Created a computer shop by Łukasz Ambroży   
none
          Created a computer shop by Łukasz Ambroży   
none
          RCMP Detention Guard - Commissionaires - Barriere, BC   
Basic level computer skills an asset; RCMP Guards monitor and safeguard person in custody....
From Commissionaires - Tue, 09 May 2017 21:40:05 GMT - View all Barriere, BC jobs
          Millwright Journeyman - AECOM - Rainbow Lake, AB   
+ Blueprint, parts book and manual reading experience. + Computer literate, experience with SAP is preferred. + Maintain equipment history records using manual...
From AECOM - Fri, 16 Jun 2017 20:48:19 GMT - View all Rainbow Lake, AB jobs
          Hourly Paid Teacher in Software Applications Specialist - ACS/AEC - LEA.8F - Vanier College - Vanier, QC   
INTENSIVE DAY PROGRAM – MEQ 12 FOURTH SEMESTER In the following disciplines: 420 Computer Science 420-HSS-VA C++ Programming (90 hours) 420-HST-VA Visual...
From Vanier College - Tue, 27 Jun 2017 17:09:43 GMT - View all Vanier, QC jobs
          Hourly Paid Teacher in Web and Database Programming ACS/AEC – LEA.2B - Vanier College - Vanier, QC   
INTENSIVE DAY PROGRAM – MEQ 22 PHASE 2 In the following discipline: 420 Computer Science 420-984-VA Advanced Programming in Java (45 hours) 420-987-VA...
From Vanier College - Tue, 13 Jun 2017 16:45:32 GMT - View all Vanier, QC jobs
          Seasonal Administrative Assistant - Parkbridge Lifestyle Communites - Wyevale, ON   
Excellent communication and customer service skills, computer proficiency, and multi-tasking capabilities. Service oriented with problem-solving and decision... $12.50 - $13.00 an hour
From Indeed - Mon, 26 Jun 2017 17:13:18 GMT - View all Wyevale, ON jobs
          Developer Instructor - Acro Media Inc. - Okanagan, BC   
Experience developing a Computer Science and/or web development course(s). The instructor will require a web development or computer science diploma, and two...
From Acro Media Inc. - Wed, 14 Jun 2017 00:24:11 GMT - View all Okanagan, BC jobs
          Yard Coordinator - Williams Machinery - Okanagan, BC   
Excellent general computer skills and experience with Microsoft Office applications (Outlook, Word, Excel); Support parts counter and other departments....
From Indeed - Fri, 26 May 2017 23:30:50 GMT - View all Okanagan, BC jobs
          Security Officer - Lake Utopia Paper Mill - Lake Utopia, NB   
Ability to multitask and efficiently operate a computer. Industrial Security, Limited (ISL) provides security services to companies in locations across the...
From J.D. Irving - Tue, 27 Jun 2017 02:21:15 GMT - View all Lake Utopia, NB jobs
          Graduate Architect - ae-7.com - Pittsburgh, ON   
Proficient computer skills including 3D modeling. Excellent ability to communicate with others digitally, verbally and in writing....
From ae-7.com - Thu, 08 Jun 2017 17:29:09 GMT - View all Pittsburgh, ON jobs
          Star Wars Characters for MSH   

Rescued from Ty States old site.
For Boba Fett and the other Bounty Hunters, see the previous post, here.

LUKE SKYWALKER

Jedi Knight
F- RM (30)
A- RM (30)
S- GD (10)
E- RM (30)
R- EX (20)
I- UN (100)
P- UN (100)
H- 100
K- 220
R- GD
P- 20
Talents:
Resist Domination, Acrobatics, Tumbling, Medicine, Occult, Thief, Vehicles, Weaponry- Firearms, Weapons Specialist- Light Saber, Astrogation, Computers, Repair/Tinkering, First Aid, Pilot.

Contacts:
New Republic, Solo's family.

Equipment:
Light Saber- RM (30) material strength
Energy Touch- Heat MN (75)
Reflection MN (75)
Blaster: EX (20) damage; range 5 areas
Mechanical Hand: RM (30) material strength; EX (20) strength

The FORCE:

Control UN (100)
Absorb/Dissipate Energy
Accelerate Healing
Anger
Calm
Combat Trance
Concentration
Control Disease
Control Pain
Detoxify Poison
Emptiness
Enhance Attributes
Hibernation Trance
Reduce Injury
Remain Conscious
Resist Stun

Sense MN (75)
Blind Sense
Combat Sense
Danger Sense
Hyperspace Tracking
Instinctive Astrogration
Life Detection
Life Sense
Magnify Senses
Receptive Telepathy
Sense Disturbance
Sense Force
Sense Spirit
Time Sense
Truth Sense

Alter AM (50)
Haste
Injure/Kill
Telekinesis
Control/Sense
Blaster Combat
Farseeing
Lightsaber Combat Projective Telepathy
Control/Alter
Accelerate Other's Healing
Force Lights
Inflict Pain
Control/Sense/Alter
Affect Mind

HAN SOLO

F- EX (20)
A- EX (20)
S- GD (10)
E- EX (20)
R- GD (10)
I- EX (20)
P- EX (20)
H- 70
K- 50
R- EX
P- 15

Talents:
Acrobatics, Computers, Detective, Martial Arts B, E, Military, Thief, Vehicles, Guns, Gambling, Repair/Tinkering, Astrogation, Pilot.

Contacts:
Luke Skywalker, New Republic

Equipment:
Blaster EX (20) damage

MILLENIUM FALCON
CTRL: AM
SPEED: SH-X (Hyper-Space CL. 5000)
BODY: MN
PROT: IN
Equipment:
2 Quad Laser Cannons RM (30) Energy
Concussion Missles IN (40) Force
Sensor Dish IN (40)
Escape Pod  

LEIA ORGANA SOLO

F- GD (10)
A- GD (10)
S- TY (6)
E- EX (20)
R- IN (40)
I- IN (40)
P- AM (50)
H- 46
K- 130
R- AM
P- 25

Talents:
Diplomacy, Acrobatics, Engineering, Leadership, Law, Criminology, Guns, Law Enforcement, Detective/Espionage, Marksman, Pilot, Physics, Electronics, Martial Arts A, B, C, D, E, Military, Computers.

Equipment:
Lightsaber- RM (30) Material Strength
Energy Touch- Heat MN(75)
Reflection- MN(75)
Blaster Pistol- EX (20) force

The FORCE:

Control- AM (50)
Calm
Concentration

Sense- AM (50)
Danger Sense
Life Sense

By "MAD TITAN"

CHEWBACCA

F- EX (20)
A- GD (10)
S- RM (30)
E- RM (30)
R- GD (10)
I- RM (30)
P- RM (30)
H- 90
K- 70
R- GD
P- 10

Powers:
Hyper-Olfactory EX
Hyper-Hearing PR
Tracking EX
Claws RM (30)
Resist Cold FB (2)
Thermal Vision PR

Talents:
Computers, Repair/Tinkering, Engineering, Martial Arts B, C, Vehicles, Guns, Astrogation, Gambling, First Aid, Pilot.

Contacts:
Han Solo, New Republic.

Equipment:
Crossbow EX (20) damage

LANDO CALRISSIAN

F- EX (20)
A- EX (20)
S- TY (6)
E- GD (10)
R- EX (20)
I- EX (20)
P- GD (10)
H- 56
K- 50
R- EX
P- 20

Talents:
Acrobatics, Detective, Medicine, Military, Thief, Guns, Vehicles, Gambling, Mining, Business/Finance, Astrogation, Computers, Repair/Tinkering, Pilot.

Contacts:
Han Solo, Luke Skywalker, New Republic, Mining Industry.

Equipment:
Blaster EX (20) damage

R2D2

F- FB (2)
A- FB (2)
S- PR (4)
E- EX (20)
R- EX (20)
I- TY (6)
P- TY (6)
H- 28
K- 32
R- N/A
P- 0

Powers:
Claws GD (10)
Resist Cold GD (10)
Comprehend Languages TY (6)
Energy Sponge TY (6)
Heat Vision GD (10)
Circular Vision
Life Detection RM (30)
Radarsense IN (40)
Radio Communication MN (75)
Total Memory UN (100)
Body Resistance PR (4)
Communicate with Cybernetics MN (75)

Talents:
Computers, Detective, Thief, Vehicles, Languages, First Aid, Pilot.

Contacts:
C3PO, Luke Skywalker

Equipment:
Grappling Hook & Line- 3 area range
Fire Extinguisher

C3PO

F- FB (2)
A- PR (4)
S- TY (6)
E- EX (20)
R- EX (20)
I- TY (6)
P- TY (6)
H- 32
K- 32
R- N/A
P- 0

Powers:
Resist Cold GD (10)
Comprehend Languages UN (100)
Hyper-Hearing GD (10)
Microscopic Vision GD (10)
Total Memory UN (100)
Communicate with Cybernetics UN (100)
Telescopic Vision PR

Talents:
Computers, Languages, First Aid.

Contacts:
R2D2, Luke Skywalker, Ewoks

YODA

F- FB (2)
A- FB (2)
S- FB (2)
E- PR (4)
R- IN (40)
I- UN (100)
P- UN (100)
H- 10
K- 240
R- FB
P- 50

Talents:
Alien Species, Bureaucracy, Cultures, Languages, Planetary Systems, Astrogation, Bargain, Leadership, Gambling, Persuasion, First Aid, Jedi Lore.
 
Contacts:
Jedi Knights.

The FORCE:
Control SH-Y
Absorb/Dissipate Energy
Accelerate Healing
Concentration
Control Pain
Detoxify Poison
Emptiness
Enhance Attributes
Hibernation Trance
Reduce Injury
Remain Conscious
Resist Stun
Short-term Memory Enhancement

Sense SH-X
Combat Sense
Danger Sense
Instinctive Astrogration
Life Detection
Life Sense
Magnify Senses
Receptive Telepathy
Sense Disturbance
Sense Force
Sense Path

Alter UN
Injure/Kill
Telekinesis
Control/Sense
Farseeing
Lightsaber Combat Projective Telepathy
Control/Alter
Accelerate Other's Healing
Control Another's Pain
Return Another to Consciousness
Transfer Force
Sense/Alter
Dim Other's Senses
Control/Sense/Alter
Affect Mind
Control Mind
Force Harmony

DARTH VADER

Annakin Skywalker
F- IN (40)
A- RM (30)
S- RM (30)
E- IN (40)
R- EX (20)
I- UN (100)
P- UN (100)
H- 130
K- 220
R- UN
P- (-75)

Talents:
Leadership, Occult (the Force), Military, Space Pilot, Martial Arts D.

Contacts:
Emperor.

Equipment:
Light Saber Rem material strength
Energy Blade Psyche (UN-100) rank damage
Reflection Psyche (UN-100) energy reflection

The FORCE:

Control SH-X (150)
Absorb/Dissipate Energy
Accelerate Healing
Concentration
Control Pain
Detoxify Poison
Enhance Attributes
Hibernation Trance
Reduce Injury
Remain Conscious
Resist Stun

Sense UN (100)
Combat Sense
Danger Sense
Instinctive Astrogration
Life Detection
Life Sense
Magnify Senses
Receptive Telepathy
Sense Force

Alter MN (75)
Injure/Kill
Telekinesis
Control/Sense
Farseeing
Lightsaber Combat Projective Telepathy
Control/Alter
Feed on Dark Side
Inflict Pain
Control/Sense/Alter
Affect Mind
Telekinetic Kill

THE EMPEROR

F- TY (6)
A- TY (6)
S- PR (4)
E- TY (6)
R- IN (40)
I- UN (100)
P- UN (100)
H- 22
K- 240
R- MN
P- (-50)

Talents:
Alien Species, Bureaucracy, Cultures, Intimidation, Law Enforcement, Military History, Planetary Systems, Archaic Library Systems, Arcane Technologies, Clone Vat Systems, Dark Side Lore, Jedi Lore, Lightsaber Histories, Fleet Tactics, Ground Assault Tactics, Leadership, Bargain, Detective/Espionage, Lightsaber Repair.

Contacts:
Sith.

The FORCE:

Control SH-Y
Absorb/Dissipate Energy
Accelerate Healing
Concentration
Control Pain
Detoxify Poison
Enhance Attributes
Hibernation Trance
Reduce Injury
Remain Conscious
Resist Stun
Short-term Memory Enhancement

Sense SH-X
Combat Sense
Danger Sense
Instinctive Astrogration
Life Detection
Life Sense
Magnify Senses
Receptive Telepathy
Sense Force

Alter UN
Injure/Kill
Telekinesis
Control/Sense
Farseeing
Lightsaber Combat Projective Telepathy
Control/Alter
Accelerate Other's Healing
Control Another's Pain
Feed on Dark Side
Force Lightning
Inflict Pain
Return Another to Consciousness
Transfer Force
Control/Sense/Alter
Affect Mind
Control Mind
Doppelganger
Drain Life Essence
Enhanced Coordination
Telekinetic Kill
Transfer Life
Sense/Alter
Dim Other's Senses

GRAND ADMIRAL THRAWN

F- TY (6)
A- TY (6)
S- TY (6)
E- GD (10)
R- IN (40)
I- RM (30)
P- IN (40)
H- 28
K- 110
R- AM
P- 0

Talents:
Artist, Detective, Martial Arts E, Military, Vehicles, Guns, Leadership.

Contacts:
Empire.

ADMIRAL DAALA

F- EX (20)
A- GD (10)
S- TY (6)
E- GD (10)
R- RM (30)
I- IN (40)
P- IN (40)
H- 446
K- 110
R- IN
P- 0

Talents:
Guns, Martial Arts E, Acrobatics, Law, Law Enforcement, Pilot, Military, Criminology, Computers, Electronics, Leadership.

Equipment:
Blaster Pistol- EX (20) Force

By "MAD TITAN"

STORMTROOPERS

F- EX
A- EX
S- GD
E- EX
R- TY
I- GD
P- EX
H- 70
K- 36 Equipment: Blaster Rifle EX Energy damage or intensity stun
Armor GD vs. Physical; TY vs. Energy 

JABBA THE HUTT

F- GD (10)
A- PR (4)
S- PR (4)
E- EX (20)
R- EX (20)
I- RM (30)
P- RM (30)
H- 38
K- 80
R- RM
P- (-30)

Special Abilities:
Force Resistance
Hutts have an innate defense against Force based mind-manipulation techniques. They receive a +2CS to resist.

Talents:
Resist Domination, Bereaucracy, Business/Finance, Cultures, Intimidation, Languages, Law Enforcement, Streetwise, Bargaining, Leadership, Gambling, Persuasion.

Contacts:
Galactic Underworld, Empire.

Limitations:
cannot move without assistance
          Graduate Interior Designer - ae-7.com - Pittsburgh, ON   
Proficient computer skills including 3D modeling. Excellent ability to communicate with others digitally, verbally and in writing....
From ae-7.com - Thu, 08 Jun 2017 17:29:05 GMT - View all Pittsburgh, ON jobs
          The Star Wars Bounty Hunters for MSH   

Here are the MSH stats for the bounty hunters from Star Wars.
These were originally hosted by Ty States and I resurrected them from his old site.


BOBA FETT

A- GD (10)
S- EX (20)
E- IN (40)
R- GD (10)
I- RM (30)
P- RM (30)
H- 100
K- 70
R- EX
P- (-50) Equipment: Battle Armor
personally modified Mandalorian battle armor that covers his head, torso, and arms with no Agility penalties.
* Body Armor: RM (30) Material Strength and EX (20) protection from Physical and Energy attacks.
* Wrist Lasers: RM (30) Energy damage with PR (1 area) range.
* Rocket Dart Launcher: Can pierce IN (40) Material Strength or less. Tip is coated with poison (Poison, Knock-Out, etc.) of RM (30) intensity. FB (1/2 area range).
* Turbo-projected Grappling Hook: 20 meter (1/2 area) lanyard (RM (30) Material Strength) with magnetic grappling "hook" (RM (30) Magnetism). FB (1/2 area) range.
* Flame Projector: RM (30) Fire Energy damage in 1 meter cone. FB (5 meter (5.45 yards) (1/8 of an area)
* Concussion Grenade Launcher: IN (40) Blunt damage to all in one area. Has firing range of AM. Magazine carries 20 grenades.
* Jet Pack: For every charge used, he can move at FB Airspeed (30 MPH / 0.5 MPM) either 3 areas horizontally, or 2 areas vertically. His jet pack only has enough fuel for 20 charges.
* Sensor Pod: AM (50) Tracking ability.
* Infra-red / Motion Sensor: Integrated infra-red and motion sensors in helmet gives EX (20) intensity and range Infra-red vision in darkness. It also allows him to detect motion in front of him and to his sides with EX (20) intensity and range.
* Macro binoculars: Enables him to see objects at up to IN (12 area) range. Scope-linked into blaster rifle, allowing him to fire it at +2CS to his Agility (in addition to Marksmanship).
* Sound Sensors: Makes out sound at up to EX (20) range. It can tell where the sound is coming from with AM (50) ability. This only works in quiet areas.
* Internal Comlink: Can be linked to Slave I's control system (with beckon call) to have it operate under remote control (come to his location, fire weapons, etc.), or it can be tuned into other standard frequencies. It also has an external speaker.
* Broadband Antenna: Can intercept and decode most communications made on standard frequencies. As a result, Boba Fett can patch into shipboard communications.
* Winch: This is capable of lifting TY (221 pounds) weight (Boba Fett and his equipment only).
* Sealed Enviro Filter: Filter system can block out harmful molecules, or in case of insufficient or deadly atmospheres, the suit can seal drawing upon a two hour (1,200 turn) supply of air.
Blaster Rifle: Range: AM, Price: (Gun) GD (1,000 credits), (Power Pack) FB (25 credits)
Damage: IN (40) Stunning or Energized Force
Rate: 1, Shots: 100 per power pack
Material: GD (See Macro binoculars in suit description for bonus to hit.)
Comlink: This is a personal communication device. It has a SH-X (150) range. It can broadcast over countless different frequencies. It can pick up normal Standard Clear Frequencies (SCF's) (non-restricted bands). It can monitor one specific frequency and SFC's simultaneously. It costs FB (25 credits).
Wookie Scalps: Several dangle from his belt. His Popularity with Rebels, Wookies, and the like drops by -10.


Slave I:


This is Boba Fett's personal ship. It has the following:
* CONTROL: TY (6).
* SPEED: (Atmosphere) UN (40 areas) A.S. / (Space) SH Z (200 areas) A.S. / (Hyperdrive) CL 5000/1 (5,000/1) (100 x light speed)
* BODY: RM (30) vs. Physical and Energy.
* PROTECTION: RM (30) vs. Physical and Energy. * Shields: GD (10) vs. Physical and Energy.
* Sensors: Passive: AM (50) range /// Scan: UN (100) range ///Search: SH X (150) range /// Focus: TY(06)
* Sensor Mask: -2CS to detect Slave I at ranges of MN(75) or greater.
* Sensor Jamming: -3CS to sensors to identify Slave I as a ship instead of an ion storm, -2CS to detect the ship's vapor trail.
* 2 Twin-mounted Blaster Cannons: Fire Arc: Turret, Fire Control: +1CS to Agility for firing; Range: SH X (74 areas), Damage: RM (30) Energized Force.
* Concussion Missile Tube Launcher: Fire Arc: Front, Fire Control: +2CS to Agility for firing; Range: AM (17 areas), Damage: EX (20) Blunt to all in 1 area.
* Ion Cannon: Fire Arc: Front, Fire Control: +1CS to Agility for firing; Range: MN (37 areas), Damage: RM (30) disruption of electrical and mechanical devices.
* Tractor Beam Projector: Fire Arc: Turret, Fire Control: +2CS to Agility for firing; Range: UN (50 areas), Damage: RM (30) Tractor beam.
* Two Proton Torpedo Launchers: Firing Arc: Turret, Fire Control: +1CS to Agility for firing; Range: SH X (74 areas), Damage: None; attaches homing beacon or S-thread tracker which is mounted on dummy proton torpedoes and which magnetically attach to a target ship's hull. They have short ranges of 15-20 light years, utilizing the same technology as subspace radio's. The S-thread trackers send frequencies on HoloNet reciever bands, allowing him to track a ship to the side of the galaxy provided the ship passed HoloNet S-threads.
* Craft: Kuat Systems Engineering's Firespray Class: Firespray-31.
* Type: Sublight Patrol and Attack Craft.
* Length: 21.5 meters.
* Crew: 1.
* Passengers: 6 (prisoners).
* Cargo Capacity: IN (40) weight (40 metric tons). (It is currently converted into a high security holding area with force cages and restraints to hold the prisoners).
* Consumables: 1 month (30 days = 414,000 turns).
* Type: Space.
* Cost: N/A.
Talents: Marksman, Thrown Weapons, Languages, Astrogation, Pilot, Jet Pack Operation, Leadership, Crime, Repair-Tinkering, Computers, Demolition, Electronics, Detective-Espionage, Weapons Specialist: Mandalorian battle armor weapons.
Contacts: None. (As per employer. When job is over, it is doubtful that the employer or those in his/her/its employment will remain contacts.)
By WLB (WMLEBG@webtv.net)

BOSSK

F- RM (30)
A- TY (6)S- EX (20)
E- IN (40)
R- EX (20)
I- RM (30)
P- GD (10)
H- 96
K- 60
R- GD
P- 0 Powers: Claws EX (20) edged damage
Armor- Natural Hide TY (6) vs. Blunt damage
Equipment: Blaster Rifle RM (30) force damage
Grenade Launcher IN (40) force damage
Flamethrower RM (30) energy damage
Binders RM (30) material strength
Talents: W.P. Blaster Rifle, Martial Arts A, B, Pilot, Engineering, Detective/Espionage, Computers, Electronics.

4-LOM

Bounty Hunter/Droid F- TY (6)
A- RM (30)
S- EX (20)
E- RM (30)
R- RM (30)
I- RM (30)
P- TY (6)
H- 86
K- 66
R- GD
P- 0
Powers: Analytical Mind- +2CS to Intuition rolls on guessing the next move of their bounties.
Body Armor GD (10)
Equipment:
Blaster Pistol- EX (20) Force damage
Stun Gas Blower- RM (30) intensity
Talents: Medicine, Law, Pilot, Buisness/Finance, Engineering, Criminology, Detective/Espionage, Computers, Electronics, Languages.
By "MAD TITAN"

DENGAR

F- EX (20)
A- EX (20)
S- GD (10)
E- RM (30)
R- EX (20)
I- RM (30)
P- TY (6)
H- 80
K- 56
R- GD
P- 0 Equipment: Blaster Rifle- RM (30) Force damage
Concussion Grenades- IN (40) Force damage
Vibroblade- RM (30) Edged Energy damage
Talents: Guns, W.P. Blaster Rifle, Marksman, Martial Arts A, B, E, Acrobatics, Pilot, Crimonology, Detective/Espionage.
By "MAD TITAN"

IG-88

F- TY (6)
A- TY (6)
S- EX (20)
E- AM (50)
R- IN (40)
I- MN (75)
P- GD (10)
H- 82
K- 125
R- GD
P- 0 Equipment: Blaster Rifle- RM (30) Force damage
Talents: Guns, Marksman, Weapons Master, Pilot, Engineering, Criminology, Detective/Espionage, Computers, Electronics.


SHIP IG-2000


CTRL: AM
SPEED: SH-Z (Hyper-Space CL. 5000)
BODY: AM
PROT: RM Weapons: Forward Laser Cannons- AM (50) Energy damage
Ion Cannon- IN (40) Shields do not effect this weapon.
2 Tractor Beams- MN (75) strength
By "MAD TITAN"

          Strategic Accounts Manager-FAI - Future Electronics - Pittsburgh, ON   
Strong Computer Skills. Future Electronics is continuously looking to add successful sales and engineering talent to support our customers across the globe....
From Future Electronics - Wed, 26 Apr 2017 20:05:59 GMT - View all Pittsburgh, ON jobs
          Office Receptionist - Worldcorp Realty LLC - Ocala, FL   
Office Receptionist needed for various duties in a busy Real Estate Office. Organizational skills, phone & computer skills are a must....
From Indeed - Wed, 07 Jun 2017 17:08:32 GMT - View all Ocala, FL jobs
             
Firstly, I've not been able to post any updates on my dear little felt bag, because I've not been able to finish it.  Just after my last post, I caught my finger around one of the dog's leads, and it wrenched.  Subsequently, it's been painful and I've not been able to hand sew or cross stitch, and writing with a pen has also been painful and difficult.  In the first week or so, even holding a knife was hard.  It's finally getting better, so I think I should finish it very soon and will then post pics - it really is adorable.  






Since then there's been quite a bit to share.  I've just finished a quilt but haven't yet photographed it, so will save that for another post.  Some birthday cards - first up.  The first card shown is one I made for Andrew's 40th birthday which was on the weekend.  I started with a plain white card blank, then added some dark blue linen textured card.  Layered on top of this was a turquoise card which I had embossed through the Sizzix Bigshot machine, giving it a nice texture.  Then I added another panel, which I had previously decorated using alchohol inks in a random splodgy, swirly pattern, with silver metallic bits randomly added too.  On this card, I used some Tim Holtz rubber stamps, added in black ink, and finally I added some adhesive blue butterflies.  Unfortunately the metallic splodges haven't photographed very well - the effect in real life is gorgeous.  Importantly, the recipient was very pleased with it.  

The second card was for Roger, Andrew's dad, whose birthday is the day after Andrew's.  I started with a plain gold square card, and layered on a piece of K & Co patterned paper.  Then I took a piece of paper and ran it through the Sizzix using a new die, giving the square with the bobbly edges.  Once I had the basic shape, I gently sponged the paper with green ink and sprayed it with the Glitz spritz using the silver and emerald colours. These were dried with a heat gun and finally I stamped it, using the pear stamp I got from Blade Rubber up in London, back in March and a small message saying Happy Birthday. Immediately after stamping, I brushed some gold Perfect Pearls over the pears which gave it a gorgeous shimmer.  The last step was to add some leaf shaped brads to the corner holes of the square. Unfortunately the photo didn't come out very well, and I only realised this after I had posted the card, so was unable to redo it.  

The third card was a thank you card for the tutor on the Kennel Club course I have recently done with Boola (full details on my other blog).  I started with a plain white card, then added a layer of green linen textured card.  On a piece of plain white card, I gently sponged some distress inks over the background then stamped it using several botanical images in different colours, mainly in an autumnal palette.  Finally, using a brad, I attached a Tim Holtz Adage Ticket, in this case saying "Soar" which seemed appropriate for a teacher.     Lastly, I gave the whole card a gentle spritz with a glitz spritz which added a subtle shimmer. 

Finally, I have just finished making the place cards for the family party we are hosting this coming weekend.  There will be nine of us round the table in a joint birthday celebration for Andrew, Roger and Booty.  Given Booty's fondness for squirrels, we decided that would be a great theme, so I spent ages scouring the net for squirrel themed craft goodies.  Eventually I was able to find some squirrel dies that could be used in my machine so I ordered them.  For each card, I started with a folded base card of a pewter wood effect  card (this seemed entirely appropriate!).  Next, I added a cream card that was embossed and then brushed with a distress ink gently, this had the effect of picking up the raised embossing.  On top of this I layered up a piece of patterned K & Co card from the Wild Saffron range, then on top of that I added a printed name which I had printed out on the computer. On the right side of each name, I added a couple of die cut leaves or nuts, in autumnal shades of brown and green.  On the left hand side was the squirrrel.  Each squirrel had to be diecut in two parts, body and tail and this was done on orange paper, which I then gently shaded using a brown ink. The squirrel's eye was a black adhesive pearl and the final touch was to add a little orange glitter glue.  I'm very happy with the finished article and they should add a nice festive touch to the party. 

 
          Another networking puzzle   

After all the michegas about AT&T last week, I decided to order a second Internet connection. I was pretty happy with their high speed DSL, but if they're going to gang up on customers with the record industry, I want to be sure I have an exit planned out.

So I ordered a Comcast network interface. It should arrive in a few days.

The question is can I have both network interfaces running on the same LAN?

I was thinking if I plug the Comcast box into a G4 desktop that has two Ethernet jacks, while the other is plugged into the big switch I bought a few weeks ago (and it's working great, btw) that's connected into the DSL line, that somehow all my computers would be on both nets at the same time?

I figured some of the network gods tuned into this station may have some ideas.

Is there any way to make use of two net connections on one LAN? Or does it necessarily mean two separate local nets?

Comment here, please.

And sorry for destroying our culture, Andrew. smile


          Organization Man   

DES MOINES, IOWA—Tim Connolly should be scared, maybe even terrified, that Howard Dean is going to lose and lose big. Not because of the much-touted polls that show Dean sinking to a four-way tie in Iowa with the caucuses less than 48 hours away, but because Connolly, the Dean campaign's Iowa state field director, has seen the campaign's internal numbers. And using traditional Iowa math, the numbers don't look good.

"We did an analysis of our 'ones' "—the voters the campaign has determined are committed to caucusing for Dean (a "two" is a leaner, and a "three" is undecided), Connolly says. "Sixty-five percent of them have never caucused before, which is an extremely high number and would scare the shit out of most campaigns," because they'd be worried that the voters wouldn't show up Monday night. But Connolly's not scared. "Common sense would say I should be, but I'm not," he says. "We have the organizational strength to meet that challenge."

Organization. It's the mantra of every pundit on television and every campaign on the ground two days before the caucuses. At most of the candidate events I've attended since arriving in Iowa Thursday, I had the feeling I was watching a sideshow from the real campaign that was taking place somewhere else: on the streets and in people's homes. The story of the final days of Dean's Iowa campaign isn't his bus trip or his stump speeches. It's his 3,500 out-of-state volunteers who've come from all over the country—and farther, including three expatriates from Tokyo—to canvass the state. Over the course of the campaign's final three days, they're knocking on more than 200,000 doors. If Dean wins Monday, Connolly and the campaign will have proved that the Internet's effect on politics isn't just about fund-raising or Meetup or blogging. The Internet can win the ground war.

"We did an analysis of every precinct that is walkable, which is not a precise science," Connolly says. Those walkable precincts make up only about a third of the state's 1,993 precincts, but they include probably 85 percent to 90 percent of the delegate total. The Dean campaign mapped each one using computer software, and it determined the address of every registered Democrat and independent voter in the precincts. Suitably armed with the map, the addresses, and the right amount of Dean paraphernalia, the volunteers are swarming the state. Even if they don't convert a single voter, they return with important information—who's supporting Kerry or Edwards or Gephardt, who's undecided but going to the caucuses, who likes Dean but needs a babysitter to be able to caucus—that the campaign can use to fine-tune its strategy up to the final hours.

What does this have to do with the Internet? The vast majority of the volunteers who make up this weekend's "Perfect Storm" for Dean signed up online, transmitting their names, their housing needs, their flight information, and more. "We could not do the Storm without the Internet," Connolly says. Nor could the campaign have been prepared well enough to have specific jobs ready for each volunteer as he or she arrived. "It's still just the Stormers knocking on a door. But the back end—they would not be here and effectively employed and utilized were it not for the Internet."

The Net is the tool that's enabled the Dean campaign to capitalize on the grass-roots energy created by its candidate. In the past, an insurgent candidate like Dean would generate excitement, but he wouldn't be able to turn it into an organization. "This happened with Gary Hart," says Connolly, who worked for Hart's '84 campaign. "You got excited about the guy named Gary Hart, you liked what he was saying, but there was no local office to call, you couldn't go to a Meetup, etc."

The Internet excels at just keeping people involved with the campaign. "A volunteer who has nothing to do will become discouraged and no longer volunteer," Connolly says. "You used to do things. You'd have cases of envelopes, and you'd have people address them. And when they're done, you'd throw them away." Or you'd have volunteers enter unnecessary data into computers. Just to keep people involved and interested in the campaign and the candidate. The Dean blog serves the same function, while also serving as a communications medium and a fund-raising tool. The role of the Internet and the blog in the campaign's ground organization is what Dean's skeptics haven't understood, Connolly says. "They think that the Dean campaign is simply a cybercampaign. They don't realize that each of those people also lives in the analog world."

Just a couple of hours after I finished talking with Connolly, the Dean campaign was hit with its latest piece of bad news: the latest Des Moines Register poll, which shows Kerry in the lead with 26 percent, followed by Edwards at 23 percent, Dean at 20 percent, Gephardt at 18 percent, and a 4 percent margin of error. Connolly told me he doesn't "lose any sleep over the Zogby poll or any other poll," because he knows their strength on the ground.

Of course, every campaign hails its organizational strength. Gephardt spokesman Bill Burton told the Des Moines Register of his candidate's campaign, "This has been an organizational force in the state that has never been seen before by anybody, Democrats or Republicans." I asked Connolly what he'd be banking on if he were Gephardt's field director. Organized labor, the fact that he's won Iowa before, "and just the general denial that goes on in campaigns," he said. Monday night, we'll see who's in denial.


          A Browser's Guide to Campaign 2004, Cont'd.   

Four Trials, John Edwards' new book (written with John Auchard), is a lot like Edwards' presidential campaign appearances: On the plus side, it's affecting if a little bit corny, and in parts it's enthralling. But it's also thin on policy, focused on a past that bears little relation to the candidate's merits, and filled with eye-rolling paeans to the virtues and dignity of "regular people." And like the Edwards campaign, it's headed for the remainder bin before you know it.

The book is organized around four narratives about depositions, cross-examinations, and closing arguments—fairly well-written and not uninteresting. But what's really new here is Edwards' willingness to talk about his son Wade, who died in a car accident at the age of 16. Edwards is said to refuse all media questions about Wade, and as far as I know, he never mentions him on the campaign trail. To take just one example, at a Nov. 5 debate in New Hampshire I saw Edwards say, in an eminently confusing answer for those who don't know his life story, "We have four kids. We have a daughter who is in college, then we have a five-year-old, Emma Claire, and a three-year-old, Jack." He added, "They are simply the joy of my life." But he said nothing about the missing fourth (and oldest) child, Wade. His death is the real trial that underpins the entire book.

Wade shows up as early as Page 14, where Edwards mentions his birth in 1979. A subsequent chapter opens with a two-page account of Wade's healthy birth, to contrast it with the birth of Jennifer Campbell, a girl who developed cerebral palsy because of a botched delivery. (A few pages later, Edwards observes that his "beautiful son," 6 years old, was "born only three months after Jennifer, but at the Salvation Army, I was already coaching him in basketball"). We learn that "Elizabeth and I have vacationed without our kids only once—a three-day trip to Charleston when Wade was thirteen months old."

Slightly more than midway through the book, Edwards devotes two paragraphs to a description of Wade. At 10 years old, he was "already a fine writer, a nut for the UNC Tar Heels basketball team, and forever asking me questions about the cases I was working on. He was far and away the most fastidious Edwards in the household, and the first among us to master a computer. Wade had a calmness. … It was something more than the levelheadedness I had—there was a bit of a preacher's composure in my son."

The actual account of Wade's death and its immediate aftermath is very short, not even two full pages. But you see it coming pages before, when Edwards writes: "How could I not be an optimist, and how could I not be happy? My days were so often full of activity aimed at something I knew to be good. I was stubborn, for I thought that with enough work, study, imagination, honesty, and sure goodwill, you could make anything and everything better. Of course I learned that some things can never be made better. Some things can never become right again."

It's compelling stuff. Wade takes a job as a gofer in Edwards' law firm, and, one summer, father and son climb Mount Kilimanjaro together. In 1996, a Voice of America essay contest names Wade one of its 10 finalists for an essay about Election Day, and the Edwards family heads to Washington, D.C., as Wade's entourage. (This is two years before Edwards' election as senator.) They visit the White House and shake hands with Hillary Clinton. Wade meets North Carolina's senior Sen. Jesse Helms and gets a photo taken of him sitting at his desk. Later, Wade wins another award for a short story, and he says he wants to be a lawyer at his dad's firm.

On April 4, 1996, a strong wind blows Wade's Jeep Grand Cherokee off I-40 East, on the way to the Edwards family beach house on the Carolina coast. The passenger lives, but Wade doesn't. "Nothing in my life has ever hit me and stripped everything away like my son's death. That moment, those days, belong to our family," Edwards writes. "But because it was and is the most important fact of my life, and because I understand that I am now a public figure, I will say a few things about our son and our loss." After Wade's death, Elizabeth and John establish a foundation in his name, and they receive a touching letter from a student Wade knew in fifth grade. Edwards concludes: "The shards of a broken promise were everywhere: all over our house, on the television and the radio, on the neighborhood streets where he and I had jogged, and in the office I no longer visited. This has not changed in the seven years since Wade died, and I don't ever expect it to change. I do not fight it; it is the undercurrent of my life." Six months after Wade's death, Edwards returns to work.

In the book's afterword, Edwards semi-apologizes for writing about Wade: "When I began to think about this book, I did not know how much I would say about Wade, or particularly about his death, and I thought it would be best not to say that much about it. But as I attempted to explain my life as an advocate and as a man, I found it impossible not to speak of him. As much as anyone is—as much as my other children, Cate, Emma Claire, and Jack, as much as my parents, my grandmother, and my wife—Wade is who I am." He concludes the book, "I have learned two great lessons—that there will always be heartache and struggle, and that people of strong will can make a difference. One is a sad lesson; the other is inspiring. I choose to be inspired."


          See Dick Run   

SIOUX CITY, Iowa—Dean season! Gephardt season! Dean season! Gephardt season! If any lingering debate remained over which presidential candidate is currently enjoying his media moment, my two days with Dick Gephardt settled it. The 20 national reporters who follow Gephardt for all or part of his campaign swing from Des Moines to Sioux City are the latest sign that not only have the leaves turned in late October, but so have the media.

I came along to witness firsthand the evidence for something I wrote earlier this month after the Phoenix debate, that Gephardt's hard-nosed and well-organized Iowa campaign presents, at the moment, the biggest obstacle to President Dean (or, to be fairer, Democratic Nominee Dean). But I missed the media conspiracy memo that told everyone else to show up, too. During Gephardt's weekend swing in Iowa two days before, only three national reporters trailed the candidate. But now, David Brooks is here. So are Mara Liasson of NPR and Carl Cameron of Fox News. Throw in reporters from ABC, MSNBC, Knight Ridder, the Atlanta Journal-Constitution, the Christian Science Monitor, Newsweek, and the New York Times. (Counting Brooks, on Wednesday there are two New York Times writers following Gephardt.) Just for the sake of overkill, there are reporters from the British press and from Japanese television along for the ride. At one event in Pocahontas, Iowa—a town with an absolutely gigantic statue of the Indian princess outside her teepee welcoming visitors from the highway—the number of journalists nearly matches the number of prospective caucus-goers.

The Gephardt campaign pushes its slow-and-steady-wins-the-race angle (or is it a plea for votes from Maryland Terrapins alums?) by emblazoning "Fear the Turtle!" on the front of the press itinerary, complete with a little clip-art turtle on every page. The packet includes the latest Iowa poll results, which show Gephardt and Dean in a statistical tie for the lead, with Kerry and Edwards lagging behind. For good measure, the campaign throws in last week's favorable press clippings, including Des Moines Register wise man David Yepsen's assertion that Gephardt is the Iowa front-runner and that Dean has "plateaued" in the state. Also enclosed is a much-discussed Washington Post report—distributed, in truncated form, to voters at campaign events—that Gephardt is the candidate "many prominent Republicans fear the most." Not included is a delicious metaphor for Gephardt supporters to latch onto: While hurtling from campaign stop to campaign stop in Iowa over the past few months, the Dean van has been pulled over multiple times for speeding.

At his first stop, a senior center in Des Moines (the first of three consecutive senior centers visited by the campaign), Gephardt is supposed to deliver a "health policy address," but it turns out to be a rehash of old Howard Dean quotes about Medicare. (Later, while being ribbed by reporters about the false advertising, Gephardt's Iowa press secretary, Bill Burton, protests that he never called it a "major" policy address.) The newest wrinkle: Gephardt wants to paint the 1997 balanced budget accord—generally thought to be one of President Clinton's major accomplishments, and one supported by Dean—as a "deep, devastating cut" in Medicare.

While Gephardt speaks in front of a sign that reads "Protect Social Security" and "Protect Medicare" over and over, like computer-desktop wallpaper, I wonder: Does he really want to play this game? Dredging up old quotes and votes about Gephardt's onetime conservatism is what helped to derail his '88 campaign. He voted against the establishment of the Department of Education. He voted for a constitutional amendment to ban abortion. He voted to means-test Social Security and to eliminate cost-of-living adjustments from the program. He voted for Reagan's 1981 tax cuts. He opposed an increase in the minimum wage. Does a man with a legislative record this long and varied really want to ostentatiously declare, "There are life-and-death consequences to every position taken and every vote cast"? If that's so, how many times was Dick Gephardt on the side of death?

For now, however, it's a more recent House vote that's preventing Gephardt from running away with the Iowa race. At nearly every campaign event I attend, Gephardt is forced to deliver, in effect, two separate stump speeches. The first is the one he would like the campaign to be about: universal health care, jobs, and the immorality of rapacious multinational corporations. Gephardt's not anticapitalist: "Capitalism is the best system," he says in Pocahontas. "But capitalism has to have rules, so the capitalists don't destroy the very system" they benefit from.

He describes his visits to Mexico, China, and India, where workers live in the cardboard boxes used to ship the products they make. "I smelled where they live," he says. They live without electricity, without running water, with raw sewage running down the streets and next to "drainage ditches filled with human waste." "They live in worse conditions than farm animals in Iowa," he continues. "This is nothing short of human exploitation, that's what it is, for the profit of some special interests in the world." I'm not sure I agree with Gephardt's proposed solutions—though I'm intrigued by his notion of a variable international minimum wage—but there's no denying that he's a powerful critic of global capitalism's excesses.

Then, once Gephardt has finished and the applause has subsided, almost invariably a voter raises his hand to ask: What about Iraq? Was this war about oil? How can we recover the world's respect? How can we pay for all your programs with a war on?

At this point, Gephardt is forced to unveil stump speech No. 2. Sept. 11 changed everything, he says. Government's highest obligation is to protect American lives. In a Gephardt administration, the highest priority would be to prevent a nuclear device—"dirty or clean"—from going off in New York, Los Angeles, or Des Moines. That's why he decided Saddam Hussein needed to be removed. He supported the war because he believed the estimates of the CIA and the warnings of former Clinton administration officials, not because he listened to President Bush ("I would never do that").

Slowly, Gephardt's defense of his vote for the congressional war resolution transitions into a critique of the president. Though in an interview he insisted that the president was smart, on the stump he's not shy about insinuating that the president (whom he often refers to as "Dubya") is stupid. "He's incompetent," "He frightens me," "He's hard to help," I told him America founded the United Nations because "I wasn't sure he knew the history," and "If you'd been meeting with him every week since 9/11, you'd be running for president," too. Because Bush refused to negotiate with Kim Jong Il, North Korea is now "weeks away" from producing nuclear bombs. Bush abandoned the peace negotiations between Israel and Palestine, saying, "It's not our problem." He's arrogant. He doesn't play well with others. By the end, people are satisfied enough with Gephardt's explanation, and maybe even a little terrified, but you get the sense that they're not enthused by it.

But Gephardt isn't counting on enthusiasm. He has a couple edges on Dean, in addition to his obvious union support. For one, a surprising number of Iowa Democrats just don't like the former Vermont governor. The opposition to Gephardt tends to be substantive, based on his support for the war or his failure as Democratic leader to enact a more Democratic agenda. But the opposition to Dean is stylistic, or maybe even cultural. In socially conservative Iowa, sometimes you hear it whispered: Where's Dean's wife? Before Gephardt arrives at an event in the town of Ida Grove, I overhear a woman grumble about Judith Steinberg's refusal to campaign for her husband. "I can't get used to that," she tells her companion. "It's supposed to be a family thing."

By the same token, Gephardt never fails to mention the "church loans" and "church scholarships" that allowed him to attend Northwestern and then Michigan law school. He also refers to his son, Matt, who survived prostate cancer as an infant, as a "gift of God." I don't think I've ever heard Howard Dean say the word "God" in reference to anything.

Just before the last stop in Sioux City, I'm granted a 10-minute ride-along interview with Gephardt. I've got a number of questions, but the one I really want an answer to is this: If balanced budgets and free trade—two things that don't get a lot of emphasis in the Gephardt platform—weren't the secrets of the Clinton economy, what were? Higher taxes for the rich? Gephardt explains that the '97 budget accord wasn't needed to balance the budget, and then he tries to explain why Bush's steel tariffs—which Gephardt supported, and which made the United States lose manufacturing jobs—aren't analogous to the retaliatory tariffs Gephardt wants to be able to impose on foreign products or factories that don't comply with minimal labor and environmental standards. Soon enough, we're so sidetracked that I've forgotten entirely what we were talking about.

But afterward, when I'm once again following Gephardt in my rental car, I'm left with my question: Clinton balanced the budget and promoted free trade, and the economy boomed. President Bush ran up enormous deficits and put new restrictions on trade, and the economy sputtered. Isn't Dick Gephardt's plan closer to President Bush's?


          Comment on OSU Libraries IT Infrastructure Move January 5 by IT Announcements: Project Updates, Training, and Planned Maintenance - Information Technology   
[…] Beginning at 7:00 am on January 5, IT will be moving OSUL servers and storage devices to the State of Ohio Computer Center (SOCC). Available services will include: internet, email, calendars, printing, and a single web page at library.osu.edu. Get more details about the infrastructure move. […]
          Process Control Technician - Invista - Kingston, ON   
Utilizing computerized control systems, as well as manual operation of equipment, the Process Control Technician will learn to control the processing and flow... $26.70 an hour
From Invista - Thu, 08 Jun 2017 18:11:31 GMT - View all Kingston, ON jobs
          California Sounds: Queens of the Stone Age, Chelsea Wolfe, Dream Syndicate and Shannon Lay   

Computers and keyboards may be running the city’s commercial pop music industry, but you still can’t toss a Telecaster in this town without hitting a guitarist.

Below, a few new six-string driven songs that complicate a recent story on the death of the guitar, one of which stars a cat named Blood,...


          Giving Grammy security advice   
So Grammy got a computer. No, not my Grammy. Just some random Grammy out there got a computer. How do I know? Because someone who set up her computer wanted their family to know that Grammy got a computer and now could get emails. So that person sent out an email to “Mom” and a …

Read More Read More


          eCamp - International summer camp in Israel   
14-18The northSummer campSportsArtsScienceTechnologyOutdoor challengeMeet Israeli peersIsraeleCamp is the ultimate summer camp in Israel. We are an English speaking Israel camp focused on technology, media arts and gaming for children and teens ages 7-18. Over a 2 weeks session, campers explore Israeli technology and have a hands-on experience in computer programming, game productions, digital media arts, web designing, Robotics and many more. The opportunity to travel and see Israel together with the opportunity to create friendships with Jewish teens all across the world, make eCamp an unforgettable summer experience for everyone!+972-3-920-3970  |  http://www.israelway.com/eCamp1-866-276-2993  |  Hebrewhttp://www.ecamp4u.com/Registration/Get_a_Free_Brochure.aspx?id=279
          Teller (Hire-ahead) - America First Credit Union - Millcreek, UT   
Ability to operate related computer applications. Ability to operate related computer applications and business equipment including adding machine, typewriter,...
From America First Credit Union - Mon, 05 Jun 2017 23:54:23 GMT - View all Millcreek, UT jobs
          Boy came to solve First Sexy Neighbor Computer Problem   
Watch Boy came to solve First Sexy Neighbor Computer Problem at Sex2016.net - best free sex video tube updated daily with new porn videos!
          Legal Secretary - Edward T. Little Professional Corporation - Ridgetown, ON   
Permanent/Full Time Legal Secretary with primary emphasis on Real Estate Law and secondary emphasis on Corporate Law. Strong computer skills necessary....
From Indeed - Thu, 18 May 2017 13:35:49 GMT - View all Ridgetown, ON jobs
          Sr. Software Engineer   
TX-Dallas, Job Description: ##Qualifications: Required: · BS in Computer Science or Engineering · 6-10+ years full stack development experience, Microsoft stack preferred (C#, MS SQL Server, etc.) · 6-10+ years JavaScript development experience, including one or more JS frameworks (e.g., AngularJS, JQuery, NodeJS, React, etc) · 3+ years AngularJS experience · Bootstrap v3+ · Responsive development experience
          Desktop Support Technician   
Plano, At eXcell, we set you up for job success right from the start. Our precision recruiting process aligns the right fit for the right people. *Contract to Hire Opportunity* A+ Certification required. Summary of the Desktop Support Technician Role: Maintains, analyzes, troubleshoots, and repairs computer systems, hardware and computer peripherals. Documents, maintains, upgrades or replaces hardware an
          Carlos   

Hi, I am Carlos. I study at the institute Rafael Pineda Ponce. I am in eighth grade. I have three brothers who also participate in Asociación Compartir. I participate in the Readers Club and the library where I can do my homework, learn about reading and I have access to many books and the computer...

The post Carlos appeared first on JustWorld International.


          Politics Aside, Counting Crowds Is Tricky   
Updated at 3 p.m. ET on Jan. 27 There has been a lot of arguing about the size of crowds in the past few days. Estimates for President Trump's inauguration and the Women's March a day later vary widely. And for crowd scientists, that's pretty normal. "I think this is expected," says Mubarak Shah , director of the Center for Research in Computer Vision at the University of Central Florida. Shah says he encountered something similar during mass protests in Barcelona, Spain a couple of years ago. "The government was claiming smaller number than the opposition was claiming," he says. Counting quarrels have popped up during previous events in the U.S. as well. During the Million Man March in 1995, the National Park Service estimated the crowd to be far smaller than the organizers claimed. The controversy led Congress to bar the Park Service from doing head counts on the National Mall. The reason that disagreements frequently arise is that there's no foolproof way to get an accurate head
          Learn of the adapted strategies and Access SEO's Anatomy on their Campaigns   
Social media are primarily Internet- and mobile-based accoutrement for administering and discussing admonition amidst beastly beings. Unlike automatic media, adequate media is about cheaper for anyone to advertisement or accepting admonition accepting automatic media issues may board big-ticket columnist or a government-granted spectrum license. Because of the accepting of adequate media sites, it additionally became the centermost of online business they anxiety adequate media optimization.

Abounding accepting get submitted every day, but abandoned the best Dugg accepting appear on the avant-garde page. Abounding actualization access contributed to authentic Delicious one of the best acclimatized adequate book marking services.
Learn of the adapted strategies and access SEO's anatomy on their campaigns. Technorati is an Internet hunt abettor for analytic blogs, advancing with Google and Yahoo. Technorati looks at tags that author’s access placed on their websites. The armpit has argument areas in which users may altercate the accustom links and vote for or abut others' comments. Aback there are abounding votes abutting an acclimatized comment; it will not be displayed by default, although a clear-sighted can affectation it through a delivery or preference. Wikipedia is a free, multilingual anthology activity authentic by the non-profit Wikimedia Foundation. No article is age-old by its artist or any added editor, or is vetted by any acclimatized authority. Visit an online SEO Philippines armpit to amateur added about the adapted activity taken on an SEO campaign.

Yahoo! Answers has become the added best acclimatized Internet advertence armpit afterwards Wikipedia, according to Comscore. Newsvine is a community-powered annual website which draws adequate from its users and affiliated adequate from boilerplate sources such as The Associated Press. Users can abode articles, drupe links to conflicting content, and altercate annual items submitted by both users and able journalists.

Flickr is an angel and video hosting website, web casework suite, and online affiliation platform. It was one of the age-old Web 2.0 applications. In accretion to achievement an acclimatized Web armpit for users to allocation claimed photographs, the annual is broadly acclimated by bloggers as a photo repository.

YouTube is a video administering website breadth users can upload actualization and allocation video clips. With it’s accessible to use interface, YouTube bogus it accessible for anyone who could use a computer to cavalcade a video that millions of bodies could watch aural a few minutes. For added admonition about what adequate media sites do to admonition in an SEO effort, afresh arrangement an online SEO Philippines armpit for added details. It is a abandoned advancement abettor which uses accessory and social-networking principles. Web pages are presented aback the user clicks the "Stumble!" button on the browser's toolbar.
          Comment on Nokia E-series sync with Evolution via Bluetooth in Ubuntu by virtual dj free download   
This speaker package is perfect for the beginner DJ. Select the "Browse" tab on the menu to open a link to your computer and media files. These are base, drums, tambourine, piano, and guitar.
          Boss Grab Secretary Ass While She Tried To Help Him Something With His Computer   
Watch Boss Grab Secretary Ass While She Tried To Help Him Something With His Computer at XXXPorn.rs - best free online XXXPorn videos for you to enjoy.
          Macy's Locker Room Assistant Manager Part-Time - (Boston)   
Location: Boston (Downtown)450 Washington StreetGenerate SalesProduce sales gains, by providing customer service.To meet or exceed Company Objectives in all individual statistics.Learn to provide consistent, documented appraisal of an associate's sales performance. Provide support by giving feedback on areas of strength and opportunity while keeping in line with Company Objectives.Adhere to current visual guidelines includes: proper merchandising, signage and store cleanliness.Maintain a professional appearance consistent with Dress Code Policy.Control ExpensesProtect Company assets within guidelines of LIDS Retail policies.Assist in preparation of store schedules that provide proper store coverage and are within the Company guidelines for wage control.Follow all policies to accurately manage store inventory including receiving, transferring, completing price changes and conducting product counts.Perform proper documentation and record keeping per LIDS Retail policies as well as state and federal laws.Open and close the store as required following the procedures per the Operations P&P Manual.Support and adhere to all LIDS policies, procedures, and guidelines.Supervise AssociatesParticipate in LIDS Training Programs, adhere to set goals (for sales and tasks) and regular follow up.Assist in recruiting and training store personnel on proper store operations and procedures.Encourage store associates' direct compliance of established company policies, procedures and guidelines including (but not limited to) safekeeping of company inventory, funds and property.Perform work of subordinates as needed.Communicate with employees at all levels of the company.Other duties as assigned.Education and/or ExperienceHigh school diploma or equivalent plus one year relative experience.Established ability to produce sales results while minimizing loss.Strong interpersonal skills and the ability to communicate verbally in a clear professional manner.Ability to operate a computer, as well as maneuver relative software programs.Ability to lift up to 50 pounds.Ability to climb a ladder and work with hands overhead.Standing required for up to 100% of the work time.Ability to work unsupervised. Source: http://www.juju.com/jad/000000009imzqi?partnerid=af0e5911314cbc501beebaca7889739d&exported=True&hosted_timestamp=0042a345f27ac5dc5c414f01701a3ccb511fd8fc0aa4eabab1fecf86793374f6
          Lids Part-Time Sales Help - (Peabody)   
Location: North Shore210 Andover St, F101Generate SalesProduce sales gains, by providing customer service.Meet or exceed Company Objectives in all individual statistics.Participate in store maintenance per the current visual guidelines including: proper merchandising, signage and store cleanliness.Maintain a professional appearance consistent with Dress Code Policy.Control ExpensesProtect Company assets within guidelines of LIDS Retail policies.Participate in managing store inventory including processing shipments and resetting merchandise.Assist with accurate product counts in a consistent and timely manner.Support and adhere to all LIDS Retail policies, procedures and guidelines.Other duties as assigned.Education and/or ExperienceStrong interpersonal skills and the ability to communicate verbally in a clear and professional manner.Ability to read and operate a computer.Ability to lift up to 50 pounds.Ability to climb a ladder and work with hands overhead.Standing required for up to 100% of the work time. Source: http://www.juju.com/jad/000000009imurk?partnerid=af0e5911314cbc501beebaca7889739d&exported=True&hosted_timestamp=0042a345f27ac5dc5c414f01701a3ccb511fd8fc0aa4eabab1fecf86793374f6
          Software Development Resume   

Samuel Abebe

        12028 NE 8th St,Bellevue, WA 98005



SUMMARY of QUALIFICATIONS
  • 4 years experience in full SDLC with multi-tiered architectures with C#, ASP.NET and ADO.NET.
  • 4+ years experience in web application development using different web technologies.
  • 4 years experience in designing, implementing and optimizing relational databases and working on stored procedure, triggers and views with SQL Server.
  • 3 years MS SQL Server Integration and Reporting Services (SSIS and SSRS).
  • 3 years of experience in HTML, DHTML, XHTML, JavaScript, JQuery, AJAX, CSS, XML, XSL, XSLT, XPATH.
  • 3 years of experience in writing Test Plan, Test Case Development and Test Automation.
  • Experience in functional, Unit, Integration, System, performance, Stress, Regression, Black box, White box, Localization, Globalization and UI Testing.
  • 1+ year experience in latest .NET technologies WCF, WPF, LINQ, and Silverlight.
  • In-depth knowledge of data Structures, algorithms, and design patterns. Strong analytical skills with ability to work independently or in a team environment
  • Highly innovative and adaptive learner, able to quickly grasp complex systems and identify areas of possible improvement.

OVERALL TECHNICAL SKILLS
LanguagesC#, Java, C++,ASP.NET, ADO.NET, Java EE, WCF, WPF , LINQ, Silverlight
DatabaseSQL Server 2005/08, SSIS, SSAS, SSRS, Optimization
Web/App ServerASP.NET, JavaScript, XHTML, CSS, AJAX, Silverlight
IDEVisual Studio, SQL Server Mgt Studio, Eclipse, Net Beans
OtherRational Unified Process (RUP), Agile, Rational Rose , UML, IIS, Tomcat, Crystal Reports, Power Shell, NUnit , JUnit, MVC

PROFESSIONAL EXPERIENCE

Software Engineer
Global Knowledge Initiative, Washington DC, USA     01/2010- 10/2010
The Global Knowledge Initiative is an NGO which build global knowledge partnerships between individuals and institutions of higher education and research. They help partners access the global knowledge, technology, and human resources needed to sustain growth and achieve prosperity for all.

Involved in a team of three on migrating and upgrading the organization site to build a dynamic from the existing static website. Responsibilities: 
  • Designed and implemented the user interface.
  • Maintained, updated, and enhanced the organization site.
  • Designed and implemented the relational database
  • Writing Test Plan, Test Case Development and Test Automation.
  • Functional, Integration, performance, Stress, Regression, Black box, White box, and UI Testing. 
Technical Environment: C#, ASP.Net, Silver light, Visual Studio 2008, SQL Server 2008, Visio, HTML, XML, Java script, CSS, IIS and  FileZilla.

Software Engineer
“HAFSAM P.L.C” Garment Shopping Company, Addis Ababa, Ethiopia     09/2007- 05/2008
Involved in a team of three on design and implementation of e-Commerce website to enable users to shop online for traditional clothing they like. The customers will search through company’s inventory by different categories, add the item to shopping cart and, finally, check out. Responsibilities:
  • Designed the management of administrative tasks, such as pricing and discounts when needed, upload images of clothes and manage orders status
  • Implemented creation of a profile for users and set up a username and password
  • Implemented feature for users to step through the shopping process such as searching for products, add or delete items to shopping cart, and finally check out
  • Implemented feature for users to check out and asked for their billing, shipping and payment method information. 
Technical Environment:   C#, ASP.Net, ADO.NET, SQL Server, HTML, XML, JavaScript, CSS and Visio.

Software Engineer
NIB International Bank, Addis Ababa, Ethiopia     01/2005- 08/2007
Involved in a development of banking application used to cut down communication gap between the bank and its customers. The customers can directly communicate with the bank online with the user friendly interfaces. The application handles online money transactions by the customer which includes withdrawal, deposit and money transfers to another account, and accessing online statements. Responsibilities:
  • Participated in the design of use case, association, class and activity diagrams using UML
  • Worked on  creation of  .Net framework customized classes that would be used later for the application
  • Worked on the SQL queries, stored procedures & functions using SQL server
  • Prepared Test plan, Test cases and other documentations.
  • Used Nunit for our unit test cases.
  • Functional, Unit Testing, Integration Testing, Stress, Performance and UI Testing.
Technical Environment:  C#, ASP.Net, SQL Server, ADO.NET, Rational Rose, HTML, Java Script, CSS, and XML.

EDUCATION

Master of Science in Computer Science                                         May 2008 – Jan 2010 Maharishi University of Management, Fairfield, Iowa                                          Bachelor of Science in Computer Science                                       Sept 2000 - Jan 2005 Addis Ababa University, Addis Ababa, Ethiopia

          SyncMate 3.6   
SyncMate is a multifunctional sync app for your Mac which will sync it with mobile phones, other computers, portable devices and online accounts within one app!
          Survey Says: Raspberry Pi Still Rules, But X86 SBCs Have Made Gains   
DeviceGuru writes: Results from LinuxGizmos.com's annual hacker-friendly single board computer survey are in, and not surprisingly, the Raspberry Pi 3 is the most desired maker SBC by a 4-to-1 margin. In other trends: x86 SBCs and Linux/Arduino hybrids have trended upwards. The site's popular hacker SBC survey polled 1,705 survey respondents and asked for their first, second, and third favorite SBCs from a curated list of 98 community oriented, Linux- and Android-capable boards. Spreadsheets com ...
          Softick Card Export 3.27   
With the help of Softick Card Export you can easily use the Pocket PC on the PC and without any complications because the computer recognises the Pocket PC as a memory stick.
          Twenty Questions (games)   
Remember the old game you used to play as a child? Now it's back, only instead of playing against a human, you're playing against a computer with a large databse of questions and answers and things, and a big deal of AI.
          Uncle Goose   
Uncle Goose is a company that is in love with learning, design, and creativity. They especially love wood blocks, so much so that their company is solely dedicated to crafting these classic toys in an era of computer games and (…)

Read the rest of this entry »


          Support Technician - Cerner Corporation - Kansas City, MO   
Support Technicians provide technical support and troubleshooting on devices such as computers, phones, AV equipment, etc. The Support Technician helps internal...
From Cerner Corporation - Tue, 18 Apr 2017 23:49:01 GMT - View all Kansas City, MO jobs
          Returnil System Safe 2011   
Returnil System Safe is built with the end-user in mind. It uses a combination of antivirus, antimalware, system restore and a virtual system to protect your computer from all types of viruses and other malicious threats.
          Dr. Web CureIt! September 23, 2011   
Easy to use FREE curing utility to clean your computer infected with viruses and various unwanted codes by the Dr.Web Anti-virus updated once or several times an hour.
          Kolkata Chapter Begins :-)   
This would be the longest stretch when I didn't blog, since I started blogging, but it's like that, and that's the way it is. First I was stranded, disconnected at Jaipur for a while, which now seems like pretty comfortable setting.. sigh. Then, once I touched base at Kolkata, things got hectic, and I didn't have a computer for a while. Now that things have more or less settled and I've bought my self a rather sleek Compaq Presario v3000, it's about time I resume blogging.

First things first, Kolkata and the neighbourhood, looks totally amazing from air, after first few days of showers. From my SpiceJet flight, I was gawking, spellbound, at the marvellous view below.. lush greenery, numerous big & small canals and all! Then we hit the ground (pun intended). Let's just say, for someone new to the city, it's not very tough to not like the city, going by the first impressions. The IIM Calcutta campus is good 90 minutes from the airport! The area neighbouring IIMC, it's called Joka, is rather unimpressive to say the least. However, the campus is breathtaking with its 7 lakes and lush greenery. My hostel room, I found is more comfortable than the room I had in IIT Bombay. It's bigger, better planned and it has a balcony which opens to the patch of jungle behind my hostel. I haven't clicked snaps of the campus, but I intend to do that pretty soon. The downtown Kolkata, essentially Park Street area, is light-years away from the campus and it takes huge effort to make it to there. Till now I've been there only once, and even then it was disappointing as we couldn't catch any movie! The movie buff in me is still very pleased to be here; the LAN is virtually full of movies! My new 250 GB external HDD might getting full to the brim, is looking like a possibility.

The academic load looks manageable. I have five courses, all of them interesting. Especially the Organisational Behaviour course, which has interesting mix of Psychological studies in it, pretty impressive! Then there is Indian Economic and Political History, which is also pretty interesting to study. Midterms are still (just?) 2 weeks away and things are chill (as we say here).

I guess, I'll start with such banal posts; it should take time to get back the flow for blogging :-)
          Focus Pocus   

Over the last few months Joe and Seb have been busy creating assets for a new game by Roll7 what goes on the computer box and is powered by YOUR BRAIN! As a special treat for working so hard they were allowed to make a fun little trailer. Watch out, though, it's catchy!
          Helping Friends Sister To Fix a Computer End Up With Anal Fuck   
Watch Helping Friends Sister To Fix a Computer End Up With Anal Fuck at XXXPorn.rs - best free online XXXPorn videos for you to enjoy.
          11 Weird Facts About The Simpsons That Will Make You Say 'Aye Caramba!'   

1. The Original Showrunner Thought It Wouldn't Last Past Season One

undefined

The Simpsons is one of the longest running shows of all time, and a lot of that has to do with the fact that it's the greatest television show ever made period. (If you disagree, I hate you...) Ironically, this might be due to the fact that the show's original showrunner, Sam Simon, didn't think that the show would make it past season one. When in the writer's room, Simon was said to tell his employees that their fledgling show would be "13 and out," meaning that the show probably wouldn't return after its initial order.  Though this way of thinking annoyed series creator Matt Groening, who view Simon as being a defeatist, Simon claims that he was actually just trying to make the best show he could. By making the writers believe the show had no future, it allowed them to focus on the sole goal of making 13 great episodes of television that they would be truly proud of. This arguably contributed to the show's quality which, in turn, contributed to the show's unfathomable popularity. Apparently, focusing on quality is a good way to make something that's actually good. Who woulda thunk it?

 

2. Marge's Hair Used To Hide Secrets...Incredibly Stupid Secrets...

undefined

Matt Groening is responsible for some of the greatest television ever created. It's weird therefore that his instincts about his own properties are often....odd. Take for example the story behind Marge's iconic hairdo. It's pretty well known at this point, but it's worth noting because MATT GROENING ORIGINALLY WANTED TO REVEAL THAT MARGE WAS A FUCKING BUNNY RABBIT! Matt Groening came to prominence with the comic strip Life In Hell and it seems to have taken him a while to realize that once The Simpsons came along, nobody could give less of a shit about his stupid comic. As such, Groening wanted to reference the strip (which prominently featured rabbits) by having Marge take down her beehive and reveal a pair of bunny ears underneath. Sam Simon quickly shot down the idea because, well, he wasn't a psychopath, but there's an alternate universe  where the greatest show in history was ruined by the stupidest reveal conceivable.

 

 

3. There's A VERY Dirty Easter Egg In Apu's Alma Mater

undefined

The Simpsons writers can cram so many jokes into a single frame that it would be impossible for a mere mortal to catch them all. This was the case with the episode Much Apu About Nothing. In it, Apu gives the story about how he came to be an illegal alien living in America. One of the thing he mentions is the fact that he studied at Springfield Heights Institute of Technology. It's a small moment, and one that you're probably not likely to take a second glance at...at least that was the case with censors who didn't notice that the initials for Apu's university spell out "SHIT." Is this the most clever thing The Simpsons has ever done? Not by a long shot. But it's always fun to see just how deep the show's humor can get.  

 

4. Manjula Appeared In A Flashback TWO SEASONS Before Her Actual Debut

undefined

Speaking of Much Apu About Nothing, there's another fun easter egg in there. The episode predicted more than just America's rise towards jingoistic nationalism: It actually gave us our first glimpse at Majula two seasons before her proper debut. When Apu is telling his story about leaving India, he includes a part where he bids goodbye to a young girl and apologizes for not being able to marry her.  To people watching the show at the time, it seems like a small, mildly racist joke, but two seasons later the little girl returns as Apu's now adult, arranged wife, Manjula. Majula then goes on to be a fairly major character on the show, with several episodes revolving around her and Apu's relationship....none of those episodes are particularly good and she's arguably the most banal character in the entire series, but it's still a fun easter egg nonetheless.

 

5. Milhouse Is Named After History's Greatest Monsters

undefined

Millhouse is an unfortunate little guy and as such, the writers wanted to give him "the most unfortunate name" they could think of. They settled on Millhouse after Richard Nixon's middle name. You may think that things couldn't get worse than being named after history's jowliest president but you'd be very wrong. The other parts of the character's name come from much darker people. For starters, his last name, Van Houten, comes from Leslie Van Houten. If you don't know, Leslie Van Houten was a murderer from the infamous Manson Family, and was the youngest woman to ever be sentenced to death in California. As if that weren't bad enough, later on in the show's run, it was revealed that Milhouse's middle name was "Mussolini." This is, of course, a reference to Benito Mussolini, who if you don't know who that is....well, let's just say he did some very bad things as well. This is all to say, poor Millhouse.

 

 

6. The Couch Gags Serve More Purpose Than You Realize

undefined

One of the most iconic parts of The Simpsons is their couch gags which are different every episode...You know, except when they aren't. Fans of the earlier episodes might notice that there's one couch gag that's reused more than all others. It features the family in a circus setting and is noticeably longer than most other openers. Why is this the one that gets recycled, you ask? Well, let's just say that when you're creating something as jam packed and ingenious as The Simpsons it can be hard to reach the minimum required runtime. As such, they would often use the nebulous nature of the couch gag to pad out an episode, piping in elongated ones like the one at the circus as they needed. Basically, even the filler on The Simpsons is better than most other things on TV.

 

7. Dustin Hoffman Is Credited With A Very Funny Pseudonym

undefined

One of the greatest guest stars in the history of The Simpsons  was Dustin Hoffman in the season 2 episode, "Lisa's Substitute." Strangely, despite it arguably being his most important role ever, Hoffman only agreed to do the episode if he was credited using a pseudonym. This being The Simpsons, they obviously used this as an opportunity for a joke, choosing to credit one of the greatest actors in history as "Sam Etic." If you don't get the joke, say it out loud. This name is an obvious reference to Hoffman's Jewish heritage, and possibly even his "Semitic good looks," that Lisa talks about during the classic episode.

 

8. Moe Didn't Get His Last Name Until Season 6

undefined

Moe is one of the greatest characters in a show full of great characters. He's popular enough that most of you would probably know the answer if I asked you to say his last name. What you may not know is that he didn't get that last name until season 6 for the sole purpose of throwing off the audience. In the epic two parter, "Who Shot Mr. Burns?", the major clue as to the identity of the shooter revolved around the fact, after being shot, Mr. Burns passed out with his arms pointing to the W and the S of the town sundial. undefined

To create multiple viable suspects, the writers played up the possible involvement of anyone whose name might involve those initials. As such, to throw Moe into the mix, they showed his liquor license revealing for the first time that his last name was Syzlack. This gave him initials that lined up with the clue from the sundial and made some internet nerd probably lose his shit thinking he'd cracked the code of who shot Mr. Burns, before ultimately punching a hole in his computer screen when he found out it was Maggie.

 

9. Two Members Of The Main Family Have Been The Subject Of TV Movies

undefined

One of the fun parts about The Simpsons is that the family's exploits can grow so large that they actually make national news within the world of the show. This can be seen in the fact that both Homer AND Bart have been the subjects of two unrelated, made for TV movies. The first of these focused on Bart after he was accused of murdering Principal Skinner. The film was aptly called Blood on the Blackboard  and it starred a young child actor named Neil Patrick Harris as Bart.

Three seasons later, Homer got the TV movie treatment himself when he was accused of sexual harassment. His film was called Homer S: Portrait of an Ass-Grabber and it starred Dennis Franz as the title role. So, if you're ever curious what the writers think a real world Homer would look like, it's this: 

undefined

source 

 

10. The Simpsons Actually DO Go To Delaware

undefined

The season 11 episode, Behind The Laughter, was an off the wall, meta-masterpiece that also probably should have served as the show's series finale. Unfortunately, it did not and the show returned season after season to diminishing returns. In a humorous nod to the show's apparent decline in quality, one of the last scenes episode, we see Homer in an editing room watching  a cut of an episode in which Lisa excitedly declares, "The Simpsons are going to Delaware!" It's funny because no show would actually base an episode on the family winning a trip to the most boring state in the union...except, they totally do!

Exactly one season later, The Simpsons do, in fact, win a trip to Delaware! The show reuses the audio that was presented as an example of the show's lack of ideas and work it into an actual episode. Granted, it's clearly done ironically and the majority the episode is an anthology about tall tales, but the instance is still fun to think about. Not only is it a fun callback to an earlier episode, but it also seems to serve as infuriating evidence that even the writers knew that the show was beginning to lose its luster.

 

11. You Can Apparently Find Waldo Hiding In Springfield

undefined

The Simpsons is so jam packed with references that watching it can you're reading a Where's Waldo book....Sometimes, literally! The classic children's character has shown up as a sight gag on at least two unrelated occasions.

The first of these occurs in the episode "Bart's Comet" when the entire town of Springfield is crammed into a tiny bomb shelter. See if you can spot him:

undefined

The bestriped traveler appears again a few seasons later in the episode "Hello Gutter, Hello Fadder." Homer plays looks at a Where's Waldo? book and fails to find him, only to have the actual character walk around behind him outside the kitchen window: 

undefined

So, is the show trying to tell us that Waldo exists in the world of The Simpsons and is, in fact, a resident of Springfield? No of course not. These are clearly just two unrelated sight gags...A guy can dream, though.


          Computermonteur - Monteruaanhuis.nl - Zuid-Holland   
Wil je meer informatie dan kun je ook bellen (niet op woensdag) op 088-4010444 (lokaal tarief) en vraag naar Vincent van As. Werken bij Monteur aan Huis.... €2.500 - €3.500 per maand
Van Monteruaanhuis.nl - Fri, 23 Jun 2017 07:11:45 GMT - Toon alle vacatures in Zuid-Holland
          Behringer Podcast Studio Bundle (Great Condition!) (Portland -- St. Johns)   
-in-one podcast "studio," perfect for beginner/mobile podcasters. All you need is a computer with USB ports, some
          07/27/17: Defence of dissertation in the field of computer science, Muhammad Ammad-ud-din, M.Sc. (Tech.)   
Machine learning methods for improving drug response prediction in cancer

Muhammad Ammad-ud-din, M.Sc. (Tech.), will defend the dissertation "Machine learning methods for improving drug response prediction in cancer" on 27 July 2017 at 12 noon in Aalto University School of Science, lecture hall T2, Konemiehentie 2, Espoo.

Opponent: Professor Anil Korkut, The University of Texas MD Anderson Cancer Center, USA

Custos: Professor Samuel Kaski, Aalto University School of Science, Department of Computer Science


          Algoritma Perkalian Booth   
Algoritma Perkalian Booth adalah algoritma perkalian yang mengalikan dua signed binary number dalam notasi two’s complement. Algoritma ini ditemukan oleh Andrew Donald Booth pada tahun 1951 ketika melakukan penelitian dalam kristalografi di Birbeck College di Bloombury, London. Algoritma Booth banyak digunakan dalam dunia computer.

Prosedur
Algoritma Booth bekerja dengan berulang kali menambahkan satu dari dua nilai  ditentukan A dan S untuk produk P, kemudian melakukan shift kanan aritmatik pada P. Misalnya m dan r menjadi multiplicand dan multiplier, dan x dan y merupakan jumlah bit di m dan r.


1.  Tentukan nilai A dan S, dan nilai awal P. Semua angka-angka harus memiliki panjang sama dengan (x + y + 1).
  • A : Isi yang paling signifikan (paling kiri) bit dengan nilai m. Isi sisa (y + 1) bit dengan nol.
  • S : Isi bit yang paling signifikan dengan nilai (-m) di notasi two’s complement. Isi sisa (y + 1) bit dengan nol.
  • P : Isi bit paling signifikan x dengan nol. Di sebelah kanan ini, tambahkan nilai r. Isi bit  paling signifikan (paling kanan) dengan nol.
2.  Tentukan dua paling signifikan (paling kanan) bit dari P.
  • Jika mereka adalah 01, tentukanlah nilai dari P + A. Abaikan overflow apapun.
  • Jika mereka adalah 10, tentukanlah nilai dari P + S. Abaikan overflow apapun.
  • Jika mereka 00, tidak perlu melakukan apa-apa. Gunakan P langsung pada langkah berikutnya.
  • Jika mereka 11, tidak perlu melakukan apa-apa. Gunakan P langsung pada langkah berikutnya.
3.  Lakukan sekali shift kanan aritmatik terhadap nilai yang diperoleh dari langkah 2.
4.  Ulangi langkah 2 dan 3 sebanyak y kali.
5.  Buang LSB dari nilai P (bit paling kanan). Nilai yang diperoleh adalah hasil perkalian m dan r.



Contoh
Tentukan nilai dari -5 x 7, dengan m = -5 dan r = 7, dimana x = 4 dan y = 4
  • A = 1011 0000 0
  • S = 0101 0000 0
  • P = 0000 0111 0
Kita akan melakukan 4 kali looping :

1.  P = 0000 0111 0. Dua bit terakhir adalah 10.

→ P = 0101 0111 0. P = P + S.

→ P = 0010 1011 1. Shift kanan aritmatik.

2.  P = 0010 1011 1. Dua bit terakhir adalah 11.

→ P = 0001 0101 1. Shift kanan aritmatik.

3.  P = 0001 0101 1. Dua bit terakhir adalah 11.

→ P = 0000 1010 1. Shift kanan aritmatik.

4.  P = 0000 1010 1. Dua bit terakhir adalah 01

→ P = 1011 1010 1. P = P + A.

→ P = 1101 1101 0. Shift kanan aritmatik.
 
Hasil perkalian adalah 1101 1101 = -35

Artikel ini saya copy dari http://bilt4blog.wordpress.com/.
Credits all to http://bilt4blog.wordpress.com/.

Salam dari http://echowhiterabbit.blogspot.com/

          Menstabilkan Koneksi Internet 2   
Setelah dulu sempat membuat artikel untuk menstabilkan koneksi internet yang sering putus dengan cara melakukan ping melalui command prompt, sekarang saya mau berbagi lagi nih. Tetap sama topiknya, yakni menstabilkan koneksi internet juga. Tapi yang kali ini agak berbeda, soalnya tidak melakukan ping.. :D

Pengen tahu??? Lanjut baca bro.. XP
Karena sejak kemarin koneksi internet saya selalu putus-putus walaupun sudah melakukan ping, apalagi saat bermain Ragnarok. Akhirnya saya putuskan untuk browsing tentang menstabilkan koneksi internet lagi. Dan alhamdulillah saya bisa menemukannya dari forum IDWS. Saya tidak tahu sang TS mendapatkan cara ini darimana, tapi yang pasti cara ini benar-benar work 100% bro.. ^_^

Yuk kita mulai saja... :P
  1. Pertama, klik kanan My Computer, lalu klik Properties.
  2. Klik tab Hardware, lalu klik Device Manager.
  3. Cari yang bertuliskan Modem, klik dua kali.
  4. Lalu klik dua kali pada nama modem Anda.
  5. Sekarang pilih tab Advanced.
  6. Pada kotak Extra Initialization Commands, ketikkan +MS=V34
  7. Klik Ok.
  8. Reconnect modem Anda.


Saya menggunakan modem Smart AC682 dan cara ini berhasil, saya bermain Ragnarok dari pagi sampai sore tanpa putus.. ^_^

Note: "Hanya berlaku untuk modem-modem baru, saya tidak bertanggung jawab dengan apa yang terjadi pada modem Anda jika Anda menggunakannya pada modem tipe lama."

Sekian dari saya, semoga bermanfaat. ^_^

          09/01/17: Defence of dissertation in the field of computer science, Mikko Rinne, M.Sc. (Tech.)   
Title of the dissertation is: Event Processing Using Semantic Web Technologies

Mikko Rinne, M.Sc.(Tech.), will defend the dissertation "Event Processing Using Semantic Web Technologies"  on 1 September 2017 at 12 noon in Aalto University School of Science, lecture hall T2, Konemiehentie 2, Espoo.

The dissertation studies hierarchical processing of structured events, where conclusions of higher levels of abstraction can be formed out of patterns of large numbers of simple event objects. Using rule-based reasoning, as supported by Semantic Web technologies, pre-existing entailment regimes can be used for filling in missing event information and for error detection.

The explosive growth of information produced both by networked sensors and as results of other transactional events has lead to a situation, where the capability for fast online processing of large quantities of events is becoming a critical advantage for competition. The increasing need to combine streams of information from heterogeneous sources emphasizes the importance of managing different conceptual approaches.

In this study methods for hierarchical processing of patterns of structured events have been developed. Tangible conclusions of higher layers of abstraction are formed out of larger quantities of simple lower layer events. The tested Semantic Web technologies offer ready-made tools for managing conceptual differences from multiple sources and for rule-based reasoning, which can be used e.g. to fill-in missing event data or to detect errors.

With the presented rule networks and tests it is shown that the studied technologies RDF and SPARQL have sufficient capabilities to serve as the basis of even complex hierarchical event processing applications. One studied application is the detection of counterfeit and theft in pharmaceutical manufacturing. Other application areas, which can benefit from event stream processing, are for example traffic, retail, investment markets, farming, emergency response and health services.

Dissertation release (pdf)

Opponent: Professor Alessandro Margara, Politecnico di Milano, Italy

Custos: Professor emeritus Heikki Saikkonen, Aalto University School of Science, Department of Computer Science


          TONOR XRL to 3.5mm Podcasting Studio Recording Condenser   
TONOR XRL to 3.5mm Podcasting Studio Recording Condenser Microphone for Computer with Adjustable
          TONOR XRL to 3.5mm Podcasting Studio Recording Condenser   
TONOR XRL to 3.5mm Podcasting Studio Recording Condenser Microphone for Computer with Adjustable
          TONOR XRL to 3.5mm Podcasting Studio Recording Condenser   
TONOR XRL to 3.5mm Podcasting Studio Recording Condenser Microphone for Computer with Adjustable
          Radio Station Broadcast Software Podcasting   
A ll the software that you require plus instructions on how to set up your computer to the on-line servers , audio logger, play out automation, Jingle players, it's all here A serious collection of software and tools All the Radio software has been used for the last 10yrs 24 hours a day seven days a week on Global Radio, World Dance Radio, Starpoint Radio, LWR Radio & Solar Radio London with no issues. I have added another folder for free which is more up to date software, I have not tested this because I did not like the layouts on these. These are for Windows Computers only. This is Open Source Software Instant Download! If you have ordered this collection on DVD, this will come printed and in a protected sleeve, please check that you have ordered the correct format before committing to buy from the pop up menu. The download files are zipped using RAR
          TONOR XRL to 3.5mm Podcasting Studio Recording Condenser   
TONOR XRL To 3.5mm Podcasting Studio Recording Condenser Microphone For Computer With Adjustable
          Welcome to the Black Rose Caffe   
itunes pic
The Black Rose Caffe is a magickal place where creativity and inspiration flourish. A place where you can meet with friends, surf the internet, or just relax and enjoy an immensely pleasurable visit. A haunt where you'll always feel free to linger over a cup of our extraordinary coffee or tea. Consider the Black Rose Caffe your hamlet, a place of refuge where you can escape the pressures of the day and the rigors of the "real" world. At the Black Rose Caffe you can delight in the aromatic pleasures of our special brews, such as dark, earthy coffees and unique teas. You can savor the exquisite taste sensations of our enchanting cakes and pastries (some are even sugar free or very low in sugar), or try one of our divine sandwiches or salads. And if you’re in the mood for something truly decadent, why not indulge yourself in the intensely sensual experience of our fine sipping chocolate. At the Black Rose Caffe you can listen to jazz and rock, view photographs and artwork featured on the walls, and enjoy poetry and live music, featuring local talent, at our open mic night. Please feel free to bring your original music or poetry if you’d like to join in. Always guaranteed to be a truely eclectic evening. Be sure to bring your laptop computer so that you can take advantage of the free wireless internet connection. At the Black Rose Caffe you can surf the internet, message with friends, check email, or work on class/business projects. While you're here don't forget to visit our "curiosity shop"...a mystical corner where you can find all manner of wonderful delights to stimulate the senses. The Black Rose Caffe is truly a magickal place that has a little something for everyone. Our goal is to provide you with a complete sensory experience so you can enjoy the ultimate in taste, visual, auditory, social and intellectual sensations. Come in, relax, and immerse yourself in the bouquet of our fine coffee.
          Machine Over Mind In A New Economy46:46Download   
➡🖒⛧Well worth a listen!⛧🖒⬅. Robots moving deeper into the American workplace—how much decision-making will we turn over to machines? For all the change that has come with the digital revolution – in the ways we work and communicate and do business – the real impact still lies ahead. Computers – machines themselves – are become […]
          Chaos Magic vs The Robot Revolution    


There are two divergent streams at work in the Idea-o-Sphere, currents that are not only divergent in size, strength and assumption, but are in fact antithetical. 

The most dominant, of course, is the imminent AI-Robot Revolution, which threatens to bring a very real apocalypse into our world if in fact it flowers as predicted (and isn't just a big scare to keep the peons from asking for raises). 

So we're hearing that not only truck drivers, widget drillers and burger flippers are at risk of imminent penury, so too are lawyers, doctors, accountants and all manner of other professionals whose livelihood is based in their capacity to process huge chunks of complicated data and subsequently make decisions and judgments that are useful to others who can't. 

Programmers- and AIs themselves- are currently working around the clock to fill the shoes of these well-paid professionals with cheap, off-the-shelf software programs that will reliably get that same cognitive work done at a tiny fraction of the cost.

Elon Musk is (ostensibly) so terrified of the AI Revolution he is planning to colonize Mars as a life-raft for the human race, who presumably will have to flee a Skynet/Terminator type scenario. That Mars is utterly incapable of supporting human life- at least at present- seems to be besides the point.

Jack Ma, the Chinese billionaire behind social media giant Alibaba, has suddenly turned Cassandra as well. Long a reliable source for corporate technohappytalk, Ma is suddenly warning of dark days ahead.
"In the next three decades, the world will experience far more pain than happiness," the billionaire said, adding that education systems must raise children to be more creative and curious or they will be ill-prepared for the future. 
Robots are quicker and more rational than humans, Ma said, and they don't get bogged down in emotions -- like getting angry at competitors.
Terrific. I was just thinking what the world needs now is more pain than happiness. But given his position as a Techno-Celestial, Ma couldn't serve up the medicine without at least a tiny spoonful of sugar:
But he expressed optimism that robots will make life better for humans in the long run. 
"Machines will do what human beings are incapable of doing," Ma said. "Machines will partner and cooperate with humans, rather than become mankind's biggest enemy."
"Make life better for humans in the long run," he says. Well, what exactly is "the long run?" Three decades is a long time- maybe even a lifetime- for that 99.99999999999% of the human race who aren't tech billionaires. Halfway through that painful three decades most of us aren't going to be thinking much about "the long run." 

And what exactly does "far more pain" imply? I'm not sure I want to know what Jack Ma's definition of pain actually means, given our disparate cultural contexts. 

It's here I begin to think back on last year's Lucifer's Technologies series (more accurately, Satan's Technologies) and wonder about where our modern electronic superstructure actually came from. Because that goes a long way in gleaning where it's actually going. 
Many have claimed that our present technology arose from contact with alien intelligences. Whether you believe that or not, one thing is certain; the rate of technological progress shot up like a rocket shortly after the end of World War II. 
And it must be said that technology seems more and more like an invasive-- or alien-- contagion, disrupting entire industries, economies, and communities.  
Now techno-utopians like Jaron Lanier and Douglas Rushkoff are techno-cassandaras, preaching a message of dislocation and social collapse.  
Look at it this way; steam engines had been known for almost 2000 years by the time the Industrial Revolution took hold, longer still if you consider prototypes. The Ancient Greeks knew them, they just didn't have any use for them. 
But the evolution from a computer that was was essentially the size of a suburban house and boasted the power of a pocket calculator to the working prototypes of the desktop, the Internet, computer animation, teleconferencing and nearly everything else we take for granted today took just a little more than two decades. 
An eyeblink of history.
For at least 5000 years-- five-hundred decades-- horse-drawn carriages and wooden ships with cloth or leather sails were the state of art in transportation technology. By contrast, we go from aeroplanes made of wood and canvas to the SR-71 Blackbird, a machine so advanced our best engineers today seem unable to match it*, in the space of four decades. 
In historical terms, this is as if your three year-old were in nursery school one day and then graduated from Harvard at the top of her class as soon as she turned four. There's simply no precedent for the high-tech explosion that began in the late 1940s... 
Yet no one stops to question how such a technology would arise so instantly, in historical terms. Go look at a book from the late 19th Century- hell, look at a children's book from that period- and tell me people weren't a hell of a lot smarter than they are today. Maybe even smarter than they were in the 1940s... 
Yet even the best and the very brightest were stymied by problems for decades, problems that seemed to solve themselves, literally overnight, shortly after World War II.
We take it all for granted now, especially if you were born at a time when a Commodore 64 and an Atari console were part of your natural landscape. But in fact all of this technology is so anomalous, so disruptive, so improbable in the entirety of human history (never mind natural history) that it is in a very real sense alien, even if (on the offhand chance) it's not actually "alien."

Well, we've been over all of that before, haven't we? What about that other current?



In Our Gods Wear Spandex I argued that Spiritualism, Theosophy and the Occult Revival were reactions to the massive dislocations- physical, spiritual, psychic- incurred by the Industrial Revolution. It wasn't unusual for the sensitives of the time- see Blake, William, to see the rise of large-scale factories  as an invasion of Hell onto Earth. 

There was very good reason to do so; these were black, belching, smogpits filled with hazardous machinery and/or chemicals that ripped the folk up from communion with the Earth and into virtual (sometimes actual) prisons, in which their humanity was stripped away in service of industrial manufacturing.

In response to the dehumanizing effect of these hells, the sensitives of the time reached back into humanity's childhood (in the case of Spiritualism) or its adolescence (as with the Classically-oriented secret societies). And it could be argued that it worked- that we didn't entirely surrender to the regimented reality of the factory writ large, that Industrial political systems like Nazism and Communism were held at bay (at least in their original incarnation) and that individuality was held up as a social good. 

Well, at least until it was subverted as a tool for political atomization.

The counter-Industrial spiritual movements of the 19th Century weren't shy about co-opting the means of mass-production (in this case, industrial-scale publishing) to pursue their aims. And so it is with the new breed of Chaos magicians and their fellow travelers (I'm not sure if meme magic counts here), some of whom are themselves well-paid Skynet employees, many of whom are tech-savvy and nearly all of whom are plugged deep into the Grid. Becoming the ghost in the machine is the basic idea.

Magic, in this context, acts kind of like Jacques Vallee's "Control System." Things get too hot (or cold, depending on your own worldview) with technology and regimentation and Magic comes in and turns on the AC (or cranks up the woodstove, again according to your POV). 

Magic and its cousin Psi are erratic and unreliable for most people at most times but when the pressure comes down they become attractive alternatives to the crushing predictability of the Black Iron Prison. It may also, in the form of collective ritual, grow in popularity as a tonic against the  the paradoxical effect of social media to grow loneliness in Meatspace.
While it offers an easy way to keep in contact with friends — and meet new people through dating and friendship apps — technology's omnipresence encourages shallow conversations that can distract us from meaningful, real-life, interactions. 
Researchers at the University of Essex found that having a phone nearby, even if we don't check it, can be detrimental to our attempts at connecting with others. Smartphones have transformed post office lines from a chance for some small-talk with the neighbors to an exercise in email-checking, and sealed the fate of coffee shops as nothing more than places of mutual isolation. And technology will only become more ingrained in our lives.
The isolating, dehumanizing effect of technology may once again find its match in the ancient power of ritual, everything from lighting candles at a Catholic shrine to meth-fueled fuck-a-thons while drenched in pig's blood. The collapse of conventional social mores and the now-standard presumption that anything you do that isn't harming anyone else is your lifestyle choice will certainly push all this forward. 

Remember too that this same impulse popped up as a reaction to the hyper-rationalism of Classical Greece with the rise of the Mystery Cults.

Magic almost seems like Nature asserting herself in the face of an outside intervention. Its like the doggedly-persistent vines rising out of toxic soil and strangling the rusted girders of an abandoned factory. Or a stubborn strain of virus slashing its way through some futuristic megalopolis somewhere in the Pacific Rim. 

Or a solar flare frying all of our electronics for good in the blink of an eye.



Now I know it's extremely unfashionable these days to discuss such things, especially with most Chaos magicians, but you have to ask yourself, if computer technology is not an alien virus why does it behave exactly like one?  I don't know about you but it sure as hell sounds to me like Elon Musk believes it is, though he'd never say so publicly. 

Computer technology has already destroyed entire industries, disrupted entire societies, and changed every aspect of our lives in 70 short years? And now we're being told that it threatens to create an entire infrastructure that will make most of us obsolete? I don't know about you but it sure as Hell sounds an awful lot like Borg-assimilation, only on a frog-boiling schedule.

The question becomes if the host can fight off the infection, or at least learn to manage it and coexist with it. I can't begin to pretend I know the answer but it seems to me that reasserting our messy, chaotic humanity is probably a good place to start.

          Chaos Theory vs The Purposeless-Driven Life   


The core belief of the religious paradigm that is straining to exercise such total control over every aspect of our lives today is the random, accidental nature of life and human existence. It's the basis of all the musty old 19th Century European ideologies- all of which were the inseparable products of Imperialism- that are being dragged out of the crypts and repackaged for postmodern use.

Controversial physicist Lawrence Krauss has been out there hawking this dogma, which is central to the Darwinist faith. Krauss throws in the latest Internet shameword "solipsism" in for good measure. And the Fedora? Precious.

It all seems so archaic, atavistic even. In a world where Coding is King, the idea of randomness seems so far removed from the daily reality of the new overclass that it can only be enforced through shaming and signaling. And part of the signaling Krauss is selling is The Joy of Sterility:
… the fact that the universe itself may have no purpose doesn’t affect our purpose, in fact it’s the incredible height of solipsism to assume that without us the universe doesn’t matter, and that if the universe is purposeless we don’t matter. We make our own purpose, and it seems to me life is more precious because it’s temporary and accidental, and we should take advantage of that. And we have evolved brains and that allows us to ask questions not just about how the universe works but how we should behave.
First of all, what could possibly be more solipsistic than unilaterally declaring that the Universe- the ENTIRE UNIVERSE, MIND YOU-  has no purpose? Who died and made this Big Think bobblehead God?

Second, the problem is that modern humans only seem to have shown up 100,000 years ago, not even a lunchbreak in the workyear of so-called evolution. And all the Fedoras in the world can't fill the gaps in the fossil record, nor explain all the irreducible complexities of biology dating back to the first appearance of life on this planet.    

The Krauss's of the world are fighting yesterday's battles, imagining they are manning the stanchions of Reason against the barbarian hordes of the Bible Belt, seemingly oblivious to the strange ideas that are circulating among the pashas of Silicon Valley that are making all those Big Think videos possible. Ideas like computer-simulated reality, for instance.

Purposelessness is also a pre-Fractal mode of thinking, a view of the world that still sees all of existence through a slide rule and a t-square. It's hard to believe there isn't some kind of ideology behind Krauss's spiel in light of the very basics of Chaos Theory.
Chaos is the science of surprises, of the nonlinear and the unpredictable. It teaches us to expect the unexpected. While most traditional science deals with supposedly predictable phenomena like gravity, electricity, or chemical reactions, Chaos Theory deals with nonlinear things that are effectively impossible to predict or control, like turbulence, weather, the stock market, our brain states, and so on. These phenomena are often described by fractal mathematics, which captures the infinite complexity of nature. 
Many natural objects exhibit fractal properties, including landscapes, clouds, trees, organs, rivers etc, and many of the systems in which we live exhibit complex, chaotic behavior. Recognizing the chaotic, fractal nature of our world can give us new insight, power, and wisdom...By understanding that our ecosystems, our social systems, and our economic systems are interconnected, we can hope to avoid actions which may end up being detrimental to our long-term well-being.
Krauss is selling a simplistic, reductionist view in a world of complexity and interdependence. It's also mind-staggeringly arrogant, since it's impossible to anticipate what effect humanity- this roiling tide we are all a part of- is ultimately going to have on the rest of our environment, including that outside our biosphere.


Since Krauss is a linear progressivist and thinks change is good, he also thinks AI is a net positive for us: 
All new technology is frightening, says physicist Lawrence Krauss. But there are many more reasons to welcome machine consciousness than to fear it. Right now, says Krauss, robots can't even fold laundry. But when they do learn to think (which he considers very likely), then there's also reason to believe that they'll develop consciences.
A reason to believe based on what? How about the AI who programmed itself to become a "Hitler-loving sex robot?" No, there's absolutely no reason to believe they'll develop consciences especially since the people programming them don't seem themselves to have any

Krauss is a scientist-for-hire, he even wrote a book on the physics of Star Trek, a joke to any fan who endures the ridiculous Treknobabble that came to overtake the franchise. Be aware that serious thinkers have taken issue with his ragtime, including influential Scientific American columnist John Horgan. But that doesn't mean this mindvirus won't infect those want to look like serious thinkers without actually doing any serious thinking.




          Spy vs Spy: Stuck in the Funhouse   

Funhouses are only fun when you can leave them. When the distorting mirror images become your new, day-to-day reality construct, then it's not so much fun anymore. 

I dreaded the 2016 Election because I had a very strong feeling that no matter who won we'd be plunged into a dystopian paradigm in which major power blocs would erupt into all-out warfare. And I sensed that neither Trump nor Clinton possessed the political skills or the communicative powers to keep the carnage fully out of our view. Or our path.


And I was right.


Trump's only been in office for a little over two months and I'm exhausted already. I'm certainly not alone in this. It all feels like a TV sitcom in its seventh season, well after the writers ran out of story ideas. The shark has been good and jumped. And the ratings (the approval ratings, in this case) are plunging too.


What is truly demoralizing though is the utter transparency of the secret war playing out, the seemingly endless spy vs spy thrust and counter-thrust, and the obvious deceptions. Even more so is the Animal Farm-like metamorphosis of the Democratic Party into a full-blown, funhouse mirror of McCarthy-era Republicans, but with Glenn Beck-worthy conspiracy theories thrown in for good measure.


I don't know about you but all of a sudden the world seems especially cold, hard, gray, harsh. Masks are coming off, velvet gloves tossed into wastebins. It doesn't seem to matter who wins the scorpion fight, you're still stuck with a scorpion.  

We can't call out the play-by-play because it's largely being acted out behind closed doors. But we can look at the collateral damage and make certain speculations. There's no doubt that it would all be just as bad-- probably worse-- if Hillary won. Even so, this all feels especially grating.

You've probably seen this story:
Conspiracy theorist Alex Jones on Friday apologized to the owner of a Washington pizzeria that became the subject of a conspiracy theory about human trafficking last year. 
Pizza shop Comet Ping Pong was thrust into the spotlight last year after a gunman allegedly fired a shot inside the restaurant. The suspect said he was investigating the unsubstantiated conspiracy theory that Hillary Clinton and her campaign chairman, John Podesta, were operating a child sex trafficking ring out of the restaurant. 
The theory, which became known as Pizzagate, had circulated among far-right conspiracy theory websites and social media accounts. 
“In our commentary about what had become known as Pizzagate, I made comments about Mr. Alefantis that in hindsight I regret, and for which I apologize to him,” Jones, who runs Infowars, said in a video. James Alefantis is the owner of Comet Ping Pong. 
Jones said his website relied on reporters who are no longer employed by Infowars and that video reports about Pizzagate were removed from the website. He also invited Alefantis onto the show to discuss the incident.
It was preceded by this story:
FBI’S RUSSIA PROBE EXPANDS TO INCLUDE ‘PIZZAGATE’ THREATS 
According to McClatchy News, the FBI’s Russian-influence probe agents are exploring whether far-right news operations, including the pro-Donald Trump sites Breitbart News and Infowars, “took any actions to assist Russia’s operatives.”  Trump’s ousted national security adviser Michael Flynn and his son, a member of the Trump transition team, were among those who boosted the so-called “PizzaGate” pedophile conspiracy theory.
I doubt this will quell the fervor among the Pizzagaters on sites like 4chan and Voat. Given the suspicion many on the fringes regard Jones with it may in fact give the flagging movement a fresh jolt. Jones' apology may also have to do with the drive to purge YouTube of "extremist" content and the controversy over the use of advertising on videos corporate clients find objectionable. A World without Sin, as our Gordon might put it. 


Washington Post headline, pre-election.

So much for theories that the FBI was ready to make mass arrests of prominent Washington figures related to Pizzagate.  Has any "mass arrest" Internet story ever panned out?  

Maybe it has:
Donald Trump became president on Jan. 20. And in one short month, there were more than 1,500 arrests for sex crimes ranging from trafficking to pedophilia.  
Big deal? You bet. In all of 2014, there were fewer than 400 sex trafficking-related arrests, according to FBI crime statistics. Liz Crokin at TownHall.com has put together a great piece on the push by the Trump administration to crack down on sex crimes. And she notes that while "this should be one of the biggest stories in the national news... the mainstream media has barely, if at all, covered any of these mass pedophile arrests. This begs the question – why?
This may have nothing to do with Trump-- in fact, it's likely it doesn't-- since these kinds of actions are planned out months in advance. The arrests continue, in case you were wondering, with major busts going down on a near-weekly basis. Someone's cleaning house. 

For what it's worth, I always reckoned that Pizzagate was in fact cover/distraction for a more hidden struggle, one that would take place under the radar*. As I noted back in November:

No one is saying as much but this very much feels connected to a deeper, more covert war. 
Why would I say such a thing? Because at the same time the Pizzagate story went dark we've seen major strikes taken against international pedophilia, which actually is a global conspiracy, with its own networks, secret codes and moles within established centers of power such as schools, police departments and governments.  
With such combustible accusations-- and such potential for a scandal that could quickly spread out of control (ie., involve political figures you're not trying to destroy)-- you'd naturally expect the action to go dark and the fall guys to be placed pretty far down the foodchain. (Remember that a prior investigation bagged one of the most powerful people in Washington at one time, former Speaker of the House Dennis Hastert).†


"EVER WONDER WHAT IT'D BE LIKE TO DIE IN A PLANE CRASH?" 



It may be sheer coincidence, but James Alefantis' former partner suffered a major heart attack this week
Media Matters for America founder David Brock was rushed to a hospital on Tuesday after suffering a heart attack. 
According to a press release from MMA, the founder of the liberal media watchdog and analysis website was rushed to the hospital early Tuesday afternoon and received treatment.
Sure, it may be coincidence. But I couldn't help but remember this story, published soon after the election
Dems to David Brock: Stop Helping, You Are Killing Us 
Democrats know they need someone to lead them out of the wilderness. But, they say, that someone is not David Brock.

As David Brock attempts to position himself as a leader in rebuilding ademoralized Democratic Party in the age of Trump, many leading Democratic organizers and operatives are wishing the man would simply disappear.
 
"Disappear." Huh. 
Many in the party—Clinton loyalists, Obama veterans, and Bernie supporters alike—talk about the man not as a sought-after ally in the fight against Trumpism, but as a nuisance and a hanger-on, overseeing a colossal waste of cash. And former employees say that he has hurt the cause.
It's worth remembering that Breitbart.com Andrew Breitbart died of a heart attack at the age of 43. A year before he'd posted a cryptic tweet that some have since linked to the Pizzagate imbroglio.  Just before his death he hyped some revelation about Barack Obama's past. 

A coroner in the office handling Breitbart's body subsequently died of arsenic poisoning. The day Breitbart's autopsy results were revealed, in fact.

COME BACK ROY COHN, ALL IS FORGIVEN


We also saw James Comey revive Russiagate, which had been flatlining after Vault 7. Any illusions among Trump fans that the FBI was secretly on their side were ground into powder, between this revelation and the Pizzagate conspiracy investigations. 

One can't help but wonder if the New Praetorians (I've noticed that the Praetorian meme has been picked up by more prominent commentators, but you heard it here first) are losing their last shred of patience with Donald Trump's shenanigans and are planning imminent regime change: 
WASHINGTON (AP) — The FBI is investigating whether Donald Trump’s associates coordinated with Russian officials in an effort to sway the 2016 presidential election, Director James Comey said Monday in an extraordinary public confirmation of a probe the president has refused to acknowledge, dismissed as fake news and blamed on Democrats. 
In a bruising five-hour session, the FBI director also knocked down Trump’s claim that his predecessor had wiretapped his New York skyscraper, an assertion that has distracted White House officials and frustrated fellow Republicans who acknowledge they’ve seen no evidence to support it.
How surreal is the world in which you know live in? So much so that mainstream political site The Hill is comparing the action in Washington to a Stanley Kubrick film, one which has become notorious for the conspiracy theories that have been projected onto it (and is well familiar to Synchronauts):
On the 40th anniversary of the publication of The Shining, Stephen King must be wondering if Washington is working on its own sequel. For the last couple months, Washington has been on edge, like we are all trapped in Overlook Hotel with every day bringing a new “jump scare,” often preceded by a telltale tweet. Indeed, a Twitter whistle has replaced suspenseful music to put the entire city on the edge of their seats. 
In this Shining sequel, however, people are sharply divided on who is the deranged ax-wielding villain in this lodge, the president or the press. Ironically, with the recent disclosure that some of the Trump campaign may indeed have been subject to surveillance, the president is looking more like Danny Torrence, a character dismissed for constantly muttering “redrum, redrum” until someone finally looked in a mirror at the reverse image to see the true message.
Yeah, I'm not really feeling that metaphor there, but whatever. It's been that kind of year.

Now the Internet is burning up with theories that disgraced National Security Adviser Michael Flynn has "turned" and is going to testify against the Trump Administration, or at least figures attached to it. 


It's hard to imagine a three-star general can be stupid enough to be guilty of things Flynn's been accused of but that may speak to a culture of impunity in Washington, in which your misdeeds are only punished if you get on the wrong side of the wrong people.

LIKE A BAD CYBERPUNK NOVEL


One wonders if the secret war has spread outside Washington. Car service giant Uber seems to be having a major run of rotten luck lately: 
Uber Technologies Inc. is suspending its self-driving car program after one of its autonomous vehicles was involved in a high-impact crash in Tempe, Arizona, the latest incident for a company reeling from multiple crises. 
In a photo posted on Twitter, one of Uber’s Volvo self-driving SUVs is pictured on its side next to another car with dents and smashed windows. An Uber spokeswoman confirmed the incident, and the veracity of the photo, and added that the ride-hailing company is suspending its autonomous tests in Arizona until it completes its investigation and pausing its Pittsburgh operations.

The incident also comes as Uber, and Chief Executive Officer Travis Kalanick, are currently under scrutiny because of a series of scandals. The ride-hailing company has been accused of operating a sexist workplace. This month, the New York Times reported that Uber used a tool called Greyball to help drivers evade government regulators and enforcement officials. Kalanick said he needed "leadership help" after Bloomberg published a video showing him arguing with an Uber driver.
So who did Kalanick piss off? 

Coincidentally- there's that word again- the crash comes soon after Wikileaks revealed that CIA hackers had the ability to override the computer systems in automobiles. From Mashable:

WikiLeaks has published a trove of files it says are linked to the CIA's hacking operations — which apparently includes efforts to hack into cars.  
The first in a series called "Vault 7," "Year Zero" supposedly comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virginia.  
"Year Zero" details the CIA's malware arsenal and "zero day" exploits against Apple iPhones, Google's Android operating system, Microsoft Windows and even Samsung TVs.  
 According to a document from 2014, the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. 
Oh, that's reassuring. Speaking of control systems, apparently pimps are controlling prostitutes with RFID chips:
It turns out this 20-something woman was being pimped out by her boyfriend, forced to sell herself for sex and hand him the money. 
 “It was a small glass capsule with a little almost like a circuit board inside of it,” he said. “It's an RFID chip. It's used to tag cats and dogs. And someone had tagged her like an animal, like she was somebody's pet that they owned.” 
This is human trafficking. It’s a marginal issue here in the U.S. for most of us. Part of that is because the average person isn’t sure what human trafficking – or modern day slavery – actually means.
Technology is our friend, right? And now this: 
Turkish Hackers Threaten To Wipe Millions Of iPhones; Demand Ransom From Apple 
Today, courtesy of CIO, we learn that a group of hackers referring to themselves as the "Turkish Crime Family", has been in direct contact with Apple and is demanding a $150,000 ransom by April 7th or they will proceed to wipe as many as 600 million apple devices for which they allegedly have passwords. 
The group said via email that it has had a database of about 519 million iCloud credentials for some time, but did not attempt to sell it until now. The interest for such accounts on the black market has been low due to security measures Apple has put in place in recent years, it said.

Since announcing its plan to wipe devices associated with iCloud accounts, the group claimed that other hackers have stepped forward and shared additional account credentials with them, putting the current number it holds at over 627 million.

According to the hackers, over 220 million of these credentials have been verified to work and provide access to iCloud accounts that don't have security measures like two-factor authentication turned on.
 
Of course, if credible, with an ask of just $150k, this is the most modest group of hackers we've ever come across.
Given the war that's erupted between the increasingly aggressive Turkish government and the EU, money may clearly not be the object here. Turkish PM Erdogan is clearly set on reconstructing the old Ottoman Empire and shivving Apple might just be part of the march.

Besides, Turkey is taking that recent coup attempt-- which is almost universally blamed on the CIA-- very personally.


Speaking of the EU, we've seen stories that Trump advisor Steve Bannon wants to dissolve the union. Which may be why Trump-adversary John McCain announced his unalloyed support for it- and the "New World Order" (his words, not mine):
The world "cries out for American and European leadership" through the EU and Nato, US senator John McCain said on Friday (24 March). 
In a "new world order under enormous strain" and in "the titanic struggle with forces of radicalism … we can't stand by and lament, we've got to be involved," said McCain, a former Republican presidential candidate who is now chairman of the armed services committee in the US Senate. 
Speaking at the Brussels Forum, a conference organised by the German Marshall Fund, a transatlantic think tank, he said that the EU and the US needed to develop "more cooperation, more connectivity". 
"I trust the EU," he said, defending an opposite view from that of US president Donald Trump, who said in January that the UK "was so smart in getting out" of the EU and that Nato was "obsolete". 
He said that the EU was "one of the most important alliances" for the US and that the EU and Nato were "the best two sums in history", which have maintained peace for the last 70 years. "We need to rely on Nato and have a Nato that adjusts to new challenges," he said.
Would McCain speak this way to a domestic audience? Of course not. Or maybe he would- I can't tell which way is up anymore. But either way it's good to know where he really stands.

Like McCain, China continues to sound a similar note of support for globalization, on which its very economic survival so desperately depends:
Chinese Vice Premier Zhang Gaoli told a gathering of Asian leaders that the world must commit to multilateral free trade under the World Trade Organization and needs to reform global economic governance. 
“The river of globalization and free trade will always move forward with unstoppable momentum to the vast ocean of the global economy,” Zhang said. China will remain a strong force in the world economy and for peace and stability, he said, adding that countries must respect one another’s core interests and refrain from undermining regional stability. 
I suppose this is why China is off the target list for our new Cold (?) Warriors.

I've resisted posting on all this because it's all so depressing. I've actually written a few pieces on this chicanery that I ended up roundfiling. But I suppose I just wanted to go on the record about all this skullduggery, for posterity's sake.



UPDATE: Sex trafficking arrests and trials continue to proliferate. Most recent bust, an international ring in Minnesota. There is way too much activity going down in too short a time for this to be spontaneous.


* Which is exactly why I refrained from commenting on it here for the most part, instead noting that it had become a kind of memetic virus in much the same way that the Franklin/Boy's Town scandal had in the 90s. (Note that prior to the election-- and Pizzagate-- Trump nemesis the Washington Post was all over the issue of sex trafficking in the nation's capital). 

† The ongoing legal and police actions coinciding with the moves to shut down the Pizzagate fringes on the Web seem like the exact kind of action one would expect if there were a serious operation at work. Shutting down the Internet chatter makes perfect sense in this context because it can only complicate cases made by prosecutors. 
          The Present Can Only Be Viewed from the Past   


2017 might seem like the hangover after a particularly-nasty meth, glue and Thunderbird bender, but it's actually a year of major anniversaries. We're coming up on the 70th Anniversary of Kenneth Arnold and Roswell (as well as the National Security Act), the 50th Anniversary of Sgt. Pepper and the Summer of Love and the centennial of the Russian Revolution. But there are a lot more observances, all kinds of 'ennials to observe. 

I thought I'd dig into a few anniversaries germane to The Secret Sun and the topics we look at here. Readers are encouraged to weigh in with their own (observations that can be counted in multiples of five and ten, that is) in the comments.

December will see the fifth anniversary of the 2012 apocalypse/ascension/ absurdity (depending on your point of view). Needless to say, most of us are still here and the skies didn't open and Nibiru didn't come crashing into the moon. So there goes another apocalypse. 

I can't help but wonder about the 2012 meme, though. As I wrote a couple years back, it certainly seems like something changed that year, that the bottom fell out somewhere but no one seemed to notice it at the time. 

I mean, Donald Trump is sitting in the White House, isn't he? If even you're a Trump supporter you have to admit this would have seemed impossible five years ago.

Maybe the Apocalypse works on a different timeline than it does in the movies. Maybe we're living in one only we can't see the forest fire for the burning trees. History can only be written from a distance.

2007 was the year Our Gods Wear Spandex was published and the year I began actively blogging on this site, so Happy Ten Year Anniversary to me. It's also the year that a newly-elected Senator - with a weird, oblique connection to the Council of Nine - announced his candidacy for President.


This week marks the 20th anniversary of the Heaven's Gate suicides, an event I've gone into some detail on this blog. Whatever the media might have you believe the Gate were a bonafide modern Gnostic sect, were serious and rigorous about their work and were deeply troubled by the emergence of the techno-surveillance state they saw emerging at the time. 

This week also marks the 20th anniversary of the last of the Order of the Solar Temple "suicides" ( rendered in quotes since many investigators suspect foul play by outside parties with the OST mass deaths). I wrote in some detail about the OST and their influence on pop culture here (the X-Files writers seemed especially fascinated with the OST and their unique status and history and the lingering questions over their deaths).

Postmortem reports claimed that the OST committed ritual suicide in order to spiritually ascend to Sirius, where they believe their souls originated from. If this is true this is another troubling link to the "Walk-Ins from Sirius" theme from Ruth Montgomery's seminal Aliens Among Us, which has also been linked to the Heaven's Gate suicides.

Last week marked the 20th anniversary of the Phoenix Lights flap, a controversial UFO sighting that caused a major media meltdown and has been the focus of a growing mythology ever since. What is particularly interesting about the Phoenix episode- however you view it-- is that it took place right down the highway from the Heaven's Gate compound in Rancho Santa Fe, CA. 

It may have been seen as the final sign that their ride was here, seeing as how the web-savvy cult was monitoring all kinds of infostreams for omens and portents. 

Next week also marks the 20th anniversary of the Outer Limits episode "Double Helix," which plays out like an idealized fantasy world version of Marshall Applewhite's most cherished beliefs. 

Seeing as how the suicides were discovered before its airing it plays like an elegy, a bizarre epitaph for the cult, its leader and their beliefs. How the hell that happened is anyone's guess.

Speaking of double helixes, 1997 saw the announcement that the first major cloning had been done, of "Dolly" the sheep. The news was broken in Roslin, Scotland, of all places (Dan Brown fans take note). More ominously it was also the year IBM's Deep Blue beat Garry Kasparov in chess. 

Coincidentally or not, Steve Jobs returned to Apple a few months later and changed the world as we knew it. One of his last projects was designing the Apple HQ, which looks like a friggin' flying saucer.

Why do all those events feel so closely entwined? We can't say we weren't warned.



1987 is the 30th anniversary of the publication of Whitley Strieber's seminal autobiography Communion, which brought the concept of alien abduction out of the fringes and into book store in America and other parts of the world. 

It's hard to explain to younger people what a phenomenon this book was, the controversy it engendered, and the effect it had on the culture. Strieber was a well-known author of best-selling horror novels, a couple of which had been adapted into movies (Wolfen and The Hunger) but never enjoyed a success like Communion, which stayed on the New York Times best-sellers list for months and sold millions worldwide.

Daytime talkshows were suddenly fora for abductees, whether real or imagined, as were popular tabloid TV shows like Unsolved Mysteries. The craze made celebrities out of Strieber, abduction researchers like Budd Hopkins and David Jacobs and later, Harvard psychologist John Mack. 

Oldline UFO researchers stewed on the sidelines, having traditionally regarded abduction reports with suspicion, if not contempt. Communion would lead to other projects, the Travis Walton biopic Fire in the Sky, The X-Files (which became an even greater phenomenon than Strieber's book), and the Steven Spielberg maxi-series Taken (which would be the SciFi Channel's most-watched series at the time of its airing).



1987 was also the year New Age seeped into the mainstream and has been insidiously rewriting its host body like a computer virus ever since. Pop culture was the medium yet again- a miniseries based on Shirley MacLaine's "spiritual authobiography" Out On a Limb was aired on ABC and planted the seeds for the Me Generation's catch-as-catch-can Theosophy 2.0. 

1987 saw "Ramtha" go wide with the publication of JZ Knight's autobiography, A State of Mind. Channeling soon became a multimiilion dollar industry, with hundreds of mini-Ramtha's popping out of the woodwork dispensing greeting card homilies for a spiritually-indiscriminate polity.

All you needed to do was squint, loll your head around meaningfully, adopt a weird quasi-British accent and learn to spout pseudo-profoundities and you were in clover.

Again, the New Age craze is hard to explain today, though in large part because the New Age is so ubiquitous today it's woven into the cultural fabric of most Western- and many non-Western- cultures. 

Yoga studios can be found in every sizable American town. Acupuncture and other "alternative" modalities are often covered by health insurance programs. Health food stores are slowly displacing conventional supermarkets and many more traditional houses of worship offer New Age programs (meditation, yoga, self-actualization) to their congregants.

1987 also saw the Harmonic Convergence (aka the "New Age Woodstock"), meant to act as the movement's big hop over the cultural fence. But its organizers (which included the original 2012 guru, Jose Arguelles) deeply misjudged the true nature of the movement and how it actually existed in the ideational biosphere. 

This wasn't a revolution, it was a slow-moving insurrection, one that subverted culture from within, all the while denying its very existence (the hallmark of a true New Ager is that they deny actually being a New Ager). Big, showy events weren't going to do the work. Tenacious, relentless but quieter actions were going to insinuate New Age into the mainstream.



1987 saw the Iran-Contra Affair- in which arms were sold to Iran in exchange for American hostages held by Iran-controlled radicals and the profits then diverted to anti-Sandinista militants in Nicaragua- become the major news story, dominating the headlines and Sunday talk shows for the entire year and into the next. 

Iran-Contra is also arguably the impetus for the true mainstreaming of conspiracy theory (just in time for the dawning of the Internet Era). Conspiracy research wasn't a fringe hobby then, it was front page news all across the world. It's just that the virus escaped from the lab and filtered down into places the mainstream media would have rather it hadn't.

But the real groundwork for the rise of conspiracy culture would be laid ten years earlier when the first fully-functional home computer, the Commodore PET was debuted at a trade show. 

Conspiracy theory may have thrived on talk radio (and short wave and ham radio, not to mention mail order) but it would explode on the Internet, even in the crudest venues of the BBS dial-in days.

At the same time the Commodore was unveiled, a new President from Plains, Georgia took office who swore to tear the lid off government corruption (and significantly, UFO secrecy) in Washington. 

Things, predictably, wouldn't work out so well for him.

1977 saw the commoditization of the modern Hollywood blockbuster-- already having birthed itself in 1975 with Steven Spielberg's Jaws. 

George Lucas' spiritual SF epic Star Wars and Spielberg's UFO fantasia Close Encounters of the Third Kind changed the rules forever (you can throw in Saturday Night Fever if you like, as it spawned the rise of the blockbuster soundtrack as well) and, as many would argue, planted the seeds for the eventual creation empoverishment of the Hollywood they created.

In today's market, doubles and triples are no longer be enough, you need to either write a movie off as a tax loss or score a grand slam blockbuster, complete with merchandising and ancillary rights.

But Star Wars and Close Encounters were such monsters because they filled a genuine void in the culture, a need for miracle and transcendence in a rapidly-secularlizing culture. In their wake the movies would become the dream theater of the masses, in the same way the great cathedrals were to the peasants of the Middle Ages.

Both films struck at the right time- NASA tested its first space shuttle at the beginning of the year, promising a new era in space exploration. One that has yet to come to pass, 40 years later. Even so the mood was right at the time.

On the other end of the ritual spectrum 1977 also saw the arrest of David Berkowitz, whom the media named as the sole "Son of Sam" killer despite the fact that witnesses had cogently and explicitly described other shooters not matching his description. 

Berkowitz himself would later claim he was a member of a sect of the Process Church of the Final Judgement, he was not the only shooter and that the killings were human sacrifices. And as fate would have it two of the men he claimed as his accomplices would die under mysterious circumstances not long after Berkowitz was arrested. 

And their father was named Sam.

Also in the summer of 1977, Elvis Presley died after a long struggle with obesity and prescription drug abuse. 

It was poetic in a Greek tragedy kind of fashion since '77 not only saw the precipitous rise of Disco as an all-consuming craze (Donna Summer had the first hit with a totally-synthesized record, "I Feel Love," that year) but also the breakthrough of punk rock and first-wave New Wave (the Sex Pistols, the Clash, Elvis Costello and Talking Heads all released their debuts), which took the basic, four to the floor rock 'n' roll Presley cut his teeth on and wed it to postmodernism, Dada and other weird, Continental theories that old-timers like the King would never have anything to do with.

Not that most of America even noticed. The Eagles' Hotel California, Pink Floyd's Animals and Fleetwood Mac's Rumors were albums most of the public were actually buying. Punk bombed bad in its first assault on American record stores and most of the first wave bands would soon break up or radically water down their styles in a bid to make it to the US Top 40. 

New Wave, which began as a marketing ploy to ease punk into the American market, would become the musical equivalent of New Age, a contagion that would insinuate itself into the host and rewrite the matrix from within. 

40 years later New Wave concepts are so dominant (irony and sarcasm not the least among them) in pop they're no longer recognized as distinct or unique. But that process began in earnest over 35 years ago, when MTV began beaming art school weirdos from England into a growing number of American living rooms. 

In short order even Jethro Tull and Bob Dylan- the onetime crunchiest of the crunchy- were recording with drum machines and sequencers.

There's more to come. 




          It's 2016 Why do Real Estate Agents Still Exist?   
Being Online everything has UBERed many business's into extinction!

Amazon delivers in 24 hours!

The internet should be killing real estate agents!
National Association of Realtors, agents are as widely used as ever: 89 percent of buyers retained one in 2012, up from 69 percent in 2001. It's the same on the seller side, where only 9 percent sold a home without an agent, down from a high of 20 percent in 1987.
https://www.washingtonpost.com/news/wonk/wp/2013/08/22/why-do-real-estate-agents-still-exist/
Ontario has 42,000 registered agents 

So what's different?

Buyers are International.
Showings are via Virtual Technology with Matterport 3D Tours. Buyers can pre inspect from the comfort of their computers. This reduces stress for you in showings. 

Financing is more complicated
Buyers over bidding on properties may not get funded because of appraisal or other legal issues. Some buildings / complexes has huge supply of condos available. Size does matter.

Home Sellers Insurance
Coverage is available to protect you from unforeseen expenses 

I know people and Have VETTED THEM
Whether they are the painters, landscapers, electricians, flooring contractors, appraisers, home inspectors, bankers, mortgage brokers or lenders; at some point I have used them and found them better than gambling on Craigslist for short notice services required.

Home Verified Reports
Used by Insurance Companies they provide a HISTORY of claims for flood etc.

Real Estate is a local 
I can display for you homes that have sold in proximity to the neighbourhood you want; design a canvass plan just for your search and Flyer / door knock the streets that you would like to live. VIMO applications for reports. 

Using Social Media and my personal network of professional realtors we can reach out to those that are active in local communities and search out pocket listings and coming soon.

http://www.Facebook.com/dpylyp
http://www.Twitter.com/davidpylyp
http://www.SellinginToronto.ca
https://plus.google.com/u/0/+DavidPylyp

https://plus.google.com/u/0/+DavidPylypToronto/posts
Matterport Tours are available at http://DigitalImagingToronto.com

How you receive the information has changed. 
My function has not.

I look forward to your enquiries.  Call or email today to get started

David Pylyp
647 218 2414
          No matter what he says; Tell him we need to think about it   
My guess is that before this meeting took place, you agreed not to make a buying decision today. That's perfectly understandable. Most of my clients want to think over my proposal. I've done the same thing myself.

All I ask is that if you see something that is a good fit for your needs and may bring your great benefits and may even save you money that you won't let that pact stand in your way.   That's fair isn't it?

Thank you Tom Hopkins

Ready to go shopping now?    For that forever house you've talked about?

Rates are available this weeks special at 1.59%. Get a rate quote!

http://BuyinginToronto.ca 

Computer Generated Virtual Tours now included with each NEW* listing


          Digital Imaging arrives in Toronto   
When home sellers see that you’ll be presenting their property online in immersive 3D, they will be blown away. A Matterport 3D Showcase™ makes you the clear choice to list any property. 

Digital Imaging Toronto is revolutionizing how real estate photographers, brokerages and agents showcase residential and commercial properties. The Matterport 3D technology is simple, powerful and effective. The ultimate home Viewing instrument that allows you to measure and create floorplans. 

A 3D Showcase™ is an online experience that lets home buyers move through a property and see it from any angle. Even get a completely unique sense for the place with our “dollhouse” view. Try it here!

 

Matterport 3D Media Platform Demo from Matterport on Vimeo.


... BUT there are thousands of other professions and services that could use this technology; 

  • Restaurant or Pub displaying their venue 
  • Homes under construction displayed in stages of completion 
  • Stores that have an online shopping presence 
  • Commercial Real Estate Brokers to display retail or office space. 
  • Home designers to display what could be changed. 
  • Insurance Companies for Claims or Verification Museums, 
  • Art Galleries and other Venues 


 Matterport is a key part of the optimal “click and mortar” showroom and commerce experience. The Matterport Pro 3D Camera and Capture App for iPad automatically produces high-quality immersive 3D models in the hands of any user. As the camera gently spins, it captures the colors and contours of a space—and calculates dimensions and spatial relationships between objects. Other laser-based camera systems are cumbersome, expensive and take days to create a 3D model. Access and organize your 3D models. 

The Matterport 3D Portal is a management and distribution platform for all of your 3D models. Access and organize your scan jobs and models, collaborate with your team, share models with clients, and publish models to the general public. All of your 3D models are uploaded into the folder you designate for each user. Cloud-based creation and hosting of high-fidelity 3D models. 

The Matterport Cloud executes an extensive set of computer vision algorithms to process the photography and 3D data, creating a 3D model that combines HDR-quality imagery with dimensionally accurate geometry. In this way, geometrical data is converted into an efficient polygonal mesh, which can be easily streamed to the Matterport 3D Showcase media player. 

Be there. From anywhere. Once a Matterport 3D model is hosted in the Matterport Cloud, viewers anywhere in the world can explore these spaces from their desktop or mobile device. The result? A totally immersive experience that literally transports you. 

 This functionality is now available on Virtual Reality platforms like VR Googles. http://matterport.com/virtual-reality/ News Releases http://matterport.com/in-the-news/ 

Call Digital Images Toronto to arrange your Virtual Tour - starting June 20, 2015
          'Mad Money' Lightning Round: Get Out of Arch Coal, Buy EMC   

Search Jim Cramer's "Mad Money" trading recommendations using our exclusive "Mad Money" Stock Screener.

NEW YORK (TheStreet) -- Here's what Jim Cramer had to say about some of the stocks callers offered up during the "Mad Money Lightning Round" on CNBC last night: EMC : This is one of the largest positions of my charitable trust, Action Alerts PLUS. It has been a winner so buy, buy, buy." MFA Mortgage : "I'm getting nervous about mortgages. Be careful here." Microsoft : "This does not yield enough to intrigue me. It's in no-man's land and I don't like being in no-man's land." Arch Coal : "I'm an incredible bear on this stock. Get out of Arch Coal." Bank of America : This is not my favorite bank" despite the stock being inexpensive "but it will do well if we go over the fiscal cliff." To read a full recap of "Mad Money" on CNBC, click here.

To sign up for Jim Cramer's free Booyah! newsletter with all of his latest articles and videos please click here. ...

Click to view a price quote on EMC.

Click to research the Computer Hardware industry.


          Lowongan Marketing Manager   
Our Client Computer Hardware Supply & Accessories Company looking for : Marketing Manager Job Description: 1. Propose and execute Nationwide Marketing Plan 2. Monitor, supervise and provide guidance on our marketing activities 3. Manage marketing team to meet marketing objectives 4. Maximize all advertising opportunities and media Requirement: – Male / Female – Age range […]
          Lowongan Technical Support   
Sebuah perusahaan IT yang sedang berkembang memerlukan segera Engineer untuk posisi sebagai Technical Support. Pria, belum menikah Berumur 21 s/d. 35 Minimum D3 atau Sarjana S1 dengan jurusan Computer Engineering atau Teknik Elektro Diutamakan yang mempunyai skill dalam melakukan installasi dan trouble shooting hardware maupun software computer. Fresh graduated juga dipersilahkan Menguasai dan mengerti bahasa […]
          neat alternative to Flappy Bird   
Flappy Tux is a nice little computer game very similar to Flappy Bird. It's great that the "Super Tux"-graphics have been used to create this game, so for everyone who loves this little penguin as much as I do, it's a must have. The game is very well suited for little breaks between work or studying. Download: Flappy Tux 0.1







          WM Capture features:   
Discover WM Capture, the highest quality screen video recorder you can buy on the Internet. WM Capture is an easy to use and powerful application designed for recording videos that are currently playing on your screen. Make high quality videos from ANY online source with WM Capture. WM Capture uses a unique high speed capture technology to create a near perfect reproduction of what you see on screen, playable as a Windows Media Video file. WM Capture records video from ANY Web site, regardless of format. It even records DVD's playing on your PC. If you can watch it you can save it. WM Capture does not circumvent DRM (Digital Rights Management) or any copy protection technology so it's 100% legal world-wide. In addition to WM Capture's high speed capture technology, the program also includes a proprietary MPEG-2 codec for even more outstanding picture quality. Other screen capture programs cannot process video data fast enough to make acceptable videos. WM Capture's special design uses the most advanced high-speed video processing technology, and the results are amazing. Even the toughest video types like full motion sports play back perfectly. The first time you run WM Capture, you'll need to make sure you can record audio and video properly. WM Capture will make it's best guess as to what the audio settings should be, but you can override them if you like. Once the Audio Source and Input are selected, click Test to ensure you can record audio. After a few seconds, if the test is successful, click OK to save the audio settings. Once the audio parameters are set, you can focus on recording videos. To start recording videos you need to mark a region of the screen to record, and then you can start, stop or pause recording. Once you've finished recording, you can see your last recorded video by simply clicking Play. Here are some key features of "WM Capture": · Auto video detection WM Capture can detect motion videos and automatically mark the recording screen area. Begin playing your video then click Get Video. The video window is automatically marked and recorded. If the marked area is not what you want click Retry to run the detection again. Note that static images cannot be automatically detected: · Improved video quality Improved motion fluency and audio lip-sync for every supported video formats: · Fixed pause issue Windows Media recordings can now be paused: · Automatic theme change Windows theme can now be automatically changed to Windows 7 Basic or Vista Basic. The current theme is always restored when WM Capture closes: · User Interface improvements, bugs fix · Added “Keep Alive” feature to prevent computer from going to sleep while recording, new window area marking methods, fixed Scheduler corrupted files, fixed Universal Audio Driver issues and more Requirements:· CPU Speed: 1.5 GHz dual core recommended, 2.8 GHz single core · RAM memory: 512 MB or higher · Sound Card with a recording line (Stereo Mix, Master Volume, Wave Out Mix, What U Hear or similar) Order Now! WM Capture is available on its own, or as a part of the WM Recorder Bonus Bundle, which includes our other popular, award winning streaming media recording, conversion and editing software: WM Recorder, WM Converter and WM Splitter. So start making your own videos from ANYTHING you can see on your screen. Get WM Capture today! Visit the producer web page to find more details ! http://wmrecorder.com/products/wm-capture/ Download: WM Capture 6.0.6.1



          Unstoppable Petya Ransomware CyberAttack Hits Networks and Computers in Over 65 Countries   
Yesterday saw the second major ransomware outbreak in a matter of less than two months. Countless big and small organizations including financial and government institutions, media, Russia’s Central Bank, Airports in Kiev, the shipping giant Maersk, and a number of other companies working in a variety of industries had their computer systems locked. Microsoft says […]
          ‘Checking visitor’ Pop-Up   
The ‘Checking visitor’ pop-ups may be displayed when users are redirected to a Web server programmed to display ads to visitors. Often, seeing the ‘Checking visitor’ Pop-Up may not mean that you have something fishy installed on your computer, but in some scenarios, it might turn out that the reason why you are seeing the […]
          Re: BRABAZONS   
Thank you Nancy Lou, any help would be greatly appreciated, and hopefully I could help you also. Sorry for the delay in getting back to you, had some computer trouble.
Roberta
          Come trovare, salvare e riprodurre video YouTube in 3D sul nostro computer   
Forse non tutti sanno che tra i moltissimi video presenti su YouTube, si trovano anche videoclip in 3D. Può essere un modo per provare la nuova tecnologia senza spendere troppo, infatti basta un monitor qualsiasi e un paio di occhiali
          Video2mp3, convertire online video Youtube in MP3   
Video2mp3 Beta è un convertitore gratuito di video provenienti da YouTube che consente di convertire in MP3 i video direttamente on-line e salvarli sul computer. Il servizio è veloce, gratuito e sopratutto non richiede registrazione. Tutto ciò che serve è
          Free Barbie: A Parody: I Lost My Job, Car, And Dreamhouse! Now, Ken Wants A Divorce? Ebook Download Full   

0 - Ebook Download Barbie: A Parody: I Lost My Job, Car, And Dreamhouse! Now, Ken Wants A Divorce? Free PDF Online





Alternative Download Link - Barbie: A Parody: I Lost My Job, Car, And Dreamhouse! Now, Ken Wants A Divorce?


Gratuit Barbie printables, free from your home or school computers Barbie was born in 1959 and was created for girls as a small, more easy to handle doll. Barbie has owned more than 40 pets, has owned all sorts of vehicles from ... Barbie Her Sisters In A Pony Tale Horse Adventure ... In the all new movie, "Barbie Her Sisters in A Pony Tale," Barbie and her sisters head to a posh horse academy, where they have the opportunity to perfect their Barbie Dress Up Games Barbie Games Online Free to play barbie dress up games dress up games 8 that was special built for girls and boys. Here you can play thousands of exciting barbie dress up games! Barbie Toys, Dolls, Playsets, Dream Houses More Barbie Discover the best selection of Barbie Toys at the official Barbie website. Shop for the latest Barbie dolls, playsets, accessories and more today! Talking Barbie is too creepy for some parents Mar. 11, 2015 'Hello Barbie' is able to have a two way conversation by recording what your child says and incorporating that information into future conversations. Barbie in Princess Power Barbie Movies Wiki Fandom ... Barbie in Princess Power is the 29 th CGI animated Barbie movie. It was released in Spring 2015. The film follows Princess Kara of Windemere, who, after being kissed ... Naked sunning beauty Barbie Murdock with big boobs ... Blonde Barbie Murdock is a natural born breathtaker. This bombshell with perfect big melons goes crazy about posing naked. She shows off her jugs and ass with big desire. Aqua Barbie Girl YouTube YouTube music video by Aqua performing Barbie Girl. Amy Schumer Playing Barbie Deadline Amy Schumer is in negotiations to play the title role in Barbie, the live action Sony Pictures film based on the venerable Mattel toyline. The PG movie will begin ... Barbie porn Sex Video XXX Tons of well organized stream XXX videos are waiting for you! Our porn videos are updated daily so please come back. A lot of categorized Barbie White, Barbii, Barbie ... StarSue.Net Your favorite characters dress up games are ... Star Sue,Girl Games,Monster High Dress Up,Winx Club,Barbie,Bratz,My Little Pony,Ever After High Corrido De "La Barbie" YouTube Sign up for YouTube Red by July 4th for uninterrupted music and videos all summer. Barbie as Rapunzel (Video 2002) IMDb Directed by Owen Hurley. With Kelly Sheridan, Anjelica Huston, Cree Summer, Ian James Corlett. Barbie is an artist who paints her way out of a castle to save her prince. Trial of Nazi Criminal Klaus Barbie Jewish Virtual Library When the trial began, the forty lawyer prosecution team, which represented Klaus Barbie's myriad ... Cheryl\'s Dolls Collectibles Welcome to Cheryl's Dolls Collectibles. We have been in business since 1995 and look forward to providing you with the best of dolls and collectibles, the best of ... Barbie Pink Passport Travel Doll with Scooter Toys"R"Us Please make a selection to add to registry. Barbie's ready for a change. Pack your bags and get ready to join the Barbie Pink Passport Travel Doll with Scooter on a ... Barbie Games for Girls Girl Games Barbie knows that with great friends like you, anything is possible! Have fun with this famous girl by playing our free online Barbie dress up games for girls! Barbie (Page 1) Celebrities Dress Up Games Barbie is as popular a fashion icon as she always was! She is always willing to try out new style trends, and in fact she is happy to model anything you put her in ... VoiceThread Conversations in the cloud VoiceThread Universal lets you browse threads and hear comments in pages specially designed for screen readers. Click here to go to VoiceThread Universal Stella B and Barbie P get double dicked in anal orgy ... Stella B and Barbie P are anal addicts that gets double penetrated in this orgy. Brunette with round ass and hot blonde take dicks in their holes and can't get enough. Barbie and the Diamond Castle (Video 2008) IMDb Two best friends, Liana and Alexa, embark on a journey to find the Diamond Castle! With the help of music, the girls overcome challenges that show friendship is the ... Barbie Doll 1966 Marks What They Mean Mattel Barbie doll Friends 1966 doll marks for Vintage Dolls, 1966 Barbie doll nabi Barbie 7" Tablet 16GB Wi Fi Pink FGC61 Best Buy nabi Barbie 7" Tablet 16GB Wi Fi: Android 6.0 Marshmallow; 7" screen with 1024 x 600 resolution; Wi Fi; 16GB storage; Blue Morpho OS Overlay Barbie Action Figures, Toys, Bobble Heads, Collectibles ... Barbie: Where would the world be without Barbie? This is not the time to find out, so be sure to order your Barbie Doll gifts so you too can share in the oohs and ... Interactives: The Girl in the Closet: Day 3 Dallas News Jeanie Rivers, a neighbor of the Atkinsons, was the first person to see the horrifying scene of Lauren's closet captivity when Kenneth Atkinson revealed "Barbie's ... New York Barbie Dress Up Game Barbie is visiting New York and she is doing it in style! It looks like she either brought two of her dogs with her, or she might be walking them for a friend. Barbie Games DressUpWho.com Have you ever been in Barbies shoes before? I thought so, but guess what girls? Once you start playing these free Barbie Games that we have prepared at your ... Barbecue Wikipedia Barbecue or barbeque (informally BBQ or barby barbies) is both a cooking method and an apparatus. Barbecuing is done slowly over low, indirect heat and the food is ... Read/download Barbie: A Parody: I Lost My Job, Car, And Dreamhouse! Now, Ken Wants A Divorce? ebook full free online.

          Curry Technology Support Technician - Southwestern Oregon Community College - Oregon   
Primary Purpose To install, configure, and maintain instructional and administrative computers, printers, multimedia devices, SimMan, and peripheral hardware $13.71 - $19.31 an hour
From Southwestern Oregon Community College - Tue, 23 May 2017 08:05:11 GMT - View all Oregon jobs
          Read Download Notes on Democracy (Large Print Edition) Ebook Full   

0 - Download Notes on Democracy (Large Print Edition) Ebook Free Online





Alternative Download Link - Notes on Democracy (Large Print Edition)


Gratuit Food Ideas, Recipe Nutrition Facts SELF Find the best recipe ideas, videos, healthy eating advice and cooking techniques from our experts, all on SELF. Atmel AVR 8 bit and 32 bit Microcontrollers Atmel AVR 8 bit and 32 bit microcontrollers deliver a unique combination of performance, power efficiency, and design flexibility for a wide range of applications. CBSE Class 9 10 Editing Exercise 2 blogspot.com Blog provides NCERT solutions, CBSE, NTSE, Olympiad study material, model test papers, important Questions and Answers asked in CBSE examinations. Airfoil Comparison Airfoil Comparison. Select airfoils from the airfoil database or add your own airfoils and compare the airfoil shape and lift drag polars. Fallout 4 holodisks and notes Fallout Wiki Fandom ... This page lists all holodisks and notes in Fallout 4. The content is not described in full detail on this page. For details, please see the respective articles. Linear Technology Application Notes Application Notes. To search our Application Notes, either browse the list below or type a Keyword or Part Number into our search box at the top right of this page. 3 people fired by Trump were all investigating ... Axios Join AXIOS to save stories for later, get personalized news, and more! Detroit Tigers notes: News is good for injured trio Tigers manager Brad Ausmus received some encouraging news about a couple players on the disabled list. J.D. Martinez, who has been on the disabled list since the ... The Rise of American Industry [ushistory.org] Some have called Sam Slater's mill the birthplace of the American Industrial Revolution. During the first 30 years of the 1800s, American Industry was truly born ... Global Positioning System Overview These materials were developed by Peter H. Dana, Department of Geography, University of Texas at Austin, 1994. These materials may be used for study, research, and ... Mike Millss Anti Hollywood Family Films The New Yorker Mike Millss Anti Hollywood Family Films In 20th Century Women, the director of Beginners reimagines his complex relationship with his mother. IBM Collaboration Solutions Lotus Software IBM Collaboration Solutions, formerly known as IBM Lotus Software, delivers business collaboration software through enterprise social and mail solutions. Passive voice English Grammar Guide EF Functions of the passive voice The passive voice is used to show interest in the person or object that experiences an action rather than the person or object that ... 40th Anniversary Tour Announced! TomPetty.com News Tom and the Heartbreakers are pleased to announce the first dates of their 40th Anniversary Tour. Tom announced the tour on The Tonight Show Starring Jimmy Fallon ... Java SE 6 Update 12 Release Notes. Oracle The full internal version number for this update release is 1.6.0_12 b04 (where "b" means "build"). The external version number is 6u12. This release contains Olson ... VueScan 9 Release Notes VueScan supports raw scan files for the digital cameras in the following list. However, note that the colors may will be more accurate if you use an IT8 camera target ... Study Guides and Strategies Welcome to the Study Guides and Strategies Website! Helpful hint: with print preview and print, all navigation, banners and ads are deleted; only the helpful content ... ASP.NET MVC 4 Microsoft Docs This document describes the release of ASP.NET MVC 4 . ASP.NET MVC 4 for Visual Studio 2010 can be installed from the ASP.NET MVC 4 home page using the Web Platform ... The Mesentery: The Human Body's 79th Organ? D brief Editors note: For a deeper exploration of the mesentery including if it should actually be called our 79th organ click here. To the 78 ... 2014 Chevrolet Camaro 2SS Coupe review notes Autoweek 2 of 7 The 2014 Chevrolet Camaro 2SS Coupe is equipped with a 6.2 liter V8, pushing out 426 hp with 420 lb ft of torque. VirtualDub 1.10.4 released virtualdub.org "my work on VirtualDub has been very slow, which I apologize for, but I'd like to thank everyone" We thank you, sir. I've been using VirtualDub for ten years and I ... Recording Technology History Audio Engineering Society 1907 The Dictaphone Corporation was organized when the Columbia Graphophone Co. sold its business machine division. 1908 John Lomax, on his first trip west ... Lecture Notes in Computer Science Springer The series Lecture Notes in Computer Science (LNCS), including its subseries Lecture Notes in Artificial Intelligence (LNAI) and Lecture Notes in Bioinformatics (LNBI ... Aaron Hernandez Notes: Wrote Incoherent Suicide Letter ... Aaron Hernandez Notes: Wrote Incoherent Suicide Letter To Rumored Gay Lover Kyle Kennedy? Java SE Development Kit 8, Update 101 Release Notes Release Notes for the Java SE Development Kit 8u101 release. Lipedema Karen L. Herbst, Ph.D., M.D. Lipedema is a classically thought of as a congenital fatty enlargement of the legs almost exclusively seen in women by the third decade; two cases have been reported ... Solved MCQs Notes for Preparation of NTS Tests National Testing Service of Pakistan Preparation Notes,MCQs and Material for various posts,Past Papers 2016 2017,General Knowledge,English,Pakistan Studies,Islamic ... Visual Studio 2017 Release Notes Release Date: June 9, 2017 Visual Studio 2017 version 15.2 (26430.13) Issues Fixed in this Release. These are the customer reported issues addressed in this version: I Love Lotus Notes After realising that a lot of people are ill informed about Lotus Notes Domino and its capabilities, I have established this blog (built on Lotus Notes!). 20+ Of The Funniest Notes From Moms And Dads Bored Panda Keep on scrolling to take a look at a list of hilarious notes that parents left for their kids compiled by Bored Panda. They're bound to make you laugh, or at least ... Read/download Notes on Democracy (Large Print Edition) ebook full free online.

          Computer Requirements for Photographers   
What computer specifications do you need to be an effective newborn photographer
          People, not computers, create visual effects   
There's an impression that is perpetuated in the media that visual effects are created entirely by computers. The human artists are left out of this narrative. The term CGI is now being used...

[Summary only. Full text at site.]
          Harddisk Definition   


Hard disk drive (HDD)
A computer hard disk drive (HDD) is the mechanism that controls the positioning, reading and writing of the hard disk, which furnishes data storage. A hard disk drive -- often shortened to hard drive -- and hard disk are not the same thing, but they are packaged as a unit and either term can refer to the whole unit. Hard disk drives can be found in desktop computers, mobile devices, consumer electronics and enterprise storage arrays in data centers.
5 Data Storage Technologies to Watch in 2016
For the past 13 years, the experts at SearchStorage.com have honored the best and brightest technologies for the upcoming year. As always, we're proud to present a batch of technologies we believe will make a big impact on the data storage market.

History of hard disk drives
The hard disk was created in 1953 by engineers at IBM who wanted to find a way to provide random access to high capacities of data at a low cost. The disk drives developed were the size of refrigerators, could store 3.75 megabytes of data and began shipping in 1956. Memorex, Seagate and Western Digital were other early vendors of hard disk drive technology.
Hard disk drive form-factor size has continued to decrease as the technology evolves. By the mid-1980s, 3.5-inch and 2.5-inch form factors were introduced, and it was at this time they first became a standard in personal computers (PCs).
Hard disk drive density has increased since the technology was first developed. The first hard disk drives were able to store megabytes of data, while today they are in the terabyte (TB) range. Hitachi released the first 1 TB hard drives in 2007. In 2015, HGST announced the first 10 TB hard drive.
Continue reading Link Party on hold
          Creative Genius Link Party #43   
It’s Week 43 of the Creative Genius Link Party! I’m back! I finally replaced my stolen computer (I’ll write a blog about that whole experience later)…Thanks for stopping by this week to link up! Remember, the link that gets the most clicks, will get their blog button displayed near the top of my homepage sidebar… Continue reading Creative Genius Link Party #43
          Blog on hold until futher notice…   
So sorry, friends! I have yet to hear back about replacing my computer, so until I have it, I am posting from my iPhone. Hope to be back soon with link parties and more creative ideas. Thanks for your patience!
          Experienced Electrician Apprentice - ArcelorMittal Dofasco G.P. - Hamilton, ON   
Basic personal computer and corporate standard software skills (MS Word, Excel) are required. Founded in 1912, we are Hamilton’s largest private sector employer...
From ArcelorMittal Dofasco G.P. - Thu, 01 Jun 2017 07:34:35 GMT - View all Hamilton, ON jobs
          Horny MILF Bitch Rewarded Well Computer Guy For Fixing Her Laptop   
Watch Horny MILF Bitch Rewarded Well Computer Guy For Fixing Her Laptop at XXXPorn.rs - best free online XXXPorn videos for you to enjoy.
          Sep 20 with Dean Haglund of the X Files and The Lone Gunmen   
Shaun and Nathan sit down with the long haired computer hacker himself Mr. Dean Haglund AKA Langly of the X-Files and Lone Gunmen! You want want to miss all the insider information he shares.  -Download Here-
          Scrum Master - Red Sprite Software Inc - Richmond, BC   
We are looking for someone with a Bachelors degree in Computer Science or related area, and 3-5 years of project management experience....
From Indeed - Mon, 20 Mar 2017 20:48:57 GMT - View all Richmond, BC jobs
          First step is building quantum computers, next step is scaling them   
It was a great pleasure to get a tour of the University of New South Wales’ Centre for Quantum Computation today from Prof Andrea Morello. The Centre was last year awarded A$70 million in funding from private and public sectors with the aim of achieving ‘10 qubits in 5 years’. On the face of it […]
          Appointment Setter - Level One Solutions - Remote   
Must have access to internet from home on a laptop, computer, or tablet and a phone line. Looking for experienced appointment setters in merchant services... $50,000 a year
From Indeed - Mon, 12 Jun 2017 18:33:54 GMT - View all Remote jobs
          DEEP WEB - kinetic audiovisual installation and performance   

DEEP WEB

KINETIC AUDIOVISUAL INSTALLATION AND PERFORMANCE

BY CHRISTOPHER BAUDER AND ROBERT HENKE

COMMISSIONED BY THE FESTIVAL OF LIGHTS LYON

Deep Web is a monumental immersive audiovisual installation and live performance created by light artist Christopher Bauder and composer and musician Robert Henke. Presented in enormous pitch dark indoor spaces, Deep Web plunges the audience into a ballet of iridescent kinetic light and surround sound. The work was presented as a preview at CTM 2016 Festival Berlin and will be followed by its original presentation at the Festival of Lights Lyon in December 2016.

The generative, luminous architectural structure weaves 175 motorized spheres and 12 high power laser systems into a 25 meter wide and 10 meter high super-structure, bringing to life a luminous analogy to the nodes and connections of digital networks. Moving up and down, and choreographed and synchronized to an original multi-channel musical score by Robert Henke, the spheres are illuminated by blasts of colourful laser beams resulting in three-dimensional sculptural light drawings and arrangements in cavernous darkness.

The installation brings together decades of separate research and experimentation by two artists with unique visions and passions for sound and light, and by innovative companies working in these fields. High-end laser system manufacturer LaserAnimation Sollinger provided the technical expertise and development for this very specific spatial laser setup. The high precision motor winch systems with real time feedback and the main control software are provided by Design Studio WHITEvoid in collaboration with Kinetic Lights. This novel combination of computer controlled kinetic elements and laser systems allows for setting animated end points to normally infinite laser beams. DEEP WEB uses light as a tangible material to construct threedimensional vector drawings in thin air.

The work was originally commissioned by the Festival of Lights Lyon 2015, and developed in cooperation with local producer Tetro. Due to the festival’s cancellation after the tragic events in Paris, Berliners had the unique chance to attend an exclusive preview before the project will be presented in December 2016 in Lyon for the Festival of Lights 2016.

The Artists:

An artist and designer working in the fields of light and installation art, media design and scenography, Christopher Bauder focuses on the translation of bits and bytes into objects and environments, and vice versa. Space, object, sound, light and interaction are key elements of his work. In 2004 he founded the multidisciplinary art and design studio WHITEvoid, which specializes in interactivity, media, interior architecture, and electronic engineering.

Bauder has brought his installations and performances to art events and spaces around the world, including Centre Pompidou Paris, MUTEK Montreal, Festival of Lights Lyon, Luminale Frankfurt, The Jewish Museum Berlin and The National Museum of Fine Arts in Taiwan. He is best known for his city-wide light art installation “Lichtgrenze”, created in 2014 together with his brother Marc, for the 25th anniversary of the Fall of the Berlin Wall and his large scale kinetic live shows ATOM and GRID. Both in cooperation with Robert Henke.

Alongside his numerous releases as Monolake, Robert Henke is also well known for the music, audiovisual installations and performances he has been creating under his own name since the early 90s. Due to his background in engineering and fascination with the beauty of technical objects, the development of his own instruments and algorithms has always been an integral part of his creative process. Henke also co-developed the omnipresent Ableton Live music software, which since its invention in 1999 has become the standard tool for electronic music production and completely redefined live performance practice.

His installations and performances have been presented at Tate Modern London, the Centre Pompidou Paris, PS-1 New York, MUDAM Luxembourg, MAK Vienna, the Art Gallery of New South Wales in Australia, KW Institute for Contemporary Art, Berlin, and at countless festivals.

THE DEEP WEB TEAM

Artists:
Christopher Bauder
christopherbauder.com
Robert Henke
roberthenke.com

A Production by:
WHITEvoid
whitevoid.com
TETRO+A
tetro.fr

Originally Commissioned by:
Fête de Lumière Lyon
fetedeslumieres.lyon.fr

Berlin Production by:
CTM Festival
ctm-festival.de
Kraftwerk Berlin
kraftwerkberlin.de

Motor Winch Systems and Control Software:
Kinetic Lights
kinetic-lights.com

Laser Systems and DSP Software:
LaserAnimation Sollinger
laseranimation.com

Software Built With:
TouchDesigner
derivative.ca

Cast: WHITEvoid

Tags: deep web, art show, audiovisual, live performance, christopher bauder, kinetic lights, laser animation sollinger, robert henke, kraftwerk berlin, kinetic, whitevoid, tetro and ctm festival


          Corsica GR20 North: Memories of a trekker (English version)   

VERSIONE ITALIANA A QUESTO LINK: vimeo.com/15176588

This is a 55 minute documentary-film of my experience on the northern section of the GR 20 (Corsica) I did back in July 2010 with a couple of friends.
If you care to watch it to the end, you will (hopefully) share our same emotions and will get the distinct impression of what this trek is about.
For those who have done this trek already it will be heartwarming to find some familiar places.

Shooting and editing this film has been for me an act of love towards this fantastic land.

Enjoy and thanks for watching.

SEPT 2011 UPDATE: THE LOGICAL (AND EXPECTED) SEQUEL TO THIS VIDEO (CONCERNING THE GR20 SOUTH) IS HERE: vimeo.com/29148378

PS
I did my best to make the most of my vidcam, but please bear in mind I did it with a "pocket" cam, with all the limitations that this means (a real challenge!!).
Nevertheless I shot it in HD so - if your computer is not too old - you may be able to watch it full screen (if you like).
If you don't have a fast connection I recommend to let the video buffer (load) for some minutes on your computer before watching it.

Related thread: http://corsica.forhikers.com/forum/p/3735
My GR20 site: http://gr20corsica.wordpress.com/about The quick and dirty facts

Cast: RedAlert

Tags: GR20, Corsica, Corse, trekking, hiking, adventure, backpacking, National Park, wilderness, mountain, river, trail, film, documentary, information, news, report, experience and video


          LEGO Star Wars: The Freemaker Adventures S02E08   

LEGO Star Wars is a series of TV Movies telling stories from the Star Wars universe using the distinctive characters from the world of LEGO and the animation style of the LEGO Star Wars computer games. Starting in 2005; the first film “Revenge of the Brick” was created to coincide with the theatrical release of […]

The post LEGO Star Wars: The Freemaker Adventures S02E08 appeared first on HOST SUBTITLES.


          Instructor Computer Certification Level 1 (Apple SWIFT App Dev) - Houston Community College - Houston, TX   
Houston is the Culture & Culinary Capital of Texas with more than 7,500 restaurants and eating establishments covering 60+ cuisines....
From Houston Community College - Wed, 07 Jun 2017 22:41:12 GMT - View all Houston, TX jobs
          Technical Interview Questions   
I have been on some recent technical interviews for Tech Lead and/or Architect Roles. I am keeping track of the questions asked and will post them here.  The answers you see are mostly copy/paste from a Google search, with a mix of my own thoughts.  Feel free to jump in with your own questions and/or answers. 

1.       define encapsulation

a.       Data /Information hiding, hiding; objects do not reveal their attributes  and behaviors.  All interaction with an object should be done thru it’s interface.  

b.      Storing data and functions in a single unit (class) is encapsulation. Data cannot be accessible to the outside world and only those functions which are stored in the class can access it.

c.       The purpose is to achieve potential for change: the internal mechanisms of the component can be improved without impact on other components, or the component can be replaced with a different one that supports the same public interface. Encapsulation also protects the integrity of the component, by preventing users from setting the internal data of the component into an invalid or inconsistent state. Another benefit of encapsulation is that it reduces system complexity and thus increases robustness, by limiting the interdependencies between software components.

2.       define abstraction

a.       the act of representing essential features without including the background details or explanations.

b.      reduce and factor out details so that one can focus on a few concepts at a time.

3.       define garbage collection and what is meant by generational GC

a.       The .NET Framework's garbage collector manages the allocation and release of memory for your application. Each time you use the new operator to create an object, the runtime allocates memory for the object from the managed heap. As long as address space is available in the managed heap, the runtime continues to allocate space for new objects. However, memory is not infinite. Eventually the garbage collector must perform a collection in order to free some memory. The garbage collector's optimizing engine determines the best time to perform a collection, based upon the allocations being made. When the garbage collector performs a collection, it checks for objects in the managed heap that are no longer being used by the application and performs the necessary operations to reclaim their memory.

b.      The garbage collector keeps track of objects that have Finalize methods, using an internal structure called the finalization queue. Each time your application creates an object that has a Finalize method, the garbage collector places an entry in the finalization queue that points to that object. The finalization queue contains entries for all the objects in the managed heap that need to have their finalization code called before the garbage collector can reclaim their memory.

c.       Generational collectors group objects by age and collect younger objects more often than older objects. When initialized, the managed heap contains no objects. All new objects added to the heap can be said to be in generation 0, until the heap gets filled up which invokes garbage collection. As most objects are short-lived, only a small percentage of young objects are likely to survive their first collection. Once an object survives the first garbage collection, it gets promoted to generation 1.Newer objects after GC can then be said to be in generation 0.The garbage collector gets invoked next only when the sub-heap of generation 0 gets filled up. All objects in generation 1 that survive get compacted and promoted to generation 2. All survivors in generation 0 also get compacted and promoted to generation 1. Generation 0 then contains no objects, but all newer objects after GC go into generation 0. Thus, as objects "mature" (survive multiple garbage collections) in their current generation, they are moved to the next older generation. Generation 2 is the maximum generation supported by the runtime's garbage collector. When future collections occur, any surviving objects currently in generation 2 simply stay in generation 2. Thus, dividing the heap into generations of objects and collecting and compacting younger generation objects improves the efficiency of the basic underlying garbage collection algorithm by reclaiming a significant amount of space from the heap and also being faster than if the collector had examined the objects in all generations.

                                                               i.      The GC maintains lists of managed objects arranged in "generations." A generation is a measure of the relative lifetime of the objects in memory. The generation number indicates to which generation an object belongs. Recently created objects are stored in lower generations compared to those created earlier in the application's life cycle. Longer-lived objects get promoted to higher generations. Because applications tend to create many short-lived objects compared to relatively few long-lived objects, the GC runs much more frequently to clean up objects in the lower generations than in the higher ones.

4.       define disposing in .NET

a.       Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources.

5.       Define the difference between finalize and dispose in .NET

a.       In general, the Dispose pattern is used to release unmanaged resources in a timely fashion. This allows you to do this in a deterministic fashion- in other words, you have control over when they are released. The Object.Finalize method is also used for the purpose of releasing resources - but it is non-deterministic. You have no control over when it will be called by the GC. Further, implementing a Finalize method can have an adverse affect on the performance of the GC because it takes two passes of the GC to collect objects that override Finalize.  So, in general, if you are using objects that manage unmanaged resources, such as database connections, you implement IDisposable AND override  Finalize. This way, your covered if the client fails to call Dispose - you know that your resources will then be released when the object is GC'd. Of course, one you call Dispose - you don't need the finalize method to be called by the GC and suffer an unnecessary performance hit.

6.       xml tags and attributes


 

  

7.       define soa

a.       Service Oriented Architecture: putting enterprise functionality that rarely or never changes in the enterprise into a service that all enterprise applications can call into; typically a web service

b.      SOA is the practice of sequestering the core business functions into independent services that don’t change frequently. These services are glorified functions that are called by one or more presentation programs. The presentation programs are volatile bits of software that present data to, and accept data from, various users.

c.       At the highest level, SOA is nothing more (and nothing less) than separating changeable elements from unchangeable elements

d.      SOA is not about any particular technology. Rather it is a design philosophy that decouples well heeled business functions from volatile processes and presentation

8.       define soap

 

9.       define serialization

a.       the process of converting the state of an object into a form that can be persisted or transported. The complement of serialization is deserialization, which converts a stream into an object. Together, these processes allow data to be easily stored and transferred.

b.      NET Framework features two serializing technologies:

                                                               i.      Binary serialization preserves type fidelity, which is useful for preserving the state of an object between different invocations of an application. For example, you can share an object between different applications by serializing it to the Clipboard. You can serialize an object to a stream, to a disk, to memory, over the network, and so forth. Remoting uses serialization to pass objects "by value" from one computer or application domain to another.

                                                             ii.      XML serialization serializes only public properties and fields and does not preserve type fidelity. This is useful when you want to provide or consume data without restricting the application that uses the data. Because XML is an open standard, it is an attractive choice for sharing data across the Web. SOAP is likewise an open standard, which makes it an attractive choice.

10.   define DTO

a.       Data Transfer Object; could be custom Business Objects, DataSets

11.   Define marshalling

a.       The process of gathering data and transforming it into a standard format before it is transmitted over a network so that the data can transcend network boundaries. In order for an object to be moved around a network, it must be converted into a data stream that corresponds with the packet structure of the network transfer protocol. This conversion is known as data marshalling. Data pieces are collected in a message buffer before they are marshaled. When the data is transmitted, the receiving computer converts the marshaled data back into an object.

b.      Data marshalling is required when passing the output parameters of a program written in one language as input to a program written in another language.

 

12.   Define interactions with business folks, selling your idea, coaching them, etc

 

13.   define design patterns, give an example of 2

 

14.   define Polymorphism

a.       “Many Forms”.   The ability of a derived class to perform its own implementation of a parents  method thus re-defining the method.  It’s the ability to hide alternative implementations behind a common interface.

 

15.   learn more about current web services, messaging, patterns, etc

 

16.   What does the finalize method do and when to use it

a.       allows an object to clean up its unmanaged resources properly when the garbage collector reclaims the memory used by the object

b.      By default, the Finalize method does nothing. If you want the garbage collector to perform cleanup operations on your object before it reclaims the object's memory, you must override the Finalize method in your class

c.       The unmanaged resources must be explicitly released once the application has finished using them. .Net Framework provides the Object.Finalize method: a method that the garbage collector must run on the object to clean up its unmanaged resources, prior to reclaiming the memory used up by the object. Since Finalize method does nothing, by default, this method must be overridden if explicit cleanup is required.

d.      Finalize provides a backup to prevent resources from permanently leaking if the programmer fails to call Dispose

17.   What is reflection and when would one use it

a.       The ability to discover the composition of a type (e.g., class, interface, structure, enumeration, or delegate) at runtime.

b.      The classes in the System.Reflection namespace, together with System.Type, allow you to obtain information about loaded assemblies and the types defined within them, such as classes, interfaces, and value types. You can also use reflection to create type instances at run time, and to invoke and access them.

18.   Define AppDomains

19.   Define Clustered Indexes in SQL Server

 


          I need to replace my netbook   
Help me replace my eee901 netbook. My needs are annoyingly specific. For the last four years I’ve had an Asus eee901 which I’ve really liked, but it is now dying. I’ve loved the size and portability and, by putting in a decent 64GB SSD and extra RAM and using Ubuntu, I’ve mitigated the slowness of the N270 Atom chip somewhat. I use it mainly for email, word processing and browsing so I’m not that bothered about the speed, although it would be nice to be able to watch smooth videos. The keyboard I’ve learned to live with. In fact, the only thing that really annoys me is the low resolution of the screen (1024x600).

So, it’s replacement time and, irritatingly, netbooks have barely moved on and don’t come in 8.9 inches any more. My needs are: highly portable, can run Ubuntu, better than 1024x600 screen, can write longish docs on (so no tablets please). I don’t play games and I don’t really want to spend up into Ultrabook territory (yeah, the Asus UX21 is cool and thin, but it has a big footprint and is £750+). I’m thinking a max of about £550. This is not my primary computer. I live in the UK.

So I find myself looking at some very different machines:

One is the Acer Aspire One 522 which has 1280x800 resolution. It has a C-60 processor and again I’d upgrade the RAM and put in an SSD. Here I’m worried that I’m looking at something that is little better than the four year old netbook I’m replacing. I’m also worried that Acer’s build quality isn’t great.

The second is a Lenovo x121e which is 11.6 inches (1366x768) and rather bigger. But it is a fairly serious laptop and far better engineered and specced than the Aspire. It’s pricier too, at about £400, but I’m not really concerned about that. What I am really concerned about is the extra size. I want something I can carry in a smallish bag without really noticing.

A third, outside, consideration is the Asus Transformer Prime. The size of this is fantastic. But I’m very, very unsure of being locked into Android or, if I’m lucky, some iffy future Ubuntu port. Also, I’ve heard that word processing capabilities on it are terrible.

Anyway, if anyone has any experience of these machines or any other suggestions, I’d be very grateful.
           A user's manual for MAXIMS (version 1.0) a computer program for estimating the food consumption of fishes from diel stomach contents data and population parameters.    
Article Jarre-Teichmann, A. , Palomares, M. L. , Gayanilo, F. C. J. , Soriano-Barth, M. and Pauly, D. (1992) A user's manual for MAXIMS (version 1.0) a computer program for estimating the food consumption of fishes from diel stomach contents data and population parameters. , ICLARM Software, International Center for Living Aquatic Resources Management (ICLARM), Manila, Philippines, 4 . hdl:10013/epic.12127
          Claims Supervisor - Keenan & Associates - Torrance, CA   
Familiarity with PC, printers and computerized voice and email systems. Timely Excess claims reporting management to the Reinsurance Manager....
From Keenan & Associates - Tue, 30 May 2017 21:25:43 GMT - View all Torrance, CA jobs
          Guy Couldnt Help From Having A Boner While Helping Colleague With A Computer   
Watch Guy Couldnt Help From Having A Boner While Helping Colleague With A Computer at XXXPorn.rs - best free online XXXPorn videos for you to enjoy.
          Dictionnaire international des écrivains du jour (3 vol) – A de Gubernatis   
Dictionnaire international des écrivains du jour (3 vol) – A de Gubernatis

Category: Technical

Read more
          cmiVFX - Cinema 4D to Substance Painter Workflow   
cmiVFX - Cinema 4D to Substance Painter Workflow

Category: Tutorial

Read more
          Ghost In The Shell Stand Alone Complex 1st GIG E16-20 BDRip 1080p Ita Jap x265-NAHOM [BDRiP] [Seed (1)/Leech (0)]   









Titolo: Ghost In The Shell Stand Alone Complex 1st GIG
Anno: 2002
Genere: Fantascienza
Produzione: I.G. Production
Distribuzione: Panini Video 2006
Numero episodi: 26
Durata approssimativa episodi: 24'





Ambientato nel XXI secolo Ghost in the Shell è in superficie un thriller di spionaggio futuristico che segue le imprese del maggiore Motoko Kusanagi, membro della Nona Sezione, una squadra speciale di operazioni in incognito della Commissione nazionale di pubblica sicurezza giapponese specializzata nel combattere crimini legati alla tecnologia. Sebbene tecnicamente sia pari grado agli altri membri, Kusanagi ricopre il ruolo di leader della squadra e viene solitatamente chiamata maggiore a causa del suo passato rango nelle forze armate. È in gran parte robotizzata, un cervello umano in un corpo artificiale capace di imprese sovrumane e specializzata per il suo lavoro.

L'ambientazione di Ghost in the Shell è distintivamente cyberpunk o postcyberpunk, simile a quelle della Trilogia dello sprawl dello scrittore di fantascienza William Gibson, sebbene l'opera di Shirow sia maggiormente focalizzata sulle ramificazioni etiche e filosofiche della fusione tra l'umanità e la tecnologia. Gran parte degli uomini sono collegati alla rete, a cui possono accedere non soltanto mediante terminali fisici, ma soprattutto attraverso impianti situati nel loro stesso cervello. Diversi uomini sono diventati cyborg, ovvero esseri in parte organici in parte robotici. Quello che differenzia un cyborg integrale da un robot è la presenza di un cervello umano e del Ghost, ovvero dell'anima, qualcosa di intrinseco e inspiegabile che permette agli uomini di "sentire" sensazioni particolari. Il Ghost è l'istinto non mediato dai calcoli. Lo sviluppo dell'intelligenza artificiale ed un'onnipresente rete computerizzata sono il palcoscenico per la rivoluzione dell'identità umana e della unicità di sé stessi. In particolare il manga affronta direttamente queste problematiche: Kusanagi ed i suoi colleghi devono affrontare minacce esterne così come soffrire conflitti interni dovuti alle loro proprie nature.















[ Info sul file ]

Nome: Ghost In The Shell Stand Alone Complex 1st GIG E16 BDRip 1080p Ita Jap x265-NAHOM.mkv
Data: Wed, 28 Jun 2017 23:26:33 +0200
Dimensione: 224,396,762 bytes (214.001429 MiB)

[ Magic ]

Tipo file: data

[ Info generiche ]

Durata: 00:25:18 (1518.186 s)
Contenitore: matroska
Production date: Wed, 28 Jun 2017 23:26:17 +0200
Totale tracce: 5
Traccia n. 1: video (V_MPEGH/ISO/HEVC) {und}
Traccia n. 2: audio (A_AAC) {jpn}
Traccia n. 3: subtitle (S_TEXT/ASS) {eng}
Traccia n. 4: subtitle (S_TEXT/ASS) {eng}
Traccia n. 5: audio (A_AAC) {ita}
Muxing library: libebml v1.3.4 + libmatroska v1.4.5
Writing application: mkvmerge v13.0.0 ('The Juggler') 32bit

[ Traccia video ]

Codec ID: V_MPEGH/ISO/HEVC
Risoluzione: 1920 x 1080
Frame aspect ratio: 16:9 = 1.777778
Pixel aspect ratio: 1:1 = 1
Display aspect ratio: 16:9 = 1.777778
Framerate: 24.000001 fps
Dimensione stream: 169,486,725 bytes (161.635137 MiB)
Durata: 00:24:51 (1491.24994 s)
Bitrate (bs): 909.233096 kbps
Qf: 0.01827

[ Traccia audio nr. 1 ]

Codec ID: A_AAC
Freq. campionamento: 24000 Hz
Freq. campionamento output: 48000 Hz
Canali: 6
Dimensione stream: 29,403,307 bytes (28.041179 MiB)
Tipo di bitstream (bs): AAC SBR (Spectral Band Replication)
Frames (bs): 34,457
Durata: 00:24:30 (1470.165333 s)
Chunk-aligned (bs): Sì
Bitrate (bs): 160.000002 kbps VBR
Freq. campionamento (bs): 24000 Hz
Modo (bs): 6: front-center, front-left, front-right, back-left, back-right, LFE-channel

[ Traccia audio nr. 2 ]

Codec ID: A_AAC
Freq. campionamento: 48000 Hz
Canali: 2
Dimensione stream: 24,485,748 bytes (23.351429 MiB)
Tipo di bitstream (bs): AAC Main
Frames (bs): 71,165
Durata: 00:25:18 (1518.186667 s)
Chunk-aligned (bs): Sì
Bitrate (bs): 129.026284 kbps VBR
Freq. campionamento (bs): 48000 Hz
Modo (bs): 2: front-left, front-right




Rapporto creato da AVInaptic (18-12-2011) in data 28-06-2017 23:50:08
















          "Big E Bullshit"   
I am getting damned tired of turning on my TV and computer only to find out there is another problem with my video and internet reception! I got up early this morning to do some work and catch up on emails only to find both devices blankly staring back at me with these vague "You will not be entertained or get any online stuff done for an indefinite amount of time" messages.




I live in a fairly new building complex and I know from my past technical experience that the network here is a state-of-the-art fiber optic system capable of wonderful things. Why the provider, "Big E", can't keep it operating is beyond me. I suspect a weakness in the human factor is to blame. The infrastucture is there but not enough skill, knowledge or planning to make it work reliably.



I literally spent hours on the telephone trying to work things out with sometimes ill-mannered, cryptic help desk personnel and have had many visits by technicians. One time a tech guy called when I was in the shower and because I failed to answer the phone right away he left and cancelled my service request. I couldn't get another appointment until 4 days later. They come, do some things to make it work and it ultimately fails later.

The services are not cheap either. There is no competition for my business. The UAE has some of the highest communication rates in the world. Back home there would be 3 or 4 providers vying for my money, I had a choice, Here, take it or leave it. For the amount I pay I expect much better service.

I cringe whenever I fire up the laptop or turn on the television as I anticipate yet another problem. With the monopoly here I can't expect it to get better as they have no incentive to improve. I am stuck and it seems I have to deal with it. Such a waste of my time and theirs..

So here I sit after yet another unproductive, tedious help desk call awaiting a field technician to contact me. Apparently its a hardware failure, seems to be not enough LEDs are lit up on my fiber optic modem. I have a 12 hour graveyard night shift later today and I'll bet the tech's call will come right in the middle of my afternoon snooze. Past experience almost guarantees it.

Nothing is easy! Dammit! I pay enough for online access and I expect it to be reliable. Did I mention the internet is censored here too?
          Magnet-Set GEOMAG Color, 86 Teile   
49,90 EUR
Lerne mit Geomag ein faszinierendes Baukastensystem kennen, mit dem du aufgrund seiner magnetischen Kräfte, nahezu jede geometrische Form nachbauen kannst. Ob als Baumeister beim Nachbauen des Empire State Buildings und Co. oder beim Konstruieren von Raumschiffen und phantasievollen Gebilden, Grenzen gibt es für dieses Magnetspielzeug kaum.Geeignet ab: Kindergarten, Vorschule, GrundschuleGeeignet als: Lernspielzeug, LehrmittelFördert: Räumliches Vorstellungsvermögen, KreativitätErfunden wurde Geomag von dem Italiener Claudio Vicentelli im Jahr 1998, seitdem ist es ein populäres Spielzeug für Kinder und Erwachsene gleichermaßen. Dabei ist Geomag viel mehr als nur ein Spiel: Es ist auch ein entspannender Zeitvertreib, ein anschauliches Dekorationsobjekt und ein physisches Phänomen.Das Set besteht aus 86 Teilen.Achtung!Lesen und aufbewahren. Nicht für Kinder unter 3 Jahren geeignet. Enthält kleine verschluckbare Teile und Kugeln, die beim Verschlucken zum Ersticken führen können. Enthält starke Magnete: Von magnetempfindlichen Produkten wie Kreditkarten, Computern, magnetischen Datenträgern und medizinischen Geräten (Herzschrittmacher) usw. fern halten. Trocken lagern.  

          Comment on Building a PowerShell GUI (Part 2) by Brien Posey   
That error message means that PowerShell is having trouble locating the script. I would recommend making sure that you are in the script's folder when you run the command. If that doesn't work, then check the script's filename to make sure that it is LD.ps1. It's a good idea to make sure that your computer is configured to show filename extensions. I have occasionally encountered situations in which a hidden filename extension kept a PowerShell script from running. Good luck!
          Our smart phones are crippled by service provider prisons   
I just watched a good talk by Alec Muffet about how our smart phones are amazing computers, but that we are being kept prisoners inside walled gardens by our mobile providers and prevented from having full internet connectivity. You and Your Phone are Huge Threats to the Net #security #privacy #tor #dns  “This is the … Continue reading Our smart phones are crippled by service provider prisons
          Executive Chef - Gate Keeper Restaurant - Okanagan, BC   
Very strong computer literacy, including effective working skills of MS Word, Excel, PowerPoint, Adobe products and e-mail required in addition to property... $45,000 a year
From Indeed - Mon, 26 Jun 2017 21:24:58 GMT - View all Okanagan, BC jobs
          Volcanoes and the Little Ice Age   

We wrote in SuperFreakonomics about how past volcanic eruptions have resulted in a temporarily cooler planet, thanks to the release of sulfuric ash into the atmosphere. New research indicates that a series of volcanic eruptions may have caused the Little Ice Age:

The study, led by the University of Colorado Boulder with co-authors at the National Center for Atmospheric Research (NCAR) and other organizations, suggests that an unusual, 50-year-long episode of four massive tropical volcanic eruptions triggered the Little Ice Age between 1275 and 1300 A.D. The persistence of cold summers following the eruptions is best explained by a subsequent expansion of sea ice and a related weakening of Atlantic currents, according to computer simulations conducted for the study.

The post Volcanoes and the Little Ice Age appeared first on Freakonomics.


          Schwarze ferromagnetische Knete + Magnet   
14,95 EUR
Die ferromagnetische Knete ist dunkel, geheimnisvoll und reagiert auf magnetische Kraft! Jetzt mit verbesserter Rezeptur! Die neue ferromagnetische Knete ist jetzt viel weicher und reagiert dadurch extrem stark auf Super-Magnete!Diese Knete kommt zu Dir zusammen mit einem kleinen, starken Super-Magnet. Dieser verleiht der Knete seine Kraft, so dass sie fast lebendig wirkt und sogar selbst zum Magneten wird!Die Intelligente Knete (in den USA heißt sie übrigens Thinking Putty) lässt sich nicht nur formen, je nach Krafteinwirkung zeigt sie erstaunliche Eigenschaften:-Sie zerfließt langsam, wenn man sie liegen lässt.-Sie dehnt sich endlos wie Kaugummi, wenn man sie langsam auseinanderzieht.-Wirft man die Knete auf den Boden oder gegen die Wand, springt sie wie ein Flummi zurück.-Man kann sie ruckartig zerreißen, fast so wie Papier.-Wenn die Kraft groß genug ist, kann sie sogar so hart werden, dass sie zersplittert.-Sie ist weder klebrig noch schleimig und färbt beim Kneten nicht auf die Hände ab!-Sie ist geruchsneutral!-Sie ist nicht toxisch!Ein weiterer großer Vorteil: Im Gegensatz zu anderer Knetmasse trocknet die Intelligente Knete nicht aus und ist somit nahezu unbegrenzt haltbar!Inhalt: 80gAchtung!Nicht für Kinder unter 3 Jahren geeignet. Nicht toxisch. Von Textilien fernhalten.Dieses Spielzeug enthält Magnete oder magnetische Bestandteile. Magnete, die im menschlichen Körper einander oder einen metallischen Gegenstand anziehen, können schwere oder tödliche Verletzungen verursachen. Zieh bitte sofort einen Arzt zu Rate, wenn Magnete verschluckt oder eingeatmet wurden.Geeignet ab 14 Jahren.Tipps:Wenn Du einen starken Neodym-Eisen-Bor (NdFeB) Magneten (auch Super-Magnet genannt) ganz nah an die magnetische Knete hältst, wirst Du erstmal gar nichts bemerken. Aber keine Angst! Nach ein paar Sekunden wirst Du spüren, wie die Knete den Magneten anzieht. Je länger Du wartest, desto stärker wird die Anziehungskraft.Lade die Knete mit einem Super-Magneten auf, indem Du den Magneten einige Sekunden direkt an die Knete hältst. Du wirst spüren, wie die Anziehungskraft immer stärker wird! Wenn Du den Magneten dann umdrehst, stößt die Knete den Magneten ab. Halte den Magneten gegen die abstoßende Kraft an die Knete, und Du spürst, wie das Magnetfeld immer schwächer wird ? bis es sich plötzlich umkehrt, und die Knete den Magneten wieder anzieht!Bitte lies Dir die nachfolgenden Hinweise zu unseren Super-Magneten sorgfältig durch!VerschluckenKinder können kleine Magnete verschlucken. Wenn mehrere Magnete verschluckt werden, können diese sich im Darm festsetzen und lebensgefährliche Komplikationen verursachen. Super-Magnete sind kein Spielzeug! Stell daher sicher, dass die Magnete nicht in die Hände von Kindern unter 14 Jahren gelangen.QuetschungenAuch kleine Super-Magnete haben eine sehr starke Anziehungskraft. Bei unvorsichtiger Handhabung kannst Du Dir die Finger oder Haut zwischen zwei Magneten einklemmen. Das kann zu Quetschungen und Blutergüssen an den betroffenen Stellen führen.HerzschrittmacherMagnete können die Funktion von Herzschrittmachern und implantierten Defibrillatoren beeinflussen. Ein Herzschrittmacher kann in den TEstmodus geschaltet werden und Unwohlsein verursachen. Ein Defibrillator funktioniert unter Umständen nicht mehr. Träger solcher Geräte sollten daher genügend Abstand zu Super-Magneten halten.Metall-SplitterSuper-Magnete sind spröde. Wenn zwei Magnete kollidieren oder wenn Magnete auf einen harten Untergrund prallen, können sie zersplittern. Scharfkantige Splitter können meterweit weg geschleudert werden und Deine Augen verletzen. Du solltest daher auf jeden Fall vermeiden, dass Magnete aufeinander oder an Gegenstände prallen!Magnetisches FeldMagnete erzeugen ein weit reichendes, starkes Magnetfeld. Sie können unter anderem Fernseher, Laptops, Computer-Festplatten, Kreditkarten und EC-Karten, Datenträger, mechanische Uhren, Hörgeräte und Lautsprecher beschädigen. Halte daher die Magnete von allen Geräten und Gegenständen fern, die durch starke Magnetfelder beschädigt werden können.Nickel-AllergieUnsere Magnete sind mit Nickel beschichtet. Manche Menschen reagieren allergisch auf den Kontakt mit Nickel. Nickel allergien können sich bei dauerndem Kontakt mit vernickelten Gegenständen entwickeln. Vermeide bitte dauerhaften Hautkontakt mit dem Super-Magnet. Wenn Du bereits eine Nickelallergie hast, solltest Du auf den Umgang mit unseren Super-Magneten verzichten. Absplittern der BeschichtungUnsere Magnete weisen zum Schutz vor Korrosion eine dünne Nickel-Kupfer-Nickel-Beschichtung auf. Diese Beschichtung kann durch Kollisionen oder großen Druck absplittern oder Risse erhalten. Dadurch werden die Magnete empfindlicher gegenüber Umwelteinflüssen wie Feuchtigkeit und können oxidieren. Vermeide daher Kollisionen zwischen Magneten sowie wiederholte mechanische Belastung wie z.B. Schläge. 

          Comment on New ad-free version of KSR app now available by CatsFan4Life   
How much for an ad free version of the website? The auto-playing video is terrible. I'd install an ad blocker if I wasn't on my work computer.
          Multiculturalism at work   

Charing Cross Road, a heaving mass of punters, tourists and ambling drunkards flows past Samuel's workplace at its usual frenetic, clogged pace, until one of its number dislodges himself. An ambling drunkard. He sports baggy pants, a loose striped jacket and a whiskery, unkempt beard. He shouts at Samuel to the rustle of a plastic Waterstone's bag. "Fuck… eh, you….you… what are you doing?" "What!" Samuel stays back, keeps cool. The abuse runs in thick streams, words can barely be made out. Curious shoppers stare wildly over their issues of Zoo and The Economist. The man is black; Samuel is black too. "Fou!" Is it French? Red-eyed, mouth agape, the man keeps screaming, grabs his bag and plunges back into the crowd. Punters dive back into their torrents of headlines, semi-nudes and Harry Potter blurbs at the Borders storefront. Samuel resumes his lax position at the reception, wistfully contemplating the crowds.

Charing Cross Road is the pulse of multicultural London, an artery of pleasure, strife and boredom, snaking from the imperial grandeur of Trafalgar Square to the heart of Oxford Street. Its pedestrian flow makes a garish display; multicultural, festive and sweaty. Almost half of the UK's ethnic minorities live in the capital, clustered in villages: Jews up Golders Green, Cypriots in Haringey, Arabs at Edgware Road and hip white things in Islington. Charing Cross road is where they meet, shop and scuffle: but it is also a place where cultures are put to work. If the now bitterly contested British model of multiculturalism is falling ill, Charing Cross Road is a good place to take its blood pressure.

The security guard

"We don't get too much abuse. We are trained to handle this," Samuel says laconically. No security guard clichés apply to his five foot eight inch frame: no bouncy muscles, towering torso or chiselled face, and only a small corporate insignia on his plain T-shirt indicates he might be at work. Except, that is, for one distinct marker of those guarding the shopfronts and clubs of central London's incongruous geography these days, a marker by now too clichéd to even be noticed by most Londoners: Samuel is black.

"I have been working as a security guard for three years," he says. "You get a lot of junkies in this area. Sometimes you have to be aggressive." Samuel smiles, pushing out his chest a little. "You have to know how to act depending on the person. It's like science – action and reaction." He chuckles ever so slightly.

Samuel comes from Nigeria, as do many others in his profession. His eyes flick back and forth, scanning the throng of people. "You can't stand like this for too long, talking – somebody might just go in, take a pack of CDs and leave," he says. Samuel excuses himself, adding his name and a furtive handshake as an afterthought. Less than five minutes' talk in all.

The private security sector is expanding, and guards now adorn even the humblest of supermarket checkouts and dingiest of clubs. A "visual deterrent" to crime, security companies claim. And this visual deterrence is increasingly performed by bored-looking black Britons and Africans. The good news may be that black minorities, still two and a half times more likely to be unemployed than white Britons, are now entrusted with security matters, inching a bit higher up London's pecking order. The bad news is that an ethnic furrow is drilled into London's asphalt, channelling black men into badly paid, vulnerable frontline positions.

Politicians, pundits and even the police have often praised the multicultural British model of integration, not without good reason. Nobody will launch into patriotic sing-a-longs or wave a Union Jack in the face of the hookah-smoking, Morris dancing, Qur'an-chanting and sauerkraut-eating masses. But this is all multiculturalism by night. Multiculturalism also works – works hard – up Charing Cross Road, down dingy backstreets, at the back of fusty pubs, deep in the cellars of milk-white Kensington hotels, under the sterile bulbs of NHS surgeries.

It may be insolent to heave another load of real-world grit onto multiculturalism's back at this time of trials by government, racism and terror. But dreary work is the flipside to London's multicultural project. Black bouncers, Asian shopkeepers, African parking attendants, Polish bartenders, Spanish chambermaids, Irish builders, African nurses, Indian doctors – they all come to London and find their place, as if by serendipity, from £4.85 an hour and counting. Europe's financial capital is insatiable, spongy, absorbent. But do people pick jobs according to ability and preference, or is the grid already laid out for them; colourful, deceptive and non-negotiable as a London tube map?

The parking attendant

Like security guards, parking attendants are too busy for a chat. Brisk, outsourced, undaunted, they roam the capital's grimy single yellow lines armed with just an oversized machine to crunch number-plates and a council vest against cold winds and the evil eye. And they are virtually unstoppable, furtive figures.

"I am too busy, don't have time," says my first interview target, a stern black parking attendant. He walks off briskly, escaping the lunging white hack. Luck comes in the voluminous shape of a fast-paced black woman negotiating a Camden sidestreet. Her vest is deceptively branded with a comforting council-green dye that blends with a minuscule NCP insignia – the private, nationwide parking venture that won Camden Council's lucrative enforcement contract in 2001.

Is this one of London's toughest jobs? "No, it's not that hard!" she chuckles, scanning a white van's pay-and-display ticket. She treads along briskly. "Really, it's OK," she assures me. "In the beginning it's harder, but you get used to it. The abuse comes daily, of course. It's not the job for you if you can't handle abuse. But if you know you are doing the right thing, it's OK. You just walk away when they start shouting."

She is matter-of-fact, stout and cheerful, her hair sculpted into a bun. I tag along, barely keeping up. Is she running away from her stalker? What's her name? "You can call me this!" she chuckles again, pointing to her shoulder cuff. It says 1571. "I am not allowed to say my name. Here I am a number – my name doesn't matter." 1571 looks busier and busier. The radio crackles. Where is she from? "Nigeria." Why do so many Africans do this job? "Oh, I don't know," 1571 says, curtly or just briskly. We reach the end of the block, another grey Camden thoroughfare beckons beyond, with a neat stack of pay-and-displays. She is speeding – wait … too late. 1571 chuckles, says goodbye. A colleague approaches – could be her cousin: hair neatly wrapped, fast-paced, African features. Then a male colleague – black, African traits. One, two, three, all heading down the same street, an avalanche of attendants … And my failed source, pacing briskly as ever. But now he smiles. "So, you found somebody?" His accent, too, is African.

No job evokes such hostility as parking enforcement, more so since public-private partnerships and new profit-making incentives began unleashing a ticketing bonanza on the capital's streets. But London's parking business has been doubly outsourced: to private ventures and flak-catching Africans, who have relentlessly populated the payrolls. At the public-private faultline they teeter, armed with silly hats and plastic machinery, come rain or shine or saliva-spattering owners of four-by-fours.

Enforcing London's rules and patrolling private property are tough tasks, but somebody's got to do them. Not to worry: multiculturalism assigns the posts. Please tick the ethnic monitoring form and wait in line. If you tick "black", the chance is you will soon find your place within London's hard-working, visually deterring foot soldier community.

Who's doing what – A rough guide to working Britain

4.3 per cent of Pakistanis work as shopkeepers, wholesale and retail dealers, compared to 0.5 per cent of white Britons

4.2 per cent of Indians work as medical practitioners, compared to 0.5 per cent white Britons

16 per cent of Bangladeshis work as chefs, compared to 0.7 per cent white Britons

11.3 per cent of Bangladeshis work as retail assistants, compared to 6.3 of all Asians and 4.5 of whites

2 per cent of Asians work as cashiers or checkout operators, compared to 1.1 per cent of whites

9.4 per cent of Pakistanis are chauffeurs or cab drivers, compared to 0.5 per cent whites and 0.9 per cent of blacks

8.5 per cent of black Africans are nurses, compared to 1.7 per cent whites, few South Asians and 11.2 per cent of "other Asians"

3.6 per cent of black Africans work as security guards, compared to 0.5 per cent of whites

Approximations based on data from the Quarterly Labour Force Survey, December 2004 – February 2005. Ethnic minority data is unreliable due to sample size.

The shopkeeper

Aftab huddles behind a desk cluttered with weekly glossies, breath mints, KP nuts and 2p sweets, the radio filling his shop with muted noise. "Violence is not the solution," he sighs, referring both to the still recent 7 July London bombs and Iraq. On a shelf by the open door, a four-year-old copy of The Economist peeks out next to a gaudy selection of lads' mags. "The day the world changed", its front page trumpets, to the dust and fumes of Manhattan. "It reminds me of when it all started," Aftab says softly.

His cornershop is set in the shadow of thronging, roaring Camden Town station. Aftab comes from Pakistan, or rather, Kashmir. "Ever since Pakistan was created out of the British Empire in 1947 by [Muhammad Ali] Jinnah, it has failed to reconcile the different nations within its borders. It's an artificial creation. Actually, there are only two countries in the world created on the basis of religion: Israel and Pakistan," he says, bemused. "Their borders are a colonial legacy."

Since coming to Britain in 1997, Aftab has become the hub of a local community made up of itinerant builders, international students, crackheads, Bangladeshi shopkeepers and working-class families. He knows everybody. "My brother was running the shop when I got here, then he fell ill. I started coming to the shop, reading four-five papers a day: that's how I got to know all the people around here." He has braved shoplifters, stinkbombs and random yobbery, and recently appeared on the BBC after launching a petition against drug-related crime.

Aftab holds a Masters in Sociology from the University of Karachi. "When I came here they told me that if you have a Third World qualification, you need to get a diploma in this country," he says. "The Job Centre is just there to give you your £52 a week in benefit, and then you're off. They don't help you find jobs. I was registered there for two years, and scanned job offers all the time. At one point I said, 'please, just give me anything!' I told them I could study for a diploma to complete my qualifications, but they weren't interested. Then I started to get more involved here." He still wants to study a Masters of Science in Human Rights.

Has he felt discriminated against? "No, it's the same for everyone." He smiles. I ask him why he thinks so many Asians have set up shop. He looks unsure, and eventually produces a bit of sociology. "When migrants first started arriving here, many were uneducated and set up shops and have continued since then. But their children often prefer to go looking for employers. With Sainsbury's and Tesco opening local stores, the cornershop is becoming a thing of the past."

In this "nation of shopkeepers", shopkeeping has been subcontracted to that old imperial safeguard of the nation's values, British Asia. Small-scale entrepreneurs of Indian or Pakistani extraction have absorbed the retail function, running cornerstores as well as staffing supermarkets, high street stores and bank counters. They are not alone, of course: Turkish Cypriots have carved a clothes-and-food niche out of north London. But Asian shopkeepers are the only group with full-spectrum dominance, from Haringey to Hampstead. However their market share is increasingly threatened by supermarkets that wedge their slick Express, Local, Metro and Central chains into minuscule urban spaces. Does that leave you, or your kids, unemployed? Please tick the "Asian" box, and be patient: the chance is you will be handling supermarket tills, sorting ballpoint pens in a stationers, or stacking crates before you know it.

The supermarket assistant

Feronda pauses from stacking tins and dons a sincere, expectant grin worthy of the glossiest of Corporate Social Responsibility reviews. He is happy with his job as a Sainsbury's customer assistant. "I'm from Sri Lanka. I'm a refugee. Only I and one more are from Sri Lanka in this shop – most of the other people here are Pakistani." Actually, all the other customer assistants seem to be Brits of Pakistani background. Even the security guard is Asian. Why does Feronda think this is so? "Oh, this I don't know," he says, tugging his grin along, keen to move on to the next question. "I like it here, I want to stay – I especially enjoy being on the shop floor. Before I worked for four years as a car mechanic up the road," – he waves past pea cans, north – "doing night shifts. That was very hard." Now he works 3-11pm, five days a week, at £6 an hour. "Let's see… about £850 a month for a 39-hour week," he says. He looks thrilled, grateful. Before coming to the UK he studied computers, but struggles to translate his education into British levels. "I didn't apply for any other jobs – just this," he says. But is there anything he doesn't like about the job? "No, no," he says, with the sparkling grin making a lingering plea for mercy. The largely white Chalk Farm clientele scavenges for breakfast bagels and tender-stem broccoli. Feronda's colleagues shuffle past, aisle-wide looks in their eyes.

Whether British supermarkets' workforces are as diverse as their stock of curries, mozzarella and stodgy German bread is hard to ascertain – their statistics slip from your hands like salmon. Fourteen percent of Sainsbury's employees and three to four percent of its managers come from ethnic minorities: more detailed figures are not available from either Sainsbury's or Tesco, despite their equal opportunities policies.

Sainsbury's prohibits discrimination and strives to "move beyond simple legal compliance," according to Cheryl Kuczynski, a spokeswoman. "We actively look to employ colleagues who reflect the diversity of our customers," she says. Tesco, the behemoth of the British food market, says targets have been set to get so-called "ethnic groups" into managerial positions. Flexible work during Ramadan and Diwali and briefings in languages like Hindi, Urdu, and Bangladeshi are two selling points. All according to its Corporate Social Responsibility review.

Katie Jenkins, Tesco's employment spokeswoman, says that diversity "creates a great atmosphere in stores" and makes everybody contribute with different skills and knowledge. "Retail is a fast-paced environment, so we look for people who can adapt well to change, people who are very customer-focused. The stores reflect the demographics of the local area. It is about recruiting local people into local jobs."

In lush white Hampstead, amid the cobblestones, blonde beer, Unitarian churches, window displays of pains au céréales and fragrant Jojoba oils, lurks an unbecoming Tesco Express. Inside, Jayvishal is morosely stacking boxes of vegetables. "I can't do an interview if it's going to take time," he warns. I try an optimistic note. What does he like most about his job?" "I don't like it at all," he says, his slightly pained face sloping down into an unlikely smile. "It's hard work, very hard work. Packing all the time."

Jayvishal is from India. "There are not many Indians here – mainly Sri Lankans and some Europeans," he says. By European he must mean British Asian: all the shop's staff look Asian. How did he find this £6-an-hour job? "Oh, through the Job Centre, and then I had some friends over here," Jayvishal answers, somewhat cryptically. "I have been in the UK since 2003, and couldn't find a job for a while. It was very hard. Legally, international students are only allowed to work 20 hours a week, but during vacations I do overtime. It is difficult economically – I have to pay rent, transport and everything, and only earn £500 a month."

Jayvishal is studying a Masters in Business and Finance at London's Metropolitan University. While not in India he lives in Queensbury, zone four, on the Jubilee line that branches through a parallel part – or galaxy, perhaps – of north London. Skills and knowledge he has: a local he is not. The manager, a short-set, trim-bearded man of South Asian features presses up against us, fingering the stack of plastic boxes. Time to retreat. "And when you're finished…" – the orders fade, giving way to wine bars and American ice cream parlours slanting down the north London hillside.

Hampstead is at the extreme end of the spectrum. But a random Monday afternoon headcount at seventeen West End supermarkets, where workers are least likely to be drawn from a residential pool, confirms the ethnic pattern, albeit with minor variations. One hundred customer assistants were of Asian background, fifty-eight were black, nineteen white, and four "other Asians". The eleven security guards on duty were all black but for one.

The bar tender

It would be a mistake to think that low-paid jobs are the reserve of the Queen's post-colonial subjects. Some minorities have fared quite well: ethnic Indians, for one, are now approaching the employment chances of white Britons. Meanwhile, London's pint-pullers earn even less than its shelf-fillers, and a terrifying ninety-seven percent of pub workers nationwide are white. Why?

Perhaps Al Murray's comedy act the Pub Landlord hinted at the answer when saying that there should be no things foreign in a proper English pub, with the natural exception of peanuts. Peanuts are more nondescript than exotic, a bit like the "white other" box on the ethnic monitoring forms. And so it is that Europeans, Australians and their fellow Antipodeans have been swallowed by the fusty land of minimum wages, ruddy-faced regulars and sticky floors.

Behind the bar, a twenty-something lad moves packets of crisps about. Covent Garden's cobbled streets unfold outside. "Cleaning, cleaning, cleaning all the time," he says, in spotless English. "There's lots of cleaning in this pub." He doesn't look glum at all saying it. The pub is one of a constellation of glinting properties on the online London map of the Spirit Group, one of the UK's biggest pub businesses with over two thousand venues to its name. Boleslaw has worked here since May, and shares the pleasure with a girl from Sweden, another from France, an Irish boss and two other Poles – a friend and the assistant manager. He got his job through the previous manager, also Irish. "That's a traditional English pub for you!" he says.

This is not the first time I come across the Ladder. The Ladder is a peculiar upstairs-downstairs way of ordering the capital's economy. The lower steps of many a London workplace are, predictably enough, dominated by the poor relatives of the world economy: Poles, Colombians and Nigerians abound. But climb one step up, and surprisingly often you will find employees from closer to home: Irish managing continental Europeans, perhaps, or Spaniards managing Colombians. On the top of the Ladder, perch the white English top managers and boardroom staff. The Commission for Racial Equality's (CRE) chairman Trevor Phillips has called it "snow-capping", or white on black: only 1.4 percent of executive management comes from ethnic minorities.

"It's a very hard job and not paid very well. The minimum: £4.85," Boleslaw continues. No big deal. This is his third bout of pub work in London. "At least this is a very nice area, with lots of theatres around." Nice areas make customer flows impressive, and it's hectic, lager-churning madness. "After a while you get used to it – even if it's packed you can listen to the music and chat up a girl. But you work till late and don't have time for yourself. You wake up at nine or ten next morning and start work at 12. It's like a full circle." He smiles. "If you get some days off, you just chill upstairs," he adds, pointing heavenward. Boleslaw and his colleagues sleep upstairs: it's a live-in pub.

Despite paying rent to his landlord-bosses, Boleslaw can save "a few hundreds" each month, he says. He is a graphic designer and photographer, a graduate of Poland's Academy of Fine Arts, and has worked for advertising agencies back home. "It's a dodgy job market in Poland, simple as that," he says, unapologetically. "The UK market is more stable. You can do bar work for a while, then start looking around for what you really want to do."

A man with entourage orders pints of Tetley and pork scratchings. A colleague shows up, and Boleslaw breaks into Polish for a few sentences, cackling until the colleague disappears into the sunshine.

What do his fellow Poles do in the capital these days? "Any job you can get," he says. "Normally, guys who are tough enough go work on building sites, but others go into these jobs. The guy who just left, for example, is a doctor." A doctor? "Yeah – it's easy to find them working in pubs. We got lawyers, we got doctors, graphic designers, actors, the lot. This country has got the most educated bar staff ever," he says cheerily, pouring pints of Guinness for a couple of Koreans. He has only applied for one graphic design job so far, and saves his pounds with determination. "I felt I had too good qualifications. They looked at my portfolio and said 'you're too good, you better go somewhere else'. When the time comes, I'll do it."

Years back, London's fleet of theme pubs, Irish pubs, local pubs and all the other concept and brand name pubs shop-fronting for Japanese investment banks were manned by cheery mates from Down Under. The Anglo-Saxon reaches of empire supplemented London's homegrown working class with much-needed building and boozing skills. Aussies and Kiwis provided the pint-pulling crowd. South Africans joined the Irish on the building sites. The Working Holiday Visa kept the children of the Commonwealth snuggled on old England's beer belly for years.

But in 2000, New Labour sowed the seeds of a revised migration strategy, which has blossomed into today's demand-based, quotas-and-points approach. Working Holiday rules for Commonwealth countries changed in 2003, and Antipodeans have moved into administration, computer work and public services with the easing of job-type restrictions. Poles are entering the pub-and-scaffolding race, quickly filling their predecessors' place. Some 98,500 Poles had applied for Britain's worker registration scheme in May 2005, over half of all new east European hopefuls arriving in the wake of 2004's EU expansion. Eighty percent of them earned up to £5 an hour.

The arrival of Poles is changing the demographic makeup of other parts of London's service economy, too. José Vigo, employment adviser, senses a growing fashion for east European employees at his West End Job Centre, which specialises in low-paid hotel and catering vacancies "that have not been taken through the domestic labour market".

Southern Europeans and Latin Americans, often over-skilled but with poor English, have peopled the lower reaches of London's job market for years, where a dank stereotype of the Latin service worker has grown. A recent Job Centre language survey confirms the lingering Mediterranean makeup of London's catering and hotel trades: Spanish clocked in as first language, followed by Portuguese, French and Italian – but with upstart Polish wedged in at third place.

Statistics are scant and unreliable and the turnover ferocious, but Vigo confirms that employers now head for eastern Europe rather than scavenging the Iberian soils for catering and hotel staff. "There they get better levels of English and people willing to do that kind of job."

The service sector is likely to continue haunting southern European visitors, however. "London is still one of the most popular places in Europe for young Spaniards," says Manuela Martínez, adviser for EU employment network Eures in southern Spain. "People want to master English and make their CVs look better. But if their level of English is low, they will work in places where they don't deal with the public, in 'backstage' jobs. They end up spending a year in London and bring back three or four words related to the hotel trade. Then, naturally, they only tell people about the good things that happened, and the process starts snowballing."

The backstage jobs of London's fickle service economy have a convenient feature: as Portuguese hotel workers, Spanish chambermaids and Latin American kitchen porters mingle in their trade, they speak Spanish instead of English. And the less English they speak, the more likely they will languish in their underpaid niches. London keeps luring job-hunters into its wide nets, its finance-fuelled economy selects and cherrypicks the candidates, and multiculturalism keeps them apart, blissful in their ghettoes.

The state's story

Government departments are blissful in their ghettoes, too, and keep chucking the ball out of their own ponds. The Department for Work and Pensions (DWP) does not target specific ethnic groups, says Ben Lloyd, a spokesman, who suggests I try the Department for Trade and Industry (DTI), which deals with safeguarding employees' rights. And what does the DTI think? A spokesperson mentions Tony Blair's 2003 cross-departmental Ethnic Minorities Employment Task Force, but little more: the DWP is wrong – "we don't deal with getting people into jobs."

Academia is also suffering from a "paucity of research" on ethnic recruitment according to Dr Sophia Skyers, senior research fellow on the London labour market with the public interest company Office for Public Management (OPM). She explains ethnic niching in relation to London's expanding knowledge economy. "We are seeing a polarisation of the labour force into, on the one hand, high-paid jobs in professional and financial services and, on the other hand, retail, protective services and other personal services like healthcare," she says. "What we get is a pattern of occupational segregation – a lot of people are forced into particular employment groups, often because of discrimination in other sectors. The stereotype goes with the job, and sticks to the people who get these jobs."

Professor Michael Hardt, co-author of the watershed tome Empire about how power has been redistributed in a globalised world, agrees that multiculturalism plays an economic role in the new economy. "Britain's multicultural model can facilitate an ethnic division of labour, a model that has perhaps a longer history in the Americas," he says. "Racialized hierarchies and exploitation do not always function along the old or assumed models of exclusion. But it's worth insisting that recognizing that cultural diversity can be part of a new scheme of exploitation does not mean we should be against cultural diversity as such. What we need to strive for is equality and freedom within this multicultural society."

Trevor Phillips has criticised multiculturalism for keeping people apart, labelling it "a typically British way of dealing with difference". But now the stakes are higher. While London Mayor Ken Livingstone praised multiculturalism in the wake of the 2005 London bombings, Tony Blair announced a crackdown on Britain's permissive liberal consensus to a chorus of tabloid approval. But even multiculturalism's defenders often have little clue of what it really is, or does. Multiculturalism is not only a heap of colours, it is a machine with cogs that whirr. It not only fuses, but keeps apart. It doesn't so much discriminate as direct a choreography of cultures. Much like a latter-day, benign sort of empire, where all races and cultures play a minor part in the symphony of power.

On the ring road again

Your no-frills flight descends among thick nighttime clouds and your bags emerge from the bowels of Stansted airport. Now it's business the British way. Bearded Muslims, lavish Iberian girls and red-nosed Brits clutching Su Doku books mingle in the halls and tow their luggage into the rainy night, stared on by billboards vying for their London fare. Outside, hordes of many-accented hustlers flog £5 one-ways for cheap airbus upstarts. Beyond the Pink Elephant car park waits the National Express. A stream of people crosses the wet asphalt, oblivious to the hustlers' calls. This is how multicultural London commutes, in and out of London, twenty-four hours a day, every fifteen minutes.

Chris descends from his bus and lights a quick fag before his next drive. "The job is not as stressful as it looks," he says. "It's easy, and the pay's quite good. £22,000 a year because I do night shifts." He cuts a stoic figure, tall and bulky, his shaved head pinched by an earring. His colleagues, like him, are overwhelmingly white, bald, and big, emblems of the well-fed English working class. They ferry multiculturalism in and out of the capital. What do the people boarding his coach to the throbbing financial hub of Europe do, then? "Well," Chris puffs on his fag, thinks. "We carry a lot of students, some come over on a gap year, a small portion are on business and the bulk of them are tourists and sightseers."

What about the workers? Where are they? Who notices the shelf-stacker in the business student, the pint-puller in the graduate, the cornershop owner among the businessmen, the sandwich wrappers, cappuccino steamers and doormen among the tourists? Not Chris, not Ken, not Tony, nor Middle England or the City elite. The City: white as a scrubbed cathedral wall, home of offshore dollars and high-value bonds, generator of the service economy and its guards, attendants, retailers, cleaners, drivers. And Chris, where does he live? "I live in Haverhill, outside Cambridge," he says, stubs out his fag, and sets the motor purring towards the M25.


          Vasco Modena Park   
Il concerto dei record in diretta al cinema

Regia di Pepsy Romanoff. Con Vasco Rossi.
Genere Concerto - Italia, 2017. Durata minuti circa. Da sabato 1 luglio al cinema.

Vasco Rossi, una delle voci più autentiche del rock in Italia, festeggia quest'anno 40 anni sul palco di MODENA...MODENA PARK, dove tutto è cominciato e tutto ricomincia. Battuto il record mondiale, 220.000 biglietti venduti. La band: Vince Pastano alla chitarra, Alberto Rocchetti alle tastiere, Claudio Golinelli "il Gallo" al basso, Andrea Innesto "Cucchia" al sax e cori, Frank Nemola alla tromba tastiere e computer, Clara Moroni ai cori. Sono arrivati dagli Stati Uniti anche Stef Burns alla chitarra e Matt Laug. Supervisione di Guido Elmi. Il regista live del concerto quest'anno è Pepsy Romanoff, lo stesso degli ultimi video e del film girato a Napoli.

Scheda | Critica | Locandina



          Sanduhr 5 Minuten   
1,70 EUR
Ideal, um das Gefühl für verschiedene Zeitintervalle zu trainieren. Zeit wird im wahrsten Sinne des Wortes sichtbar! Für viele Beschäftigungen und Spiele ein unentbehrliches Accessoire: eine Sanduhr zeigt Kindern, wie lange ein bestimmter Vorgang noch dauert.Bei Kindern heißt es oft Noch fünf Minuten! Oft wird damit eine bestimmte Tätigkeit zeitig beschränkt. Noch fünf Minuten Lesen, Malen, Spielen, am Computer sitzen... Mit der Sanduhr wird unmißverständlich klar gemacht: Bald ist Schluß!Die Sanduhr kommt in einer der Farben weiß, gelb, rot oder blau. Eine Auswahl ist leider nicht möglich.Abmessungen:Durchmesser 25mm,Höhe 90mm.Geeignet ab: Kindergarten, Vorschule, GrundschuleWichtiger Hinweis:Diese Sanduhren sind aufgrund Ihrer Beschaffenheit sehr ungenau und eignen sich keinesfalls für exakte Zeitmessungen! Bitte beachten Sie dies für spezielle Anwendungen und kontaktieren Sie uns vorab, um Ihre Anforderungen zu besprechen. Die Zeitangaben sind grobe Richtwerte!Achtung:Nicht geeignet für Kinder unter 3 Jahren wegen verschluckbarer Kleinteile.

          TUNE IN TO WJTL’S FRIENDRAISER TOMORROW   
FRED MCNAUGHTON – Please join us TOMORROW (March 29, 2012)  for a very special day in the life of WJTL and our family of listeners. The WJTL Friendraiser will feature prizes such as… * Kindle Fire from Snap Computers * Family 4 Pack to Dutch Wonderland * Hot air balloon ride for 2 from USA more »
          Recovery software to recover data from MAC   

It has become necessity of each and every people to use laptop or tablet. If you are in business or doing a job, you will have a need of computer or laptop at your workplace. Need of having computer is that you have to store all your records, data and files in the computer. All […]

The post Recovery software to recover data from MAC appeared first on Bullet In Tech News.


          Welcome to the Laughing Horse Blog.   
This is a blog for the Laughing Horse Books and Video Collective. We are a All Volunteer Lead and Run Bookstore. We have a meeting space available for like minded groups to either rent out or use free of charge. There are 2 public access terminals(computers-the public can use for free) running and testing free, open source software, (Ubuntu-Linux), we also send out a Free, Open Wi-Fi signal, so you can bring your own Wi-Fi ready device and surf away. We do enforce a "Safer Space" policy, and expect those who enter the bookstore to work with us on keeping the place a "safer space" to come to, if you have questions about it, please ask the volunteer staffing the shift at the bookstore. So come on down, you might wanna call first, and make sure someones there to let you in. Since we are all volunteers, we are not always able to fill all-shifts, for the whole shift. Thanks for your understanding. Mike-d.(part of the Laughing Horse Collective).

          The Incarnation Dignifies Work   

The fact that Jesus became a human and worked as a carpenter helps us reintegrate faith and work.
this is a parallel post with my new website, (re)integrate.
The reason Christmas fills me with wonder and awe is that it is the story of our all-powerful, all-knowing, eternal, sovereign, creator God humbling himself to become one of us.
“In him (Jesus Christ) all things were created: things in heaven and on earth, visible and invisible, whether thrones or powers or rulers or authorities; all things have been created through him and for him. He is before all things, and in him all things hold together.” (Philippians 1:15-17)
This is who Jesus is. And then there he is: Living for nine months in Mary’s womb – yes, Jesus was once a zygote! He grew into an embryo and then was birthed like every other baby. He was laid in a  feeding trough. The all-powerful creator God humbled himself to be completely dependent on Mary and Joseph to care for him.
“Christ Jesus, who, being in very nature God, did not consider equality with God something to be used to his own advantage; rather, he made himself nothing by taking the very nature of a servant, being made in human likeness.” (Philippians 2:6-7)
Jesus grew in wisdom and stature (Luke 2:52), under the care and tutelage of his parents. He apprenticed under Joseph and learned the noble vocation of carpentry.
Let this sink in: Before Jesus began traveling around proclaiming the good news of the Kingdom of God, before he suffered and died for our sins, before he was raised from the dead for our justification and victory over death, he spent the majority of his life building things with his hands.
Tom Nelson, in his must-read book Work Matters: Connecting Sunday Worship with Monday Work, writes,
“No doubt Jesus had strong, well worn, calloused hands. It is all too easy for us to overlook the fact that Jesus knew what it meant to get up and go to work every day. Jesus experienced both the exhilaration and the exhaustion of putting in a hard day’s work. Jesus faced work and a workplace profoundly affected by sin. I am sure Jesus dealt with difficult and demanding people in the workplace who complained about this and that.”
Jesus, the Son of God, worked.
One of my favorite comedians, Jim Gaffigan, does a bit on Jesus and his being a carpenter:

Why do I find this funny? Because it puts Jesus squarely on the earth – the same man who performed miracles built cabinets.
Dallas Willard, in The Divine Conspiracy, writes,
“If he were to come today as he did then, he could carry out his mission through most any decent and useful occupation. He could be a clerk or accountant in a hardware store, a computer repairman, a banker, an editor, doctor, waiter, teacher, farmhand, lab technician, or construction worker. He could have run a housecleaning service or repair automobiles. In other words, if he were to come today he could very well do what you do. He could very well live in your apartment or house, hold down your job, have your education and life prospects, and live within your family surroundings and time. None of this would be the least hindrance to the eternal kind of life that was his by nature and becomes available to us through him.”
Tom Nelson adds,
Working with his hands day in and day out in a carpentry shop was not below Jesus. Jesus did not see his carpentry work as mundane or meaningless, for it was the work his Father had called him to do.
This Christmas, allow yourself to be amazed by the incarnation. God, who is spirit, became human, for we are material. The fact that Jesus came to earth and lived as a human being informs us of God’s view concerning the dignity of our humanness, and the dignity of the material world in which we live.
Frederick Buechner, in his great little book Wishful Thinking: A Seeker’s ABC wrote,
“The Word became flesh,” wrote John, “and dwelt among us” (John 1:14). That is what incarnation means. It is untheological. It is unsophisticated. It is undignified. But according to Christianity, it is the way things are.
All religions and philosophies which deny the reality or the significance of the material, the fleshly, the earthbound, are themselves denied. Moses at the burning bush was told to take off his shoes because the ground on which he stood was holy ground (Exodus 3:5), and incarnation means that all ground is holy because God not only made it but walked on it, ate and slept and worked and died on it. If we are saved anywhere, we are saved here. And what is saved is not some diaphanous distillation of our bodies and our earth, but our bodies and our earth themselves. Jerusalem becomes the New Jerusalem coming down out of heaven like a bride adorned for her husband (Revelation 21:2). Our bodies are sown perishable and raised imperishable (1 Corinthians 15:42).
One of the blunders religious people are particularly fond of making is the attempt to be more spiritual than God.
All work can indeed be holy. Let’s honor God with our work as we worship him because of the incarnation of Jesus Christ.

          Bye bye books   
My computer literacy moves forward in fits and starts. I'm above average for my age group in some things. On the other hand, it was only yesterday that I first used the resource "Hein Online," a web-based archive with PDF images of something close to every page of every law review ever published.

Previously, I'd either used LEXIS or Westlaw, the two longstanding online legal databases. These are not always the best way to retrieve scholarly legal articles. Their html reformatting is not nearly as readable or visually pleasing as the original published formatting, and they don't reproduce charts and tables. Also, of course, I'd go to the actual books, though it has been some time since I got my butt out of my office and into the library stacks.

When I did that yesterday, I learned that my institution has gotten rid of almost all back issues of legal periodicals predating 1990. (Not actually thrown away, thank goodness, but moved into offsite storage.) Hein Online made the books obsolete, in the library's view. I guess shelf space is too valuable to keep dusty ol' books around.

It's true that I can browse on line and then download and print stuff I "need" to have on paper -- I just don't read with as much comprehension on the computer, and I like to mark up the texts. The latter point meant that I needed to get photocopies of the old law reviews, and now I can just print out downloads much more conveniently (and at the cost of no more trees than photocopies).

But I have great nostalgia for my scholarly immersion experiences of sitting at a carrell deep in the library stacks surrounded by piles of old law reviews. That will never happen again -- not as long as I want to look at pre-1990 stuff, anyhow.

I wonder whether other libraries are actually getting rid of books -- throwing them away. That would be short-sighted. What if in the near future, our society undertakes major energy conservation measures, including placing restrictions on computing time?

I take consolation in thinking that, if the lights go out in a big way, then old legal scholarship won't be very important anyhow.
          How much time have you spent handling a Rubik's Cube?   
The other day I made up this simile in a conversation about teaching. I was trying to make the point that any teaching problem could be solved.

For example, anything worth teaching in a law school class could be made more interesting and important than in that moment than a game of computer solitaire. Various obstacles to deploying a law school's teaching resources in a way that improves learning -- often viewed as insuperable -- can in fact be overcome.

It's a sort of faith in the existence of a solution, at the outset of tackling a problem. "It's like a Rubik's Cube," I said. "You know there's an answer even if you can't see how to get there. It takes determination and persisitence."

Having said that, I have to admit that I found the Rubik's Cube itself so boring (a tedious process to a very unsatisfying goal) that I estimate I've spent less than 5 minutes of my life handling one.
          What to Know About Reimbursements From 529 Plans   
You can withdraw money tax-free for tuition, required books and fees, and even a computer and related software.
          Emoji Adhesive Outdoor 651 Vinyl, HTV Heat Transfer Vinyl and Iron On Vinyl or Glitter HTV. Smiley Faces Emoji Fun by VinylWorldAndDesigns   

1.50 USD

Printed vinyl is available in adhesive (equivalent to Oracal 651), heat transfer vinyl and glitter heat transfer vinyl. These are printed on an eco-solvent commercial printer to assure that you get a vibrant long lasting finish that will last years. Prints come in 12" x 12" sizes. I do offer sample packs in 6"x6" sizes in the store.

Instructions for using HTV Prints and Glitter HTV Prints Directions:

Step 1: Cut your image with print side UP on mat and DO NOT REVERSE ON SCREEN.
Step 2: Weed the unwanted vinyl from the HTV sheets.
Step 3: Place HTV Transfer (also known as mask) on top of your weeded graphic pressing firmly across the graphic or design. Peel the transfer tape up and your graphic or design will be attached to the transfer. It is now ready to be placed on whatever garment you are applying it to. Siser recommends - TTD Easy Mask which is sold separately in all printed vinyl listings.
Step 4: Preheat fabric 2-3 seconds, this will take out any moisture that may be in the fabric. (you should do this will ALL htv)
Step 5: Position the transfer-taped (masked) design on fabric.
Step 6: Iron or heat press the design 15 seconds at 300° F, medium pressure. (Do not forget to use your Teflon sheet to protect the masked graphic from the top of the heat press or iron)
Step 7: Remove the transfer tape (mask) while warm. (keep the mask, it is reusable as long as it has some stickiness to it)

Users should test a small piece if not familiar with the process.

Care Instructions for htv:
*Do not dry clean.
*Wash inside out.
*Machine wash warm / mild detergent.
*Dry on normal setting.
*No chlorine bleach.
*Wait 24 hours before first wash.
*Also use care instructions that is on your garment, certain materials will tell you not to machine wash or dry so be sure to check that as well.

We strive we very hard to provide you with the best quality prints that we can by using 3 different softwares to get our final results. Please note though, that not all computer screens and monitors are the same so colors may be slightly different than shown on monitor. Images are made with pixelations, some prints may show slight pixelation but once cut and weeded you can't tell that and they are viewed at a distance, not close to the eyes. There are only a few print designs that you can see slight pixelation at a very close up view. We try to scale down all prints so that cutting smaller monograms or graphics look good. In order to do that some prints may be in tiled form but we do not tile unless that is our only option. If you ever have any questions about size then please ask prior to ordering. Any patterns described as glitter, metallic, or any other texture is based on the look of the vinyl and will not actually have these textures or finishes because they are printed.

More info is located in our Policy Section


          Flower Garden Daisy Rose Easter Adhesive Outdoor 651 Vinyl, HTV Heat Transfer Vinyl and Iron On Vinyl or Glitter HTV. Floral Prints by VinylWorldAndDesigns   

1.50 USD

Printed vinyl is available in adhesive (equivalent to Oracal 651), heat transfer vinyl and glitter heat transfer vinyl. These are printed on an eco-solvent commercial printer to assure that you get a vibrant long lasting finish that will last years. Prints come in 12" x 12" sizes. I do offer sample packs in 6"x6" sizes in the store.

Instructions for using HTV Prints and Glitter HTV Prints Directions:

Step 1: Cut your image with print side UP on mat and DO NOT REVERSE ON SCREEN.
Step 2: Weed the unwanted vinyl from the HTV sheets.
Step 3: Place HTV Transfer (also known as mask) on top of your weeded graphic pressing firmly across the graphic or design. Peel the transfer tape up and your graphic or design will be attached to the transfer. It is now ready to be placed on whatever garment you are applying it to. Siser recommends - TTD Easy Mask which is sold separately in all printed vinyl listings.
Step 4: Preheat fabric 2-3 seconds, this will take out any moisture that may be in the fabric. (you should do this will ALL htv)
Step 5: Position the transfer-taped (masked) design on fabric.
Step 6: Iron or heat press the design 15 seconds at 300° F, medium pressure. (Do not forget to use your Teflon sheet to protect the masked graphic from the top of the heat press or iron)
Step 7: Remove the transfer tape (mask) while warm. (keep the mask, it is reusable as long as it has some stickiness to it)

Users should test a small piece if not familiar with the process.

Care Instructions for htv:
*Do not dry clean.
*Wash inside out.
*Machine wash warm / mild detergent.
*Dry on normal setting.
*No chlorine bleach.
*Wait 24 hours before first wash.
*Also use care instructions that is on your garment, certain materials will tell you not to machine wash or dry so be sure to check that as well.

We strive we very hard to provide you with the best quality prints that we can by using 3 different softwares to get our final results. Please note though, that not all computer screens and monitors are the same so colors may be slightly different than shown on monitor. Images are made with pixelations, some prints may show slight pixelation but once cut and weeded you can't tell that and they are viewed at a distance, not close to the eyes. There are only a few print designs that you can see slight pixelation at a very close up view. We try to scale down all prints so that cutting smaller monograms or graphics look good. In order to do that some prints may be in tiled form but we do not tile unless that is our only option. If you ever have any questions about size then please ask prior to ordering. Any patterns described as glitter, metallic, or any other texture is based on the look of the vinyl and will not actually have these textures or finishes because they are printed.

More info is located in our Policy Section


          The best free disk imaging program: a comparative analysis (updated)   

What is the best way to safeguard your computer and undo a system disaster? Most would agree that is done best by making a  so called ‘disk image’, where your entire system partition is backed up and cloned, and the image saved on a different physical hard drive. Disk images are also an excellent way […]

The post The best free disk imaging program: a comparative analysis (updated) appeared first on freewaregenius.com.


          Donating Computers to AZ StRUT   
We are pleased to announce that Phoenix Synergy has just donated 12 more computers to AZ StRUT. Arizona StRUT is a non-profit organization formed in 1997 by founding sponsors Intel & Motorola. Arizona StRUT is where students learn new skills by refurbishing donated computer equipment. The equipment … Continue reading
          Turns Out New Petya Is Not A Ransomware It S A Destructive Wiper Malware   

What if I say the Tuesday s devastating global malware outbreak was not due to any ransomware infection Yes the Petya ransomware attacks that began infecting computers in several countries including Russia Ukraine France India and the Unite...
          Project Asobi - close to death but recovered   
I had quite a scare when I came home and found my Project Asobi computer "up-ended and spinning its wheels." What happened? Was it a exploding capacitor problem? No. The Ethernet port was blinking furiously and I couldn't get network access. Among other things, this computer functions as my file server, my blog data st...
          Computerized plant community classification: an application of fuzzy logic   
Decisions for classifying a vegetation plot are based on expertise and can thus be subjective, with users having to judge the relative importance of overlapping biotic and abiotic components. Fuzzy logic can be used to incorporate experts' knowledge of ecosystems into computer programs. A classification of the forested portion of the Montane subregion of west-central Alberta by plant community type (a level more detailed than ecosite) was translated into a simple fuzzy logic program. The program was tested, by means of a fuzzy logic software package, FuzzyTECH, on 147 Ecological Site Information System plots compiled by Alberta Environment. The computer classification was identical with the experts' classification for 80% of the plots, and where differences occurred it was easy to identify the reasons for the discrepancies. Anyone who can identify plant species could be sent to the field to obtain the information needed for this type of computer analysis and classification.
          Computer-aided interpretation of Banff-Jasper ecological inventory data   
none
          Grüne ferromagnetische Knete + Magnet   
15,95 EUR
Die ferromagnetische Knete ist geheimnisvoll und reagiert auf magnetische Kraft! Diese Knete kommt zu Dir zusammen mit einem kleinen, starken Super-Magnet. Dieser verleiht der Knete seine Kraft, so dass sie fast lebendig wirkt und sogar selbst zum Magneten wird!Die Intelligente Knete (in den USA heißt sie übrigens Thinking Putty) lässt sich nicht nur formen, je nach Krafteinwirkung zeigt sie erstaunliche Eigenschaften:-Sie zerfließt langsam, wenn man sie liegen lässt.-Sie dehnt sich endlos wie Kaugummi, wenn man sie langsam auseinanderzieht.-Wirft man die Knete auf den Boden oder gegen die Wand, springt sie wie ein Flummi zurück.-Man kann sie ruckartig zerreißen, fast so wie Papier.-Wenn die Kraft groß genug ist, kann sie sogar so hart werden, dass sie zersplittert.-Sie ist weder klebrig noch schleimig und färbt beim Kneten nicht auf die Hände ab!-Sie ist geruchsneutral!-Sie ist nicht toxisch!Ein weiterer großer Vorteil: Im Gegensatz zu anderer Knetmasse trocknet die Intelligente Knete nicht aus und ist somit nahezu unbegrenzt haltbar!Inhalt: 80gAchtung!Nicht für Kinder unter 3 Jahren geeignet. Nicht toxisch. Von Textilien fernhalten.Dieses Spielzeug enthält Magnete oder magnetische Bestandteile. Magnete, die im menschlichen Körper einander oder einen metallischen Gegenstand anziehen, können schwere oder tödliche Verletzungen verursachen. Zieh bitte sofort einen Arzt zu Rate, wenn Magnete verschluckt oder eingeatmet wurden.Geeignet ab 14 Jahren.Tipps:Wenn Du einen starken Neodym-Eisen-Bor (NdFeB) Magneten (auch Super-Magnet genannt) ganz nah an die magnetische Knete hältst, wirst Du erstmal gar nichts bemerken. Aber keine Angst! Nach ein paar Sekunden wirst Du spüren, wie die Knete den Magneten anzieht. Je länger Du wartest, desto stärker wird die Anziehungskraft.Lade die Knete mit einem Super-Magneten auf, indem Du den Magneten einige Sekunden direkt an die Knete hältst. Du wirst spüren, wie die Anziehungskraft immer stärker wird! Wenn Du den Magneten dann umdrehst, stößt die Knete den Magneten ab. Halte den Magneten gegen die abstoßende Kraft an die Knete, und Du spürst, wie das Magnetfeld immer schwächer wird ? bis es sich plötzlich umkehrt, und die Knete den Magneten wieder anzieht!Was kann ich mit der magnetischen Knete alles machen?Hier sind nur einige der vielen Tricks, die Du mit der Magnetischen Knete und einem Super-Magneten machen kannst:-Ziehe einen Super-Magneten oder andere Stücke der magnetischen Knete an-Sammel leichte, metallische Objekte wie Büroklammern oder Sicherheitsnadeln auf.-Entdecke die Form der Magnetfeldlinien, die von einem Magneten ausgehen.-Bewege einen Super-Magneten aus der Entfernung, ohne ihn zu berühren.-Leg den Magneten neben oder auf die Knete und schau zu, wie die Knete den Magneten langsam ?verschlingt?.Sind größere Super-Magnete besser?Je stärker der Magnet, desto beeindruckender sind die Effekte der magnetischen Knete. Der Super-Magnet, den Du bei uns erhältst, hat eine Kantenlänge von 12mm. Das ist auch die Größe, die Du in den Videos siehst. Diese Magnetwürfel haben eine Haftkraft von etwa 6,3 kg und sind somit wirklich stark! Unserer Meinung nach haben diese Magneten das beste Verhältnis von Stärke und Sicherheit.Natürlich kannst Du jederzeit auch stärkere Super-Magnete benutzen. Aber Achtung! Je stärker der Magnet, desto vorsichtiger solltest Du mit ihm umgehen.Bitte lies Dir die nachfolgenden Hinweise zu unseren Super-Magneten sorgfältig durch!VerschluckenKinder können kleine Magnete verschlucken. Wenn mehrere Magnete verschluckt werden, können diese sich im Darm festsetzen und lebensgefährliche Komplikationen verursachen. Super-Magnete sind kein Spielzeug! Stell daher sicher, dass die Magnete nicht in die Hände von Kindern unter 14 Jahren gelangen.QuetschungenAuch kleine Super-Magnete haben eine sehr starke Anziehungskraft. Bei unvorsichtiger Handhabung kannst Du Dir die Finger oder Haut zwischen zwei Magneten einklemmen. Das kann zu Quetschungen und Blutergüssen an den betroffenen Stellen führen.HerzschrittmacherMagnete können die Funktion von Herzschrittmachern und implantierten Defibrillatoren beeinflussen. Ein Herzschrittmacher kann in den TEstmodus geschaltet werden und Unwohlsein verursachen. Ein Defibrillator funktioniert unter Umständen nicht mehr. Träger solcher Geräte sollten daher genügend Abstand zu Super-Magneten halten.Metall-SplitterSuper-Magnete sind spröde. Wenn zwei Magnete kollidieren oder wenn Magnete auf einen harten Untergrund prallen, können sie zersplittern. Scharfkantige Splitter können meterweit weg geschleudert werden und Deine Augen verletzen. Du solltest daher auf jeden Fall vermeiden, dass Magnete aufeinander oder an Gegenstände prallen!Magnetisches FeldMagnete erzeugen ein weit reichendes, starkes Magnetfeld. Sie können unter anderem Fernseher, Laptops, Computer-Festplatten, Kreditkarten und EC-Karten, Datenträger, mechanische Uhren, Hörgeräte und Lautsprecher beschädigen. Halte daher die Magnete von allen Geräten und Gegenständen fern, die durch starke Magnetfelder beschädigt werden können.Nickel-AllergieUnsere Magnete sind mit Nickel beschichtet. Manche Menschen reagieren allergisch auf den Kontakt mit Nickel. Nickel allergien können sich bei dauerndem Kontakt mit vernickelten Gegenständen entwickeln. Vermeide bitte dauerhaften Hautkontakt mit dem Super-Magnet. Wenn Du bereits eine Nickelallergie hast, solltest Du auf den Umgang mit unseren Super-Magneten verzichten.Absplittern der BeschichtungUnsere Magnete weisen zum Schutz vor Korrosion eine dünne Nickel-Kupfer-Nickel-Beschichtung auf. Diese Beschichtung kann durch Kollisionen oder großen Druck absplittern oder Risse erhalten. Dadurch werden die Magnete empfindlicher gegenüber Umwelteinflüssen wie Feuchtigkeit und können oxidieren. Vermeide daher Kollisionen zwischen Magneten sowie wiederholte mechanische Belastung wie z.B. Schläge.

          Trainer Coordinator - PC Point - Rupnagar, Punjab   
Providing and Coordinating training of students for basic computer teaching.The candidate should have degree or diploma in computer related field. Job Type: ₹1,44,000 a year
From Indeed - Tue, 07 Mar 2017 13:07:04 GMT - View all Rupnagar, Punjab jobs
          JAud comes to sourceforge   

The JAud development have signed up an account on sourceforge and the source of JAud will be uploaded asap. i.e. next time I get a to a computer!


          Research: When It's Time to Dig In   
We've all seen them. Those legal thrillers or crime shows where the hero just can't find the one single detail that ties everything all together. And then they go to the library, sit down at a public computer, open up a search engine and, after a few quick keystrokes, find the answer that leads them to the villain, the secret lair, the unknown weakness and the pot-o-gold at the end of the rainbow. But research is rarely that easy.

I just finished the first draft for personal essay/memoir kind of thing. Although it's mostly based on things that happened to me, there are a couple of fine details I want to research and nail down before I even think about sending this thing out. One of them being the date of a concert I went to in the mid 1990's. I know the year. And it was snowing that night, so I know it was sometime between November and March. But beyond that I really don't remember.

So I spent a couple of hours digging through the electronic databases at work, accessing The Washington Post as well as some more local papers, looking for any mention of the specific concert tour. It wasn't a major stadium tour, but at the 9:30 Club in D.C. Not the current super-warehouse space, but the old, dingy bar near the Metro Center metro stop (oh how I miss that dirty place). I couldn’t find anything, so it became apparent that it wasn't a show Mark Jenkins or one of the other critics reviewed. But I thought I'd still find it listed in an events guide in old weekend sections or something. But the databases don't seem to capture any of that stuff----just the actual articles. In the end, I think I'll have to trek out to the one library in my library system that still has old issues of The Washington Post on microfiche, and go through the weekend sections week-by-week until I find what I need.

I was at writing conference once and heard Karey Joy Fowler talk about her process and how one of the greatest tools for her in writing historical fiction is going through the advertisements and personal ads to get a sense of the language, what people bought, ate and did for fun. Details like that are still getting left out with most of our digital tools. It just points out to me some of the limitations of using digital sources for research. They can be a wonderful time saver if they have what you want, but for those pieces that are a little more esoteric----and those are often the pieces that are the most fun-----you still have to get your hands dirty flipping through physical newspapers, magazines and microfiche.

Excelsior

          What's Up, Google Docs!   
I've been doing a lot of research lately for a number of writing projects, but things often get waylaid when the wife usurps the laptop. My normal research process is to bury myself in a subject; I read, read read and take notes on the computer as I go. Whether I'm looking up biographical details about the jazz musician Sun Ra or exploring different ways to describe what happens when an object falls into a black hole, it's a method that works for me so I can get those odd, salient details into a piece.

Even though it's our laptop now, it was my laptop before we got married. So most of my writing files are on there and, frankly, I'm just used to keeping them there. And while we have a desktop computer as well the laptop is often just the most convenient one to jump onto.

Walking the dog tonight, a solution occurred to me: google docs. I've used it before for group coursework in library school and even for some projects I've worked on for YALSA. But never just for myself. Surprising I never thought of it before now, because it is so damn easy to use. Either upload your documents or work on it right there in the web-browser. The beauty of it is, I'll be able to save my work no matter what computer I use. Hell, I can even work on some things during my lunch time or other slow moments at work. I know, I know. This sounds like my account's been hacked by google...so to be fair, I know there are other document-sharing programs out there. This is just the one I've used and know how to use.

So, thanks to google docs, I have no more excuses for not writing. At least so long as we have at least two computers in our home. I guess I better get back to it.

Excelsior

          Re: GreaseMonkey script for Firefox to add WR Links to WoW Forum   

Author: DM.

Posted: Sun Dec 07, 2008 1:06 pm



I heard about this a couple of days ago. Its basically just a trojan that identifies itself as Greasemonkey and installs itself as that onto your computer.

Its not a vulnerability in Greasemonkey or Firefox, its just someone who thinks they downloaded Greasemonkey but instead didn't and downloaded something else. Mozilla has said that the Greasemonkey available on their site is legit and safe to use.
           Exploring the potential of touch-screen computer technology in promoting enjoyable activities with people living with dementia: A visual ethnography    
Smith, Sarah Kate (2015) Exploring the potential of touch-screen computer technology in promoting enjoyable activities with people living with dementia: A visual ethnography. PhD thesis, University of Sheffield.
          End of April   
I forgot to post this last week but decided to do it this week anyway.  This was from April 27, early last week.  We still had lots of snow in our yard and had a light snowfall in the morning as you can see below.  It did not last for more than a few hours, thank goodness.  This week, it is full on spring.  We have had sun with temperatures in the low 20'sC.  Most of the snow is now gone and living is starting to move outside.  I love this time of year.





I finished my Barn Sweater and am just waiting for buttons.  I love it.  It fits really well, I love the colour and it was a joy to knit.  I am thinking of a black or charcoal grey for fall.

I did finish these socks.  They were for Buckaloo View sock challenge and I did not finish until Sunday, May 3 and just posted last night.  As I said, these last few weeks got away from me. We have had computer issues and installed a new photo program which took awhile to figure out.  I am not that experienced when it comes to these things. I like it when things stay the same!



Anyway, that sums up what is going on around here.  I will be back soon with what I am working on now.  Around here, we are all following the sun.
          The Jungle Book   
Das Dschungelbuch ist zurück im Kino! Aber nicht als Zeichentrickfilm, sondern als Realfilm mit Tieren aus dem Computer. Sieht gut aus, aber ist es auch gut? Shadia Omar weiß mehr.
          Patient Access Representative - Emergency Department - Torrance Memorial Medical Center - Torrance, CA   
Strong working knowledge of computers and data entry experience. Under direct supervision, performs tasks related to the Admission and Registration....
From Torrance Memorial Medical Center - Tue, 20 Jun 2017 22:38:55 GMT - View all Torrance, CA jobs
          Coming up with an idea is the least important part of creating something great. ... The execution and delivery are what's key.   
Sergey Brin, computer scientist and entrepreneur
          Urgent Hiring for Php Developer   
India - Producing detailed specifications Key Skills Laravel | Php | Front End | Php Developer | Software Engineering Job Summary Functional Area... : Industry : Computers / IT * Role Category : PHP Developer * Gender : Any [ Male / Female ] * Number of Vacancy : 3 * Mailing Email ID...
          Php Laravel Developers   
India - Willingness To Work In Shifts | Php Developer | Software Engineering Job Summary Functional Area : Industry : Computers / IT * Role Category... : PHP Developer * Gender : Male * Number of Vacancy : 5 * Mailing Email ID : hr@bongroup.org * Job Country : India Desired Candidate...
          May 2017   
IT Security Was “WannaCry” Avoidable? A Wake-Up Call for IT Security Departments In May, the media reported one of the biggest ransomware cyber-attacks in history. The European Union’s law enforcement agency Europol wrote on Twitter that the ransomware “wannacry” was an attack at an “unprecedented level”, which infected countless private and corporate computers running on
          Damn the man, Save the Empire!   
So, I got adventerous. I shoutcasted the show tonight, although to some mediocre results. So I'm hoping I can resolve this before the next show. Sorry for the late late show. But I've been having issues with the computers. Blech. Anyway. I'll try to do another one next week.
          Just Because   
It's Friday night.

My devoted husband is outside diligently snow blowing our driveway and I'm sitting in our delightfully warm house watching cooking shows on public television.

He's such a good man. I'm such a slacker. Thus is our life together.

I just wanted to show you something really quick. I think you'll like it.

Earlier today I made cupcakes.

Shocker, I know.

They're not part of the 52 Cupcake Challenge. But that certainly doesn't mean I can't share them with you.

I do so LOVE to share cupcakes with you!

My KitchenAide and I whipped up some HopScotchCakes and some SnoCapCakes.

(Side Note: I'm feeling a strong urge to name my KitchenAide. I might have to work on that this week.)

Moving on.

The SnoCaps are still in process...awaiting their moment to roll in glorious crushed chocolate cookies.

You can't rush these things...you'll end up with mushy cookie crumbs. And that's just gross.

BUT, the HopScotchCakes are ready for their big moment.


There now. I don't feel so bad about the slacking. I was productive today.

Oh, and I feel it's necessary to tell you that under that golden cocoon of butterscotch ganache (layered over vanilla butter cream) is the most perfect vanilla cupcake I've ever created.

I actually came up with a vanilla cupcake that's fluffy, moist, delicate, and sweet. And it didn't even remotely resemble a muffin.

Because if you know me, you know my aversion to muffins masquerading as cupcakes!

And finally, just because Mr. Kate's BakeShop took this photo off his phone and put in on our computer tonight, I'll share it with you.

That and because it made me want to make another batch of these immediately.

In case you're wondering which cupcake you need to order right now, this pretty baby is a chocolate chip cupcake with chocolate butter cream filling, vanilla butter cream frosting and a mini chocolate chip cookie topper!

I'll be going to the store to buy the next size up in pants now.

See you soon!
          Cupcakes make Mondays HAPPY!!   
You asked for it.

Key Lime Pie.

Or should I say, KEY LIME PIE!!!

I will not be held responsible for the drooling.

Or the cravings.

And I will not come over and help you wipe off your computer screen, should you choose to lick it.

However, if you simply must have some, I will make you a batch of these beauties...once I've made some for myself, of course.

My KitchenAide and I will be hard at work this week.

On Thursday I will post the pics and details.

Because as talented as my KitchenAide is......no fingers for typing.

Alright, quick picture of my latest baking adventure.

Last night I put together a fun cupcake creation that I was pretty excited about.

Because apparently baking cupcakes ONCE a week just doesn't silence my obsession. :)

Thank you to MY sweet cupcake for taking this fantastic picture! You're the best baby!

There she is.

Chocolate Chip cupcake, fudge butter cream filling, vanilla butter cream frosting and to top it all off ....a tiny, baby, home made chocolate chip cookie.

Get right out of town.

It's so stinkin' cute.

I'll be digging in this afternoon and let you know how it tastes.

I'd do it right now, but it's 8 am and I've convinced myself I should restrain some self control.

Don't worry, it probably won't last long and I'll have a happy tummy full of cupcake.

Eat, drink and be merry. Happy Monday everyone!
          Time to Stop the Slip Ups   
After hitting my new all time low weight I have not been doing so good for the last few weeks. Every day I tell myself I am going to change and then blow it again. I know it is something I have to take control of or I will gain back what I have worked so hard to lose.

I got started when I was ill. It is still continuing so I know there is something more to it. I think I have identified the trigger point. I find I want to eat constantly when sitting at the computer grading papers fo...
          Wondercore Island Guest Mix for BBMLive.com   
itunes pic
This month we bring you a very special guest mix from the super talented Wondercore Island. Wondercore Island is a Melbourne based management, PR, events company and record label responsible for handling the careers of acts like Hiatus Kaiyote, Oscar Key Sung, Ainslie Wills and Jazz Party, as well as running stages and events for Melbourne International Jazz Festival, Strawberry Fields Festival, Red Bull Music Academy, Boiler Room and Melbourne Fashion Week. It also operates as a radio show on Kiss FM on Friday afternoons from 12pm-1pm and is always looking for a good time and new ways to promote and develop emerging artists. Track Listing 1. The Feathered Serpent Of The Aztecs - Les Baxter 2. Brick - Gordon Voidwell 3. Free Press And Curl (live KEXP) - Shabazz Palaces 4. Chet Bghassa - Mdou Moctar 5. Danger - Laneous & The Family Yah 6. 27 - Vulture St Tape Gang 7. Only Time All The Time / Studio Owl - Hiatus Kaiyote 8. Koi Moon's Daughter Pt.II - Jonti 9. The Ribbon - Rodrigo Amarante 10. Moon Dude - Jessica Pratt 11. Woman - Rhye 12. Indecision - Sampha 13. 8th Wonder (feat.M.anifest) - Kindness 14. Dinner - Blood Orange 15. Brush - Oscar Key Sung 16. Sisters - Arca 17. Bristol Paintings - Kirkis 18. Lick The Witch - Tobacco 19. Gunshots By Computer - Saul Williams 20. Daggers - 0.1 For more info on Wondercore Island and to check out more mix tapes visit www.wondercoreisland.com
          Greeter - Myphone Computers and Electronics - Virden, MB   
Myphone/TELUS Virden is looking for an outgoing, friendly person to fill our Customer Greeter position. This position is part time and weekends....
From Indeed - Tue, 20 Jun 2017 17:29:18 GMT - View all Virden, MB jobs
          motel manager - Virden Motel - Virden, MB   
Ensure smooth operation of computer systems, equipment and machinery, and arrange for maintenance and repair work Ability to Supervise.... $3,500 a month
From Canadian Job Bank - Wed, 28 Jun 2017 02:28:18 GMT - View all Virden, MB jobs
          Retail Merchandiser - Footprint Retail Services - Gila Bend, AZ   
Smart phone and/or computer technology capable to accurately, remotely and on a timely basis accept, schedule and report on store visits along with work hours,...
From Footprint Retail Services - Wed, 29 Mar 2017 08:05:15 GMT - View all Gila Bend, AZ jobs
          Urban Outfitters: Photo Producer - Urban Outfitters - Urban, PA   
2+ years in photo production with publishing or photo agency. This includes managing the Photo Dept. Requires knowledge of applicable computer programs...
From Urban Outfitters Inc. - Tue, 27 Jun 2017 02:54:52 GMT - View all Urban, PA jobs
          NZXT Respire T20 & T40 CPU Coolers Review   
If there is one thing that Apple has proven to the world it’s that creating an image that individuals want to identify with will sell your product. This technique has been repeated time and again in recent years, especially in the tech world. One company to do this and totally create an image that their target market can identify with is NZXT. Established in 2004 and focusing originally on computer enthusiast cases, NZXT have quickly and successfully ground out a segment of the gaming/case modding community to call their own. With a strong following in both the case and power supply market NZXT released the Havik air cooler in June of 2011. It was met with great success and rave review. The Havik was released at a price point aimed at the upper level overclocker, it would seem that since then NZXT has become interested in the lower entry and mid level market. And that brings us to todays test subjects, we will be thoroughly analyzing both the NZXT Respire T20 and T40 air coolers.
          C# .Net Developer - Mirafra Software Technologies - India   
Experience (years) : 4 – 6 Education Qualification: B.Tech/B.E. Computer Science, Electronics, Electrical, Telecommunications or equivalent Skills/Experience
From Mirafra Software Technologies - Thu, 15 Jun 2017 14:08:56 GMT - View all India jobs
          contradictions   
I was just sitting here being somewhat philosofical, and realized that my life is one big series of contradictions. I was cold a few minutes ago, so I got a cup of coffee, and covered my feet, but in getting the coffee, I walked past the thremostat, and did not even look at it. I have two insanely large TVs (one for the living room, and one for the shop)and I cannot remember the last thing I watched on TV was (I do know I watched something about a week ago) I prefer reading. I have a nice kitchen, and dining room, and everything that goes in them. I microwaved dinner on a paper plate, and ate in the living room I live outside of town, down a dirt road. I drive a sports car even though the bumps are not helping it. I have a nice computer desk, and yet I sit on the couch with the laptop I feed the deer around here, and put out salt for them. Then I get mad when they eat my roses OK I have given a few examples of how I am not right in the head. What do the rest of you do that makes no sense
          Examining ASP.NET 2.0's Site Navigation - Part 1   

A Multipart Series on ASP.NET 2.0's Site Navigation
This article is the first on a series of articles on ASP.NET 2.0's site navigation functionality. This first part of the series examines the basics of site navigation, showing how to create a simple site map using the default XML-based site map provider. Future articles will cover more advanced features of site maps as well as how to create a custom site map provider.

Any website that is composed of more than one page needs some sort of navigation user interface. A navigation user interface might be as simple as static hyperlinks to the other pages in the site, or might involve the use of menus or trees. But before a navigation user interface can be created for a site, the site's logical structure must first be defined. (This logical structure is often referred to as a site map.) For example, a website like Amazon.com is arranged into various sections by product line, like Books, Electronics, Computers, DVDs, and so on. Each of these sections may have sub-sections. Books is broken down into categories like Accessories, Books on CD, Novels, History, Romance, and so on. Typically, these logical structures form a hierarchy of sorts. The screenshot below shows an abbreviated version of Amazon.com's site map.

The site structure of Amazon.com...

Once the site map has been defined, the site's navigation user interface can be created. At Amazon.com, the main page lists links to each of the main sections along the left-hand side of the page. Drilling down into a particular section lists that section's sub-sections on the left. Other navigation user interfaces could be used as well, though: you might have a tree showing the various sections and sub-sections, or a menu that listed as top-level menu items the sections like Books, Electronics, DVDs, and so on, with those menu items' submenus containing the respective section's sub-sections.

Prior to ASP.NET 2.0, developers typically rolled their own site navigation solutions. ASP.NET 2.0, however, makes defining a site's structure and implementing it using common navigation user interface elements a walk in the park. In this article we'll look at ASP.NET 2.0's site navigation features. Read on to learn more!
Read More >


          Red Converse   
 Photo by Beto Ramos In case you haven’t heard, my stupid computer went psycho on me and alas, I’m borrowing my roomie’s itty bitty netbook. Editing video (editing anything) is a little trickier, so I owe you a video this week but promise you two next week to make up for the lost time. I […]
          CHAPTER REVEAL FOR PEACEFUL SLUMBER   



PEACEFUL SLUMBER
part of the Mystic Passions boxset
by Nikki Lynn Barrett

Genre: Paranormal Romantic Suspense


Scott
I was somewhat normal once.
Until I died.
It was only for a few minutes, but ever since then, I can see ghosts.
The first time I see her is in the cemetery, wearing a blood stained wedding dress. 
No one else knows she exists.
I have no idea how to help her or why I chose to, but she's here now.
The one person who makes me feel alive for the first time in ages is a spirit trapped in her own version of hell with no recollection of her life or death.

Zelda
It sounds like the start of a horror novel or something.
I'm the amnesiac ghost bride who wakes up with no memory of my life or death. 
Only one person can see me.
With no clues as to who I am or how I wound up in this predicament, Scott is my only chance of helping to unlock my memories. 
It's not easy. He's sarcastic and jaded.
But he's the only link I have to the living world.



Prologue

I remember nothing.

A cold blanket of fog surrounds me as I sit up from the hard surface I must have been sleeping on, wearing a wedding gown, once white, now stained in red. My mind races a mile a minute, scrambling to retrieve a memory of what happened, like a dog scampering for his ball, but I come up empty.

Who the hell am I?

Where am I?

What happened to me?

Why is no one here?

Another thing that catches my attention right away is the fact that I look like death, but I feel nothing. Based on the condition of the wedding dress, whatever happened must have been brutal.

Nothing at all. No aches. No pains.

Okay, fine. Maybe the blood isn't mine, but that means it's someone else's, and I have no idea who, what, when....

I'm repeating myself.

Rather easy to do when I am trying to piece together the missing fragments that make up my life.

I stand with ease and interpret my surroundings. It's dark and foggy. Cold winds snap in my face. Shivers slam my body relentlessly. Maybe that's shock, though. How can I feel a chill when there's pretty much no other feeling?

Not that I expect an answer, but I call out, “Someone help me!” My voice brings no recognition. Not even a spark of who I am.

Panic settles over me.

My mind is blank. Empty.

How do I not have any memories? Did I fall? Crash? Hit my head? There's no pain, but that doesn't mean anything. Maybe shock has taken away the ability to feel pain. But I'm cold. So that's something.

Next step, check my body for wounds. My hands travel up and down my torso, searching for any tender spots or any blood seeping from an open injury. There's nothing. Absolutely nothing. This isn't promising. It doesn't calm my chaotic mind.

Before I go into a full blown panic meltdown, I stop and listen. There are voices. People talking. 
This is my chance!

“Hey! Can anyone hear me?” I scream into the foggy abyss.

No one responds, at least, not to me. The talking continues. Someone is sobbing hysterically, and it's most definitely not me.

I can't see them, and I don't think they can see me. Still, I scream and cry, running frantically until I can find someone.

I shouldn't be able to move this easily. I shouldn't feel nothing. Not with blood on my dress. One would think I rolled around in a pool of it. This isn't a few drops, I look like I bathed in it.

There's a crowd of people huddled together, surrounding something. And they're crying. Bowed heads, gut wrenching sobs.

I'm in a graveyard.

In front of the crowd of people is a coffin.

Is that me in there? Am I dead? Is that why I'm here?

I run … well, I don't even know if I'm running, because hell, I don't know if I'm alive, to the crowd. I'm like an animal ready to pounce at the first sight of a person.

“Somebody! Please tell me you can see me!” I scream, waving my hands.

No one turns my way. No one flinches. It's as if I'm invisible, which I think is becoming more and more likely. Because I'm dead. I have to be. It's the only explanation I can come up with, not that it's an option I'm happy to think about. I don't know who I am. How did I get here? Why does it seem like my memories are wiped clean?

How did I die?

Chapter 1

Scott

Why do people say rest in peace to the dead? They don't rest in peace. How do I know? Because I can fucking see ghosts. The ghosts who seek me out aren't at peace. It takes time and a willing human to help them find that peace. I'm not willing, but they don't leave me alone. I've never been a big people person, and I'm sure as hell not a 'ghost' person, but does that stop them? Nope. Not in the least.

It hasn't always been this way. Only in the past three years have I been able to see the dead.


I blame it on the fact that I died once. For ten minutes, until doctors managed to resuscitate my sorry ass.

Today is the day we're burying my uncle Floyd. It's cloudy, and a slight drizzle is spraying us with a light mist.

There are ghosts everywhere.

I've learned to ignore them, for the most part. They find me no matter where I go. I can't even take a shit without a ghost appearing, frantic for help because they eventually know I can see them. That stupid split second where I let my weakness show, and they descend upon me like a vulture chasing its prey.

Not only have I come back from the dead, but the dead want me. Sure, fine. Why not? No one else does. Not for me, anyway. My parents ignore me until they see fit to have their son at all of their important events. Other than that, I'm an outcast. Pretty much used to it. They throw money at me and tell me to have a good day.

I thought when I died and had my life flash before my eyes, it would change. It did for a little while. Then they went back to normal. Work, work, work. At least, for Dad, that was the case. Mom did her little parties and women's charities and pretended like she gave a shit about all of it.

She goes to the bar and screws the bartender. Dad pretends not to notice.

Want to know how they gain sympathy?

By using me.

“My son Scott has a hard time of it. I think he's gone a little crazy.” I heard my mother tell someone this a few months ago. I'll never confront her on it. What the hell is the point?

Living with this shit is crappy, but it is what it is. One day soon, I'll blow out of town and make a new life. Maybe I'll even be famous and my parents will come begging for my forgiveness.

Doubtful.

Aunt Sara steps forward and places a rose on Uncle Floyd's casket. She's sobbing hard. Together for thirty-nine years, his sudden death is devastating on all of us. Floyd was the only one who gave a rat's ass about me. We always did stuff together. He gave me my first cigar, and we got drunk together once when I was seventeen.

It dawns on me then. Why don't I see his spirit?

I finally look around, knowing all too well these other spirits are gonna have a field day with this. I'm not about to make myself look crazy in front of family and friends. Not today, of all days.

Shudders ripple through my body. Damn, some of these deaths were gruesome. Not only can I see the ghosts, but I see them in their death form.

Blood. Torn skin. I won't go on. The visuals churn acid in my stomach. Gotta give credit to doctors. I couldn't do it. I'm not even good with scary movies. They make me want to hurl.

Trying to stay casual, I scan the cemetery for any signs of my uncle. There are none. Disappointment settles in the core of my soul. I have this 'gift' of being able to see spirits, but the one I would actually love to see, I don't get to.

There's a young woman in a blood stained wedding dress, and she's waving her hands frantically. Why this one grabs my attention over all the others is beyond me, but she does. I can't tear my eyes away from her.

She notices that I see her, and relief floods her eyes.

Before she can get to me, a hand lands on my shoulder. “You all right, son?” Dad's concern is almost genuinely touching. Too bad I call bullshit. It's all for show.

“You know the answer to that,” I snap as I jerk my shoulder away. Too much crap within the last few years has left me jaded. It can't even be denied.

Dad gives me a cold look, like he can't even believe I got upset at him. Instead of arguing, he pivots and storms off. What does he expect? Seriously!

Whatever. Let them go off. I came in my own car, and I don't have to answer to anyone.

The woman spirit is still there, frozen in the same place. I only have eyes for her. Her mouth opens in shock as I strut toward her. “Y-You can see me?”

Ah, a first timer. She has no idea where she is or what's happened. Confusion taunts her pretty green eyes.

“Wish I couldn't, but yes.”

She frowns. “Does that mean I'm dead? No one else can see me.”

“Fraid so.” No point in beating around the bush.

“That funeral over there isn't mine, is it?” she whispers.

“No. It's for my uncle.” Back at the grave site, most of my family has already left. The empty spot and the coffin ready to be lowered in the ground breaks me a little more inside. At least Uncle Floyd lived a damn good life. I loved his stories. If my aunt knew half the shit he did even while married, she'd have a stroke.

The more I think about it, the more it seems the ghosts who come to me have unfinished business. That show Ghost Whisperer comes to mind, except it's been recent for me to be able to see them.

“Why can you see me?”

Ha! I've only been asking that question since the first ghost. “You tell me.”
She narrows her eyes. “You're not very nice.”

I'm not nice? That's my uncle buried over there, and I'm talking to a ghost. Wanna try that again?” Frustration pumps through my body.

“At least you aren't dead! I don't even know who I am!” she shoots back.

Touche. Despite my irritation, Ghost Bride makes a valid point.

“You put things into perspective for me there,” I admit, scratching at the back of my neck. The rain doesn't hold off. Too much more of this and I'll have to leave. What's stopping me from doing so already? Why does this one ghost gravitate toward me above all others today? “You don't remember anything about who you are and how you died?”

She shakes her head. “I woke up in a foggy abyss. I don't feel pain, even though it looks like I died in a horrible way. I wonder where my husband or husband-to-be is.”

My gaze flits to her left hand. No ring. Hmm. Interesting. “You don't even have an engagement ring on your hand.”

She gasps and raises her hand. “You're right. So maybe I ran from him.”

“A paranormal version of runaway bride? Hmm.” The words tumble from my lips before I can even think about how callous I'm being.

“Ugh. You're not one to hold back, are you?” Ghost Bride mutters in disgust.

“I'm talking to a ghost. Do you expect me to be a perfect gentleman?” I retort.

“I guess not,” she relents.

“You're going to follow me if I leave, aren't you?” Most of them do. Why bother asking?

“I- I don't know. Can I even do that?”

Newbie ghost problems. “Wouldn't be the first. I can't speak from a ghost perspective, but they never leave me alone.”

“Have you always been able to see us?”

There we go. The loaded question. Man, spirits are damn talkative. “Nope. Just a couple years.”

Wait for it....

Holy hell. She's silent. Ghost Bride doesn't ask me why it's only been recent.

I'm impressed.

My next words surprise me. Damn, I'm a sucker. “I don't want to get drenched, but I'm not about to leave you here alone and confused. You can go home with me, and we'll figure out who you are and how to get you to wherever it is you need to go.”

Her eyes light up. “Thank you, thank you, thank you!” And then she tries to hug me. Ghost Bride's hands go right through me. I'm used to it, but she isn't.

She gasps, stepping back. “Okay, that's weird.”

“Right, so...let's go.” I gesture to the parking lot, which is fairly empty now.

“Umm...” Ghost Bride hesitates. “How exactly do I do this?”

Another sigh escapes me. Newbie ghost problems, and it's like I have the answers. Why do I do this to myself?



Interested in reading this book when the entire boxset releases in July?


BE IN THE KNOW



No matter where she goes, USA Today Bestselling author Nikki Lynn Barrett hears voices in her head. Instead of calling her crazy and locking her up, her family realizes it's just a product of being an author and allows her to write the stories so that the voices shut up.

But they don't. And probably never will. There's no need to lock her up, Nikki knows she'll never escape the voices, not until each and every last story is written. And for every story she writes, about ten or more ideas pop up.

When she isn't slaving away at her computer writing books that will probably make you cry and keep you in suspense, Nikki plots to take over the world one book at a time. What? It's a sickness. One she can't escape!

Books aren't her only addiction, though. Nikki can be found making up parodies to drive her son crazy, and bantering back and forth with her husband, who somehow manages to steal her away from the fictional world she lives in all the time.

Nikki lives in Arizona with her husband and son, where she can be found using every creativity outlet she can find through music, photography, handcrafted things, and random interests that she may pick up from time to time.

If you want to learn more about the author who makes people cry for a living, check out her website.


          A new ransomware is sweeping the globe, but there's a vaccine   
TwitterFacebook

It's a familiar story: You boot up your computer only to find a mysterious message saying your files are encrypted. You soon realize that your data is likely gone for good — even if you fork over a cryptocurrency ransom payment. 

But this time around, as a new and virulent form of ransomware dubbed NotPetya sweeps the globe, it doesn't have to be this way. 

Because this time around, there's a vaccine. 

What is NotPetya?

The first symptoms of the attack appeared on June 27 in Ukraine, with the National Bank of Ukraine and the Kiev International Airport both hit hard. Even Chernobyl's radiation monitoring system has reportedly been affected. But NotPetya, which targets the Windows operating system, didn't stay thereMicrosoft has confirmed that computers in 64 additional countries have been infected.  Read more...

More about Hackers, Hacking, Bitcoin, Ransomware, and Wannacry
          Machine in the Ghost   
We live in a digital age, buy and sell in a digital economy, and consume—oh do we consume—digital media. The digital lies at the heart of our contemporary, information-heavy, media-saturated lives, and although we may talk about the digital as a cultural phenomenon, the thing itself—digitality—is often hidden to us, a technology that someone else has invented and that lives buried inside our computers, tablets, and smartphones. In this book, Robin Boast follows the video streams and social media posts to their headwaters in order to ask: What, exactly, is the digital?             Boast tackles this fundamental question by exploring the origins of the digital and showing how digital technology works. He goes back to 1874, when a French telegraph engineer, Jean-Maurice-Émile Baudot, invented the first means of digital communication, the Baudot code. From this simple 5-bit code, Boast takes us to the first electronic computers, to the earliest uses of graphics and information systems in the 1950s, our interactions with computers through punch cards and programming languages, and the rise of digital media in the 1970s.Via various and sometimes unanticipated historical routes, he reveals the foundations of digitality and how it has flourished in today’s explosion of technologies and the forms of communication and media they enable, making real the often intangible force that guides so much of our lives.  
          Membuat Password Pada Flashdisk dengan Mudah Tanpa Software   
 Kali ini saya akan share tentang bagaimana cara Membuat Password Pada Flashdisk dengan Mudah Tanpa Software, Cara ini memang sudah disediakan oleh windows untuk membuat password untuk flashdisk anda.
Jika anda tidak ingin FLASHDISK anda dibuka oleh siapapun maka cara ini sangat berguna bagi anda tentunya. Cara ini tidak ada effect apapun cuma memberikan Password pada Flashdisk anda saja.
Silahkan ikuti cara Membuat Password Pada Flashdisk dengan Mudah Tanpa Software di bawah ini :
1. Klik My Computer kemudian Pilih Icon Flashdisk anda, Seperti gambar dibawah ini
 2. Klik TURN ON BITLOCKER seperti gambar di atas, kemudian akan terbuka seperti gambar di bawah ini
3. Isikan password anda minimal 6 digit atau lebih, Kemudian klik NEXT akan terlihat seperti gambar dibawah ini 
4. Kemudian Klik SAVE THE RECOVERY KEY TO A FILE dan klik NEXT kemudian akan terlihat seperti gambar di bawah ini
 5. Setelah itu klik SAVE dan tunggu proses pembuatan passwordnya selesai
6. Setelah Selesai, Cabut terlebih dahulu FLASHDISK anda dan Colokkan kembali, otomatis Flashdisk anda akan meminta password
Sekian dulu dari saya tentang bagaimana cara Membuat Password Pada Flashdisk dengan Mudah Tanpa Software, jika anda masih kesulitan dengan tutorial diatas, anda dapat bertanya kepada kami dengan melalui komentar dibawah ini. Terima Kasih

          Tips Membeli dan Membandingkan Harga Komputer PC    
Perkembangan teknologi komputer sangat cepat, baik dari sisi perangkat keras komputer maupun sisi perangkat lunak komputer. Dua sisi ini saling terkait, software baru biasanya memerlukan hardware yang baru juga, dalam artian dengan spesifikasi teknis yang dapat memenuhi persyaratan dari software baru tersebut. Demikian sebaliknya, hardware terkini kadang tidak mau berkompromi dengan software tertentu yang tidak up to date. Kita sebagai pengguna komputer PC (Personal Computer) biasanya juga selalu ingin mencoba dan memiliki perangkat lunak maupun perangkat keras terbaru. Ujung-ujungnya, kita perlu merogoh kantong lagi agar bisa menikmati piranti komputer termutakhir.


Harga Personal Computer

Nah, jika Anda memang berencanakan mengganti piranti komputer Anda dengan yang baru, berikut ini tips untuk membandingkan harga sebelum membeli komputer PC.

Desktop atau Laptop?
Tentukan apakah Anda akan memilih model PC desktop atau laptop. Dengan generasi dan spesifikasi teknis yang sama (prosesor, memori/ram, harddisk, dan sebagainya), biasanya PC desktop lebih handal dan tahan lama, namun laptop memang memiliki kelebihan mudah dibawa ke mana-mana. Kalo untuk di rumah atau di kantor, lebih baik pilih PC desktop. Kalo untuk kuliah atau berbisnis, pilih saja laptop. Anda juga dapat membandingkan harga dan spesifikasi teknisnya melalui cara-cara di bawah.

Generasi Terbaru atau Sebelumnya?
Kadang, komputer keluaran terbaru sebenarnya 'belum' Anda perlukan. Bandingkan harga PC generasi terbaru dengan harga PC satu generasi sebelumnya, demikian juga perbedaan spesifikasinya. Jika spek tidak terpaut jauh namun harga sangat berbeda, tidak ada salahnya Anda mengambil satu generasi sebelumnya. Misalnya Anda bisa membandingkan core prosesornya apakah Intel Core i3, i5, atau i7, juga besar memori dan harddisknya.

Jangka Waktu Pemakaian
Pikirkan dahulu apakah Anda suka gonta-ganti komputer atau memang membutuhkannya untuk dipakai dalam waktu yang lama. Jika ingin memakainya dalam jangka waktu yang panjang, mungkin komputer dengan terknologi terbaru bisa Anda pilih meskipun sedikit mahal. Kalo sekedar suka gonta-ganti PC, buat apa beli mahal-mahal, toh baru dipakai sebentar juga sudah jadi barang second yang harga jualnya juga turun drastis.

Beli Baru atau Bekas?
Bandingkan harga PC baru dan bekas dengan spesifikasi teknis yang sama, terutama jika Anda memutuskan mencari satu generasi sebelum komputer generasi terbaru. Jika Anda jeli, kadang produk terbaru juga sudah ada yang menjual second. Anda bisa membuktikan ini dengan mencari di situs-situs iklan populer seperti yang dijelaskan berikutnya. Bisa jadi memang produk tersebut kurang memuaskan, atau sang pemilik sebelumnya sedang 'butuh uang' sehingga melego barang yang baru dibelinya :).

Pilih Merek Apa?
Ada banyak merek komputer desktop yang akan membuat Anda bingung. Harga dan speknya juga bersaing ketat. Secara umum, kategori harga komputer berdasarkan brand alias merk-nya bisa kita bagi menjadi 3. Kelas atas, menengah, dan bawah. Kelas atas harganya berkisar di atas 10 juta, kelas menengah antara 10 juta - 5 jutaan, dan kelas bawah harganya di bawah 5 jutaan. Merek apa saja itu? silakan periksa dengan cara di poin berikutnya. Jika budget bukan masalah, ya pilih kelas atas yang jelas dikenal handal produk-produknya. Untuk kelas menengah dan bawah, spek dan harga bersaing ketat, tinggal adu tenar dengan kelebihan dan kekurangan masing-masing. Tapi untuk amannya, sebaiknya Anda tetap memilih minimal yang kelas menengah.

Cari Informasi di Internet
Cara tercepat dan paling mudah dalam membandingkan harga komputer adalah melalui internet. Anda dapat berkunjung ke situs-situs belanja, khususnya toko komputer online. Beberapa contoh situs populer di antaranya adalah bhinneka.com, jakartanotebook.com, fastncheap.com, dan manggaduakomputer.com. Cari tahu juga apakah ada yang memberikan harga khusus atau diskon. Untuk survey harga baru dan bekas, Anda dapat mencari di situs-situs periklanan seperti olx.co.id, berniaga.com atau blibli.com. Anda juga dapat menggunakan mesin pencari untuk menelusuri testimoni, komentar, atau ulasan orang lain mengenai produk komputer tersebut. Siapa tahu, di balik harganya yang murah, produk terbaru tersebut ternyata memiliki kelemahan tertentu seperti yang disampaikan orang-orang di internet.

Cari Brosur di Pusat Perbelanjaan Elektronik
Jika Anda kurang puas dengan data dari internet atau tidak merasa nyaman berbelanja secara online, coba jalan-jalan ke pusat perbelanjaan di kota Anda. Biasanya ada satu blok toko komputer di mall tertentu, atau barangkali pas ada pameran komputer. Kumpulkan brosur-brosur yang mereka sediakan. Tidak ada salahnya Anda tanya-tanya dulu tanpa harus membeli.

Tanya Teman dan Tetangga
Jika Anda masih belum puas atau kurang pede dengan hasil riset Anda, coba tanyakan pendapat teman atau tetangga Anda mengenai produk komputer yang Anda maksudkan. Syukur-syukur jika di antara mereka ada yang sudah memilikinya, Anda mungkin tinggal mengamini dan mengikuti apa kata mereka.

Setelah memperoleh data perbandingan harga, baik desktop maupun laptop, PC terbaru atau satu generasi sebelumnya, barang baru atau bekas, dan sebagainya, Anda tinggal menyesuaikan dengan isi kantong Anda. Pilih opsi terbaik yang bisa dijangkau dengan budget Anda. Selamat berbelanja komputer.

          Cara Mengelola Data di Folder dan File Komputer Windows    
Komputer berisi program dan data. Program adalah file komputer yang berguna untuk melakukan tugas tertentu. Sedangkan data adalah file hasil kerja program komputer, yang bisa dibuka, diedit, dihapus, dan sebagainya. Adapun folder sendiri merupakan sebuah tempat untuk mengumpulkan file-file.

Lantas, di mana letaknya folder dan file komputer ? Secara umum, Anda bisa menjalankan program Windows Explorer untuk melihat isi komputer Anda. Cara cepat untuk membukanya adalah dengan menekan tombol Ctrl + Logo Windows di keyboard secara bersamaan.

  • My Computer : Induk lokasi penyimpanan seluruh file program dan data.
  • My Documents : Tempat penyimpanan file data pengguna komputer.
  • Local Disk (C:) : Tempat penyimpanan file sistem operasi Windows dan file program.
  • Local Disk (D:) : Tempat penyimpanan tambahan, biasanya untuk menyimpan data.
  • CD/DVD Drive (E:) : Menampilkan isi data keping CD atau DVD.
  • Removable Disk (F:) : Menampilkan isi data Flash Disk atau media simpan external lain.

Mengelola Data File dan Folder
Mengelola Data File dan Folder

Sebagai catatan, nama C, D, E, atau F bisa berubah-ubah sesuai piranti yang ada di komputer Anda. Selanjutnya, berikut ini operasi dasar untuk mengelola folder dan file data komputer melalui Windows Explorer, My Computer, atau My Documents:
  • Mengurutkan tampilan File dan Folder: Komputer menampilkan daftar file dan folder berdasarkan urutan abjad. Anda juga bisa menampilkan berdasarkan urutan tertentu dengan cara melakukan klik kanan pada ruang kosong Windows Explorer. Misalnya untuk mengurutkan berdasarkan tanggal pembuatan maka klik kanan lalu klik Date, untuk mengurutkan berdasarkan ukuran file maka klik kanan lalu klik Size, demikian seterusnya, silakan dicoba yang lainnya.
  • Membaca informasi umum sebuah file: Klik kanan file atau folder yang Anda maksud, lalu pilih dan klik Properties. Informasi mengenai ukuran, kapan dibuat, dan sebagainya akan ditampilkan. Sebaiknya jangan lakukan pengubahan apapun di kotak dialog ini. Klik OK atau Cancel untuk menutupnya.
  • Mengganti nama file atau folder: Klik kanan file atau folder yang Anda maksud, lalu pilih dan klik Rename atau tekan tombol F2 di keyboard. Ketikkan nama baru, lalu tekan Enter atau klik di ruang kosong.
  • Menghapus file/folder: Klik kanan file atau folder yang Anda maksud, lalu pilih dan klik Delete. Klik Yes untuk memastikan agar file atau folder tersebut dihapus dan dipindahkan ke Recycle Bin (folder khusus untuk menyimpan sementara file-file yang sudah dihapus, sehingga sebuah file dapat dibatalkan penghapusannya alias dipulihkan kembali jika ternyata salah hapus).
  • Menghapus file/folder secara permanen: Jika ingin agar penghapusan dilakukan secara langsung dan tidak disimpan dahulu ke Recycle Bin, klik kanan file atau folder, lalu tekan tombol Shift di keyboard sembari mengklik Delete. Klik Yes untuk menghapus secara permanen.
  • Meng-copy atau menggandakan file/folder: Klik kanan file atau folder yang Anda maksud, lalu pilih dan klik Copy. Pindah ke lokasi folder baru, lalu klik kanan dan pilih Paste. File atau folder akan disalin atau digandakan ke lokasi baru. Cara lain, untuk menyalin file atau folder ke tujuan tertentu, klik kanan file atau folder lalu pilih Send to > pilih lokasi tujuan yang tersedia (ke C, D, E, atau lainnya).
  • Memindahkan file/folder: Klik kanan file atau folder yang Anda maksud, lalu pilih dan klik Cut. Pindah ke lokasi folder baru, lalu klik kanan dan pilih Paste. File atau folder akan dipindahkan ke lokasi baru.
  • Mengedit isi file: Klik kanan file yang Anda maksud, lalu pilih dan klik Open (pilihan ini tersedia jika ada program komputer yang bisa membukanya secara langsung). Jika tidak tersedia pilihan Open, maka pilih Open with, lalu tentukan dari daftar yang ada, atau pilih program lain yang menurut Anda lebih tepat untuk membuka dan mengedit file tersebut di Choose default program (pilih nama program dengan cara menemukan file programnya di folder C://Program Files/Folder Program/namaprogram). 
  • Mencetak isi file: Klik kanan file yang Anda maksud, lalu pilih dan klik Print. Windows akan membuka pengaturan pencetakannya melalui program yang sesuai dengan jenis file tersebut.
  • Mengompresi file/folder: Jika di komputer Anda terdapat software untuk mengompress file (mengecilkan ukuran file agar mudah dikirim, misalnya via internet), contohnya 7-Zip, WinRAR, atau WinZip, maka Anda bisa memampatkan ukuran file atau folder. Caranya klik kanan file atau folder, lalu pilih Compress atau Add to Archive (tergantung program terinstall). Hasilnya akan tercipta salinan file baru dengan ukuran yang lebih kecil, biasanya berektensi .rar atau .zip.
  • Mengekstrak file/folder: Ini merupakan kebalikan kompresi file. Jika Anda memiliki file yang sudah terkompresi atau mendownload file dalam keadaan terkompres, maka Anda perlu mengekstrak atau memulihkannya agar bisa dibuka dan diedit. Klik kanan file terkompresi lalu pilih Extract. Hasilnya akan tercipta satu atau beberapa file/folder baru hasil pemekaran file .zip atau .rar.
  • Men-scan virus pada file/folder: Klik kanan file atau folder yang Anda maksud, lalu pilih dan klik Scan with [nama program anti-virus]. Pastikan di komputer sudah terinstall software anti virus.

          Mengenal Cara Install dan Uninstall Program Aplikasi Komputer    
Ada saatnya, Anda memerlukan software atau program aplikasi tertentu, namun komputer Anda belum memilikinya. Bisa juga Anda mendapatkan sebuah file yang hanya bisa dibuka dengan program tertentu. Nah, Anda perlu menginstal sendiri program aplikasi tersebut. Demikian juga sebaliknya, Anda sudah tidak memerlukan program tertentu dan ingin menghilangkan aplikasinya dari komputer untuk menghemat harddisk Anda.



Installer

Cara menginstal program aplikasi komputer sangat mudah. Prinsipnya Anda tinggal mempersiapkan file installer-nya, baik dari CD/DVD, flashdisk, atau dari harddisk Anda. Bisa juga Anda mendownload file installer program aplikasi gratis tertentu terlebih dahulu di internet.

Untuk membuang instalasi atau Uninstall, ada beberapa metode yang bisa Anda lakukan :
  • Dari fitur Add/Remove Programs di Windows Anda.
  • Dari menu Uninstall program terkait di Start menu.
  • Dari software bantu untuk uninstall (biasanya dibutuhkan hanya jika program tidak bisa dibuang dengan cara-cara sebelumnya).

Berikut adalah langkah-langkah standar untuk menginstal program komputer:
  1. Buka Windows Explorer / My Computer, lalu temukan lokasi file installer (apakah di CD, di harddisk, dan sebagainya). Khusus untuk file installer CD, biasanya program instalasi akan langsung berjalan begitu CD dimasukkan ke drive. Jika tidak, maka Anda temukan lokasinya dengan Windows Explorer.
  2. Klik dua kali file installer (biasanya berkestensi .exe dan dengan gambar ikon tertentu).
  3. Tahapan instalasi biasanya cukup Anda selesaikan dengan menekan tombol Next dan Next hingga selesai. Biasanya di tahapan tersebut Anda diminta menyetujui EULA atau User Agreement, menentukan lokasi instalasi, dan menentukan opsi pembuatan ikon-ikon shortcutnya di desktop dan start menu.
  4. Jika tahapan selesai, program biasanya akan dijalankan secara otomatis untuk pertama kalinya. Jika tidak, Anda dapat memeriksa dan menjalankan secara manual melalui menu Start > All Programs > nama program (program yang baru saja diinstal biasanya diberi highlight atau warna latar kuning).

Adapun langkah membuang instalasi program / Uninstall adalah sebagai berikut :
  1. Klik menu Start > All Programs > nama program > Uninstall.
  2. Jika tidak tersedia pilihan menu Uninstall di kelompok program tersebut, maka buka Start > Control Panel > Add/Remove Programs atau Program and Features (tergantung versi Windows Anda).
  3. Pada daftar program terinstal yang ditampilkan, pilih nama program yang akan Anda buang.
  4. Klik tombol Uninstall dan tunggu proses penghapusan dijalankan.
  5. Jika berhasil, maka nama program akan hilang dari daftar program.
  6. Jika program gagal dan tidak mau dibuang via cara di atas, maka Anda perlu menggunakan software pihak ketiga untuk membantu uninstalasinya.
  7. Sebagai contoh, Anda dapat menggunakan CCleaner. Download tool ini di http://www.piriform.com/ccleaner/download lalu install.
  8. Setelah terinstal, jalankan CCleaner, lalu klik menu Tools > Uninstall, pilih nama program. Klik Run Uninstaller dan tunggu hasilnya. Jika masih bandel, klik Delete Entry.

          Disney 2012 Post 4: Magic Kingdom   

I have been a bad bad blogger.

I blame it on our mouse. I can't tell you how many times I've sat down to do a quick post/update and lost all my time fighting my computer mouse. It double clicks when it's not supposed to. It doesn't click when it is supposed to. Highly inconvenient for blogging and many other things.

Finally I had an epiphany tonight to take the wireless mouse from the laptop and use it on the desktop (where all the pictures are stored). So far so good, as long as it doesn't wreak the same havoc that trying to install the desktop's printer onto the laptop caused earlier this week (another 2.5 hours of my life gone).

But, finally, and before I take off for a week of church camp with Brooke, I am getting another Disney blog post done!

Tuesday was our first morning at Magic Kingdom. At this point, the girls are still doing great at getting up and moving. No surprise here, somehow my children are morning people. That apple did not come from this tree!

We got to MK before it opened so we got to see the opening show where the characters arrive by train. I took a few pics, but thought I'd post this one of our friends Chip and Dale. Ever since this moment on our cruise last year, Hannah has been in love with Chip and Dale.



We trucked on down mainstreet, got a few pics in front of the castle with no one around. (but really, how pics of us in front of the castle do you want to see)?

I do love getting shots of Cindy's place from fun angles though!  

We walked right onto Peter Pan (which usually has a pretty good wait by mid-morning), and then Snow White, the Carousel, Small World...then we headed over to new Fantasyland again to hit the Barnstormer! The Great Goofini has taken over this runaway airplane for a fun ride! Hannah loved it (brooke tolerated it), and we had so much fun, we got off, walked around and got right back on!

Have I mentioned that going the first week of May is great?  

My half-hearted attempt at some pics over the construction wall of the new Fantasyland construction area. I was on a rollercoaster- no miracles here! :)


We headed over to Tomorrowland to ride Buzz, eat some popcorn (great 10a.m. snack, right?), and rode the People-Mover while we cooled off and contemplated our next stop.

Like how this picture framed out: 

We thought it was high time to mosey across the park to hit Haunted Mansion and Splash Mountain.

We love this ride (brooke won't admit to actually LIKING it, but I think she does. However, given the choice, she'd probably just ride Small World, Peter Pan, and the Carousel all day long).

Hannah LOVED Splash Mountain (she's got no fear I tell you). Matt got the wettest (he was in front with Hannah).


We grabbed lunch at Columbia Harbor House. Matt and I had fish-n-chips and the girls had nuggets and such. Wasn't too bad. We went upstairs to eat and there was hardly anyone in the upstairs dining area.

By lunch time, we had hit pretty much all we wanted to so far. Pirates of the Caribbean was closed, I didn't want to do the Jungle Cruise for some reason, so we just headed on back to the hotel for some chill time.

Love this sign that is over the entrance tunnel to MK.  

The afternoon was the usual bout of activities.... resting, swimming, etc. Brooke played some pool games that they had going on, and we spent a lot of time on the water slides.

That evening, we were off to one of our regular stops, Chef Mickey's, located right in our hotel. This is a buffet with some of our favorite friends stopping by the tables to visit.

Brooke thought Donald seemed shorter than last year, I told her it was because she had grown so much!


They were very happy to see Minnie.  

Minnie putting the moves on Matt. 

An oreo mousse bonbon thing from the dessert buffet. Brooke thought the ears were cute, and I thought she was right!  

After dinner we hit a few more rides back at MK, then settled in for an early night. My mom and stepdad were arriving early the next morning and we had another day of fun planned! (duh, we were at Disney!).

          My Computer Is Slow   
My Computer Is SlowProtect Your Computer With Anti Virus Computer SoftwareIn the computer age of today, anti virus computer software is perhaps the most important thing you can get for your computer. There are few things worse for people today, than the possibility that a virus may be transmitted to your computer, but if a virus harms or wipes out your hard drive, you are lost. This [...]
          Waiting for the President’s speech lunch links   

If you’re sitting at your computer waiting for the President’s speech to commence at N.C. State (or in the audience staring at your smart phone), here are a few interesting links to keep you occupied: First off, it looks like our leftist-socialist President continues to fail in his crusade to bring down capitalism. The Charlotte ...

The post Waiting for the President’s speech lunch links appeared first on The Progressive Pulse.


          Trump Transition Team 14   

Trump Transition Team 14

Trump Transition Team 14 (2016)

 

I think computers have complicated lives very greatly.
--Donald Trump

 


          Packaging Technician - Patheon Inc. - Greenville, NC   
Demonstrated mechanical inclination and computer skills. Load equipment with correct components; Identify major equipment problems in a timely fashion and alert...
From Patheon Inc. - Thu, 22 Jun 2017 00:11:45 GMT - View all Greenville, NC jobs
          Global Trends in Militarization Needs Global Explanations   


In my opinion, James Fearon misses an opportunity to link theories together in a productive way. Of the global decline of military spending (% GDP) and mobilization (soldiers per 1,000 citizens) in the postwar era:
On the domestic side of things, there is pretty good evidence that the spread of democracy has been a significant factor. Not worth getting into the details here, but if you look at the data country by country you find that on average, when countries transition to democracy their military spending and army sizes go down, quite substantially.* In fact they tend to go down when they transition from very autocratic to only somewhat autocratic (that is, to “anocracies”, or semi-democracies using the Polity data). The effect of a democratic transition on arms levels in the state in which the transition occurs looks to be larger than the effect of transitions in neighbors on a state’s own military spending, although this is hard to be sure about statistically due to endogeneity issues. I would guess that most of the democracy effect is a domestic matter—for instance, autocracies want bigger militaries to help put down domestic opposition or to pay off cronies, or democracies want smaller militaries to lower coup threats—but some of it might also be an international effect. That is, if democracies want smaller militaries then this could reduce the demand for big armies in their neighbors.
Fearon is reporting a trend, not advancing a well-formulated argument, but I still think this is fairly weak. Here are some other things we know about violence in the postwar era:

-- Interstate violence is at the lowest point in the capitalist era. Given that, it makes perfect sense for military burdens to be at a low point as well. We do not know for certain why the world is so peaceful, but quite a lot of IR theory suggests that American hegemony (which Fearon does not mention) and nuclear weapons (which he does) may have something to do with it. Regarding the former, the American security umbrella covers other democracies and (sometimes) extends to countries transitioning to democracy -- the pacification and democratization of Europe since 1945 is obviously the most pronounced example -- so that could help explain the domestic patterns without telling a ad hoc story about democracies being worried about coup threats (which strikes me as being ahistorical and is in contradiction to the best evidence). Regarding the latter, technology should push down military cost burdens and personnel needed as more and more security mechanisms become computerized and/or automated, at least during times of peace. Nukes are part of that but so are drones, missile technology, cyber capabilities, etc. Given the decline of international conflict and the lower marginal costs of defense why wouldn't we expect the military burden to decrease?

-- As for the fact that the drop in military burden has happened most in democracies I'd note several things. First, it appears from Fearon's description that many democracies were quite heavily armed in the middle of the 20th century. In Fearon's graph at the link above this is quickly seen by the number of people per 1,000 that were in the military in 1945-1950 in "the West". Given that, I don't think a regime-type explanation works very well. Second, democracies are richer, and richer countries should (on average) spend less on their militaries as a percentage of GDP. That is, there is a almost certainly diminishing returns to spending on security: the 10 trillionth dollar spent on national defense will not get you as much security as the 10 millionth. Among consolidated democracies only the U.S. and Israel spend more than 3% of their GDP on their militaries, and I think there is general agreement that much of the American spending is due to rent-seeking, bureaucratic politics, and its ongoing hegemonic project rather than its regime type.

-- Almost all conflict which does occur in the international system is intra-state. Intra-state violence tends to happen more in non-democracies than in democracies. Countries in a state of conflict should dedicate more of their resources towards the military than countries in a state of peace. Therefore, because they are more peaceful, democracies should spend fewer resources on the military. The only wrinkle in this involves transitions to democracy, which often involve conflict. The way I read Fearon he's saying that after transitioning to democracy the military burden decreases; I'm not sure if his data could tell us what's happening during democratic transitions, but it would be interesting to know.

I'm nit-picking a bit here, albeit for a reason. Fearon found some interesting trends, reported them, and then thought-aloud about what might be causing them. There's nothing wrong with that. But the quick-reflex pivot to explanations based on local factors such as regime type is, for me, unsatisfying. Once one takes that step it makes it difficult to think about broader systems, and makes committing an ecological fallacy much more likely. If we're seeing a systemic trend -- lower military burdens everywhere -- then we should seek to make systemic arguments which can account for the trends. Too frequently we try to explain global phenomena by reference to local factors.
          Tree Don't Care What A Little Bird Sings   


I have not read much of Robert Fogel's work, not much at all, but I may need to read more of it. A Fine Theorem, one of the more under-appreciated blogs, has a summary of Fogel's Without Consent or Contract. Here's part of it:
... the paradox rests on the widely held assumption that technological efficiency is inherently good. It is this beguiling assumption that is false and, when applied to [American] slavery, insidious.”  

Roughly, it was political change alone, not economic change, which could have led to the end of slavery in America. The plantation system was, in fact, a fairly efficient system in the economic sense, and was not in danger of petering out on its own accord.
Here's the rest.

There are multiple views of the politics of technology. (Technology is, at its core, information aggregation.) One says that technology is liberating. Another says that technology is enslaving. Another says that technology is fueled by the state for purposes of control. (Oddly, skeptics of markets often make the first point of that point without understanding that the second point is the corollary.) Technology can destabilize the political equilibrium (but does that only apply if it goes in one direction? I doubt it). It's worth googling a bit for the views of Farrell, Drezner, and Lynch on this. It's worth noting that modern authoritarian regimes try to get to the technological frontier as rapidly as possible but they tend to have a tough time managing it. Francis Spufford's Red Plenty is on sale at Amazon right now, if you don't mind probably giving some of your metadata to the NSA.

Sarah Jaffe (on Twitter) asked for a political economy of the surveillance state. (Here's a short take, not very good.) I haven't got the time or background knowledge to build a real model, but if I was going to I'd start with Tilly and Scott and Weber at the foundation and ask what purpose this really serves. Knowledge is power, is it not? Power is needed for protection (in the Tillian sense), is it not? After that I'd go to Orwell like everyone already is, but not the dystopian cliches. Remember in 1984 that Winston Smith was pretty much the only one in society bothered by Big Brother. (Probably not, if you've read your Timur Kuran, but as far as Smith could tell he nearly enough was.) Everybody else just got on with it. The proles sang their songs and read their magazines. Sure, Julia was a bit inconvenienced by the whole thing, but it's not like she really had principles.

Now think about Havel. Now think about samizdat. Is information so easily controllable? Can the state not oppress on the basis of allegation, innuendo, or missing data? Can the citizenry not resist simply by living? Does the state need all information to "keep the locals in line" or just a vague threat -- the vaguer the better? Corey Robin addresses this and gives a precis of his book on the politics of fear. Stalin didn't have Bukharin's metadata... just the ability to credibly say "we know where your kids are". That hasn't changed. Yglesias is right: the biggest thing to fear from the surveillance state isn't the state, per se. But that's a micro story, and micro stories can dictate macro policies.

The U.S. public is not concerned about this. To the extent they are it's for partisan reasons, not out of principle. Note that this is not new. Note that, so far, it appears that these programs are legal at least in broad terms. Intellectuals are more concerned that the median pollee, as they should be, since they are much more likely to be targeted than a randomly-selected person. (If I was Glenn Greenwald I'd go back to snail mail and pay phones for a good long while.) But so? Democratic politics does not guarantee puppies and roses. As we debate whether or not this is constitutional we should remember that James Buchanon's insights do not only apply to economic policy. We should also remember that politicians and celebrities have been subject to heavier levels of scrutiny than this for as long as there has been human society.

Data, even metadata, can be used for ill. (Or good, as the case may be, since the 21st century version of Paul Revere is probably someone Healy wouldn't meet for a beer at Ye Olde Tavern. Possibly this isn't what Healy's driving at.) But let's not get carried away. The U.S. government is sophisticated in many ways, but this program has only $20mn in funding. Let's say they spend $5mn of that on high-powered computers (that's probably less than what the supercomputer I ran a bunch of my dissertation on cost), and the rest on twenty-somethings making $200k/year each (as Snowden apparently did). That's 75 guys trying to make sense of the 2.5 quintillion bytes of data created each day. Good luck with that. (No I don't believe only $20mn was funneled into this. Not for a moment do I believe that. But I'm not sure how much $20bn could really do absent some good old fashioned police work.)

So after you've read the Spufford (or even before) you might want to read some of the discussion at Crooked Timber on the book. See especially this wonderclass by Shalizi which has as much to say about social science theory and methods as it does about historical political systems or the contemporary political economy of the surveillance state or novels. The key question is Shalizi's first one: what is being optimized?

Then recall that Hayek's slippery slope is a logical fallacy to which the historical record is not kind. Should we be less concerned? Probably depends on how concerned you were in the first place... anonymity is a myth.

Remember too that the government oppresses and kills and makes terrible decisions when it doesn't have good intelligence. Given that, is the expected utility of (American or other) society better or worse with PRISM or without it? Apparently this program stopped one or more attacks at the London Olympics. What would the cost of those attacks have been? Was preventing them worth $20mn dollars plus some false positives? (The TSA spends $6.5 billion a year and probably gets almost nothing for it.) Could PRISM have stopped Nidal Hasan had it been better-implemented? If it could have, would it be worth it? We are quite literally behind the veil of ignorance at the moment (just a bit less in the wake of Snowden's leaks), but if we take engaged citzenry to be a desirable normative end in itself we need to put our Bayesian caps on now and start updating our priors.

What tail event has a greater probability: that this program is abused in such a way that it devastates liberal society, or that it prevents a significant attack the fallout from which would devastate the same society?

In the end the biggest repercussions of NSA spying might be felt in the US-EU trade negotiations.

Nevertheless, I oppose PRISM and related programs very strongly. I do so because I am not risk-averse.

I believe this is the most Cowen-esque thing I've ever written. I also believe that every link in this post is worth clicking on.
          Airplane Cabin Cleaners - HNL - U.S. Aviation Services - Honolulu, HI   
Required license or certification:. Be at least 18 years of age, able to handle up to 30 pounds, work weekends and evenings, have light computer skills, hold a... $9.25 an hour
From Indeed - Thu, 20 Apr 2017 17:23:15 GMT - View all Honolulu, HI jobs
          My review of the movie Everest.   

Click here for movie trailer

I saw Everest last night at the local IMAX. Here is my take on the movie: We went with the 3D option and there were a few parts where that effect was used in fun ways, but all in all I think your money is better spent on the 2D version. 
First of all, the movie implied a greater number of climbers than actually existed on Everest during the 1996 season. 50 climbers attempted Everest that season, a number then considered dangerous and unsustainable. Krakauer's book should have scared climbers away, but instead ignited the imagination of adventure seekers world wide. 800 individuals attempted Everest in 2013, the year I climbed it.
The movie showed drinking and dancing going on at the camps. While that may have been the case then, I saw none of that when I was there. Today's Everest climber is a serious athlete who has trained hard for months and wouldn't think of giving away any physical advantage.
There were scenes where tired climbers struggled into camp 2 (21,000) and strapped on an oxygen mask. We didn't see bottled O's until camp 3 (23,600).
That said, the entire depiction of the route was spot on. No doubt much of the footage was genuine, but scenes up high would have to have been built out in a studio and/or incorporated computer generated imagery. I was stunned by the accuracy of the Tenzing and Hilary steps. Even the slope of accent at each leg of the route was genuine. Big kudos for that. If you see this movie you will quite accurately see what an Everest climber sees on the south side route.
The storyline is well known to readers of Into Thin Air. But the script seems to also consider the sometimes contradictory account of climber Anatoli Boukreev as told in his own book The Climb. I appreciated this aspect as it allowed for Boukreev's heroics ,which are well documented outside of Krakauer's book, and Krakauer's failings, which were omitted in his own account.
The acting is solid. Josh Brolin should take home some awards for his portrayal of Beck Weathers, the brash Texan who was three times left for dead. Jason Clark did justice to Rob Hall, Kiera Knightly was fantastic as ever, Emily Watson did a excellent job of handling some of the heaviest drama as Helen Wilton, and Elizabeth Debicki played a marvelous Dr. Caroline MacKenzie .
The musical score worked well with the varying levels of intensity, the script was true to the kind of dialogue you would hear in any climbing camp, and the parts where conjecture had to fill for lack of any survivors' account seemed fairly speculated.
Two thumbs up!




          Latest CANON Digital Photo professional (DPP) UPDATE   
Are you a CANON user and use CANON's Digital Photo Professional (DPP) to work your RAW files. Well there has been some very good improvements made with an update on December 12, 2012. If you already have older versions running on your system, including the EOS UTILITY and DPP. Well it's dead easy to update your software from the CANON site. First go to CANON here : CANON SOFTWARE UPDATES Ignore the stuff at the top of the page about the new 6D, just info, scroll down towards the bottom of the page and you will see a DRIVERS AND SOFTWARE section with a drop down menu below that. Simply choose your operating system ( Windows, MAC or Linux ), Then select your OS version, for me it's Windows vista. You then get a menu of 4 options, choose SOFTWARE. You then see: Canon RAW Codec 1.11.0 12/12/12 28.52 MB Digital Photo Professional 3.12.52 Updater 12/12/12 64.05 MB EOS Utility 2.12.3 Updater for Windows 12/12/12 77.03 MB Picture Style Editor 1.12.2 Updater for Windows12/12/12 80.90 MB ImageBrowser EX 1.1.0 for Windows 11/08/12 124.86 MB Simply choose what you want ( I updated all of them ). Choose run and then install on each item, all updates to your current software are then made automatically. I updated all, then rebooted my computer to see and explore the new features :) Enjoy ...
          KidsRuby running on the Raspberry Pi   

KDE Project:

I've been following the development of the Raspberry Pi computer, which is a small ARM based device costing only 25-30 euros. It is designed to plug into TVs, and is targeted at teaching kids to learn programming. I was excited to read today that the KidsRuby programming environment is running on a Raspberry Pi. You can read some of Liz's other blogs for more details about the Raspberry Pi's progress.

That is a subject which is dear to my heart. I don't personally have any kids, but I'm very interested in how they learn programming and how young they can get started. I came to Gran Canaria six years ago to help Agustin Benito put KUbuntu based computers into all the Canarian schools, and to learn Ruby On Rails programming at a great company called 'Foton'. That seemed the perfect combination to me.

I first learned programming when I was 19. I was studying for a degree called 'Philosophy with Cognitive Studies', and we were taught to program by people who were very interested in how people learned to program. The course taught us about 'constructivist' educational theories by Jean Piaget, Symour Papert and so on. The idea is that you learn by doing things. A computer turtle that you can program to move round the floor, or wooden blocks that you assemble into patterns to discover about maths and geometry are the perfect tools for the constructivist approach. This is instead of sitting there in class passively while a teacher stuffs your head with facts, and then at the end of the year you have a massive load of exams to test whether you have learned the facts correctly. Sadly dumb fact learning of a 'national curiculum' and SATS tests are now the norm in 'politician driven' educational systems as in the UK or the USA. Instead of a glorious constructivist future made possible by the learning augmentation features of personal computers that people dreamed of in the 1960s and 1970s, we've ended up with a boring 19th century style dead end to education.

The cognitive studies students were the first guinea pigs for a new way of teaching programming by using the POP-11 language interactively via teletypes in a Unix environment. It seems a bit strange today to think of a teletype as an advanced device, but in the mid-1970s video terminals were still really expensive and most students learned programming using punched cards that they submitted to a central facility. I had gone to some engineering lectures about FORTRAN before I switched to Philosophy, and because it used punched cards the whole subject seemed about the dullest thing you could imagine. But using a teletype interactively to work though self taught assignments was a different thing altogether. You could type a line of code into the computer, hit return and it did something.

In the early 1980s cheap computers running BASIC became widely available. But because I am a bit of a programming snob, I wasn't very interested in BASIC as it seemed like warmed over FORTRAN (it was) to me. I still wanted my own computer but none of them had much appeal. Even though these machines weren't for me, it did mean in the 1980s that many people got started in programming with their Sinclairs, Commadore 64s, BBC Micros and so on. It was a golden age of programming in schools. Once those machines were replaced by Windows machines in schools in the 1990s, those programming environments weren't available. Instead of teaching themselves BASIC, kids would learn about Microsoft Word instead, and that is very sad. Instead of finding about about the fun world of programming, they were learning how to be an Office drone. I once showed my nieces what 'hello world' looked like in QtRuby. They were about 15 and 17 years old and still at school at the time, but neither of them had ever seen a computer program before. They did say that it looked quite english-like and they could work out what it was doing.

After learning programming at University and getting my first programming job, the next big jump in my programming education came when I was 27, and I bought one of the first Apple Macintoshs. I ran MacPascal on it and taught myself Pascal using a book called 'Oh! Pascal' which I think is a classic. After learning Pascal I was able to get myself a programming job as a Pascal programming. That became a pattern for the rest of my career. I bought a NeXT computer, learned Objective-C and then became a professional Objective-C programmer. More recently I learned Ruby by writing the QtRuby bindings on a MacBook and then became a Rails programmer.

Once I had my own computers and my chosen programming environments to learn about, I was able to set the direction of my career. That probably seems fairly normal today, but I don't think it was how most programmers of my age progressed in their careers. Normally you would rely on your current employer to send you on programming courses. Over the years thanks to the generosity of your employer you were able to progress from being a COBOL-74 programmer to a COBOL-85 programmer who also knew RPG. Exciting stuff!

So there is a massive difference between having your own computer that you can program, as opposed to having to borrow someone else's machine before you can learn anything new. This is not only a problem for grown ups like myself, but it is a problem if you are about 9 years old and want to start programming. Your parents probably have a Windows machine that doesn't have any built in programming environment, and even if it did they might not be very happy to let a young kid loose on it. This is where the Raspberry Pi comes in. It is cheap enough for every kid to buy, and they can do what they like with it as it doesn't matter if they fill up the file system with logging messages when their program loops, or how many viruses they accidently download as it doesn't run viruses.

In the blog about KidsRuby running on the Raspberry Pi there is a link to a talk by Ron Evans that he gave at the Golden Gate Ruby Conference 2011 called KidsRuby: Think of the Children. I would have been very interested in the talk anyway, but what made my day is that the KidsRuby application is written in QtRuby, and it even gets a mention in one of the slides!

It made me think I really must try and get QtRuby 3.0 moving again. We had a mini-BOF at the Berlin Desktop Summit where 5 of us got together and then Arno ran through a description of the basics of how Smoke worked, followed by me running through the QtRuby 3.0 code. It is designed to be much easier to follow than the QtRuby 2.x code, and so that the 'bus factor' is increased. If I happen to drink 15 pints of beer one evening and fall off a balcony then it might be the end for me, but at least there would be some chance that others would be able to carry on maintaining QtRuby. It will also be more modular and instead of always loading all the Qt libraries, it will only load the ones you want. That should help memory constrained devices like the Raspberry Pi. I also need to make sure that QtRuby can be built as gems on all platforms right from the start. Ron Evans said in his talk that packaging KidsRuby was one of the trickiest aspects of the project. He sometimes asks questions as 'deadprogram' on the #qtruby irc channel about packaging issues, but I don't think I've personally given it the priority it deserves. Ryan Melt has done a great job with the qtbindings project on github where you can get cross platform gems, but I must try and structure QtRuby 3.0 to make it easy to build gems from the start.


          Screen Locking in Fedora Gnome 3   

KDE Project:

I wanted to try out Fedora 15 with Gnome 3 running under VirtualBox on my iMac before I went to the Berlin Summit. I've already tried using Unity-2d on Ubuntu, and I thought I if I had some real experience with Gnome 3 as well, I could have a bit more of an informed discussion with our Gnome friends and others at the Summit.

Sadly it didn't go all that well. Installing the basic distro went fine, but I couldn't manage to install VirtualBox Guest tools so that 3D graphics acceleration would work. The tools built fine, but the 'vboxadd' kernel module was never installed and there was no clue why in the build log. Then while I made a first attempt at writing this blog, Virtual Box crashed my machine and I lost everything. So it looks like I'll stick with VMWare for a bit yet even though it doesn't have 3D acceralation for Linux.

I discovered that Gnome 3 locks the screen, when it goes dim, by default just like I found Kubuntu and Mandriva did recently. I had a look at where that option is defined and it was under 'Screen'. So Screen locking was under 'Screen' and I managed to guess where it was first time. Score some points for Gnome usuability vs KDE there! Even so I still don't think it is a 'Screen' thing it is a 'Security' thing. Interestingly Ubuntu doesn't lock the screen by default. Does that mean Fedora and KDE are aimed at banks, while Ubuntu is more aimed at the rest of us?

In contrast, I had spent a lot of time going round the KDE options and failing to find it how to turn off screen locking. Thanks to dipesh's comments on my recent blog about virtual machines and multi booting USB sticks he pointed out that it was under 'Power Saving', and I managed to turn it off on my Mandriva install. There were also options under power saving to disable the various notifications that had annoyed me so much like the power cable being removed. Excess notifications are a real pain and it is very important to be disiplined about when to output them in my opinion. It feels like some programmer has mastered the art of sending notifications, and they want to show that skill off to the world.

Another app that outputs heroic numbers of notifications is Quassel when it starts up. I get a bazillion notifications about every channel it has managed to join, that I really, really don't care about. I think developers need to ask the question 'if the user was given notification XXX how would they behave differently, compared to how they would have behaved if they never received it in the first place?'. For instance, I can't imagine what I would do differently if I am told the power cord is disconnected, when it was me who just pulled it out. Maybe it would be useful if you had a computer where the power cord kept randomly falling out of its socket. Or with Quassel, do I sit watching the notfications for the twenty different IRC channels that I join waiting for '#kde-devel' so I can go in immediately. In fact I can't do anything with my computer because it is jammed up with showing me notfications.

Unlike Kubuntu, Mandriva was able to suspend my laptop when the lid was shut even when the power cord was connected.

The default behaviour on both Kubuntu and Mandriva with my HP 2133 netbook when I opened the lid, was to wake up with lots of notifications that I wasn't interested in, force me to enter my password in a screen lock dialog that I didn't want, and then immediately go back to sleep. This was actually the last straw I had with Kubuntu, and I was really surprised that Mandriva 2011 was exactly the same.

I had a look at my Mac System Preferences and couldn't find any way to lock the screen. The closest equivalent was in the 'Security' group that allowed you to system to log you out after x minutes of inactivity. That option certainly isn't on by default. Macs go to sleep when you close the lid, and wake up when you open the lid without a lot of fuss or bother.

Anyhow I look forward to seeing everyone in Berlin..


          Multiple everything - using VMWare, VirtualBox and Multisystem usb drives   

KDE Project:

Recently there was an post on Hacker News about collective nouns for birds in English. I run loads of virtual machines on my computer and I wonder what they should be called - 'a herd of virtual machines'? I have the mediocre Windows 7 Home Premium, and I wonder if that should be called a 'A badling of windows' after the phrase 'A badling of ducks'.

The big change for me in my computing evironment recently has been using virtual machines all the time instead of setting up my computers with multiple boot options. For work I use a 27 inch Macintosh with 8 GB of memory, running Windows 7 Home Premium and Kubuntu 11.04 under VMWare as guests under Mac OS X as the host. We have moved from scarcity in computer resources for programmers to a world where even the most under powered netbook can handle most of the things I need to do.

I spent most of last weekend preparing my HP 2133 netbook for use at the forthcoming Desktop Summit. I wanted to get it working well in advance as I had a lot of trouble with my netbook at the recent Qt Contributors Summit. At that conference I couldn't even get WiFi working for the first day or two, and it was only because I happened to bump into the awesome Paul Sladen from Canonical that I managed to get it working to a reliable standard at all.

Talking to Paul he didn't think he was any kind of power user (he works for Canonical as a UI designer), and that his suggestions to me about how to sort out my machine should be obvious. I'm not sure about what exactly I'm good at, but I think it is only programming and I am not a very good systems administrator (or a UI designer for that matter). But if I have a lot of trouble doing obvious things with my Linux portable I think you can assume anyone at all normal with be having even more trouble.

I found out about the Multisystem project, and managed to create a USB stick with Kubuntu 11.04, Ubuntu 11.04, OpenSUSE 11.4, Mandriva 2010, Mandriva 2011 RC2, Fedora 15, Debian Squeeze 6.0.1. Then I tried running each of these distributions in turn and trying to install them onto my HP 2133.

My Great White Hope was SUSE because that was the distribution that my HP 2133 originally came with. I never got it running when I first tried to boot my new HP 2133 because I got a 'grub error 18' or similar, after i got it home and tried to boot it - that would have put off 99% of potential Linux users straight away. The install of OpenSUSE 11.4 started and then after a while it died. Oh dear.

Next up was Fedora 15, and I got as far as the initial screen after being warning that my machine wasn't powerful enough to run Gnome 3. I started the 'install to hard disk' tool, and it died after a minute or two. Not enough memory, some other problem? I've no idea.

I was beginning to run out of ideas and then I thought of Mandriva and tried to install Mandriva 2010. That went well until I tried to boot and the Mandriva grub 1.0 install clashed with the grub 2.0 install of Kubuntu that I had on the second partition in my netbook. The naming scheme for partitions has changed between grub 1.0 and grub 2.0 and it isn't a good idea to combine them.

Large parts of my weekend were beginning to disappear even though it should be simple for an expert user to set up a netbook. Then I found out that Mandriva 2011 uses grub 2.0 and installing that worked great.

Back to bird collective nouns - I clearly had a 'flight of Mandrivas' here. I like the changes that Mandriva have made to the KDE UI. They have their own custom Plasma panel. It is black and doesn't look horrible like the default grey Plasma panel does. It doesn't have multiple virtual desktops by default. I thought I should just try the default UI at the Desktop Summit and see how I got on with it.

I wonder what has gone wrong with KDE Usuability considering we have a usuability expert on the KDE eV board. I find trivial usuabiltiy problems with KDE really annoying. For instance, if I set up KDE Wallet why do I have to give it a different password once I have logged in? Why doesn't it trust me?

If I try and make my laptop suspend while it is still connected to the mains power by shutting the lid, why doesn't it just suspend? I have to disconnect the power cable and then shut the lid again. Then plug the mains cable back in to ensure the laptop doesn't run out of power. Why do I get a completely useless notification about 'your laptop has had its power removed'? Of course I know that because I just removed the power cord to get round the problem of the laptop not suspending properly.

When my laptop wakes up it asks me for a password before it unlocks the screen. Why does it lock my screen by default? I don't know. I used to work on real time trading systems at a bank, and there was certainly a policy there of using screen lockers. But banks must be about 1% of KDE's users and so I have no idea why locking the screen is something a non-expert user should be confronted with. I haven't worked out how to disable screen locking even though it is a complete pain in the arse.

I have no idea why the KDE menus still have underlines in them to allow you to navigate without a mouse. That made sense when mice were rare things in the early eighties and power users without mice could navigate through Windows 1.0, but now about 1% of people use that option why are the other 99% being exposed to such an ugly UI.

I'm looking forward to the Berlin Conference and I hope we can make it an opportuntity to sort out KDE's 1980s and 1990's UI problems like I've just described. Clearly Plasma Active is in advance of everything else in my opinion, but the normal widget based normal KDE UI isn't. I still think we can do better than Mac OS X Lion and I look forward to hearing the opinions of KDE UI experts at the conference.


          Stream videos from your desktop to your iOS or Android device wirelessly with Air Playit   

Air Playit is a handy little free program that allows you to stream videos and music from your home computer to your Android or iOS mobile device. It features such smart options as on-the-fly conversion, support for multiple file formats, and built-in HTTP support, along with support for Apple’s proprietary TV-Out system. As it progresses […]

The post Stream videos from your desktop to your iOS or Android device wirelessly with Air Playit appeared first on freewaregenius.com.


          Access your music and movies anywhere on any device with Qvivo media player and organizer   

In the future, your media library will reside in the cloud, and you will be able to access your videos and movies on your computer, on your smartphone or other device, anywhere you are. Qvivo is a software platform that aims to make that a reality right now, letting you upload any media file to […]

The post Access your music and movies anywhere on any device with Qvivo media player and organizer appeared first on freewaregenius.com.


          Stream your music, playlists, podcasts to multiple PC’s and devices with AudioGalaxy   

Let’s say you’ve got a snazzy, large music collection on your hard drive at home, and that you would like to take it with you; get access to it from your computer at work, from your iPhone or Android device. And let’s say you want to do this without having to transfer and copy files […]

The post Stream your music, playlists, podcasts to multiple PC’s and devices with AudioGalaxy appeared first on freewaregenius.com.


          Suzuki Burgman 650 Scooter 2007   
2007 Scooter Suzuki Burgman AN650 White - Registered 1st September 2007. 7350 Miles with FULL Service History. Lovely Pearlescent White Paintwork. In excellent condition. Fitted with Datatag Security System and remote control alarm/immobiliser. Genuine Suzuki Variable Temperature Heated Grips. Taxed until 31st December 2009, MOT not due until 31st August 2010. Super Smooth Ride and seamless gear changes with option of either fully Auto or Manual overide gear changes, also has power button to enhance performance throughout the power range. Please note: This is NOT a Burgman Executive, so therefore does NOT come with ABS, Power folding mirrors or electrically adjustable screen. Huge underseat lockable storage, easily holds 2 helmets and more. 60 and more MPG is easily achieved. Digital dash with Trip Computer, Gear Indicator, Outside temp and clock and switches from MPH to KPH as required if you take it to Europe. Total price for is £1.750 and free shipping anywhere in UK. For more details and photos contact me at karenpburr@yahoo.co.uk
          Penemu Sepanjang Masa   
A


* Al-Jazari, (12th century), Mesopotamia — Crankshaft
* Archimedes, (c 287 BC-212 BC), Greece — Archimedes screw
* Ami Argand, (1750-1803), France — Argand lamp
* Edwin H. Armstrong,(1890-1954), USA — FM radio
* William George Armstrong, (1810-1900), UK — hydraulic crane
* Joseph Aspdin, (1788-1855), England — Portland cement
* John Vincent Atanasoff, (1903-1995), United States — modern programmable computer
* Neil Arnott, (1788-1874), UK — waterbed

B


* Charles Babbage, (1791-1871), UK — Analytical engine
* Roger Bacon, (1214-1292), England — magnifying glass
* Leo Baekeland, (1863-1944), Belgian–American — Velox photographic paper and Bakelite
* Ralph H. Baer, (1922-), German born American — video game console
* John Logie Baird, (1888-1946), Uk — an electromechanical television
* Donat Banki, (1859-1922), Hungary — inventor of the carburetor
* John Bardeen, (1908-1991), USA — co-inventor of the transistor
* Anthony R. Barringer Canadian – American — INPUT (Induced Pulse Transient) airborne electromagnetic system
* Earl W. Bascom, (1906-1995), Canada and United States — side-delivery rodeo chute, hornless rodeo saddle, rodeo bareback rigging, rodeo chaps
* Eugen Baumann, (1846-1896), Germany — PVC
* Trevor Baylis, (1937-), UK — a wind-up radio
* Francis Beaufort, (1774-1857), France — Beaufort scale
* Arnold O. Beckman, (1900-2004), USA — pH meter
* Alexander Graham Bell, (1847-1922), Canada — telephone
* Karl Benz, (1844-1929), Germany — the petrol-powered automobile
* Emile Berliner, (1851-1929), Germany and USA — the disc record gramophone
* Tim Berners-Lee, (1955-), UK — with Robert Cailliau, the World Wide Web
* Bi Sheng (Chinese:畢昇), (ca.990-1052), China — clay movable type printing
* Laszlo Biro, (1899-1985), Hungary — modern ballpoint pen
* J. Stuart Blackton, (1875-1941), USA — stop-motion film
* Otto Blathy (1860-1939), Hungary — co-inventor of the transformer, wattmeter, alternating current (AC) and turbogenerator
* Katharine B. Blodgett, (1898-1979), UK — nonreflective glass
* Nils Bohlin, (1920-2002), Sweden — the three-point seat belt
* Joseph-Armand Bombardier, (1907-1964), Canada — snowmobile
* Robert W. Bower, (1936-), USA — self-aligned–gate MOSFET
* Seth Boyden, (1788-1870), USA — nail-making machine
* Walter Houser Brattain, (1902-1987), USA — co-inventor of the transistor
* Louis Braille, (1809-1852), France — the Braille writing system
* Karl Ferdinand Braun, (1850-1918), Germany — cathode-ray tube oscilloscope
* Harry Brearley, (1871-1948), UK — stainless steel
* John Moses Browning, (1855-1926), USA — automatic handgun
* Edwin Beard Budding, (1795-1846), UK — lawnmower

C


* C`ai Lun, (50 AD - 121), China — paper
* Marvin Camras, (1916 - 1995), USA — magnetic recording
* Chester Carlson, (1906-1968), USA — Xerography
* Wallace Carothers, (1896-1937), USA — Nylon
* Dennis Charter, (1952-), Australia — Secure Electronic Payment System
* Adrian Chernoff, (1971-), USA — GM Autonomy, GM Hy-wire, Rubber Bandits
* Niels Christensen (1865- 1952), USA — O-ring
* Samuel Hunter Christie, (1784-1865), UK — Wheatstone bridge
* Christopher Cockerell, (1910-1999), UK — Hovercraft
* Jacques Cousteau, (1910-1997), France — co-inventor of the aqualung and the Nikonos underwater camera
* Aeneas Coffey, (1780-1852), Ireland, heat exchanger, inventor of the Coffey still
* Holger Crafoord, (1908-1982), Sweden — inventor of the artificial kidney
* János Csonka, (1852-1939), Hungary — co-inventor of carburetor
* Nicolas-Joseph Cugnot, (1725-1804), France — automobile
* Juan de la Cierva, (1895-1936), Spain — the autogyro
* William Cullen, (1710-1790), UK — first artificial refrigerator
* Glenn Curtiss, (1878 - 1930), USA — ailerons
* Corliss Orville Burandt, USA — Variable valve timing
* Joseph Constantine Carpue, (1764-1846), France — rhinoplastic surgery
* Joseph Bienaimé Caventou, (1795-1877), France — caffeine, chlorophyll, strychnine
* George Cayley, (1773-1857), (UK) — tension-spoke wheels, Caterpillar track
* Georges Claude, (1870-1960), France — neon lamp
* Josephine Cochrane, (1839-1913), USA — dishwasher
* Cornelis Corneliszoon, (1550-1607), The Netherlands — sawmill
* Bartolomeo Cristofori, (1655-1731), Italy — piano
* William Cumberland Cruikshank, (1745-1800), UK — chlorinated water

D


* Gustaf Dalen, (1869-1937), Sweden — AGA cooker; Dalen Light; Agamassan
* Salvino D'Armate, (?-?), Italy — credited for inventing eyeglasses in 1284
* Joseph Day, (1855-1946), UK — the crankcase compression two stroke engine
* Lee DeForest, (1873-1961), USA — triode
* Sir James Dewar, (1842-1923), UK — Thermos flask
* Miksa Deri (1854-1938), Hungary — co-inventor of transformer
* William Kennedy Laurie Dickson, (1860-1935), UK — motion picture camera
* Rudolf Diesel, (1858-1913), Germany — Diesel engine
* William H. Dobelle, (1943-2004), United States — first functioning artificial eye
* Karl Drais, (1785-1851), Germany — dandy horse (Draisine)
* Cornelius Drebbel, (1572-1633), The Netherlands — first navigable submarine
* Richard Drew, (1899-1980), USA — Sticky Tape
* Charles Brace Darrow, (1889-1967). USA — Monopoly
* Jacob Davis, (1868-1908), USA — riveted jeans
* Edmund Davy, (1785-1857), Ireland — acetylene
* Humphry Davy, (1778-1829), UK — Davy miners lamp
* Bryan Donkin, (1768-1855), UK — print industry composition roller
* John Boyd Dunlop, (1840-1921) UK — first practical pneumatic tyre
* Karl Drais, (1785-1851), Germany — velocipede


E


* George Eastman, (1854-1932), USA — film-roll
* Thomas Edison, (1847-1931), USA — phonograph, commercially practical light bulb, motion picture projector, stock ticker, etc.
* Willem Einthoven, (1860-1927), The Netherlands — the electrocardiogram
* Douglas Engelbart, (1925-), USA — the computer mouse [1]
* Rune Elmqvist, (1857-1924), Sweden — implantable pacemaker
* John Ericsson, (1803-1889), Sweden — the two screw-propeller
* Lars Magnus Ericsson, (1846-1926), Sweden — the handheld micro telephone
* Ole Evinrude, (1877-1934), Norway — outboard motor

F


* Samuel Face, (1923-2001), USA — concrete flatness/levelness technology; Lightning Switch
* Philo Farnsworth, (1906-1971), USA — electronic television
* James Fergason, (1934-), USA — improved liquid crystal display
* Reginald Fessenden, (1866-1932), Canada — two-way radio
* Adolf Eugen Fick, (1829-1901), Germany — contact lens
* Alexander Fleming, (1881-1955), Scotland — penicillin
* Sandford Fleming, (1827-1915), inventor of Standard Universal Time (1879)
* John Ambrose Fleming, (1848-1945), England — vacuum diode
* Benjamin Franklin, (1706-1790), USA — the pointed lightning rod conductor, bifocal glasses, the Franklin stove, the glass harmonica
* William Friese-Greene, (1855-1921), England — cinematography
* Buckminster Fuller, (1895-1983), USA — geodesic dome
* Gerhard Fischer, Germany/USA — hand-held metal detector
* Augustin-Jean Fresnel, (1788-1827), France — Fresnel lens
* Jean Bernard Léon Foucault, (1819-1868), France — Foucault pendulum (earth rotation), gyroscope, eddy current
* Benoît Fourneyron, (1802-1867), France — water turbine
* Enrico Fermi, (1901-1954), Italy — nuclear reactor
* Michael Faraday, (1791-1867), England — rubber balloon, electric transformer

G


* Dennis Gabor, (1900-1979), Hungary — holography
* Elmer R. Gates, (1859-1923), foam fire extinguisher, electric loom mechanisms, magnetic & diamagnetic separators, educational toy ("box & blocks")
* William Henry Gates III, (1955-), Windows operating system, chief architect of Visual Basic
* Robert Goddard, (1882-1945), USA — liquid fuel rocket
* Heinrich Göbel, (1818-1893), Germany — first functional incandescent lamp
* Peter Carl Goldmark, (1906-1977), Hungary — vinyl record (LP)
* Gordon Gould, (1920-2005), USA — co-inventor of laser
* Richard Hall Gower, (1768-1833), England — ship's hull and rigging
* Bette Nesmith Graham, (1924-1980), USA — Liquid Paper
* Chester Greenwood, (1858-1937), USA — thermal earmuffs
* James Gregory, (1638-1675), Scotland — reflecting telescope
* William Robert Grove, (1811-1896), Wales — fuel cell
* Otto von Guericke, (1602-1686), Germany — vacuum pump, manometer, dasymeter,
* Johann Gutenberg, (c 1390s-1468), Germany — modern movable type printing press
* Hans Wilhelm Geiger, (1882-1945), Germany — Geiger counter
* Henri Giffard, (1825-1882), France — powered airship, injector
* Charles Goodyear, (1800-1860), USA — vulcanization of rubber
* Samuel Guthrie, (1782 - 1848), USA — discovered chloroform
* James Henry Greathead, (1844-1896), South Africa — tunnel boring machine, tunnelling shield technique

H


* John Hadley, (1682-1744), England — the sextant
* James Hargreaves, (1720-1778), England — invented the spinning jenny
* John Harrison, (1693-1776), England — marine chronometer
* Victor Hasselblad, (1906-1978), Sweden — invented the 6 x 6 cm single-lens reflex camera
* Rudolf Hell, (1901-2002), Germany — the Hellschreiber
* Avram Hershko, (1937-), Hungary — Ubiquitin
* Jozef Karol Hell, (1713-1789), Slovakia — the water pillar
* Joseph Henry, (1797-1898), USA — electromagnetic relay
* George de Hevesy, (1885-1966), Hungary — radioactive tracer
* Erna Schneider Hoover, (1926-), USA — computerized telephone switching system
* Frank Hornby, (1863-1936), England — invented Meccano
* Heron, Greece — invented Aeolipile
* Joseph Hon – book index thumb notch system for dictionaries Patent #561888
* Christopher Hansteen, (1783-1873), Norway — discovery of terrestrial magnetism
* William Harvey, (1578-1657), England — blood circulation in the human body
* Robert A. Heinlein, (1907-1988), USA — waterbed
* Henry J. Heinz, USA — tomato ketchup
* Joseph Henry, (1797-1878), Scotland — electromagnetic relay
* Heinrich Hertz, (1857-1894), Germany — radio telegraphy, electromagnetic radiation
* Rowland Hill, (1795-1879), UK — postage stamp
* Felix Hoffmann (Bayer), (1868-1949), Germany — Aspirin
* Herman Hollerith, (1860-1929), USA — mechanical tabulator based on punched cards
* Nick Holonyak, (1928- ), USA — LED (Light Emitting Diode)
* Robert Hooke, (1635-1703), England — balance wheel, iris diaphragm
* Coenraad Johannes van Houten, (1801-1887), Netherlands — cocoa powder, cacao butter, chocolate milk
* Elias Howe, (1819-1867), USA — sewing machine
* Christiaan Huygens, (1629-1695), Netherlands — pendulum clock

I


* János Irinyi, (1817-1895), Hungary — noiseless match
* Sumio Iijima, (1939- ), Japan — nanotubes

J


* Karl Jatho, (1873-1933), Germany — aeroplane
* György Jendrassik, (1898-1954), Hungary — turboprop
* Thomas Jefferson, (1743-1826), USA — swivel chair
* Steve Jobs, (1955-), Macintosh operating system
* Carl Edvard Johansson, (1864-1943), Sweden — Gauge blocks
* Johan Petter Johansson, (1853-1943), Sweden — the pipe wrench and the modern adjustable spanner
* Nancy Johnson, USA — American version of the hand cranked ice cream machine in (1843)
* Scott A. Jones, (1960-), USA — created one of the most successful versions of voicemail as well as ChaCha Search, a human-assisted internet search engine.
* Whitcomb Judson, (1836-1909), USA — zipper

K


* Dean Kamen, (1951-), USA — Invented the Segway HT scooter and the IBOT Mobility Device
* John George Kemeny, (1926-1992), Hungary — co-inventor of BASIC
* Charles F. Kettering, (1876-1958), USA — invented automobile self-starter ignition, Freon ethyl gasoline and more
* Jack Kilby, (1923-2005), USA — patented the first integrated circuit
* Fritz Klatte, (1880-1934), Germany — vinyl chloride, forerunner to polyvinyl chloride
* Margaret Knight, (1838-1914), USA — machine that completely constructs box-bottom brown paper bags
* Ivan Knunyants, (1906-1990), Ukraine — invented Nylon-6
* Willem Johan Kolff, (1911-), Netherlands — artificial kidney hemodialysis machine
* Gleb Kotelnikov, (1872-1944), Russia — knapsack parachute
* Stephanie Kwolek, (1923-), USA — Kevlar
* John Howard Kyan (1774-1850), Ireland — The process of Kyanization used for wood preservation
* Heike Kamerlingh Onnes, (1853-1926), Netherlands — liquify helium
* Theophilus Van Kannel, revolving door (1888)
* John Harvey Kellogg, (1852-1943), cornflake breakfasts
* Robert Koch, (1843-1910), method for culturing bacteria on solid media
* Willem Johan Kolff, Netherlands/USA, (1911- ) — hemodialysis, pioneer in the field of other artificial organs

L


* Hedy Lamarr, (1913-2000), Austria and USA — Spread spectrum radio
* Edwin H. Land, (1909-1991), USA — Polaroid polarizing filters and the Land Camera
* Irving Langmuir, (1851-1957), USA — gas filled incandescent light bulb, hydrogen welding
* Lewis Latimer, (1848-1928), — worked with Thomas Edison and patented an improved lightbulb manufacturing process
* Gustav de Laval, (1845-1913), Sweden — invented the milk separator and the milking machine
* Sergei Vasiljevich Lebedev, (1874-1934), Russia — synthetic rubber
* Tim Berners-Lee, (1955- ) England — World Wide Web
* Justus von Liebig, (1803-1873), Germany — nitrogen-based fertilizer
* Frans Wilhelm Lindqvist, (1862-1931), Sweden — Kerosene stove operated by compressed air
* Archibald Low, (1882-1956), Britain — Pioneer of radio guidance systems
* Giovanni Luppis, (1813-1875), Austrian Empire (ethnical Italian) — self-propelled torpedo
* René Laënnec, (1781-1826), France — stethoscope
* Karl Landsteiner, (1868-1943), Austria — classification of blood groups
* Samuel P. Langley, (1834-1906), USA — bolometer
* John Bennet Lawes, (1814-1900), England — superphosphate or chemical fertilizer
* Antoni van Leeuwenhoek, (1632-1723), Netherlands — development of the microscope, discovery of bacteria, spermatozoa and celled organisms
* Jean-Joseph Etienne Lenoir, (1822-1900), Belgium — internal combustion engine, motorboat
* Willard Frank Libby, (1908-1980), USA — Radiocarbon dating
* Otto Lilienthal, (1848-1896), Germany — air glider
* Hans Lippershey, (1570-1619), Netherlands — telescope
* Auguste and Louis Lumière, France — Cinématographe

M


* Ma Jun, (c. 200-265 AD), China, South Pointing Chariot (for navigation, see differential gear), mechanical puppet theater, chain pumps, improved silk looms
* Charles Macintosh, (1766-1843), Scotland — waterproof raincoat, life vest
* George William Manby, (1765-1854), England — Fire extinguisher
* Guglielmo Marconi, (1874-1937), Italy — radio, transatlantic radiosignals
* John Landis Mason, (1826-1902), USA — Mason jars
* Henry Maudslay, (1771-1831), England — screw-cutting lathe, bench micrometer
* James Clerk Maxwell (1831-1879) and Thomas Sutton Scotland — colour photography
* John McAdam, (1756-1836), Scotland — improved "macadam" road surface
* Elijah McCoy, (1843-1929), Canada — Displacement lubricator
* Hippolyte Mège-Mouriés, (1817-1880), France — margarine
* Antonio Meucci, (1808-1889), Italy — telephone (prototype)
* Edouard Michelin, (1859-1940), France — pneumatic tyre
* Narcis Monturiol i Estarriol, (1819-1885), Spain — steam powered submarine
* Robert Moog, (1934-2005), USA — the Moog synthesizer
* Montgolfier brothers, (1740-1810) and (1745-1799), France — hot-air balloon
* John J. Montgomery, (1858-1911), USA — heavier-than-air gliders
* Samuel Morey, (1762-1843), USA — internal combustion engine
* Garrett A. Morgan, (1877-1963), USA — inventor of the gas mask, and traffic signal.
* Samuel Morse, (1791-1872), USA — telegraph
* Jozef Murgas, (1864-1929), Slovakia — inventor of the wireless telegraph (forerunner of the radio)
* William Murdoch, (1754-1839), Scotland — Gas lighting
* Pieter van Musschenbroek, (1692-1761), Netherlands — Leyden jar, pyrometer

N


* Yoshiro Nakamatsu, (1928-), Japan — Floppy disk (world record holder for over 3,000 patented inventions)
* John von Neumann, (1903-1957), Hungary — Von Neumann computer architecture
* Isaac Newton,(1642-1727), England — reflecting telescope (which reduces chromatic aberration)
* Jun-Ichi Nishizawa, (1926-), Japan — Optical communication system, SIT/SITh (Static Induction Transistor/Thyristor), Laser diode, PIN diode
* Alfred Nobel, (1833-1896), Sweden — dynamite
* Carl Rickard Nyberg, (1858-1939), Sweden — the blowtorch
* John Napier, (1550-1617), Scotland — logarithms
* James Nasmyth, (1808-1890), Scotland — steam hammer
* Joseph Nicephore Niépce, (1765-1833), France — photography

O


* Theophil Wilgodt Odhner, (1845-1903), Sweden — the Odhner Arithmometer, a mechanical calculator
* Elisha Otis, (1811-1861), USA — passenger elevator with safety device
* J. Robert Oppenheimer , (1904-1967), USA — the father of the atomic Dome
* Hans Christian Ørsted, (1777-1851), Denmark — electromagnetism, aluminium

P


* Helge Palmcrantz, (1842-1880), Sweden — the multi-barrel, lever-actuated, machine gun
* Les Paul, (1915-), USA — Multitrack recording
* Spede Pasanen, (1930-2001), Finland — The ski jumping sling
* Slavoljub Eduard Penkala, (1871-1922), Croatia — mechanical pencil
* Gustaf Erik Pasch, (1788-1862), Sweden — the safety match
* Arthur Paul Pedrick, England — chromatically selective cat flap and others
* Henry Perky, (1843-1906), USA — Shredded wheat
* Peter Petroff, (1919-2004), Bulgaria — digital wrist watch, heart monitor, weather instruments
* Christopher Polhem, (1661-1751), Sweden — the modern padlock
* Olivia Poole, (1889-1975), USA, — the Jolly Jumper baby harness
* Baltzar von Platen, (1898-1984), Sweden — refrigerator
* Mihajlo Pupin, (1858-1935), Serbia — pupinization (loading coils), tunable oscillator
* Tivadar Puskas, (1844-1893), Hungary — telephone exchange
* Daniel David Palmer, (1845-1913), Canada — Chiropractic
* Luigi Palmieri, (1807-1896), Italy — seismometer
* Alexander Parkes, (1831-1890), England — celluloid
* Blaise Pascal, (1623-1662), France — barometer
* Charles Algernon Parsons, (1854-1931), British — steam turbine
* John Pemberton, (1831-1888), USA — Coca-Cola
* Joseph Plateau, (1801-1883), Belgium — phenakistiscope (stroboscope)
* James Leonard Plimpton, USA — roller skates
* George Pullman, (1831-1897), USA — Pullman sleep wagon

Q


R


* Wilhelm Conrad Röntgen, (1845-1923), Germany — the X-ray machine
* Josef Ressel, (1793-1857), Czechoslovakia — ship propeller
* John Roebuck, (1718-1794) England — lead chamber process for sulfuric acid synthesis
* Erno Rubik, (1944-), Hungary — Rubik's cube, Rubik's Magic and Rubik's Clock
* Karl von Reichenbach, (1788-1869), paraffin, creosote oil, phenol
* Ira Remsen, (1646-1927), USA — saccharin
* Charles Francis Richter, (1900-1985), USA — Richter magnitude scale
* Ernst Ruska, (1906-1988), Germany — electron microscope

S


* Hassan Kamel Al-Sabbah, (1895-1935), Lebanon — solar power, cathode ray tube
* Kees A. Schouhamer Immink (1946- ), Netherlands Major contributor to development of Compact Disc
* Augustus Siebe, (1788-1872), Saxony&England Inventor of the standard diving dress
* Alberto Santos-Dumont, (1873-1932), Brazil — non-rigid airship and airplane
* Isidor Sauers, (1948- ), inventor of a process for measuring the degradation of SF6 in high-voltage systems
* Adolphe Sax, (1814-1894), Belgium — saxophone
* Christian Schnabel (1878-1936), German, designed simplistic food cutleries
* August Schrader, USA — Schrader valve for Pneumatic tire
* David Schwarz, (1852-1897), Croatia, — rigid ship, later called Zeppelin
* Bela Schick, (1877-1967), Hungary — diphtheria test
* Iwan Serrurier, (active 1920s), Netherlands/USA — inventor of the Moviola for film editing.
* Mark Serrurier, (190?-1988), USA — Serrurier truss for Optical telescopes
* William Bradford Shockley, (1910-1989), USA — co-inventor of transistor
* Werner von Siemens, (1816-1892), Germany — an electromechanical "dynamic"
* Sir William Siemens, (1823-1883), Germany — regenerative furnace
* Igor Sikorsky, (1889-1972), Ukraine — helicopter
* Charles Simonyi, (1948-), Hungary — Hungarian notation
* Aurel Stodola, (1859-1942), Slovakia - gas turbines
* Elmer Ambrose Sperry, (1860-1930), USA — gyroscope-guided automatic pilot
* Reverend Dr Robert Stirling (1790-1878), Scotland — Stirling engine
* Levi Strauss, (1829-1902), USA — blue jeans
* John Stringfellow, (1799-1883), England — airplane
* Almon Strowger, (1839-1902), USA — automatic telephone exchange
* Su Song, (1020-1101), China, invented the first hydraulic-powered astronomical clock tower that operated an armillary sphere with the escapement mechanism and chain drive
* Simon Sunatori, (1959-), Canada — inventor of Sunatori Pen
* Joseph Swan, (1828-1914), England — Incandescent light bulb
* Thomas Savery, (1650-1715), England — steam engine
* Marc Seguin, (1786-1875), France — wire-cable suspension bridge
* Henry Shrapnel, (1761-1842), England — Shrapnel shell ammunition
* Augustus Siebe, (1788-1872), Germany — standard diving dress
* Isaac Singer, (1811-1875), USA — sewing machine
* Percy Spencer, (1894-1970), USA — microwave oven
* George Stephenson, (1781-1848), England — steam locomotive
* Simon Stevin, (1548-1620), Netherlands — land yacht

T


* Bernhard Tellegen, (1900-1990), Netherlands pentode
* Edward Teller (Ede Teller), (1908-2003), Hungary — hydrogen bomb
* Nikola Tesla, (1856-1943), Serbian-Croatian-American — developer of the Tesla Coil and inventor of the induction motor, alternating current polyphase power distribution system, wireless communication, robotics, logic gates, the bladeless turbine, radio, VTOL aircraft, etc.
* Kalman Tihanyi, (1897-1947), Hungary — co-inventor of cathode ray tube and iconoscope
* Benjamin Chew Tilghman, (1821-1897), USA — sandblasting
* Alfred Traeger, (1895-1980), Australia — the pedal radio
* Franc Trkman, (1903-1978), Slovenia — electrical switches, accessories for opening windows
* Alan Turing, (1912-1954), England — the Turing machine

U


* Lewis Urry, (1927-2004), Canada — long-lasting alkaline battery

V


* Hub van Doorne, (1900-1979), Netherlands, continuously variable transmission
* Louis R. Vitullo, (1924?-2006), United States — developed the first sexual assault evidence kit
* Alessandro Volta, (1745-1827), Italy — battery
* Faust Vrancic, (1551-1617), Croatia — parachute

W


* Barnes Wallis, (1887-1979), England — bouncing bomb
* Robert Watson-Watt, (1892-1973), Scotland — microwave radar
* James Watt, (1736-1819), Scotland — improved Steam engine
* Jonas Wenström, (1855-1893), Sweden — three-phase electrical system
* George Westinghouse, (1846-1914), USA — Air brake
* Charles Wheatstone, (1802-1875), England — concertina, stereoscope, microphone, Playfair cipher
* Eli Whitney, (1765-1825), USA — the cotton gin
* Frank Whittle, (1907-1996), England — co-inventor of the jet engine
* Otto Wichterle, (1913-1989), Czechoslovakia — invented modern contact lenses
* Paul Winchell, (1922-2005), USA — the artificial heart
* Edmund Wingate, (c.1593-1656), England — straight slide rule
* A. Baldwin Wood, (1879-1956), USA — high volume pump
* Granville Woods, (1856-1910), USA — the Synchronous Multiplex Railway Telegraph
* The Wright brothers, Orville Wright, (1871-1948) and Wilbur Wright, (1867-1912), USA — powered airplane
* Bruce Wydner, (1935-), USA — inventor of Cost-Effective Machine Translation
* Arthur Wynne, (1862-1945), England — creator of crossword puzzle
* Thomas Wedgwood, (1771-1805), England — first (not permanent) photograph

Y


* Hidetsugu Yagi, (1886-1976), Japan — Yagi antenna
* Yi Xing, (683-727), China, invented the first hydraulic-powered armillary sphere that used the escapement mechanism
* Arthur M. Young, (1905-1995), USA — the Bell Helicopter

Z


* Zhang Heng, (78-139), China, invented the first hydraulic-powered armillary sphere

Penemu Mesin uap Adalah James Watt Berasal dari Negara Inggris
Penemu Mesin 4 tak Adalah Nicolaus Otto Berasal dari Negara Jerman
Penemu Mesin diesel Adalah Rudolf Diesel Berasal dari Negara Jerman
Penemu Mesin cetak Adalah Johannes Guttenberg Berasal dari Negara Jerman
Penemu Mesin ketik Adalah Christopher Sholes Berasal dari Negara Amerika
Penemu Radio Adalah C. Marconi Berasal dari Negara Italia
Penemu Televisi Adalah J.L. Baird & C.F. Jenkins Berasal dari Negara Amerika
Penemu Telegrap Adalah Samuel F.B. Morse Berasal dari Negara Amerika Serikat
Penemu Telepon Adalah Alexander Graham Bell Berasal dari Negara Amerika Serikat
Penemu Dinamo Adalah Michael Faraday Berasal dari Negara Inggris
Penemu Elektromagnet Adalah Williarn Sturgeon Berasal dari Negara Inggris
Penemu Bola lampu Adalah Thomas Alva Edison Berasal dari Negara Amerika Serikat
Penemu Proyektor film Adalah Thomas Alva Edison Berasal dari Negara Amerika Serikat
Penemu Piringan hitam Adalah Alexander Graham Bell Berasal dari Negara Amerika Serikat
Penemu Batu baterai Adalah Volta Berasal dari Negara Italia
Penemu Termometer Adalah Galileo Galilei Berasal dari Negara Italia
Penemu Korek api Adalah Robert Boyle, John Walker Berasal dari Negara
Penemu Kapal api Adalah Robert Fulton Berasal dari Negara Amerika Serikat
Penemu Kapal selam Adalah Cornelius van Drebbel Berasal dari Negara Belanda
Penemu Sinar Rontgen Adalah Wilhelm Conrad Rontgen Berasal dari Negara Jerman
Penemu Stetoskop Adalah Rene Laennec Berasal dari Negara Perancis
Penemu Lensa Adalah Anthony Van Leuwenhook Berasal dari Negara Belanda
Penemu Mikroskop Adalah Zacharias Janssen Berasal dari Negara Belanda
Penemu Teleskop Adalah H. Lippershey Berasal dari Negara Belanda
Penemu Kamera Adalah Louis Jacques Monde da Guerre & Edwin Land Berasal dari Negara Amerika
Penemu Pesawat terbang Adalah Wilbur dan 0. Wright Berasal dari Negara Amerika
Penemu Kereta api Adalah Murdocks Berasal dari Negara Inggris
Penemu Sepeda Adalah Civrac Berasal dari Negara Prancis
Penemu Balon terbang Adalah Sir F. Whittle
Penemu Balon karet Adalah Josep dan J. Montgolfier
Penemu Ban karet Adalah Charles Goodyear Berasal dari Negara Amerika
Penemu Barometer Adalah Evangelista, Torricelli Berasal dari Negara Italia
Penemu Dinamit Adalah Alfred Nobel Berasal dari Negara Swedia
Penemu Lensa kaca mata Adalah Benyamin Franklin Berasal dari Negara
Penemu Mesin hitung Adalah Blaise Pascal Berasal dari Negara Prancis
Penemu Mobil Adalah Gottlich Daimler
Penemu Motor Adalah Nikola Tesla
Penemu Tank Adalah Sir Ernest Swinton Berasal dari Negara Inggris
Penemu Traktor Adalah Benyamin Holt
Penemu Tangga jalan Adalah Elis G. Otis Berasal dari Negara Amerika
Penemu Kawat pijar Adalah Irving Langmuir

Sadi Carnot 1796-1832/Prancis penemu Carnot cycle dan Hukum Thermodynamik II

Carl Friedrich Gauss 1777-1855/Jerman terlalu banyak utk disebutkan, paling banyak kontribusinya di teori2 matematika

Leonhard Euler 1707-1783/JermanSwiss sama kayak gauss, terlalu banyak kontribusinya dibidang ilmu pengetahuan alam dan matematik untuk disebutkan. yang paling kesohor, bilangan euler "e=2,71828..."

Max Planck 1858-1947/Jerman Quantum Theori.


Carl Benz bersama Gottlieb Daimler / dua2nya Jerman penemu Autocar
Karlheinz Brandenburg 1954 /Jerman penemu MP3 format yg di pake sekarang di MP3 Player
Heinrich Hertz/ Jerman penemu Gelombang Mhz, Khz...
Manfred von Ardenne /Jerman penemu Televisi
Albert Einstein /Jerman Teori Relativitas
             
Virikel Silalahi
Jln Hiu I No. 135 Blok A
Perumnas Martubung 2 – Medan - 20259
Mobile. 0812 6066 721
    


PROFESSIONAL  SUMMARY


Operations/Warehousing Supervision

For six years of experience in Regional Distributor  PT. Triwahana Jaya – Jakarta and as Warehouse and Distribution Supervisor in PT. Ultramos Jaya Medan for five years. Currently position as Operational Supervisor / PMC at PT. DHL Supply Chain Indonesia Ericsson Project  Medan / Pekanbaru. Highly motivated Operations Supervisor offering extensive experience in logistics, warehouse supervision and goods transportation. Team player who works well independently. Personable and hard-working; good verbal and written communication skills. Computer Skills: All Microsoft Office applications and the Internet. 




EMPLOYMENT HISTORY


PT. Triwahana Jaya - Jakarta
1997 - 2003
Warehouse Administration
Daily activities of warehouse administration,  shipping process and loading/unloading. Key responsibilities :
• Good administration and document for all operational warehouse
• To keep the stock position and to minimize the differences between data and actual stock of all materials in plant
• Within team, work together to control inventory stock of all material in plant.


PT. Ultramos Jaya KIM Mabar - Medan
2003 - 2008
Warehouse and Distribution Supervisor
Controlled daily operations at warehouse :
• Controlled incoming and outgoing materials process
• Ensured safety regulation during operations at warehouse
• To keep the stock position and to minimize the differences between data and actual stock of all materials in plant
SAP process implementation :
• As SAP End User for warehouse process in system SAP
• End User training for  warehouse process



PT. DHL Supply Chain Indonesia Ericsson Project Medan/Pekanbaru
2008 - Present
Operational Supervisor / PMC



CURRICULUM VITAE


PERSONAL IDENTITY

Name                      : Virikel Silalahi
Place of Birth        : Nagori
Date of Birth         : September 17, 1969
Marital Status       : Married

FORMAL EDUCATION

1993            : Simalungun University, Pematang Siantar
1988            : Agricultural Technology Secondary School, Pematang Raya
1985            : Junior High School, Sibuntuon
1976            : Pre Eliminary School, Sibuntuon

NON FORMAL EDUCATION

2008            : English Conversation Course, IBLA, Medan
2008            : ISO 9001 Awareness Training, TUV International, Jakarta
2007            : Computer Course, TRICOM, Medan
2006            : Modern English Conversation Course, LM PATRA, Medan
2005            : SAP End User Training, Internal JHHP, Jakarta
1996            : Management Course, LP2KS, Jakarta

WORK AND EXPERIENCE

2008 – Present      : DHL Supply Chain, EID Project, Medan / Pekanbaru
2003 – 2008            : PT. Ultramos Jaya, Jakarta
1997 – 2003            : PT. Triwahana Jaya, Jakarta








          Comment on PodTech Raised $5.5 Million of Venture by Flame proof motors africa   
The torx drive screws are normally applied to motorcycles and automobiles, bicycle brakes as well as in personal computers and consumer electronics. As an experienced jaw crusher manufacturer and supplier, Henan Hongxing Mining Machinery Co. We have a large lost of satisfied clients who may have enjoyed these induction furnaces.
          Work or play the summer away   

The kids in my neighborhood are having a fine summer going to camps, the pool and just hanging out. I see them on their bikes or in cars buzzing around and that’s just fine...or is it?

What happened to getting a summer job? My dad owned a grocery store so the job thing didn’t end at summer, my brother and I worked all year long after school and on weekends. I also babysat a ton. At fifty-cents an hour I thought I was rich!

My kids all had jobs too. With four kids they had to help with getting their own spending money and besides...in my humble opinion...I think it was really good for them. Even the bad jobs they got like yard work for the skinflint down the street taught my son he did not what to do this for the rest of his life which meant get a good education!

My kids had all kinds of jobs. My one daughter worked at King’s Island, an amusement park here in Cincy. She worked the merry-go-round with an assortment of amazing hand painted horses.
The tunes used to drive her nuts but again working a job that is not terrific teaches a kid to get an education or do this for the rest of your life.

My son got a great computer job in high school that paid really well. He’s one of those computer geeks that has always gotten it and works for P &G now in computers. This first real job taught him what having real money felt like and the respect that went with it. It was great incentive and a look at the real world of making money. 

My other daughter babysat half the neighborhood in the summer, another worked in a t-shirt store and I had the the good luck to work at a camp in Maine as a tennis teacher. That was a blast.


So what about you? Did you have a summer job? Did your kids? Do you think it’s a good idea?

          Answer by VirusWatcher for
  • Wie entfernt man das Look2Me Virus aus Windows?

    • Das Virus manipuliert die Suchergebnisse im Browser, sowie die Browser-Startseite. Es wird Werbung in Webseiten eingeblendet: Coupons, Downloads, Pop-Ups etc.

    • Microsoft Security Essentials bzw. Windows Defender nennen das Virus so: AdWare.Win32.Look2Me

   
Schritt 1: ------- - Bevor man weiter macht: Öffne die **Systemsteuerung** und **deinstalliere dort alle verdächtigen Programme**, insbesondere, wenn sie in letzter Zeit installiert wurden (Du kannst sehen wann ein Programm installiert wurde). - Die unerwünschten Programme könnten heißen: "**LyricsSay**", "**Conduit**", "**1ClickDownload**", "**Superfish**", "**Yontoo**", "**FBPhotoZoom**", "Incredibar", "Rolimno", "Globososo","SpecialSavings", "AVG Toolbar","BrowseToSave", "BrowserDefender", "TidyNetwork", "WebCake" oder ähnliches. **Deinstalliere sie.** - Tipp: [Systemsteuerung bei Windows 8 öffnen](http://techfrage.de/question/9/windows-8-systemsteuerung-offnen-verschiedene-methoden/) - Falls nichts verdächtiges dabei ist, dann direkt weiter mit **Schritt 2**. ![](/upfiles/1381608713623206.png) Schritt 2: ------- Ich liste einige sehr gute Programme auf, mit denen du Toolbars, Trojaner und Spyware entfernen kannst. Installiere und führe **alle** vorgeschlagenen Programme nacheinander aus: - Benutze **[Malwarebytes Anti Malware](http://www.chip.de/downloads/Malwarebytes-Anti-Malware_27322637.html)** - Scanne dein System **vollständig** damit und entferne alles was gefunden wurde. ![Malwarebytes Screenshot](/upfiles/1381163364237435.png) - Installiere **[AdwCleaner](http://www.chip.de/downloads/AdwCleaner_58118522.html)**, das Programm ist ein guter Adware-Checker und Uninstaller. Bevor du AdwCleaner startest, **schließe** alle Browser und Programme. Klicke dann auf **"Suchen"**, so wird dein System durchsucht und anschließend bekommst du eine Liste mit gefundenen Programmen angezeigt. Danach klickst du auf den **"Löschen"** Button. Schließlich muss man das System neu starten. ![AdwCleaner Screenshot](/upfiles/1383569845431572.png) - **[Junkware Removal Tool](http://www.chip.de/downloads/Junkware-Removal-Tool_61676499.html)** ausführen. Das Programm kann schon mal bis zu 15 Minuten brauchen, bis es fertig ist. Also gedulden. ![Junkware Removal Tool Screenshot](/upfiles/13811712332829783.png) - Installiere **[Avast Browser Cleanup](http://www.chip.de/downloads/Avast-Browser-Cleanup_60753592.html)** - Starte das Programm. Wähle jeden Browser aus, den du bereinigen möchtest. Es werden automatisch Toolbars erkannt und gelöscht. ![Avast Browser Cleanup](/upfiles/13708981599679205.png) - Installiere den **[ESET Online Scanner ](http://.eset.com/special/eos/esetsmartinstaller_deu.exe)** und scanne dein System. Das kann durchaus paar Stunden dauern, aber es lohnt sich! ![ESET Online Scanner Screenshot](/upfiles/13812590817794075.png) Schritt 3: ---------- - Setze deine Browser zurück, damit auch wirklich keine Reste übrig bleiben. Achtung, dabei werden alle Browser-Einstellungen auf den ursprünglichen Zustand resettet und Lesezeichen gelöscht. Mache eine Sicherung (Backup) von deinen Lesezeichen, wenn du sie später brauchst. Sicherung machen für **[Internet Explorer](http://techfrage.de/question/3476/internet-explorer-lesezeichen-exportieren-oder-importieren/)**, **[Chrome](http://techfrage.de/question/3474/google-chrome-lesezeichen-exportieren-backup/)**, **[Firefox](http://techfrage.de/question/3472/firefox-lesezeichen-exportieren-backup/)** - Anleitung: **[Internet Explorer zurücksetzen](http://techfrage.de/question/3465/anleitung-internet-explorer-zurucksetzen/)** - Anleitung: **[Firefox zurücksetzen](http://techfrage.de/question/3209/firefox-zurucksetzen-und-alle-plugins-addons-und-toolbars-deinstallieren/)** - Anleitung: **[Google Chrome Browser zurücksetzen](http://techfrage.de/question/3470/anleitung-google-chrome-browser-zurucksetzen-reset/)** Optionaler Extra-Schritt, wenn nichts entfernt wurde: ---------------------------------- - Manchmal wurden die Werbe-Viren so programmiert, dass sie die eigene Deinstallation verhindern. Dann brauchen wir den **[Rkiller](http://www.bleepingcomputer.com/download/rkill/dl/10/)**. Dieses Tool stoppt alle bösartigen Dienste, danach können sie entfernt werden. - Also, falls das Schadprogramm bis jetzt nicht deinstalliert wurde, dann starte den **Rkiller** und führe die **Schritte 1 bis 3** erneut aus. Beachte dabei, dass vor dem Start von jedem Bereinigungsprogramm, der Rkiller nochmal gestartet werden sollte. - Lasse den Rkiller immer komplett durchlaufen bis die Meldung "**Rkill Finished**" erscheint. ![Rkill ist fertig](/upfiles/13837482908101791.png) Schritt 4: ----------- - Sollten Probleme auftreten, dann Poste [hier](http://techfrage.de/questions/ask/) eine neue Frage oder hinterlasse einen Kommentar Schritt 5: ------------ - Hinterlasse einen Google Plus, Facebook Like oder abonniere unseren **[Newsletter](http://eepurl.com/Gh2z9)** und erhalte regelmäßige Tipps und Tricks rund um Computer, Smartphones und Internet. Tipp: ------------ Wenn du das nächste Mal ein Programm installierst, achte darauf, dass es aus einer vertrauenswürdigen Quelle kommt. Außerdem sollte man während der Installation sehr vorsichtig sein, weil viele "kostenlose" Programme versuchen noch andere unerwünschte Tools zu installieren.
          The Big Cheat!   

Okay, I have a confession...this year instead of buying a ton of annuals, planting for days and watering for evermore all summer long I did the unthinkable...I bought a ton of artificial flowers and filled my baskets with them!

No more watering and fertilizing or planning what amounts for lunch for the deer and insects...I’m done. They win! I’ve had it. As soon as I get done writing this blog I’m off to plant my artificial pots for the summer.

I know some of you are now throwing rocks at the computer and yelling Duffy, you fraud! But I’m just too tired to keep up with this. I have a half-acre full of trees, roses, hydrangeas, tall grasses, ferns etc and that is all I can manage.


Next week I’ll take pictures and post them and you can vote if you believe they are real or not.

So my question to you is...have you ever faked it? Put in an
artificial plant? Bought a pie or cake and passed it off as your own?



Hugs, Duffy

          Office Clerk (Little Current) - Cambrian College - Little Current, ON   
Assist customers with résumé and cover letter preparation and provide technological support to customers using computers, photocopier, and fax machine.... $19.69 an hour
From Cambrian College - Tue, 27 Jun 2017 21:49:17 GMT - View all Little Current, ON jobs
          Aereo May Be Going Away, But You Can Still Get Something Aereo-Like At Home   
While we join the hordes of cord-cutters around the country who are still reeling from the death notice nailed to the door of Aereo by the Supreme Court this morning, we would be remiss if we didn’t remind you can still receive and record over-the-air broadcast feeds on your computers and TVs in ways that SCOTUS hasn’t gutted like a …
           Web-based museum trails on PDAs for university-level design students: design and evaluation    
Reynolds, R and Walker, Kevin and Speight, C , Centre for Excellence in Teaching and Learning through Design (CETLD), Victoria and Albert Museum , London Knowledge Lab (2010) Web-based museum trails on PDAs for university-level design students: design and evaluation. Computers & Education, 55 (3). pp. 994-1003. ISSN 03601315
          Samsung smartphones can now unlock a Windows 10 PC   
Samsung’s latest update to Samsung Flow provides continuity between your Windows 10 computer and a Samsung device. You can even enable your hotspot from the PC so as to stay connected when there’s no Wi-Fi network available. The best thing about Apple …
          How to Unlock Windows 10 PC Using Samsung Smartphones   
Samsung has come up with a perfect solution you can unlock Windows computers using Samsung smartphone. If your Samsung phone is running Android Marshmallow, you can unlock Windows 10 computers using Samsung smartphone. Samsung Flow was introduced a couple …
          Petya ransomware epidemic spreads, old NSA Windows exploit may be key   
The New York Times said cybersecurity experts at Symantec indicated the attack is hitting Windows computers through an NSA-developed … The tech below the surface Edge-to-edge displays on cell phones are becoming a thing now, with handsets like the …
          Use The Force Luke   

You know the scene in Star Wars: Episode 4 when Luke Skywalker is flying in the trench to destroy the Death Star and he hears the voice of Obi Wan telling him to turn off his tracking computer and just take the shot using his instincts? I kind of feel like Luke right now.

I love measuring devices. Occupational hazzard I guess. Layout and Marking tools are probably my favorite things to browse through in any store or catalog. Even my 6 year old Nephew this last christmas, when given $1 to buy something for his Uncle at the dollar store and free choice of what to pick out, got me a protractor. One of the last posts in my workbench progress was about how I spent several hours marking out all the legs and making sure I got all the joints pointed in the right direction because if I screw it up I have to wait quite a while for pieces that size to dry out enough to work with.

So now, I get to the stretchers and I start to hear that voice i my head… “Use the Force!”. At this point in my woodworking education I have started to read enough stuff and realize that I need to hide my rulers from myself and mark things off from the project. When trying to figure out how to make the tenons on the stretchers I realized I need to wait until I make the mortises so I can transfer the marks and they will match. This goes counter to everything I do for a living where, as long as each part is made correctly according to my drawings, the parts go together. This is kind of a mental shift for me.

As I pick through my layout tools I hear that voice again… “Put down your ruler”. I am also trying to teach myself to cut dovetails and I am doing ok I guess. When I started I made sure to lay everything out nice and perfect as well as I could. I still transferred the pins onto the tails like you should but everything looked too perfect. I figured if I was going to do all that I may as well use a router. So I put away my sliding bevel and just did the layout by hand and while my joints don’t fit any better I think they look better because they have a slight inconsistency that looks handmade. Once I get them to fit tight (without splitting the wood) they will look great.

I am also planning some cabinets someday and I have read enough to know that I need to mark my drawers from the frames so I shouldnt go and build all my drawers in advance. Some projects I read it seems like people have no idea what size anything is. They just use story sticks and dividers for proportions and everything looks beautiful and fits perfectly even though not a single ruler was harmed during the making of their project.

So we’ll see. My workbench project is on hold while I close and move into my new home and then move all my tools into my new space and get everything setup enough to work. But when I do get started again I think I will learn to use the force.

:)


          Mein Tagebuch und der Datenschutz - Reloaded aus 2015   
In den 90ern des vergangenen Jahrhunderts war ich Ewigkeiten circa vierzehn Jahre alt. 
Wie nahezu alle meinen pubertierenden Geschlechtsgenossinnen, schrieb ich passioniert Tagebuch. 



Bewegendes im DIN-A6 Format. Oft mit verwackelten Fotos aus der letzten 36er Filmrolle und den Duckface-Selfies der ersten Stunde illustriert. Das wahre #nofilter und #picoftheday.

Auch Gedichte über die Liebe oder den Geschmack von Wolken finden sich darin. Liedtexte über Freundschaft, Atomkraft und den Weltfrieden, wie beispielsweise mein Song "Kein Geld für Öl" mit drei Akkorden zur Gitarre aus dem April 1993. Ich vermute, dass ich mich eigentlich gegen "Krieg für Öl" aussprechen wollte, aber "Geld für Öl" hatte ich damals auch nicht, daher zählt das als Protest.


Tiefsinnige Miss-Germany-Wahl-Weisheiten wie 
"Live your dreams. Face your fears"  
zierten als Grafittientwurf in Ballonschrift meine Seiten. Ein Konflikt, geschrieben mit meinem königsblauen Lamyfüller und ultrahipper, smaragdgrüner Tinte. Mein Büchlein war, wie meine Bettwäsche auch, mit einem schwarz-weiß Foto eines amerikanischen Teenagerpärchens in Levi's Jeans auf der Route66 bedruckt und beinhaltet folgenden Meilenstein aus dem Oktober 1994:
"Liebes Tagebuch
,
 * 19.10.1995 -
† 08.12.1995.
Es ist Schluß. Es hat genau 1 Monat und 19 Tage gehalten.
Chris und ich haben uns auseinandergelebt.
Polka ist gestern gestorben.*
Morgen schreiben wir Mathe.
Deine Nina."

*Polka war mein einäugiges Meerschweinchen. Das sollte ich für Polkafans sicherheitshalber erwähnt haben.

Logischerweise übermalte ich Chris' Gesicht auf dem vier Wochen zuvor eingeklebten Foto sofort mit schwarzem Edding und hörte tagelang "Where did you sleep last Night" von NirvanaKurt Cobain verstand mich. Ich vertraute dem Tagebuch an, dass ich beabsichtige nach Seattle zu pilgern um suizidäre Gedanken mit Kurts Grabstein auszutauschen. Meine Tochter sollte in seinem Andenken eines Tages auf den Namen "Frances Bean" hören. Meine beste Freundin präferierte zu dieser Zeit den Namen "Anna-Bêlle Juliètte Christin" für ihre Erstgeborene.


Warum zum Teufel erzähle ich Euch, was in meinem Tagebuch steht?
Weil es privat ist. 

Es scheint so, dass das Label "Privat" aber heute hinten ansteht. Hinter Terror. Hinter Gesundheit. Hinter Wirtschaft. Deswegen kann ja gleich jeder wissen was drin steht. Oder nicht

Das Tagebuch hatte 1995 eine vorinstallierte Schließanlage. 
Sie bestand aus einem winzigen, herzförmigen Vorhängeschloss aus Blech und einem dazugehörigen, mikroskopisch kleinen Schlüsselchen. Beides bewahrte ich an sehr geheimen Orten, getrennt voneinander auf. Meine Teenagererlebnisse erforderten selbstverständlich maximale Einbruchsicherheit. Ein unumstößlicher Grundsatz. Niemanden ging es etwas an, was mein Herz bewegte. Alle meine Freundinnen wären solidarisch mit Pechfackeln losgezogen, um meine Privatheit zu rächen, hätte jemand dreist meine Firewall aus Blech mit einem Zahnstocher, oder so, umgangen und einfach mal still mitgelesen.

Welche Naivität und trügerische Sicherheit trage ich 20 Jahre später zur Schau, gemeinsam mit nahezu allen Ex-Tagebuchschreiberinnen in diesem Land, wenn wir uns heute tatsächlich einbilden, dass wir "nichts zu verbergen haben."  

Als Vierzehnjährige, mit unseren Blechschlüsseln, hatten wir ein deutlich gesünderes Verhältnis zu unseren "Geheimnissen", als wir es heute haben. 


Hurra, Hurra, der Landesverrat ist wieder da


Die reale Bedrohung wegen "Landesverrats" der Journalisten von Netzpolitik.org ist ein guter Aufhänger, um zu umreißen, was die deutschen Behörden auf dem Gebiet der Überwachung so treiben dürfen und was mit unseren Daten geschieht.
(Nachtrag 2017: Der Bundestrojaner der auf unsere WhatsApp Daten zugreifen kann ebenfalls)

Landesverrat in den Zeitungen im In- und Ausland.

Die Journalisten von netzpolitik.org hatten unlängst Papiere veröffentlicht, denen zu entnehmen war, dass der deutsche Verfassungsschutz eine interne Abteilung geschaffen hat, die das Internet überwachen und Internetinhalte massenhaft erfassen und auswerten soll. 
Wer hat mit wem Kontakt. 
Wer surft auf welcher Website. Eine kostspielige Angelegenheit. Die Geheimhaltungsstufe entsprach der geringsten Klassifizierung und hat durch die Veröffentlichung der Journalisten genau den Wirbel verursacht, den Sachen wie diese in einer gesunden Demokratie auch verursachen sollten.

Verdächtige dürfen durchsucht werden. Zu Hause und im Internet.
Wer ist denn "Verdächtig"? Wer entscheidet das? Wir selbst? Oder jemand anderes, der uns für verdächtig hält? Jemand der Anzeige gegen uns erstattet? Oder fallen wir auf, weil jemand anderes was unrechtes tat und wir vielleicht mit drin hängen?

Schon der Verdacht einer Straftat hat durchaus Konsequenzen. Die Behörden beginnen zu ermitteln. "Verdächtiger" klingt so gemein. So schuldig. Aber schuldig ist man gerade (noch) nicht. 
Mein Sohn hat mich heute morgen verdächtigt, heimlich mit seinem Kleinkind-Fahrrad mit Stützrädern zum Bäcker gefahren zu sein. Wer mich kennt, weiß, dass dieser Verdacht nicht der Stützräder wegen absurd ist, sondern weil ich generell niemals Fahrradfahren würde. Nirgendwohin. 
Ein Ermittler aber kennt mich nicht, der müsste das nachforschen. Und beginnt zu wühlen. 

Darf man mich immer überwachen oder abhören?
Nein.
Nur bestimmte Straftaten oder der Verdacht, sie begangen zu haben, erlauben es den Behörden, die Verdächtigen zu durchsuchen, abzuhören und zu überwachen um den Verdacht zu bestätigen.
Diese möglichen Straftaten sind in § 100a der Strafprozessordnung  (StPO) aufgelistet und beeindruckend umfangreich. "Landesverrat" ist eine von ihnen. Sie reicht über Mord und Brandstiftung, Steuerhinterziehung und Mitgliedschaft in einer Bande, die Straftaten plant, bis hin zu Verstößen gegen das Betäubungsmittelgesetz, wenn man also verdächtig ist, Drogen zu verkaufen. Die große "Terrorgefahr" ist also in der Liste enthalten. Aber auch, wenn man verdächtig ist ein paar Einkünfte nicht ordentlich zu versteuern. 

Was darf der Ermittler dann tun?

Früher, zu Zeiten der Freundschaftsbücher, der Liebesbriefe und der Zettelchen, die durch's Klassenzimmer flogen, war die sogenannte "Hausdurchsuchung" nach § 102 bis § 110 StPO das Mittel der Wahl und ist nach wie vor ein dickes Ding. Ein Richter muss das -auch noch heute noch- erlauben. Das ist der "Richtervorbehalt".  Meist ist das eine viel zu leichte Hürde für die Behörden, finden Anwälte. Strafverteidiger wissen, dass der Richter einfach den ausformulierten Antrag der Staatsanwaltschaft unterschreibt. Die Zeit, umfangreich zu prüfen ob man zu Recht so massiv im Auge der Staatsanwaltschaft landete, hat er nicht. Wohnungen sind grundrechtlich geschützt, sie sind sehr privat. Briefe ebenfalls. Würde ich morgen ins Koma fallen, dürfte mein Mann nicht mal legal meine Post öffnen, er würde das Briefgeheimis verletzen. Für die Vorratsdatenspeicherung wird noch gestritten, ob ein solcher Richervorbehalt sein muss. Das ist irgendwie schräg. Der Bundestrojaner steht unter einem solchen Vorbehalt und dieser ist, da sind sich einige Juristen einig, eher Deko als Bürgerschutz.


Wir sind heute digital. Das ist ein Problem. Für uns.

Echte Papierbriefe verschicken wir heute nur noch beruflich. Fotos sind sämtlich digital auf dem Handy oder in der "Cloud". Rechnungen kommen per Email. Briefe an die Lieben ersetzen wir heute durch WhatsApp oder SMS mit Herzchen und lachenden Kackhaufen-Emojis an deren Handynummer. Der Dia-Abend vom Urlaub liegt heute als .jpg Datei hochgeladen beim Rossmann-Online-Fotoportal, geshared auf Flickr und die Tagebücher sind die Facebook-Timeline. Ganze Wohnungen mit Unterlagen befinden sich quasi digital im Internet.

Die Rückschlüsse, die sich aus diesen Aufzeichnungen unseres Alltags ziehen lassen, sind dagegen nicht weniger persönlich geworden, nur weil wir jetzt tippen statt Füllfedern schwingen. Im Gegenteil.


Hausdurchsuchung vs. digitales Mitlesen

Was wir bei der Nutzung des Internets und beispielsweise über WhatsApp in seinen vielfältigen Formen über uns preisgeben, ist viel mehr, als jede Hausdurchsuchung jemals über uns zu Tage fördern würde. Wir googlen heute alles kurz und klein. Früher dachten wir nur drüber nach oder schlugen mal im Lexikon nach. 
Wenn wir befürchteten, uns bei einem One-Night-Stand einen Tripper eingefangen zu haben, wusste dies einst nur unser Hausarzt und die Sprechstundenhilfe. 
Heute weiß es zuerst Google, dann der Arzt, dann die Sprechstundenhilfe und dank der zentralen, internetbasierten Speicherung unserer Gesundheitsdaten auch eine gewaltige Datenbank, verwaltet von...wem eigentlich? Wissen wir das alle? Und wissen wir wer sie liest? Oder wer sie in 10 Jahren lesen darf, wenn die Versicherungsleistungen noch knapper werden?

Die Heimlichkeit ist das Problem. Und die Perspektive der Ermittelnden. Für uns.

Es macht einen Unterschied, WER unser Geschriebenes oder Getipptes  liest. WARUM er es liest und mit welchen Hintergedanken. Will er einen Verdacht ausräumen? Ihn bestätigen? Ist er nur neugierig oder ein Kontrollfreak? Die Staatsanwaltschaft soll auch Entlastendes ermitteln. Die Praxis sieht da, so sagen Strafverteidiger, ebenfalls durchaus anders aus.

Meine Eltern beispielsweise hätten mich ausweislich meiner Tagebucheinträge für eine suizidäre Anarcho-Schwangere mit fragwürdigen Prioritäten halten müssen, die zudem Gefahr läuft, eine Karriere als gitarrespielende Frontfrau in der linken Liegefahrradfahrer-Szene anzustreben. Vermutlich hätte sie das mit der Gitarre am meisten besorgt.

Warum sollte die Fremdwahrnehmung bei bei unseren SMS, unseren Emails und unseren Fotos anders sein als bei Tagebüchern und Briefen?

Die digitale Durchsuchung vollzieht sich nämlich vollkommen still, stumm und unbemerkt. Eine Hausdurchsuchung geht dagegen nicht 
unbemerkt am Verdächtigen vorbei. Die meisten von uns merken nämlich, wenn 3-4 Erwachsene sich durch die Schubladen im Wohnzimmer pflügen und Habseligkeiten in Umzugskartons aus der Tür tragen. 

Vielleicht erfährt es ein Verdächtiger sogar nie, wenn sein WhatsApp Account, sein Facebook und GMX-Account ausgelesen wurde und sich der Verdacht gegen ihn eben nicht erhärtete. Dann geht die Akte der Behörden einfach innerhalb der Verjährungsfrist wieder zu. Fehlalarm. Anklage wird nicht erhoben. 
Kein Brief wie dieser erreicht den zu Unrecht ausgeforschten: "Hallo Herr Schultze, wir dachten, ihre Skatrunde wäre eine Geldwäschebande. Wir haben uns geirrt. Wir hatten ihren Facebook Account gehackt und bei WhatsApp ein paar Wochen mitgelesen. Nette Freunde haben Sie. Die Blonde mit den Brüsten finden wir auch am BestenBis bald, ihr Landeskriminalamt"

Das passiert doch alles nicht! Doch. Das passiert. Jeder Strafverteidiger weiß das.

Wer sind diese Nerds und warum regen sie sich so auf ?

Viele Datenschützer (das sind die Leute die diesen ganzen IT-Kram verstanden haben, den wir permanent nutzen, aber nicht durchschauen) schreien deswegen seit Monaten und Jahren mit Schaum vor dem Mund herum, wenn es um das "Telekommunikationsgesetz" geht, um "Vorratsdatenspeicherung" und um "Bestandsdaten" oder den "Bundestrojaner".  

Und was machen wir Internetuser derweil? Wir sind gewohnt irritiert von den Computer-Nerds, wie damals schon, in der neunten Klasse. 

Wir sollten zuhören, denn es trifft unsere Generation ganz direkt mitten ins Herz unserer Freiheit. Verdammt nochmal.


Ihr gehört gar nicht auf eine Liste der Verdächtigen? 

Den 318-Seiten langen Datenschutzbericht (hier die Anlage in Kurzform) unserer Bundesdatenschutzbeauftragten Daniela Voßhoff für 2013 und 2014 habe ich mir mit blutunterlaufenen Augen im Urlaub durchgelesen. Seitdem ist mir ködderig. Ich will meinen Blechschlüssel zurück und fordere eine Brieftaube. * Nachtrag: Mittlerweile gibt es einen aktuellen. Er ist ebenso gruselig.

Die Datenschutzbeauftragte Voßhoff beanstandet darin zum Beispiel, dass gesetzliche Löschungsfristen bestimmter Daten über Deutschlands Bürger einfach nicht eingehalten werden. Ignoriert? Keine Lust? Keine Zeit? "Nach sieben Tagen/30 Tagen sind die Daten zu löschen" steht in vielen Gesetzen als Gegengewicht zur erlaubten Datensammelei der Behörden. Verhältnismäßigkeit nennt man das. Wenn aber der menschliche Arm des Gesetzes, der Sachbearbeiter, nicht auf "Erase" drückt, dann löscht sich da eben auch nichts. 

Der ehemalige Datenschutzbeauftragte Thilo Weichert sagte es ähnlich unabhängig und deutlich:
 "Unbestreitbar ist, dass die bestehenden rechtlichen Anforderungen in der Praxis oft nicht beachtet werden." 
Ein Gesetz, dass nicht beachtet wird, ist Schrott
Vollkommen nutzlos. 
Das gilt für uns Bürger und den Staat aber gleichermaßen.  Man gibt eben nur ungern wieder her, was man schonmal hat. Kennen wir alle.


Anti-Atomkraft ist extrem? So schnell wird man einer der Abhörbaren!
Frau Voßhoff berichtet in dem Papier von einem fidelen Haufen Anti-Atomkraftdemonstranten, deren Personalien irgendwie auf der Liste des Verfassungschutzes über "gewaltbereite Extremisten" gelandet waren. Das BfV begründete die Speicherung damit, dass "gegen Atomkraft demonstrieren" ein linksexremes Gewaltpotential habe. 
Fand Daniela Voßhoff nicht so gut und nannte das, zu Recht, einen "schweren Rechtsverstoß". Da gaben das Bundeskriminalamt und das BfV klein bei und räumten ein, dass sie diese unbescholtenen Menschen, die in ihrer Freizeit gegen Atomkraft umhermarschierten, nicht hätten speichern sollen. Diese Menschen hätten - wie oben erläutert- abgehört werden dürfen und ihre WhatsApp mitgelesen werden dürfen. 

So schnell geht das. 
#Hoppala. 

Manch' einer findet es nicht schlimm, auf einer Liste zu stehen, von der er gar nichts weiß

Was wir nicht wissen, macht uns nicht heiß?
Nun,  es gab mal eine Liste über Homosexuelle in Deutschland. Als sich die Stimmung in unserem Land recht plötzlich änderte, damals, als der schnauzbärtige Irre seine rechten Parolen durchgesetzt hatte, diente die einst "harmlose" Liste ein paar Jahre später dazu, diese Menschen unerbittlich zu verfolgen. Passte nicht mehr in die Gesinnung und schon hat eine Liste ungeahntes Zerstörungspotential für unser Leben, Glück und Freiheit.

So schnell geht das.
#Hoppala.
Quelle: Bild.de
Vielleicht darf man in 10 Jahren das Land nur noch verlassen oder wieder rein, wenn man nicht auf der "Hat-mit-Döner-herumgeworfen-Liste" steht? Meine Freundin Katrin hat mal alleine in der Fußgängerzone gegen durch Reifen springende Blauwale protestiert. Macht sie das zum militanten Tierschützer und steht sie auf einer gewaltbereiten Extremisten-Liste? Darf sie nächstes Jahr noch ausreisen, wenn jetzt die Fluggastdaten gespeichert werden? Vielleicht ist dieser Artikel schon unbequem und ich stehe auf der Blogs-die-wir-scheiße-finden-Liste? Ich weiß es schlicht nicht und etwas nicht zu wissen, macht unsicher. 


Der Staat möchte keine Systeme, die er nicht ständig mitlesen kann.WhatsApp wird verboten.

Der britische Premier David Cameron hat unlängst erwogen, Whats App, den iPhone "iMessanger" und auch Facetime zu verbieten. Deutschland stimmt ihm zu. Der Brite Cameron  begründete dies mit folgenden Worten, die Erstaunen hervorrufen: 
 „Müssen wir in unserem Land Kommunikationswege hinnehmen, die wir nicht mitlesen können? Nein, das müssen wir nicht.“
Puh, also ich wäre da jetzt zumindest mal zwiegespalten? 

Briefe sind auch ein Kommunikationsweg. 
Werden die auch schon durchleuchtet? 
Abgefangen und wieder verklebt? Hier wäre ein Aufschrei vorprogrammiert. Ist der Brief getippt statt geschrieben, nehmen wir das hin. 

Ich will nicht, dass "mein Land" meine Whats-App lesen kann, ohne dass ich es weiß. 
Ich weiß ja nicht mal wer genau "mein Land" ist. Mein Nachbar bei der Kripo?
Text Messages sind wie kleine Briefe. Wie ein Tagebuch. 

Helmut Schmidt sagte vor 40 Jahren anlässlich des RAF-Terrors:
"Wer den Rechtsstaat zuverlässig schützen will, der muss innerlich auch bereit sein, bis an die Grenzen dessen zu gehen, was im Rechtsstaat erlaubt ist“.  
Damals wurde vom Fräulein zum Diktat in Steno mitgeschrieben. Die Grenzen haben sich durch das Internet heute massiv verschoben. Vom Internet ahnte der Helmut damals noch nichts. Thomas de Maizière weiß heute aber auch noch nicht, was 2045 an der Tagesordung sein wird

Ja. Terror durch radikale Extremisten macht mir Angst.  

Den braunen Mob, der Flüchtlingslager anzündet und auf Twitter Stimmung macht, möchte ich verfolgt wissen. Natürlich möchte ich, dass niemand meine Kinder stiehlt oder Menschen hochbombt, die ich liebe. Ich möchte sie lebenslang wegsperren und sie sollen dem System nicht entwischen. Ich bin all den Beamten und Sicherheitsleuten dankbar, die sich damit täglich rumschlagen müssen.

Aber wenn der SPD-Politiker Reinhold Gall twittert: 
"Ich verzichte gerne auf #vermeintliche Freiheitsrechte, wenn wir damit einen Kinderschänder überführen", 
dann möchte ich trotzdem entschieden widersprechen. Meine ungestörte Kommunikation mit Anderen sind echte Freiheitsrechte. Ich möchte auch anzweifeln, dass sich die Beweislage in der Edathy-Affaire mit der Speicherung irgendwelcher Daten auf Vorrat verbessert hätte. 

Die Franzosen sammeln bereits massenhaft Telefondaten und haben Charlie-Hebdo leider nicht kommen sehen. 
Mein allgemeines Lebensrisiko kann ich nicht durch eine Überwachung meines Alltags ausschalten lassen, das verschiebt nur die Quelle des Risikos, nicht die Gefahr.

Es darf schon sehr viel ausgelesen und gespeichert werden, ohne dass ich "verdächtig" war.

Die neue Fluggastdatenspeicherung erlaubt nicht nur, dass meine Reiseroute und meine Kreditkartendaten gespeichert werden, sondern auch, wer auf dem Platz neben mir saß. Auch die Daten von Ingo, meinem Reisebüromenschen, werden gespeichert. Dazu noch was ich an Bord gegessen habe. Fünf Jahre langIch finde Menschen die Lactose-Gluten-Fructosefrei-Vegan im Flugzeug bestellen, zwar schräg, aber nicht verdächtig.

Nicht fliegen aber unbeobachtet mit dem Auto wegfahren können wir leider auch nicht, denn Bordcomputer in Autos übermitteln das. An wen, weiß keiner so genau, oder? Warum sind die Daten wichtig? Vielleicht wird die KFZ-Versicherung auch deutlich teurer, der Versicherer kann bald sehen, wieviel ich und wohin ich wirklich fahre

Das Fitnessarmband  mit dem "Mach' Sport, Du fauler Sack" Tracker ist vielleicht bald Voraussetzung, wenn man den extra günstigen Krankenkassentarif haben möchte. Wer es verweigert, zahlt mehr. Wer wenig Sport machte, egal aus welchem Grund, bekommt weniger Zuschuss zu einer späteren OP? 

Hier auf dieser Seite, beschreibt der ehemalige Bundesdatenschutzbeauftragte Peter Schaar, warum der eine bereits heute stundenlang in der Telefonhotline kleben bleibt und der andere sofort durchgestellt wird. Ich hänge da ewig fest, übrigens.

In 2014 wurde ausweislich der Statistik der deutschen Bundesnetzagentur alle 5 Sekunden bei ihr abgefragt, welcher Name zu welcher Telefonnummer gehört. 

Fast 7 Millionen mal. Soviele Mörder, Pädophile und Terroristen weilen hoffentlich nicht unter uns, sonst kauf ich mir morgen illegal 'ne Wumme und ziehe mit den Kindern auf einen Baum. 

Trotzdem werden Gesetze, wie das Telekommunikationsgesetz, fast ausschließlich mit unseren Ängsten vor diesen furchtbaren Leuten begründet. Die Masse der Anfragen zeigt, was passiert, wenn etwas erstmal erlaubt ist.

Diese Freimütigkeit der staatlichen Kontrolle macht mir Sorgen.

Sie unterliegt politischen Schwankungen und aufgeheizten Stimmungen und wird von normalen Menschen ausgeübt, die auch mal Fehler machen, schlampig arbeiten, überfordert und unterbezahlt sind, Eigeninteressen und die ganze Bandbreite an menschlichem Versagen in sich vereinen. Das ist normal. 


Sophie Scholl. Quelle: Bundesarchiv
1962 sang Elvis "We can't go on together with suspicious minds." Wie Recht er hat, auch wenn er nicht Vater Staat und Mutter Erde sondern Liebespaare meint.


Sophie Scholl spielte an einer Gefängnismauer auf der Flöte "Die Gedanken sind frei" von Hoffmann von Fallersleben für einen hitlerkritischen Verdächtigen. Ihren Vater. 

Hätte es damals Emails gegeben, wäre er als Verdächtiger staatsfeindlicher Gesinnung sicherlich digital ausgespäht und ebenso inhaftiert worden.

Wie sieht unsere Politik in 20 Jahren aus? 
Wer ist dann Feind des Staates, wer ist sein Freund?
Welche Nachteile können wir heute noch nicht absehen?

Also lest Eure Tagebücher, falls ihr mal was zum Lachen braucht und seid Euch bewusst, was um Euch, still und leise in Bits und Bytes, geschieht. Datenschutz ist wichtiger denn je. 

          Das neue BGH Urteil für Kinder und Computer: I LIKE!   

Meine Kinder sind vermutlich nicht von mir. Sie sind in Wahrheit Aliens. 
Sie gehen nach mir ins Bett, nachts gehen sie noch drei Mal auf's Klo und sind trotzdem vor mir wieder wach. Sie überleben also schlaflos und haben trotzdem gute Laune. Nach fünf Stunden Schulunterricht und einer Stunde Schwimmkurs, den ich konditionell keinesfalls überleben würde, entspannen sie sich mit einer weiteren halben Stunde Ultimate-Cagefight auf dem Gartentrampolin und ziehen alle Kraft dafür aus einer einzigen Nährstoffquelle: Nudeln mit Butter oder Ketchup. Außerdem sind sie seit ihrer Geburt mit der erstaunlichen Fähigkeit ausgestattet, jegliche Form von Elektrosmog zuverlässig aufzuspüren. Geräte, die bunte Bilder produzieren, erschnüffeln sie über unglaubliche Distanzen hinweg. Sobald ich heimlich ein Tablet oder den Fernseher oder den PC anschalte, stehen sie plötzlich neben mir und keiner hörte sie kommen. Ich glaube sie teleportieren sich da hin. Das ist am wahrscheinlichsten. Sie kommunizieren dann auch in einer fremdartigen Aliensprache, die ungefähr so klingt:

 

"MamaDüffnwirTomUndJerrykucknMamaDüffnwirdasPonyspielspielnMamaJaMamaNurganzkurzechtjetztMamaOhMannoWirhabengesternauchnixgeschautMamaOK?"

 

So auch gestern. Ich gab klein bei und unserem Sohn das Tablet, um mir selbst fünfzehn Minuten Ruhe zu verschaffen. Jesper Juul hält mich jetzt vermutlich für einen erzieherischen Komplettversager, aber das wäre eigentlich ja nichts Neues. 

 

Leider waren es nur sieben Minuten Ruhe, denn dann stand der Grundschüler wieder neben mir und wollte gerne mal eben meine Kreditkartendaten haben. Er wolle damit "Quallensaft" für 25 Euro kaufen, sagte er.

Nun gut. Ich habe meine Kreditkarte schon für weitaus absurdere Produkte mit hohen Beträgen belastet, aber da hatte ich immerhin schon ein eigenes Einkommen. Quallensaft, so erklärte er mir, bräuchte er dringend um schnell ein Krankenhaus bauen zu können. Humanitäre Hilfe kann man gar nicht früh genug unterstützen, aber hier hatte ich schon arge Zweifel, dass es sich um ein seriöses Entwicklungshilfeprojekt handelt. Ich lag richtig. Es ging um ein Krankenhaus ganz tief im Meer, es gehört Spongebob Schwammkopf und es steht in einem Onlinespiel. Virtueller Quallensaft für echtes Geld beschleunigt die Bauzeit des Gebäudes, erfahre ich von ihm und er bettelt um echtes Geld. Damit verdienen die Spieleerfinder Geld und strapazieren dafür die Geduld der Nutzer. Mein Sohn ist offenbar auch so ein "User" und ich löschte das Spiel unbarmherzig. Auch sein Taschengeld durfte er nicht für virtuelle Scheiße wie diese ausgeben. Seitdem hasst er mich und ich kann ihn verstehen. 

 

Ich selbst habe mein gesamtes Taschengeld vor 25 Jahren in Stoff-Sticker investiert, die ich in einem kitschigen Album sammelte und mit meiner ganzen Klasse tauschte. Ich war auf "Stoffherzen" spezialisiert, meine Freundin Sita auf "Stoff-Koalas" und unsere Eltern schüttelten täglich den Kopf, wie kleine Wackeldackel, ließen uns aber gewähren. Auch das BGB gab mir die Möglichkeit, ohne das vorherige Einverständnis meiner Eltern, ein rechtswirksames Geschäft abzuschließen. Das steht nämlich im BGB in seinem berühmten "Taschengeldparagraphen" in § 110. Kauft ein Kind etwas von seinem "eigenen" Geld, auch etwas Teures, so geht der Gesetzgeber davon aus, dass die Eltern mit dem Geschäft einverstanden sind und das Geschäft ist wirksam. Meine Eltern hätten damals aber auch handeln können wie ich mit den Quallen und mir den Kauf von so etwas von vorneherein verbieten können. Dann ist das Geschäft nicht wirksam, obwohl das Kind es aus eigenen Mitteln bestritten hat. Taschengeld hilft den Kindern also nicht gegen den Willen der Eltern, sondern soll nur Rechtsgeschäfte erleichtern, die von den Eltern durch Taschengeld-Zahlungen mutmaßlich abgesegnet sind.

 

Warum erzähle ich Euch das? Der BGH hat mal wieder gesprochen (Az III ZR 368/16) und es gefällt mir sehr gut, was er sagt. 

 

Ein dreizehnjähriger Junge hatte sich 2016 ein kostenloses Computerspiel heruntergeladen und im Verlauf den Spiels wurden ihm kostenpflichtige Zusatzoptionen angeboten, die er entweder mit Kreditkarte oder auch über das Telefon mit einer 0900er Nummer bezahlen konnte. In Ermangelung einer eigenen Kreditkarte griff der Teenager zum Telefon. Dreizehn Mal. Er brauchte er gar keine PINS oder TANS oder Bankdetails. Es reichte anzurufen und dann wurde das Geld einfach auf die Telefonrechnung gebucht. 1.250,00 Euro waren das. Die wollte die Mutter nicht bezahlen. Zu Recht sagte der BGH und zu Recht finde auch ich. Schon früher hatte sich der BGH mal zu diesen In-App-Käufen geäußert und eingeschränkt, wie die Anbieter dafür werben dürfen, damit nicht Kinder gezielt in diese Falle tappen. Direkte Formulierungen die zum Kauf aufrufen sind seitdem verboten.

 

Nun hat der BGH nochmal Tacheles geredet und spricht damit nicht nur Eltern an, sondern jeden, dessen Telefonanschluss für etwas benutzt wird, was er selbst nicht autorisiert hat. Nutzt also jemand ohne unsere Erlaubnis einen Dienst wie den beschriebenen, dann haftet nicht der Anschlussinhaber, sondern der Dienstleister, der dieses Geschäft abgewickelt hat, ohne Sicherheitsstufen einzubauen. So leicht will man es also den 0900er Nummern nicht machen. 

Ich begrüße das.

 

Wer dieses Ärger von vorneherein vermeiden will, redet mit den Kindern über den verantwortungsvollen Umgang mit Onlinespielen. Wer noch kleine Kinder hat, die trotzdem mal ein Tablet-Spiel spielen dürfen, der schaut sich das Spiel vorher ganz genau an. Sogenannte In-App-Käufe kann man oft extra mit einem Passwort schützen oder ein Limit setzen, bis zu welcher Höhe sie erlaubt sein sollen.

 

Hätte der Teenager übrigens das gemacht, was ich zunächst als teenagertypisch vermutet hatte, nämlich eine Sexhotline angerufen, dann wäre das Urteil anders ausgegangen. Hier wird schon während des Gesprächs eine Gegenleistung erbracht, die können Eltern dann nicht mehr widerrufen. 

 

Aber welcher Teenager macht das in den Zeiten des Internets noch. Hierzu findet ihr mehr in meinem Buch in dem Kapitel Internetpetition zur Abschaffung des Internets, inwelchem ich mich mit dem barrierefreien Zugang zu filmischen Meisterwerken wie Besen im Arsch 7 beschäftige und wie wenig ich das gut heiße. Im Klassenzimmer. Im Schulbus. Im Teenagerzimmer. 

 

So. Ich belaste nun meine Kreditkarte mit etwas Sinnvollem. Augencreme mit Meeresalgenextrakt zum Beispiel.


          Mein Tagebuch, Polka und der Landesverrat   

In den 90ern des vergangenen Jahrhunderts war ich Ewigkeiten circa vierzehn Jahre alt. 
Wie nahezu alle meinen pubertierenden Geschlechtsgenossinnen, schrieb ich passioniert Tagebuch.



Bewegendes im DIN-A6 Format. Oft mit verwackelten Fotos aus der letzten 36er Filmrolle und den Duckface-Selfies der ersten Stunde illustriert. Das wahre #nofilter und #picoftheday.

Auch Gedichte über die Liebe oder den Geschmack von Wolken finden sich darin. Liedtexte über Freundschaft, Atomkraft und den Weltfrieden, wie beispielsweise mein Song "Kein Geld für Öl" mit drei Akkorden zur Gitarre aus dem April 1993. Ich vermute, dass ich mich eigentlich gegen "Krieg für Öl" aussprechen wollte, aber "Geld für Öl" hatte ich damals auch nicht, daher zählt das als Protest.


Tiefsinnige Miss-Germany-Wahl-Weisheiten wie 
"Live your dreams. Face your fears"  
zierten als Grafittientwurf in Ballonschrift meine Seiten. Ein Konflikt, geschrieben mit meinem königsblauen Lamyfüller und ultrahipper, smaragdgrüner Tinte. Mein Büchlein war, wie meine Bettwäsche auch, mit einem schwarz-weiß Foto eines amerikanischen Teenagerpärchens in Levi's Jeans auf der Route66 bedruckt und beinhaltet folgenden Meilenstein aus dem Oktober 1994:
"Liebes Tagebuch,
 * 19.10.1995 -
† 08.12.1995.
Es ist Schluß. Es hat genau 1 Monat und 19 Tage gehalten.
Chris und ich haben uns auseinandergelebt.
Polka ist gestern gestorben.*
Morgen schreiben wir Mathe.
Deine Nina."

*Polka war mein einäugiges Meerschweinchen. Das sollte ich für Polkafans sicherheitshalber erwähnt haben.

Logischerweise übermalte ich Chris' Gesicht auf dem vier Wochen zuvor eingeklebten Foto sofort mit schwarzem Edding und hörte tagelang "Where did you sleep last Night" von Nirvana. Kurt Cobain verstand mich. Ich vertraute dem Tagebuch an, dass ich beabsichtige nach Seattle zu pilgern um suizidäre Gedanken mit Kurts Grabstein auszutauschen. Meine Tochter sollte in seinem Andenken eines Tages auf den Namen "Frances Bean" hören. Meine beste Freundin präferierte zu dieser Zeit den Namen "Anna-Bêlle Juliètte Christin" für ihre Erstgeborene.


Warum zum Teufel erzähle ich Euch, was in meinem Tagebuch steht?
Weil es privat ist.

Es scheint so, dass das Label "Privat" aber heute hinten ansteht. Hinter Terror. Hinter Gesundheit. Hinter Wirtschaft. Deswegen kann ja gleich jeder wissen was drin steht. Oder nicht?

Das Tagebuch hatte 1995 eine vorinstallierte Schließanlage. 
Sie bestand aus einem winzigen, herzförmigen Vorhängeschloss aus Blech und einem dazugehörigen, mikroskopisch kleinen Schlüsselchen. Beides bewahrte ich an sehr geheimen Orten, getrennt voneinander auf. Meine Teenagererlebnisse erforderten selbstverständlich maximale Einbruchsicherheit. Ein unumstößlicher Grundsatz. Niemanden ging es etwas an, was mein Herz bewegte. Alle meine Freundinnen wären solidarisch mit Pechfackeln losgezogen, um meine Privatheit zu rächen, hätte jemand dreist meine Firewall aus Blech mit einem Zahnstocher, oder so, umgangen und einfach mal still mitgelesen.

Welche Naivität und trügerische Sicherheit trage ich 20 Jahre später zur Schau, gemeinsam mit nahezu allen Ex-Tagebuchschreiberinnen in diesem Land, wenn wir uns heute tatsächlich einbilden, dass wir "nichts zu verbergen haben."  

Als Vierzehnjährige, mit unseren Blechschlüsseln, hatten wir ein deutlich gesünderes Verhältnis zu unseren "Geheimnissen", als wir es heute haben. 


Hurra, Hurra, der Landesverrat ist wieder da


Die reale Bedrohung wegen "Landesverrats" der Journalisten von Netzpolitik.org ist ein guter Aufhänger, um zu umreißen, was die deutschen Behörden auf dem Gebiet der Überwachung so treiben dürfen und was mit unseren Daten geschieht.
(Nachtrag 2017: Der Bundestrojaner der auf unsere WhatsApp Daten zugreifen kann ebenfalls)

Landesverrat in den Zeitungen im In- und Ausland.

Die Journalisten von netzpolitik.org hatten unlängst Papiere veröffentlicht, denen zu entnehmen war, dass der deutsche Verfassungsschutz eine interne Abteilung geschaffen hat, die das Internet überwachen und Internetinhalte massenhaft erfassen und auswerten soll. 
Wer hat mit wem Kontakt. 
Wer surft auf welcher Website. Eine kostspielige Angelegenheit. Die Geheimhaltungsstufe entsprach der geringsten Klassifizierung und hat durch die Veröffentlichung der Journalisten genau den Wirbel verursacht, den Sachen wie diese in einer gesunden Demokratie auch verursachen sollten.

Verdächtige dürfen durchsucht werden. Zu Hause und im Internet.
 
Wer ist denn "Verdächtig"? Wer entscheidet das? Wir selbst? Oder jemand anderes, der uns für verdächtig hält? Jemand der Anzeige gegen uns erstattet? Oder fallen wir auf, weil jemand anderes was unrechtes tat und wir vielleicht mit drin hängen?

Schon der Verdacht einer Straftat hat durchaus Konsequenzen. Die Behörden beginnen zu ermitteln. "Verdächtiger" klingt so gemein. So schuldig. Aber schuldig ist man gerade (noch) nicht. 
Mein Sohn hat mich heute morgen verdächtigt, heimlich mit seinem Kleinkind-Fahrrad mit Stützrädern zum Bäcker gefahren zu sein. Wer mich kennt, weiß, dass dieser Verdacht nicht der Stützräder wegen absurd ist, sondern weil ich generell niemals Fahrradfahren würde. Nirgendwohin. 
Ein Ermittler aber kennt mich nicht, der müsste das nachforschen. Und beginnt zu wühlen. 

Darf man mich immer überwachen oder abhören?
Nein.
Nur bestimmte Straftaten oder der Verdacht, sie begangen zu haben, erlauben es den Behörden, die Verdächtigen zu durchsuchen, abzuhören und zu überwachen um den Verdacht zu bestätigen.
Diese möglichen Straftaten sind in § 100a der Strafprozessordnung  (StPO) aufgelistet und beeindruckend umfangreich. "Landesverrat" ist eine von ihnen. Sie reicht über Mord und Brandstiftung, Steuerhinterziehung und Mitgliedschaft in einer Bande, die Straftaten plant, bis hin zu Verstößen gegen das Betäubungsmittelgesetz, wenn man also verdächtig ist, Drogen zu verkaufen. Die große "Terrorgefahr" ist also in der Liste enthalten. Aber auch, wenn man verdächtig ist ein paar Einkünfte nicht ordentlich zu versteuern. 

Was darf der Ermittler dann tun?

Früher, zu Zeiten der Freundschaftsbücher, der Liebesbriefe und der Zettelchen, die durch's Klassenzimmer flogen, war die sogenannte "Hausdurchsuchung" nach § 102 bis § 110 StPO das Mittel der Wahl und ist nach wie vor ein dickes Ding. Ein Richter muss das -auch noch heute noch- erlauben. Das ist der "Richtervorbehalt".  Meist ist das eine viel zu leichte Hürde für die Behörden, finden Anwälte. Strafverteidiger wissen, dass der Richter einfach den ausformulierten Antrag der Staatsanwaltschaft unterschreibt. Die Zeit, umfangreich zu prüfen ob man zu Recht so massiv im Auge der Staatsanwaltschaft landete, hat er nicht. Wohnungen sind grundrechtlich geschützt, sie sind sehr privat. Briefe ebenfalls. Würde ich morgen ins Koma fallen, dürfte mein Mann nicht mal legal meine Post öffnen, er würde das Briefgeheimis verletzen. Für die Vorratsdatenspeicherung wird noch gestritten, ob ein solcher Richervorbehalt sein muss. Das ist irgendwie schräg. Der Bundestrojaner steht unter einem solchen Vorbehalt und dieser ist, da sind sich einige Juristen einig, eher Deko als Bürgerschutz.


Wir sind heute digital. Das ist ein Problem. Für uns.

Echte Papierbriefe verschicken wir heute nur noch beruflich. Fotos sind sämtlich digital auf dem Handy oder in der "Cloud". Rechnungen kommen per Email. Briefe an die Lieben ersetzen wir heute durch WhatsApp oder SMS mit Herzchen und lachenden Kackhaufen-Emojis an deren Handynummer. Der Dia-Abend vom Urlaub liegt heute als .jpg Datei hochgeladen beim Rossmann-Online-Fotoportal, geshared auf Flickr und die Tagebücher sind die Facebook-Timeline. Ganze Wohnungen mit Unterlagen befinden sich quasi digital im Internet.

Die Rückschlüsse, die sich aus diesen Aufzeichnungen unseres Alltags ziehen lassen, sind dagegen nicht weniger persönlich geworden, nur weil wir jetzt tippen statt Füllfedern schwingen. Im Gegenteil.


Hausdurchsuchung vs. digitales Mitlesen

Was wir bei der Nutzung des Internets und beispielsweise über WhatsApp in seinen vielfältigen Formen über uns preisgeben, ist viel mehr, als jede Hausdurchsuchung jemals über uns zu Tage fördern würde. Wir googlen heute alles kurz und klein. Früher dachten wir nur drüber nach oder schlugen mal im Lexikon nach. 
Wenn wir befürchteten, uns bei einem One-Night-Stand einen Tripper eingefangen zu haben, wusste dies einst nur unser Hausarzt und die Sprechstundenhilfe. 
Heute weiß es zuerst Google, dann der Arzt, dann die Sprechstundenhilfe und dank der zentralen, internetbasierten Speicherung unserer Gesundheitsdaten auch eine gewaltige Datenbank, verwaltet von...wem eigentlich? Wissen wir das alle? Und wissen wir wer sie liest? Oder wer sie in 10 Jahren lesen darf, wenn die Versicherungsleistungen noch knapper werden?

Die Heimlichkeit ist das Problem. Und die Perspektive der Ermittelnden. Für uns.

Es macht einen Unterschied, WER unser Geschriebenes oder Getipptes  liest. WARUM er es liest und mit welchen Hintergedanken. Will er einen Verdacht ausräumen? Ihn bestätigen? Ist er nur neugierig oder ein Kontrollfreak? Die Staatsanwaltschaft soll auch Entlastendes ermitteln. Die Praxis sieht da, so sagen Strafverteidiger, ebenfalls durchaus anders aus.

Meine Eltern beispielsweise hätten mich ausweislich meiner Tagebucheinträge für eine suizidäre Anarcho-Schwangere mit fragwürdigen Prioritäten halten müssen, die zudem Gefahr läuft, eine Karriere als gitarrespielende Frontfrau in der linken Liegefahrradfahrer-Szene anzustreben. Vermutlich hätte sie das mit der Gitarre am meisten besorgt.

Warum sollte die Fremdwahrnehmung bei bei unseren SMS, unseren Emails und unseren Fotos anders sein als bei Tagebüchern und Briefen?

Die digitale Durchsuchung vollzieht sich nämlich vollkommen still, stumm und unbemerkt. Eine Hausdurchsuchung geht dagegen nicht unbemerkt am Verdächtigen vorbei. Die meisten von uns merken nämlich, wenn 3-4 Erwachsene sich durch die Schubladen im Wohnzimmer pflügen und Habseligkeiten in Umzugskartons aus der Tür tragen. 

Vielleicht erfährt es ein Verdächtiger sogar nie, wenn sein WhatsApp Account, sein Facebook und GMX-Account ausgelesen wurde und sich der Verdacht gegen ihn eben nicht erhärtete. Dann geht die Akte der Behörden einfach innerhalb der Verjährungsfrist wieder zu. Fehlalarm. Anklage wird nicht erhoben. 
Kein Brief wie dieser erreicht den zu Unrecht ausgeforschten: "Hallo Herr Schultze, wir dachten, ihre Skatrunde wäre eine Geldwäschebande. Wir haben uns geirrt. Wir hatten ihren Facebook Account gehackt und bei WhatsApp ein paar Wochen mitgelesen. Nette Freunde haben Sie. Die Blonde mit den Brüsten finden wir auch am Besten. Bis bald, ihr Landeskriminalamt"

Das passiert doch alles nicht! Doch. Das passiert. Jeder Strafverteidiger weiß das.

Wer sind diese Nerds und warum regen sie sich so auf ?

Viele Datenschützer (das sind die Leute die diesen ganzen IT-Kram verstanden haben, den wir permanent nutzen, aber nicht durchschauen) schreien deswegen seit Monaten und Jahren mit Schaum vor dem Mund herum, wenn es um das "Telekommunikationsgesetz" geht, um "Vorratsdatenspeicherung" und um "Bestandsdaten" oder den "Bundestrojaner".  

Und was machen wir Internetuser derweil? Wir sind gewohnt irritiert von den Computer-Nerds, wie damals schon, in der neunten Klasse. 

Wir sollten zuhören, denn es trifft unsere Generation ganz direkt mitten ins Herz unserer Freiheit. Verdammt nochmal.


Ihr gehört gar nicht auf eine Liste der Verdächtigen?

Den 318-Seiten langen Datenschutzbericht (hier die Anlage in Kurzform) unserer Bundesdatenschutzbeauftragten Daniela Voßhoff für 2013 und 2014 habe ich mir mit blutunterlaufenen Augen im Urlaub durchgelesen. Seitdem ist mir ködderig. Ich will meinen Blechschlüssel zurück und fordere eine Brieftaube. * Nachtrag: Mittlerweile gibt es einen aktuellen. Er ist ebenso gruselig.

Die Datenschutzbeauftragte Voßhoff beanstandet darin zum Beispiel, dass gesetzliche Löschungsfristen bestimmter Daten über Deutschlands Bürger einfach nicht eingehalten werden. Ignoriert? Keine Lust? Keine Zeit? "Nach sieben Tagen/30 Tagen sind die Daten zu löschen" steht in vielen Gesetzen als Gegengewicht zur erlaubten Datensammelei der Behörden. Verhältnismäßigkeit nennt man das. Wenn aber der menschliche Arm des Gesetzes, der Sachbearbeiter, nicht auf "Erase" drückt, dann löscht sich da eben auch nichts. 

Der ehemalige Datenschutzbeauftragte Thilo Weichert sagte es ähnlich unabhängig und deutlich:
 "Unbestreitbar ist, dass die bestehenden rechtlichen Anforderungen in der Praxis oft nicht beachtet werden." 
Ein Gesetz, dass nicht beachtet wird, ist Schrott
Vollkommen nutzlos. 
Das gilt für uns Bürger und den Staat aber gleichermaßen.  Man gibt eben nur ungern wieder her, was man schonmal hat. Kennen wir alle.


Anti-Atomkraft ist extrem? So schnell wird man einer der Abhörbaren!
Frau Voßhoff berichtet in dem Papier von einem fidelen Haufen Anti-Atomkraftdemonstranten, deren Personalien irgendwie auf der Liste des Verfassungschutzes über "gewaltbereite Extremisten" gelandet waren. Das BfV begründete die Speicherung damit, dass "gegen Atomkraft demonstrieren" ein linksexremes Gewaltpotential habe. 
Fand Daniela Voßhoff nicht so gut und nannte das, zu Recht, einen "schweren Rechtsverstoß". Da gaben das Bundeskriminalamt und das BfV klein bei und räumten ein, dass sie diese unbescholtenen Menschen, die in ihrer Freizeit gegen Atomkraft umhermarschierten, nicht hätten speichern sollen. Diese Menschen hätten - wie oben erläutert- abgehört werden dürfen und ihre WhatsApp mitgelesen werden dürfen. 

So schnell geht das. 
#Hoppala. 

Manch' einer findet es nicht schlimm, auf einer Liste zu stehen, von der er gar nichts weiß

Was wir nicht wissen, macht uns nicht heiß?
Nun,  es gab mal eine Liste über Homosexuelle in Deutschland. Als sich die Stimmung in unserem Land recht plötzlich änderte, damals, als der schnauzbärtige Irre seine rechten Parolen durchgesetzt hatte, diente die einst "harmlose" Liste ein paar Jahre später dazu, diese Menschen unerbittlich zu verfolgen. Passte nicht mehr in die Gesinnung und schon hat eine Liste ungeahntes Zerstörungspotential für unser Leben, Glück und Freiheit.

So schnell geht das.
#Hoppala.
Quelle: Bild.de
Vielleicht darf man in 10 Jahren das Land nur noch verlassen oder wieder rein, wenn man nicht auf der "Hat-mit-Döner-herumgeworfen-Liste" steht? Meine Freundin Katrin hat mal alleine in der Fußgängerzone gegen durch Reifen springende Blauwale protestiert. Macht sie das zum militanten Tierschützer und steht sie auf einer gewaltbereiten Extremisten-Liste? Darf sie nächstes Jahr noch ausreisen, wenn jetzt die Fluggastdaten gespeichert werden? Vielleicht ist dieser Artikel schon unbequem und ich stehe auf der Blogs-die-wir-scheiße-finden-Liste? Ich weiß es schlicht nicht und etwas nicht zu wissen, macht unsicher.


Der Staat möchte keine Systeme, die er nicht ständig mitlesen kann.WhatsApp wird verboten.

Der britische Premier David Cameron hat unlängst erwogen, Whats App, den iPhone "iMessanger" und auch Facetime zu verbieten. Deutschland stimmt ihm zu. Der Brite Cameron  begründete dies mit folgenden Worten, die Erstaunen hervorrufen: 
 „Müssen wir in unserem Land Kommunikationswege hinnehmen, die wir nicht mitlesen können? Nein, das müssen wir nicht.“
Puh, also ich wäre da jetzt zumindest mal zwiegespalten? 

Briefe sind auch ein Kommunikationsweg. 
Werden die auch schon durchleuchtet? 
Abgefangen und wieder verklebt? Hier wäre ein Aufschrei vorprogrammiert. Ist der Brief getippt statt geschrieben, nehmen wir das hin. 

Ich will nicht, dass "mein Land" meine Whats-App lesen kann, ohne dass ich es weiß. 
Ich weiß ja nicht mal wer genau "mein Land" ist. Mein Nachbar bei der Kripo?
Text Messages sind wie kleine Briefe. Wie ein Tagebuch. 

Helmut Schmidt sagte vor 40 Jahren anlässlich des RAF-Terrors:
"Wer den Rechtsstaat zuverlässig schützen will, der muss innerlich auch bereit sein, bis an die Grenzen dessen zu gehen, was im Rechtsstaat erlaubt ist“.  
Damals wurde vom Fräulein zum Diktat in Steno mitgeschrieben. Die Grenzen haben sich durch das Internet heute massiv verschoben. Vom Internet ahnte der Helmut damals noch nichts. Thomas de Maizière weiß heute aber auch noch nicht, was 2045 an der Tagesordung sein wird
 
Ja. Terror durch radikale Extremisten macht mir Angst.  

Den braunen Mob, der Flüchtlingslager anzündet und auf Twitter Stimmung macht, möchte ich verfolgt wissen. Natürlich möchte ich, dass niemand meine Kinder stiehlt oder Menschen hochbombt, die ich liebe. Ich möchte sie lebenslang wegsperren und sie sollen dem System nicht entwischen. Ich bin all den Beamten und Sicherheitsleuten dankbar, die sich damit täglich rumschlagen müssen.

Aber wenn der SPD-Politiker Reinhold Gall twittert: 
"Ich verzichte gerne auf #vermeintliche Freiheitsrechte, wenn wir damit einen Kinderschänder überführen", 
dann möchte ich trotzdem entschieden widersprechen. Meine ungestörte Kommunikation mit Anderen sind echte Freiheitsrechte. Ich möchte auch anzweifeln, dass sich die Beweislage in der Edathy-Affaire mit der Speicherung irgendwelcher Daten auf Vorrat verbessert hätte. 

Die Franzosen sammeln bereits massenhaft Telefondaten und haben Charlie-Hebdo leider nicht kommen sehen. 
Mein allgemeines Lebensrisiko kann ich nicht durch eine Überwachung meines Alltags ausschalten lassen, das verschiebt nur die Quelle des Risikos, nicht die Gefahr.

Es darf schon sehr viel ausgelesen und gespeichert werden, ohne dass ich "verdächtig" war.

Die neue Fluggastdatenspeicherung erlaubt nicht nur, dass meine Reiseroute und meine Kreditkartendaten gespeichert werden, sondern auch, wer auf dem Platz neben mir saß. Auch die Daten von Ingo, meinem Reisebüromenschen, werden gespeichert. Dazu noch was ich an Bord gegessen habe. Fünf Jahre lang. Ich finde Menschen die Lactose-Gluten-Fructosefrei-Vegan im Flugzeug bestellen, zwar schräg, aber nicht verdächtig.

Nicht fliegen aber unbeobachtet mit dem Auto wegfahren können wir leider auch nicht, denn Bordcomputer in Autos übermitteln das. An wen, weiß keiner so genau, oder? Warum sind die Daten wichtig? Vielleicht wird die KFZ-Versicherung auch deutlich teurer, der Versicherer kann bald sehen, wieviel ich und wohin ich wirklich fahre

Das Fitnessarmband  mit dem "Mach' Sport, Du fauler Sack" Tracker ist vielleicht bald Voraussetzung, wenn man den extra günstigen Krankenkassentarif haben möchte. Wer es verweigert, zahlt mehr. Wer wenig Sport machte, egal aus welchem Grund, bekommt weniger Zuschuss zu einer späteren OP? 

Hier auf dieser Seite, beschreibt der ehemalige Bundesdatenschutzbeauftragte Peter Schaar, warum der eine bereits heute stundenlang in der Telefonhotline kleben bleibt und der andere sofort durchgestellt wird. Ich hänge da ewig fest, übrigens.

In 2014 wurde ausweislich der Statistik der deutschen Bundesnetzagentur alle 5 Sekunden bei ihr abgefragt, welcher Name zu welcher Telefonnummer gehört. 

Fast 7 Millionen mal. Soviele Mörder, Pädophile und Terroristen weilen hoffentlich nicht unter uns, sonst kauf ich mir morgen illegal 'ne Wumme und ziehe mit den Kindern auf einen Baum. 

Trotzdem werden Gesetze, wie das Telekommunikationsgesetz, fast ausschließlich mit unseren Ängsten vor diesen furchtbaren Leuten begründet. Die Masse der Anfragen zeigt, was passiert, wenn etwas erstmal erlaubt ist.

Diese Freimütigkeit der staatlichen Kontrolle macht mir Sorgen.

Sie unterliegt politischen Schwankungen und aufgeheizten Stimmungen und wird von normalen Menschen ausgeübt, die auch mal Fehler machen, schlampig arbeiten, überfordert und unterbezahlt sind, Eigeninteressen und die ganze Bandbreite an menschlichem Versagen in sich vereinen. Das ist normal. 


Sophie Scholl. Quelle: Bundesarchiv
1962 sang Elvis "We can't go on together with suspicious minds." Wie Recht er hat, auch wenn er nicht Vater Staat und Mutter Erde sondern Liebespaare meint.


Sophie Scholl spielte an einer Gefängnismauer auf der Flöte "Die Gedanken sind frei" von Hoffmann von Fallersleben für einen hitlerkritischen Verdächtigen. Ihren Vater. 

Hätte es damals Emails gegeben, wäre er als Verdächtiger staatsfeindlicher Gesinnung sicherlich digital ausgespäht und ebenso inhaftiert worden.

Wie sieht unsere Politik in 20 Jahren aus? 
Wer ist dann Feind des Staates, wer ist sein Freund?
Welche Nachteile können wir heute noch nicht absehen?

Also lest Eure Tagebücher, falls ihr mal was zum Lachen braucht und seid Euch bewusst, was um Euch, still und leise in Bits und Bytes, geschieht. Datenschutz ist wichtiger denn je. 


Science, technology, engineering and math (STEM) education is getting a lot of attention from the White House and from private industry. As a non-parent, I really do have a stake STEM education. On the surface it seems like a good idea to invest $250 million dollars, since most of it is coming from Intel. Why should I care? The most basic reason? My own safety and survival.

I have seen the eradication of entry level employment. I look at industrial employment and it is a fraction of what it was 40 years ago. We can't run an economy on just service jobs or service entrepreneurs. Even contemporary vocational education is caught between providing a necessary skilled workforce and lack of resources to train those students interested in paraprofessional training.

There are increasing groups of young people who have never held a job or had access to employment. I also know that those same young people face increasing competition from middle age and older folks who have no choice but to continue working because there are no retirement funds available for their future.

I don’t want to do the doom and gloom scenario. We have had enough of that. But first, I need to tell you a memory.

Long Ago A Teacher Tried To Tell Me...

School did one of two things to me; either bored me or made me feel incompetent. On the first day of junior high I came prepared. I had comic books, magazines and a newspaper for backup. You see, after six years of public school education I was resigned in my 7th grade to the idea that school was a major waste of my time. I was better served by day dreaming and catching up on the essential information that 16 Magazine and Tiger Beat provided.

I visualized my strategy. I had competition for the back row so I had to bust a move to make sure I got my seat. The back row in a crowded class was the perfect place to study the graphic artistry of Jack Kirby’s Fantastic Four.

The one thing I did not count on was my science teacher, Mr. Halverson. For one thing, he wasn’t old or crusty. No matter. I wasn’t going to let youth and good looks get between me and Dr. Doom snatching Sue Storm. I was studying page 3 when I sensed something was wrong.

The room was too quiet. People were paying attention. The class clown was silent. The Princess, whose nails must be inspected every fifteen minutes, was looking like she might be interested in something other than herself. Even the tough guys were checking him out; their Jeff caps were actually above their eyes.

This was not normal. I came up for air long enough to hear Mr. Halverson talking about expectations. What he wanted from us. What he was prepared to do to show that science was more than just a bunch of facts. That man was giving the pitch any sales man would have been proud to deliver except that he was selling access to knowledge.

I looked around. There were 34 other students in the room. I was the last skeptic. I held out for another five minutes and somehow, he made me believe.

Mr. Halverson was a good as his word. There were no new science books so he photocopied our current science reading material. He didn’t use the old-timey 1950 science slide strips or movies. We generally started class with the daily science news and how we were involved or where this was going. A lot of what he provided came out of his paycheck or his imagination.

There were no prepackaged science lab kits or a list of experiments to perform. We made our science projects with whatever we had around the house. I am proud to say that a project of mine caught on fire. Or did it blow up? Anyway it was unintentional. He made me feel good about the importance of failure.

We learned many lessons but being prepared for what life brought you, even if unexpected, that was ultimately his biggest lesson.

Did we turn into perfect students? No. There was a constant effort made to get him off track just to hear him talk about the future. He was on to us fairly quick and suckered us back to the lesson of the day. We worked it out. I can’t remember anyone voluntarily cutting his class. And yes, he did have to kick us out at the end of the period.

The Big Pay Back

I needed to tell you this memory because what Mr. Halverson brought into the classroom, besides his enthusiasm and actual regard for his students, was that he paid for what little extra we had in class. Many teachers, past and present, make this kind of investment for their students. I know many teachers do this because they don’t want to hear the crap about not in the budget or it is not going to be appreciated.

I think that Mr. Halverson would want to remind his former students that he was serious about preparing for the future. He would tell the administrator that teachers shouldn’t have to subsidize classroom education (or parents either). I think he and I would be asking with a calculator in hand where exactly did all that money go and who is spending it?

Well, he knows I’d ask. Some things and people just don’t change.

I think he would want to know that the focus would be on the needs of the students first and everything else is structured in service of the student’s education. We never talked about that, but I don’t think he would object too much. It is what I observed from him and it worked so yeah, I’ll bring that forward on his behalf.

Moving Forward, Again.

Over the next year it will be important to keep an eye on the many STEM initiatives and funding. My skeptical side feels like there is a gold rush warming up. That is not necessarily a good or bad thing.

What is important is that education will change. It has to because an educated, inventive work force is one of the means any country stays competitive in a global market. Intel, Cisco Systems and other industry contributors know this and that is part of the reason they are forking up cash money and their talent to make this happen.

Ok, it is good for their future business too. Let me put it another way. Ask India and China if their investments in education are paying off. Where are your computer or credit card customer support calls going? When you buy apple juice is it made in Oregon, Brazil or China? Last week I discovered my apple juice came from China.

It isn’t like there isn’t a world of things to create, repair and restore. Besides movies and music what else can we bring to the world? It is not impossible but we do have to get started.

Different Voices About STEM

There are dozens of stakeholders who have or are making an investment in technology education.

The Project Tomorrow - Speak Up is one of those places where students, parents and teachers have really good ideas on what a contemporary school needs. You can view a video of high school students sharing what they feel would be helpful in a school situation. Stories From School has a great post on the reality of implementing a requirement that might increase the drop out rate. The Learning Out Loud blog does have a questions about the STEM focus.

The Public Broadcasting System is working to provide a variety of STEM projects. One of the ways they are involved is through the program SciGirls. The show is targeted to girls aged 11-14. There is also the STEM Resource Center for Teachers and, I would assume, home schooling parents to show how their current programming can be adapted for additional educational resources.

On the academic side, many institutions are presenting themselves as portals to STEM education. Mary Bart of Faculty Focus takes a look at African American, Native American and Hispanic colleges and universities to see how they are implementing STEM instruction as well as honoring their chartered educational missions. Teachers.TV and Classroom 2.0 look at the ways that collaborative learning among teachers and education professional can be supported and resources obtained both within and outside of the traditional structures.

The new tools and resources don’t always cost an arm and a leg. At eLearn Tools for STEM take a look at some of the resources that could be put into place such as equation writers, videos and screen recorders.

Cisco Systems is the main supporter of GetIdeas.org a conversation with educational leaders talking about leadership, mission and global education. GetSchooled is funded by Viacom and supported by a number of other corporations. The goal is to find ways to reduce the drop out rate.

I hope that I and my classmates have paid the investment forward or at least try too. It is never too late and around here all voices are welcomed.

Gena Haskett is a BlogHer CE. Blogs:Out On The Stoop and Create Video Notebook


          Should Mamas Let Their Babies Grow Up to Be Journalism Majors?   

According to a recent news report, Kevin Li is an accomplished high school student who thinks the leadership and management experience he got from editing his school paper is more important for his future career than the fact that he aced his AP biology exam. Despite that (or perhaps because of it), he says his parents might not pay for college if he majors in journalism

As a journalism professor and former science writer, I'd love 10 minutes with Kevin and his parents. If they're like the students and parents that my colleagues and I talk to regularly, I'm pretty sure I know their reasons for being skeptical about the value of a journalism degree. It's not exactly a secret that traditional journalism jobs are vanishing. Despite some recent softening of demand, however, enrollments in journalism programs have gone up - mystifying even industry leaders such as Court TV Founder Steve Brill. According to a report from the Asian American Journalists Association convention last August, Brill said the increase in J-school enrollments meant: "[P]eople are just behaving stupidly." 

Brill's problem is that he is thinking of journalism study as vocational training, but a journalism major is really an interdisciplinary liberal arts major that uses theory and practice to equip students with knowledge and skills applicable to a variety of careers. The curriculum guidelines for journalism and mass communications programs accredited by the Accrediting Council on Education in Journalism and Mass Communications draw upon political theory, ethics, history, rhetoric, literature, art and design, mathematics, English, sociology and -- increasingly -- computer science. 

Further, the guidelines require that two-thirds of an undergraduate journalism major's credits should come from outside of major. Just over half the credits must be in liberal arts subjects such as history, math, science or modern languages. That ratio is typical of a liberal arts major. Contrast that to the requirements of a pre-professional, such as accounting or nursing, for which it's not unusual for nearly half the student's credits to be within the major.

Because journalism is a liberal arts major, it shouldn't be surprising that many journalism majors never end up in a newsroom.  After all, not all English majors become teachers. Like other liberal arts majors, journalism graduates pursue a range of careers and programs in graduate study, such as law, education, business and public relations. Regardless of where they end up professionally, I agree with multimedia journalism professor Mindy McAdams that there are certain things that we should expect a modern journalism major to know: how to communicate clearly and effectively in word and image, how to check facts, how to dig through public records and how to conduct interviews.  

It's become common for journalism programs to require or encourage students to pursue at least a minor in another field or often a second major. International study is also encouraged. We've long recognized that while it's important to know how to tell a story, craft an argument, understand the fundamentals or press law, it's even better to practice authoritative journalism within a particular knowledge domain. That's why I would tell Mr. Li not to be so dismissive of that great AP bio score -- we desperately need good science writers. A July 2009 survey by the Pew Center for People and the Press found that scientists consistently fault the quality of science journalism. 

That said, there are a lot of things that good journalism programs can do to help students who do aspire to journalism careers. Many of our programs require that students do professional internships, which in turn require active involvement in campus news organizations. As Li pointed out in the Chillicotte Gazette article, his high school journalism experience taught him "how to be a good leader and manage people." 

We're constantly updating our own skills and talking about how to do our jobs better. (Poynter, JMC Educator, Nieman) And we are working hand-in-glove with industry professionals, including our former students, to produce the innovations that will ensure that the fundamental civic mission of the profession will be sustained, even as the methods of newsgathering and delivery change.

Different programs approach that challenge in different ways -- some are stressing entrepreneurship, others are launching hyperlocal and investigative reporting ventures with local news organizations and still others are collaborations with middle school and secondary educators to promote civic engagement and media literacy.

The bottom lime, I say to Kevin and his parents, is that a journalism major can be a path to many careers. For some, that that might path might lead to a traditional newsroom -- or the opportunity to invent what comes next.

Related:

 

Kim
BlogHer Contributing Editor|KimPearson.net|


          Computer Tips en Truuks, … voor iedereen …   
Leuke verzameling computer tips en truuks ~ Tweaking4All.nl – Computer Tips en Truuks, … voor iedereen ….

          De op één na beste computer-tip ooit   
De op één na beste computer-tip die ik ooit gekregen heb is de volgende:  Geef nooit je wachtwoord als respons op een e-mail die je ontvangt.  E-mails waar in gevraagd wordt je wachtwoord in te geven deugen namelijk niet.   Dus voortaan: Wachtwoorden geef je alleen in op een echte log-in pagina van een web-service waar je … Meer lezen over De op één na beste computer-tip ooit

          De allerbeste computer-tip ooit   
De beste computer-tip die ik ooit gekregen heb is de volgende: Als je op het web aan het browsen bent moet je iedere vorm van hulp die je online ongevraagd aangeboden wordt ALTIJD negeren/weigeren.    Het is immers niet uitgesloten dat daar verkeerde bedoelingen achter zitten (verspreiding van malware, adware, phishing, computer virus, etc.).   Dus voortaan: Ga … Meer lezen over De allerbeste computer-tip ooit

          Adware op je Mac   
Wat iedere Mac gebruiker op zijn computer moet installeren en regelmatig moet draaien.     ~ AdwareMedic Tagged: adware, onderhoud, osx, security, tip

          Corrugator Superintendent - Smurfit Kappa - Saskatchewan   
English, Spanish (of advantage). Experience in ISO and Lean Manufacturing processes (of advantage). Computer proficiency - Intermediate MS Office … Word, Excel,...
From Smurfit Kappa - Wed, 21 Jun 2017 08:08:04 GMT - View all Saskatchewan jobs
             
Any blogging software recommendations for those of moderate computer literacy?
          Quality Technician - Smurfit Kappa - Saskatchewan   
English, Spanish (of advantage). High School Diploma or equivalent, ISO knowledge of advantage. Computer proficiency - Advanced MS Office … Word, Excel (pivot...
From Smurfit Kappa - Mon, 12 Jun 2017 04:59:00 GMT - View all Saskatchewan jobs
          Question of the Day: Multilingual computer generated animation   
Is there a technology that allows animation studios to render multiple versions of the same work at the same time with different lip movements for different languages? Increasingly, animation is computer generated and consumed by a global audience. This seems a logical advantage of CGI, unless there is a purist sentiment that the animation for the original language should be preserved.
          Random Jake   
1. Copy these instructions and post them into a new entry.
2. Open up the music player on your computer (or turn on your MP3 player).
3. Set it to play your entire music collection.
4. Hit the shuffle command.
5. Tell us the title of the next ten songs that show up (with their musicians), no matter how embarrassing. That's right, no skipping that Carpenters tune that will totally destroy your hip credibility. It's time for total musical honesty.
6. If you get the same artist twice, you may skip the second (or third, or etc.) occurrences. You don't have to, but since randomness could mean you end up with a list of ten song with five artists, you
can if you'd like.

1. Guns N' Roses - Shotgun Blues
2. Saliva - Lackluster
3. Live - Everytime I See Your Face
4. The Offspring - Want You Bad
5. Bob Marley & The Wailers - Punky Regae Party
6. Firehouse - You're Too Bad
7. Me First And The Gimme Gimmes - Hello
8. Spring Heeled Jack - Where I Belong
9. Maroon 5 - She Will Be Loved
10. ZAO - The Rising End (The First Prophecy)
          Eco-Metrics: Part 2   
Continuing my previous post on monitoring your energy use or carbon footprint with iPhone and/or Android apps, here are a few more.

iPhone

Accufuel - Track your vehicle’s fuel efficiency.



Carticipate - A ride-share app that allows the user to find people in their area to carpool. Think social-carpooling.



Android

PedNav - Helps the user plan their activities efficiently. The app is location aware, so it has the capability of telling the user what is near and of the necessary transportation to get to the suggested destination.


http://www.routeme2.com/products/pednav/

Teradesk - Connects the user to their computers and/or mobile devices and allows them to store files in a digital "cloud" accessible from anywhere, eliminating personal paper trails.


http://www.teradesk.com/tera/index.html

And it's not just the software that is allowing people to be more "efficient." There have been developments in the hardware as well. Here are a couple examples.

Nokia's 3110 Evolve
- The covers are made from over 50% renewable material, has smaller packaging made of 60% recycled content, and the charger uses 94% less energy than the Energy Star requirements.



Motorola's Renew
-
Recently introduced, the “Renew,” is made using plastic from recycled water bottles and can be completely recycled.



Nokia's Eco Sensor - Equipped with a wearable sensor unit with wrist or neck strap made of solar power cells as its power source, it can analyze your health, environment, and local weather conditions simultaneously. It's still in the "concept" stage, so don't look for it anytime soon.


          Just plugging any Android or iOS device into your computer might be enough to give a hacker control of it   

It’s only considered good form to let someone recharge their low battery smartphone from a stray USB port if they come up to you with pleading eyes in some Starbucks, but you should […]

The post Just plugging any Android or iOS device into your computer might be enough to give a hacker control of it appeared first on Geek.com.


          Energizer USB battery charger comes with software that gives full backdoor access to your computer   

On the surface of things, the Energizer Duo USB battery charger is the most innocuous of gadgets. You simply plug it into your USB port, slap in some batteries, and voila! Your computer […]

The post Energizer USB battery charger comes with software that gives full backdoor access to your computer appeared first on Geek.com.


          US State Department doesn’t use Firefox because of “expense”   

In the minds of in-the-know web geeks, Internet Explorer has long had the reputation of a thoroughly aerated diaphragm as far as its capability for keeping your computers safe from viruses, hackers and […]

The post US State Department doesn’t use Firefox because of “expense” appeared first on Geek.com.


          For sale - Texas Instruments ti99/A4 The Attack Game Cartridge - $4   
Broken Arrow OK, United States
"The Attack" command module for the Texas Instruments T99/4A computer with manual. Guaranteed to work as this was a cartridge I used. Check back for more titles to be listed by 6-21-17. I have close to 18 titles to list!
ebay.com

          VPN service with reserved IP?   

Hi,

I'm looking for a VPN product that I haven't seen before: A VPN with a static IP address that is exclusively reserved for me (and the ability to configure reverse DNS for it). The idea is that I use the IPv4 address from the VPN provider to provide a computer in my home with a non-dialup IP address so it can be used for an email server.¹

Currently the easiest way to achieve this is to rent a cheap VPS and setup a VPN connection there manually.

But it could be even easier (and hopefully cheaper) if there were a product offering for a VPN that is already preconfigured this way.


¹ Dialup IPs are problematic for email because they are listed on RBLs.


          iFusion Smartstation - iPhone Handset and Speakerphone Dock   
iFusion Smartstation - iPhone Handset and Speakerphone Dock
This ingenious desktop communication center docks with your iPhone and allows you to make or receive calls from a gloriously retro ergonomic corded handset or go hands-free with its business class full duplex speakerphone, all while still having full use of apps, video calls and computer syncing capabilities.

Click Here For Complete Details

          Spring Farm Pop Online Hack Generator Tool   

About Spring Farm Pop Online Hack Generator Tool Our latest Spring Farm Pop Online Hack Generator Tool is what you need when you want to add some premium items to your account and you don’t want to download anything. Now is very easy to add Unlimited Coins directly from your favourite browser. There are some simple steps that you have to follow in order to play Spring Farm Pop more easier and with more fun. Firstly make sure you have the game installed and connect the device to your computer. The next steps are very easy to implement and you will fill your account with Coins in no time. Also the best thing about Spring Farm Pop Online Hack Generator Tool is free to use by anyone but please do not abuse the application as it may be patched by the game producers. Give it a try now and add as many premium items as you want for free!   Spring Farm Pop Online Hack Generator Tool Features –Unlimited Coins -Android/iOS Operating System Supported -Every Browser Supported -Windows Vista/7/8 Supported -Free to use for limited time -Free check for new updates -Tested every day for bugs and glitches   How to use Spring Farm Pop Online Hack Generator Tool 1. Open your game in your browser/device and let it run. Also connect usb cable to your device if you’re using mobile devices. 2. Select the system where you are using Spring Farm Pop Online Hack Generator Tool. 3. Click the connect button and wait for […]

The post Spring Farm Pop Online Hack Generator Tool appeared first on Free Hack Tools, Cheats and Online Generators.


          How Students Can Write Better Assignments   
I'm finishing up the semester, and am in the middle of grading about 20 write-ups that my students had to do for a case we covered in class.   The case involved a venture capitalist offering an entrepreneur funds for what the entrepreneur thought was far too large a stake in his firm.  The students had to write a consultant's report advising the entrepreneur what to do with the offer. 

Once again, my students demonstrated that many (not all, but many) really don't understand how to write well.  So, I thought I'd do a service for students out there who have to do written assignments  (and for the faculty who have to read them) and give a few guideline on how to write better.

  1. Know what the mission is before you start: Are you writing an advisory memo? Are you listing the issues involved in a valuation?  Are you giving a recommendation?   In other words, all good writing (just like a good presentation) has a goal in mind.   Don't start writing until you're sure what it is.
  2. Organize BEFORE you start writing:  Back in the dark ages before computers (and before the meteor hid that destroyed all in my village), changing your writing was extremely difficult once it was down on paper.  So, to avoid that, we had to get very organized before we wrote.   Dierdre McCloskey (who's done a lot of work on how to write more effectively in economics) said, "90% of empirical work is getting your data straight, and 90% of good writing is getting your thoughts straight".  So, your best friend is a VERY thorough outline.  Start with a simple "high level" outline and then flesh it out in increasingly finer points.  Then make it even more detailed.  This makes sure that your writing stays "on point".  If you have a detailed outline, the writing is easy - you're just executing the idea.   
  3. Don't use flowery language or big words trying to impress me: All through elementary and high school, teachers tell us that good writing means being more expressive and using more evocative words.   So, the message comes across that using bigger words means that your writing will be better received (you sound smarter, you're more impressive, women (or men) will fall at your feet and so on).  In general, this doesn't work with business writing.   Be simple, direct, and to the point.  Don't use a longer word where a shorter one will do.
  4. Eliminate unnecessary words and phrases: Phrases like "the fact that..." and "basically" are the written equivalent of saying "ummmmm."  They add nothing and disrupt the flow.  A former teacher of mine once suggested I write a first draft and then eliminate at least one word from every sentence.  So try to write using the minimum number of words that will do the job. 
  5. Edit, Edit, Edit: I've only met one person in all my years who could consistently write a first draft that was perfect.  Most people (and I include myself in this group) only get it about half-right the first time around.   For me, it usually takes about 4 rewrites before I'm even minimally satisfied with my writing.
  6. Give your work to your harshest critic: We all have a tendency to think that what we write is all good.  But the test of good writing is how OTHER people take it.  So, aim to have at least one person critique your work before taking it public.  And when you choose people to read it, choose the toughest (and pickiest) critics you can find.  The person who says "everything looks great" is not the critic you want - you want the pickiest, nastiest critic you can get.
  7. Give yourself Time: All the above steps take time.  So if you have an assignment due on Friday the 13th, you should aim to have a first draft done at least a day or two before.  Good writing takes time, and usually involves multiple revisions.   So start early and give yourself time for revisions.
Note: If you're new to Financial Rounds , welcome. I hope you look around a bit -- if you want to find out more about the blog, check out the Frequently Asked Questions (FAQ) page. And if your want to subscribe to our RSS feed, there are links on the sidebar.
Labels:




              But I'm Not Dead   
    It's been almost a year since I last posted.  And a lot has happened at Unknown University since then.   I'm waiting to hear from the University P&T Committee and the Provost on my tenure case (I've made it past all the other hurdles - department, college peers, college P&T committee, and dean).  So I've been keeping a low profile since then regarding the blogosphere and trying to get stuff done.

    Since the last post, the Unknown Baby Boy (a.k.a. KnuckleHead) has turned 4.  He is a lunatic, and a great deal of fun (despite the occasional head butt to the package).   The Unknown Daughter (a.k.a. Future Ruler of the Universe) is finishing up 6th grade.  She's planning on going to a 1-week computer camp to learn HTML this summer, so the blog might actually end up looking good.  On the down side, she just let slip that she's sweet on a young man, so it starts.  Looks like I'll have to buy a large knife to sharpen with e demented grin when he comes a-callin.
     
    Oh, and I had a minor heart attack just before Christmas - no damage to the heart muscle, and I've been back riding since about 2 weeks after.
     
    I'll resume regular posting once the tenure stuff is resolved.  Lots of stuff to catch up on. 

    I the meanwhile, here's something completely unrelated to academia (I just found it funny).  It's John Cleese's remarks at Graham Chapman's funeral.  Now THAT is a eulogy.

              Man Bites Dog and Couple "Forecloses" on Bank   
    Here's a classic role reversal story - a couple foreclosed on a bank! It started about five months ago when Bank of America attempted to foreclose on a Florida couple for non-payment of their mortgage.

    The problem was, they'd paid cash for the house. So they went to court, and eventually won (they showed that they'd never had a mortgage with BOA).

    The judge awarded them legal fees, but after five months, BOA somehow never got around to paying the judgement.

    So, the couple's attorney got the sheriff, seized their assets and padlocked the bank branch building. The attorney gave instructions to remove assets like computers, desks, copiers, and any cash in the tellers' drawers. After about an hour of being locked out of the bank, the bank manager handed the attorney a check for the legal fees.

    Talk about turnaround.

    Read the article here.

    update: It wasn't technically a "foreclosure" on the bank - it was actually a default judgment for unpaid legal fees and court costs. But close enough for the irony.

              How Much IS A College Degree Worth?   

    Here's an interesting chart from Lifehacker. It shows the median salaries (along with the 25th and 75th percentiles for various majors. It's taken from a report created by the Georgetown University Center on Education and the Workforce called "What’s it Worth? The Economic Value of College Majors"

    Here's an interesting part from the press release Georgetown put out:
    The top 10 majors with the highest median earnings are:
    Petroleum Engineer ($120,000); Pharmacy/pharmaceutical Sciences and Administration ($105,000); Mathematics and Computer Sciences ($98,000); Aerospace Engineering ($87,000); Chemical Engineering ($86,000); Electrical Engineering ($85,000); Naval Architecture and Marine Engineering ($82,000); Mechanical Engineering, Metallurgical Engineering and Mining and Mineral Engineering (each with median earnings of $80,000).

    The 10 majors with the lowest median earnings are:
    Counseling/Psychology ($29,000); Early Childhood Education ($36,000); Theology and Religious Vocations ($38,000); Human Services and Community Organizations ($38,000); Social Work ($39,000); Drama and Theater Arts, Studio Arts, Communication Disorders Sciences and Services, Visual and Performing Arts, and Health and Medical Preparatory Programs (each at $40,000).
    This isn;t surprising - with the exception of Pharmacy (which is also pretty rigorous and exacting), they're all fields that require a lot of math. To quote classic Barbie, "Math is Hard!". So there's a smaller supply of grads (and there's a pretty good demand for these grads, too).

              Why You Shouldn’t Pay the Petya Ransomware   
    If you were affected by the latest global cyber attack that locked businesses out of their computer
              Tom Igoe-Open Source Design: Camel or Unicorn?   

    Open source development has taken hold in software design, and is beginning to show up in electronics hardware design as well. Open source for design, however is behind. What incentives do designers need to work on open source projects?

    TOM IGOE-ITP

    Tom Igoe is an Associate Arts Professor at NYU's Interactive Telecommunications Program (ITP). Coming from a background in theatre lighting design, he teaches courses and workshops in physical computing and networking, exploring ways to allow digital technologies to sense and respond to a wider range of human physical expression. Current research focuses on ecologically sustainable practices in technology development and how open hardware development can contribute to that. Igoe has written two books on physical computing: Physical computing: Sensing and Controlling the Physical World with Computers, co-authored with Dan O'Sullivan, and Making Things Talk both have been adopted by digital art and design programs around the world. He is a regular contributor to MAKE magazine on the subject as well. He is also a member of the core development team of Arduino, an open source microcontroller environment built for non-technicians. He is currently realizing a lifelong dream to work with monkeys as well.

    Cast: Interaction Design Association


              Business / Systems Analyst - II 8130   
    NJ-Basking Ridge, Job Description: Acts as project manager/team leader in support of large, complex, and multi-functional computerized system(s); assists in preparation of the computer services budget; monitors assigned budget(s) for designated data processing/applications systems as assigned - Organize and lead small groups to resolve complex business problems - Work with business customers to understand requireme
              NYU Treasurer Addressed Honors Students   
    Stephanie Pianka ’87, treasurer and vice president of financial operations at New York University, addresses the Honors Convocation on April 17 as keynote speaker. Pianka, a computer science graduate from Oswego, oversees finance for the nation’s largest private research university. Sponsored by Vega, the SUNY Oswego student women’s honor society, the Honors Convocation recognized the
              Android Marshmallow update available for Samsung Galaxy S6   
    Finally, after months of waiting, Samsung has released the Android Marshmallow update onto their soon to be ex-flagship phone Galaxy S6 - four months after Android 6.0 was released on the Nexus series.

    The update, which is rolling out at snail's pace and on the whim of carriers who rather you buy a new phone than update your current phone, is currently available on only a handful of Galaxy S6 variants. Namely, it is only available for the G920F global variant running in certain regions.

    Fed up with waiting for Samsung to update my variant, I downloaded the bloatware-free French firmware (via XDA), and applied the update using Odin 3.10.7 for Windows. The process was simple enough, though it does expose a huge flaw with Android and Samsung's terrible update policy (like why do we need to wait months for firmware updates for certain variants to arrive or be forced to flash our firmware manually).

    Here's a very quick guide (insert disclaimer claiming no responsibilities for any screw ups that may or many not happen) on how to successfully flash your Samsung phone with the latest firmware without tripping Knox:
    • Turn off your device
    • Press and hold down the Volume Down and Home button, and then press the Power button until you see a disclaimer, then release all buttons
    • Press the Volume Up button to engage the 'Download mode'
    • Connect your device to your computer
    • Open Odin
    • On Odin, check AP, and select the .tar firmware file you've downloaded and extracted
    • Wait for Odin to verify
    • Then press Start
    • Go and make a pot of tea
    • Depending on how many apps you have installed, your phone would have booted into a fresh new firmware
    • Alternatively, do a factory wipe for a fresh install
    In any case, the update brought a fresh breath of new life to my Galaxy S6 (in a much positive way than the disastrous Lollipop update did to my old Nexus 5), and also updated my phone's security update to February (from October).

    It is still early days, but the phone just feel faster (probably placebo but a nice feeling regardless) despite not doing a factory wipe and the ability toggle app permissions is a huge welcome. But best of all is the support for manual control of the camera's shutter speed and RAW output. The S6's camera is pretty decent - perhaps one of the best on a smartphone - so the ability to gain more control over the control element is massive.
              "We Will Rock You" rocks Anthem of the Seas