Comment on Supreme Commander 2 Free Download by lordethe2cnd 16        
does this app add any viruses to your computer
          Part-Time Human Resources Development Instructor (Continuing Education)        
NC-Wilmington, Definition: Teach employability soft skills as they relate to current computer technology and trends vital to the existing job market. Provide classroom instruction to college students through lecture, demonstration, laboratory exercises, handouts, responding to questions and testing for employability purposes. DISTINGUISHING CHARACTERISTICS: Employees within this class are distinguished from the
          Watch and Download FOUR CHRISTMASES - Movie        


Download Movie Four Christmases

" stop Searching & Start Downloading Four Christmases Full Length Watch online or Download Four Christmases movie for free."

Hello, listen closely as I describe to you one of the best ways to download Four Christmases and dvd quality movies for free. It's actually very easy, with this highly rated software you will literally download Four Christmases to your desktop free. You can then take Four Christmases and write it on either a audio and dvd disc fast and easy.


Also if you download Four Christmases on a monthly basis then you are seriously getting ripped off. If you go out to the movie theaters and paying to watch full movies such as Four Christmases then you are spending money on what millions of people literally download and watch for free.


Now when choosing a movie downloading software, it is imperative that you choose the right movie software. With so many of viruses , spyware and adware infected movie sites on the internet today, who love nothing better then to steal surfers personal data . Why risk the chance downloading Four Christmases , or any other movie from one of these potentially computer harming sites. With your new software you can instantly download movies safe without malware and adware being downloaded to your desktop.

Download Four Christmases Complete Movie Free!!!


          Beaufort County computer recycle events set        
BEAUFORT, S.C (OS) — The next Beaufort County Public Works Department Solid Waste and Recycling Office free electronics recycling events for county residents will be held from 9 a.m. to 3 p.m. at the following locations on Dec. 5: Beaufort County Public Works, 9 Benton Field Road, Bluffton Beaufort County Public Works, 140 Shanklin Road, […]
          1994        

From: "scrittore della domenica" <scritdom72@unimi.it>
To: "lorenzo" <Lrnz73@unipi.it>
Date sent: Mon, 14 Feb 1994 12:09:05
Subject: Eccomi

Mannaggia a te! Che c'era di male nelle lettere cartacee? Signornò. "Dai, mandami un'e-mail! E' facile, divertente, vedrai!". - Intanto ho dovuto iscrivermi al laboratorio d'informatica di questa cavolo di università, dove bisogna fare domanda in carta bollata anche per un caffè al bar. Poi, io il computer manco lo so usare. A quest'ora dovrei essere in sala studio a preparare l'esame di diritto privato comparato (capirai); invece sto qua ad arrovellarmi con tastiera e mouse.

Va beh. Ti scrivo per questo: devi assolutamente registrarmi un po' di cassette di musica rock. Hai presente? Quella che tu hai sempre detto che io la snobbo. Specialmente, quanto più progressive anni '70 riesci a procurarmi. Non so, gli Yes, i Genesis, i King Crimson, quella roba là. E poi il grunge. Non i Nirvana, ché onestamente non li reggo: Smashing Pumpkins, Pearl Jam, Soundgarden. E magari della musica da discoteca, però di un certo livello. E ci sarebbe un pezzo di un gruppo inglese che mi ossessiona, si chiama... ce l'ho sulla punta della lingua. Basta, appena mi ricordo il titolo te lo dico.

No, non sono impazzito. E' che ho conosciuto una ragazza molto simpatica che ha questi gusti musicali. Anche molto bella, a dire la verità. Anzi, la sola cosa che le vorrei dire è proprio questa: che la trovo bellissima. Ma, tu mi conosci; non c'è verso; se provo ad affrontare l'argomento, ammutolisco senza rimedio. Così mi servono urgentemente altri argomenti di conversazione. Lei studia inglese, e fin qui posso arrangiarmi. L'ho anche accompagnata a lezione, ho studiato i suoi appunti. Sai? Sto diventando, credo, il massimo esperto di T. S. Eliot di tutto il basso Ionio reggino. Quest'estate, se non altro, potrò esibirmi nei locali sul lungomare recitando The Waste Land a memoria.

Ma tutto questo non basta. Prima o poi dovrò trovare il coraggio di invitarla a uscire una sera, che so, ad un concerto, o addirittura (non ridere) a ballare. Perché ho capito che alle matinée in Conservatorio lei non ci viene. Ebbene, è qui che subentri tu. Devi aiutarmi ad andare oltre Beethoven. Ripeto, procurami del rock, perché mi serve come il pane!

Attendo tue notizie, stammi bene.

P.S. Mi sono ricordato il titolo di quella canzone: Creep, dei Radiohead.


From: "scrittore della domenica" <scritdom72@unimi.it>
To: "lorenzo" <Lrnz73@unipi.it>
Date sent: Mon, 21 Mar 1994 15:31:22
Subject: Re: Re: Eccomi

Grandi novità! Abbiamo occupato. Ora la nostra casa dello studente è Pensionato Universitario Occupato Autogestito. L'abbiamo deciso venerdì sera, al termine di un'agitata assemblea sugli ultimi aumenti delle rette e della mensa. Io mi sono aggiudicato la gran parte dei turni di notte in portineria: sia per evitare i turni di pulizia, sia perché mi piace fare le ore piccole e perché durante l'occupazione c'è un bel clima. Si parla, si beve, si fuma tabacco e non solo: effettivamente, non sto studiando granché. Però mi diverto.

Ieri, per esempio, verso la mezzanotte la situazione comprendeva una bottiglia di mirto, uno stereo, sei-sette persone fra cui Alice (la ragazza di cui ti ho parlato nella mia ultima lettera) e me. Il guaio è che dopo un'oretta loro sono usciti, per andare credo in discoteca, mentre io dovevo rimanere per continuare il turno; ma mi hanno lasciato la bottiglia, d'altronde semivuota, e lo stereo. O forse due bottiglie e due sterei, a quel punto non capivo più bene. Sono riuscito, in qualche modo, a togliere la cassetta dei Rage Against The Machine e a mettere su il Lamento d'Arianna di Monteverdi, che in quel momento era anche più adatto.

A proposito: mi hai registrato le cassette che ti ho chiesto? Se scendi anche tu in Calabria per le elezioni, tra una settimana me le puoi dare. Ma l'hai visto quel pagliaccio miliardario? E pensa che magari qualcuno lo voterà anche. Viviamo in un paese meraviglioso.


From: "scrittore della domenica" <scritdom72@unimi.it>
To: "lorenzo" <Lrnz73@unipi.it>
Date sent: Fri, 15 Apr 1994, 16:05:30
Subject: buona notte al secchio

La sai una cosa? Tre anni fa, dopo il diploma, commisi un solo errore.

Allo sportello della stazione chiesi un biglietto per Milano. Sbagliai: avrei dovuto comprare un sola andata per Londra, o per Parigi, o per Berlino.

L'occupazione è finita. L'Ente per il Diritto allo Studio ha promesso che, col nuovo bilancio, ben il 3,75% delle risorse aggiuntive sarà stanziato per porre rimedio ai recenti rincari delle tariffe, compatibilmente con il principio del pareggio contabile.

Insomma: non abbiamo ottenuto un bel niente.

Ho saputo che Alice si è fidanzata. Con uno studente d'ingegneria, milanese da varie generazioni e di ottima famiglia, buon giocatore dilettante di basket. Ha una macchina svedese con doppia alimentazione, benzina verde e gas, perché bisogna proteggere l'ambiente. Un bravissimo ragazzo.

Tutto è perduto. Mentre questa ridicola nazione, consegnatasi ancora volontaria nelle mani di un tirannello squilibrato, si avvia verso il suo triste destino, io ti comunico la mia irrevocabile decisione.

Pongo rimedio al mio errore.

Espatrio.

E basta, con queste e-mail del piffero! Ti farò avere prossimamente il mio nuovo recapito estero.

La sai un'altra cosa? Siamese Dream degli Smashing Pumpkins è molto più noioso della più tediosa sinfonia di Bruckner.


From: "scrittore della domenica" <scritdom72@unimi.it>
To: "lorenzo" <Lrnz73@unipi.it>
Date sent: Tue, 26 Apr 1994 16:28:43
Subject: scherzavo

E niente: all'estero non sono andato.

Ti spiego cos'è successo.

Sai che mi è sempre piaciuto stare sveglio fino a tardi; ultimamente sto esagerando; mi succede spesso di fare l'alba. Da un po' non scendo neanche più in sala studio, per non rischiare d'incontrare Alice. La sera me ne sto tappato in camera, ascoltando Brahms.

Un mio consiglio per i giovani: se abitate in una casa dello studente, cercate di non innamorarvi mai di un'altra persona ospite del pensionato. Soprattutto se non corrisposti.

Bene: domenica notte, mentre studiavo, ho messo su il Tristano. Così, tanto per cambiare. Ma, poco dopo il preludio, ho dovuto spegnere.

Frisch weht der Wind
Der Heimat zu
Mein Irisch Kind,
Wo weilest du?


Mi si è annebbiata la vista, e ho scoperto che avevo finito i kleenex. Ho chiuso il libro. Mi sono alzato dalla sedia e sono andato a lavarmi il viso con l'acqua fredda. Poi sono tornato alla scrivania.

Ho acceso il quinto canale della radio (quello che trasmette solo classica). C'era un brano di avanguardia; una cosa che non conoscevo, una specie di collage sonoro sul tipo di Revolution 9 dei Beatles, hai presente? Folle in tumulto, suoni strani, rumori ambientali, nastri in loop, voci umane che declamano sillabe incomprensibili. Un delirio.

Roba forte! Ho attaccato lo spinotto delle cuffie alla radio e mi sono sparato il brano nelle orecchie, chiudendo gli occhi e reclinando indietro la testa. A un certo punto, dal tappeto sonoro ha cominciato a emergere una voce femminile, che sembrava pronunciare un testo coerente. Dapprima si sentiva sullo sfondo, e non si capiva bene cosa dicesse; qualcosa sul Vietnam. Man mano, la voce diventava sempre più forte, più netta, e veniva sempre più in primo piano. Alla fine, con una presenza sonora impressionante, la voce scandiva, anzi no scolpiva, queste parole: "Rimanete qui, e combattete per la vostra dignità di uomini".

"Avete ascoltato: Luigi Nono, Contrappunto dialettico alla mente", ha detto l'annunciatore.

Ho staccato lo spinotto, ho tolto le cuffie e ho spento la radio.

Ho riconsiderato la mia intenzione di espatriare. Ho pensato: ma non l'ho già fatto? Sono già emigrato. E prima di me mio padre, proprio negli anni in cui Nono componeva quel pezzo.

Quante volte ancora voglio fare le valigie?

Possibile che l'unica soluzione sia quella di scappare sempre più lontano?

L'indomani, 25 aprile, sono andato alla manifestazione. Il concentramento era alle due del pomeriggio; ma mi sono svegliato così tardi che non ho potuto neanche fare colazione. Ho preso un caffè al distributore automatico giù in atrio e sono uscito, in direzione porta Venezia.

Era previsto un corteo molto grande. E' stato immenso. Mai vista tanta gente tutta insieme! E che varietà, quanti colori, che musiche, che allegria! Quanta pioggia, anche: veniva giù a secchiate, per tutta la durata della manifestazione.



Io ero in fondo al corteo, e pensa che non sono neppure riuscito a entrare in piazza Duomo, tanto era gremita! Ho svoltato per piazza Fontana, poi per via Larga. Ho vagato per un pezzo; non so chi o cosa mi aspettassi di trovare, a parte qualcosa da mettere sotto i denti, dato che avevo una fame da lupo.

Mi sono ritrovato, non so come, in piazza Sant'Alessandro, vicino alla facoltà di lingue, che naturalmente era chiusa; c'era però un bar-tavola calda miracolosamente aperto; mi ci sono fiondato dentro.

Ero seduto sul mio sgabello, dando le spalle all'ingresso, e divoravo la mia pizzetta, ovviamente pessima come solo a Milano la sanno fare, quando mi è parso di vedere una sorta di variazione nella luce. Come se avesse improvvisamente smesso di piovere e fosse uscito un sole splendente.

Mi giro, e vedo Alice entrare nel locale e raggiungermi.

Era in tenuta da manifestazione: jeans sdruciti, camicia grunge, niente make-up (lei che di solito è così curata). I lunghi capelli biondi inumiditi dalla pioggia, che intanto continuava a scrosciare.

"Ciao", le dico. "Dov'è il tuo fidanzato?"

"Sciocco", mi ha risposto. "Oggi ci sono cose più importanti", ha detto. "C'è mezza casa dello studente qui fuori: abbiamo fatto uno striscione molto figo, lo andiamo ad attaccare al portone dell'I.S.U. Cosa fai qua, solo come un gufo? Vieni anche tu!"

Non me lo sono fatto dire due volte.

E dunque. Fra un mese ho l'esame di diritto sindacale. Materia interessante, sai? Credo che chiederò la tesi.

Per ora rimango qui.

(Racconto già pubblicato su Evulon. Ogni riferimento a fatti, persone, città, eventi, uomini politici, bar e pizzette della realtà è puramente casuale).
          Stella rossa sull'Europa        
"Buongiorno, Anne. Buon anno".
"Buongiorno, Valentin. Buon anno anche a te. Novità?"
"Sì. Un nuovo arrivo. Sabato notte. Hai il colloquio già fissato per le undici. Trovi tutti i dettagli in agenda".
Anne Dupont, psicologa del Centro di Prima Accoglienza di Calais, entrò nel suo ufficio, accese il terminale e consultò la sua agenda elettronica.

Lunedì 5 gennaio 2011, ore 11,00. Colloquio con Monsieur Philip Brasser. Cittadino britannico. Età 38. Celibe. Operazione di salvataggio in mare, Canale della Manica, acque internazionali, 3 gennaio u.s. Condizioni fisiche buone. Non parla francese. Attribuzione provvisoria: codice blu.

Bene, pensò Anne. Un rifugiato politico. Iniziare l'anno nuovo con un codice blu era di buon auspicio. Il colloquio era di lì a due ore. Non c'erano altri impegni per la giornata. Completò con calma alcuni referti clinici iniziati la settimana precedente, fece una partita a Tetris, chattò con alcuni amici in Internet. Quando fu il momento, si aggiustò il make-up e si recò in sala colloqui.

Era una stanza non troppo ampia, arredata come un normale studio specialistico ma con qualche accorgimento per mettere gli ospiti a proprio agio: colori pastello, luci soffuse, lettino basso, comoda poltrona. Su quest'ultima, di fronte alla scrivania della dottoressa, era già seduto il signor Brasser.

"Good morning, Mr. Brasser. Prima di tutto, come sta?"
La domanda non era solo formale. L'uomo appariva molto provato. I tanti capelli bianchi, la pelle del viso magro solcata da numerose rughe, le profonde occhiaie dietro le lenti spesse, lo facevano sembrare più vecchio di dieci anni rispetto alla sua età anagrafica. Al posto degli abiti che indossava al momento del suo salvataggio, fradici e inservibili, gli avevano fornito un nuovo completo, che era tuttavia di due numeri più largo e accentuava la gracilità del suo fisico. Gli tremavano le mani.
Quegli scafisti maledetti, pensò Anne.
"Adesso sto meglio, grazie. Certo, suppongo che la notte passata all'addiaccio su quel canotto non abbia migliorato granché la mia cera. Ma ho fatto una buona dormita, qui da voi, e la vostra cucina è ottima". La sua voce era ferma, con una sfumatura d'ironia. "Solamente, non sono riuscito a procurarmi neppure una sigaretta, dottoressa..."
"Dupont. Ma può chiamarmi Anne. Temo che non ne troverà neppure in futuro. Nell'Unione non se ne producono più. Fino a qualche tempo fa, le importavamo dal suo paese".
"Oh, già, ora ricordo. Le esportazioni cessarono sei anni fa. Troppo pochi fumatori, qui da voi. Non c'era abbastanza profitto. Lo so perché all'epoca lavoravo in un'agenzia di rating".
"Lei è analista finanziario?"
Il signor Brasser rise. "No. Laureato in agraria. Da Troody's ero operatore al call center. Ogni grande compagnia ha il suo. E' la mansione che ho sempre svolto, durante tutta la mia carriera. Ho lavorato per almeno trenta società diverse, ogni volta per non più di sei mesi. Si imparano tante cose, sa?"
"Non ho dubbi. Ma veniamo al punto. Lei ha chiesto lo status di rifugiato politico. Data la sua provenienza, certamente la sua richiesta sarà accettata. Lei diventerà fra breve, a tutti gli effetti, cittadino dell'Unione delle Repubbliche Socialiste d'Europa. Già adesso, comunque, lei è libero di circolare in tutto il territorio dell'Unione, ed eventualmente anche di tornare da dove è venuto..."
"No grazie! Non ci tengo affatto".
"Dicevo per dire. In genere, qui da noi i rifugiati si integrano abbastanza in fretta. Tuttavia, non si può escludere che, all'inizio, lei si trovi un po' spaesato. Il nostro sistema sociale è molto diverso da quello da cui lei proviene. A sua richiesta, lei può fruire di adeguata assistenza psicologica e culturale, per superare eventuali difficoltà di adattamento. In questa fase iniziale, se vuole, mi consideri pure come suo referente".
"Oh. E quanto dura questa... fase iniziale?"
"Può finire anche subito, se crede. L'unico suo obbligo, se intende rimanere nell'Unione, è di iscriversi nelle liste di collocamento e nelle graduatorie per gli alloggi. Non credo che le sarà difficile trovare un lavoro e una casa. Se lei non ha esigenze particolari, penso che troverà una sistemazione accettabile nel giro di un paio di settimane. Fino ad allora, comunque, può rimanere qui, o spostarsi in una delle altre strutture di prima accoglienza nel territorio dell'Unione".
"Sembra magnifico. Dov'è la fregatura?"
"Ecco. Era proprio ciò che intendevo. Non c'è nessuna fregatura, per quanto lei sia abituato a pensare che debba per forza esserci. Non pretendo che lei mi creda. Presto se ne accorgerà da sé".

Non c'erano straordinari da fare, quel giorno. Alle tredici, Anne spense il computer, salutò i colleghi che arrivavano per il turno pomeridiano e, senza passare dalla mensa, prese l'elio-tram che, serpeggiando silenziosamente lungo la costa, la portò a casa sua in dieci minuti. Era una magnifica giornata di sole. Il mare era inusualmente calmo, in quei giorni. Una fortuna, per Brasser. Aveva evitato il triste destino di tanti boat-people che partivano clandestinamente dalla riva inglese ma non riuscivano a raggiungere i nostri mezzi di soccorso nelle acque internazionali.

Anne abitava da sola. Si preparò un leggero pranzo macrobiotico, poi un caffé d'orzo. Accese la radio; la spense. Si guardò nello specchio del soggiorno. Sorrise. Tutto sommato, si piaceva. Si chiese come sarebbe stato il suo sembiante, alla sua età, se anziché in Europa continentale fosse vissuta in quell'inferno che doveva essere Londra. I profughi le avevano raccontato storie orribili. Inquinamento, degrado. Se andava bene, orari lavorativi di dieci o dodici ore. Altrimenti, la disoccupazione, l'emarginazione e la pazzia. Oppure, per una ristretta minoranza, la ricchezza e il potere, ma a costo di rinunciare a qualsiasi barlume d'umanità. Un'altra forma di follia, in fondo.

Mercoledì 7 gennaio, ore 10,00. Secondo colloquio con Monsieur Brasser.

Quella mattina l'aspetto di Mr. Brasser era molto migliorato. Anne glielo disse.
"Grazie, Dottoressa. Lei è gentile quanto bella".
Anne Dupont ignorò il complimento.
"Se ho chiesto un nuovo colloquio" continuò Brasser, "non è per ottenere assistenza psicologica".
"Davvero? E perché, allora?"
"Ho due domande da porle".
"Le risponderò, se posso. Ma prima, permetta che le faccia io una domanda. Cosa sa, lei, dell'Unione?"
"Poco, in realtà. So che dapprima ci fu la Rivoluzione d'Ottobre, in Russia, nel 1917. Poi, tra il '18 e il '20, il capitalismo fu abbattuto in Germania, in Ungheria e in Italia. In rapida successione, tutte le colonie europee in Asia e in Africa conquistarono l'indipendenza. L'India nel 1925, la Cina nel '27, e così via. Poco dopo fu la volta dell'Algeria e del Marocco, e a quel punto la rivoluzione scoppiò anche in Francia e in Spagna. Alla fine degli anni '30, tutta l'Europa continentale era socialista.
Frattanto, il crollo di Wall Street nel 1929 aveva gettato l'America nella crisi più nera. Le elezioni presidenziali del 1940 furono vinte da Charles Lindbergh, un fanatico antisemita che instaurò negli U.S.A. una dittatura razzista, appoggiata dal grande capitale. Presto quel regime si circondò di una serie di stati-satellite che coprivano tutta l'America del Sud e del Nord.
Negli anni '80, quelle dittature iniziarono ad implodere, dapprima in America Latina e poi in Canada. Quando nel 1989 cadde il Muro di Tijuana, finalmente il capitalismo crollò negli stessi Stati Uniti. Da allora, secondo la nostra propaganda, il Regno Unito di Gran Bretagna è rimasto l'ultimo baluardo del libero mercato e della civiltà, contro la barbarie socialista che ha travolto tutto il resto del globo. Questo è quanto".
"Bene - disse la dottoressa - a parte la faccenda del baluardo, il quadro storico è corretto. Non le sarà stato facile ricostruirlo..."
"No, infatti. Da noi, formalmente, la cultura è libera, e ognuno può leggere ciò che vuole. Si possono prendere in prestito, nelle poche biblioteche rimaste, anche testi di Marx o di Lenin, e persino di Fabio Volo. Non è vietato. Di fatto, però, ci sono materie che non conviene approfondire troppo. Se si viene a sapere che lei fa certe letture e che ha determinate idee (e si viene a sapere sempre), non speri di trovare lavoro tanto facilmente. Io me la sono cavata con i call center, solo perché le mie origini non sono troppo umili. Quando avevo vent'anni, i miei riuscirono persino a mandarmi all'università. Certo, oggi non potrei più frequentarla. Da allora le rette sono decuplicate."
"Ah, lei ha letto Fabio Volo? Complimenti. Da noi, molti lo considerano un autore troppo difficile".
"Sì, è molto rigoroso e denso, ma se si ha tempo da dedicargli, è un pensatore affascinante. Le consiglio la Critica del tempo unidimensionale, se non l'ha ancora letta. A me ha aperto la mente. In realtà, uno dei motivi per cui mi sono deciso ad espatriare è che anche studiare per conto proprio da noi è diventato impossibile. Troppo costoso, da quando il dizionario è stato privatizzato".
"Il dizionario?"
"Sì. Tutti i sostantivi che iniziano per vocale appartengono alla Mircosoft. Quelli che iniziano per consonante sono del gruppo Murdogh. Gli avverbi sono di Merdaset, e così via. Per leggere o per usare comunque le parole bisogna pagare il noleggio ai legittimi proprietari. Quando lei scrive una e-mail, oppure quando chatta o quando telefona, un sistema di contatori automatici calcola la cifra e l'addebita sul suo conto. Ottimo sistema, fra l'altro, per controllare i contenuti della comunicazione. Io, per esempio, ho fatto quindici giorni di carcere per uso illecito di marchio registrato, la volta che in una mia mail ho scritto che la Cocca Colla mi faceva schifo".
"Senta, Mr. Brasser. Quali sono i suoi progetti? Cosa intende fare, ora che è venuto qui da noi?"
"Primo, togliermi una curiosità che mi ha tormentato a lungo. Ed è la prima delle due domande che volevo farle, si ricorda?"
La dottoressa Dupont sbuffò. "Va bene. Spari".
"La domanda è: perché non ci avete invaso? Come avete potuto lasciarci a mollo in quella fogna?"
Anne si appoggiò sullo schienale della sedia. "Beh, alcuni partiti in seno all'Internazionale erano per dichiarare guerra. Ma infine prevalse l'idea che il socialismo non può essere imposto con i carri armati. Se ci avessero attaccato, ci saremmo difesi. Per fortuna non accadde. Oggi, poi, molti sostengono che una pluralità di sistemi sociali diversi non è necessariamente un male. In India, in Giappone e in Sud America, dove la transizione al comunismo è molto avanzata, stanno già smantellando le strutture dello Stato, per sostituirle con vari tipi di organizzazione non statuale. In Europa e in Africa ci troviamo ancora nella fase socialista, in vari stadi di sviluppo a seconda dei territori. Forse è bene che ci siano delle zone dove ancora vige il capitalismo."
"Sarà un bene per voi, che ci osservate dall'esterno come se fossimo allo zoo! Ma per noi che siamo in gabbia è un altro discorso".
"Lei ora non è più in gabbia. Comunque, mi sembra che il suo atteggiamento nei confronti del suo paese d'origine sia un po' troppo negativo, non crede?"
"Mi dica lei cosa ci vede di bello, in quel letamaio", ribatté Brasser.
"Beh, che so... Avete una scena musicale molto vivace. Un sacco di gruppi pop, rock, punk, post-punk... Wim Wenders ci ha fatto anche un film. Poi, comunque, il vostro sistema ha ancora una base di consenso popolare".
"Si riferisce a West End London Social Club, vero? Quel film mi dà la nausea! Le televisioni del regime lo replicano senza tregua. L'unico film d'autore trasmesso in prima serata, e senza interruzioni pubblicitarie."
"Ecco, ad esempio - lo interruppe la dottoressa - Perché lei parla di televisioni di regime? Da voi ci sono sei o sette canali, se non sbaglio, tutti privati e in concorrenza fra loro..."
"... e trasmettono tutti le stesse schifezze. Non si distinguono l'uno dall'altro. Anne, lei non ha capito: da noi l'economia è allo sfascio, la società è in piena decadenza, la cultura è morta e sepolta. L'unica attività che va a gonfie vele è la manipolazione del consenso per mezzo dei mass-media. Quella è l'unica industria che non conosce crisi!"
"Non volevo farla arrabbiare. Si calmi. Lei ora è al sicuro. Andrà tutto bene. Respiri profondamente, e mi faccia la seconda domanda che voleva pormi".
"Mi scusi. La domanda è questa. Lei è libera stasera? Ho letto sul giornale che in un cinema d'essai a Dunkerque proiettano L'Atalante di Jean Vigo. E' una vita che desidero vedere quel film, e mi chiedevo se... lei volesse venire con me a vederlo, ecco."


Pubblicato su Evulon in due puntate: la prima il 7 gennaio 2011 qui, e la seconda il 12 gennaio 2011, qui.
          Update (February 11, 2017) - '..ethical standards..' ('.. Dr. Bates appeared to distance himself from some of what he wrote in the blog post..') (no replies)        
Update February 11, 2017: 'In an interview on Monday with E&E News, Dr. Bates appeared to distance himself from some of what he wrote in the blog post, and from the way his criticisms were portrayed in the Mail on Sunday article.

“The issue here is not an issue of tampering with data,” he said, “but rather really of timing of a release of a paper that had not properly disclosed everything it was.”

Climate Home, a nonprofit site based in London that offers news and analysis, also weighed in on one of the central contentions of Mr. Rose’s article, that the publication of the NOAA paper had "duped” policy makers into adopting the Paris accord. The site contacted representatives to the talks from 10 countries; none said that the paper had any influence.'

- Henry Fountain, No Data Manipulation in 2015 Climate Study, Researchers Say, February 7, 2016


Update February 09, 2017: 'Dr Bates’ main complaint is that Dr Karl and his co-authors did not follow strict procedures required for NOAA’s ‘operational’ data. It is not yet clear whether Dr Karl should have subjected his research data to the same procedures. Dr Karl, who retired from NOAA in August 2016, has not yet had the opportunity to respond fully to Dr Bates’ allegations.'

- LSE: More fake news in ‘The Mail on Sunday’, February 5, 2017 (Wikipedia Bans Daily Mail As 'Unreliable' Source, February 08, 2017))


'..a failure to observe proper ethical standards..'

'Dr John Bates’s disclosures about the manipulation of data behind the ‘Pausebuster’ paper is the biggest scientific scandal since ‘Climategate’ in 2009 when, as this paper reported, thousands of leaked emails revealed scientists were trying to block access to data, and using a ‘trick’ to conceal embarrassing flaws in their claims about global warming.

Both scandals suggest a lack of transparency and, according to Dr Bates, a failure to observe proper ethical standards.

Because of NOAA ’s failure to ‘archive’ data used in the paper, its results can never be verified.

Like Climategate, this scandal is likely to reverberate around the world, and reignite some of science’s most hotly contested debates.'

- Exposed: How world leaders were duped into investing billions over manipulated global warming data, February 4, 2017


'Whatever takes its place, said Dr Bates, ‘there needs to be a fundamental change to the way NOAA deals with data so that people can check and validate scientific results. I’m hoping that this will be a wake-up call to the climate science community – a signal that we have to put in place processes to make sure this kind of crap doesn’t happen again.

..

Dr Bates said: ‘How ironic it is that there is now this idea that Trump is going to trash climate data, when key decisions were earlier taken by someone whose responsibility it was to maintain its integrity – and failed.’ '


'Dr Bates retired from NOAA at the end of last year after a 40-year career in meteorology and climate science. As recently as 2014, the Obama administration awarded him a special gold medal for his work in setting new, supposedly binding standards ‘to produce and preserve climate data records’.

..

Less than two years earlier, a blockbuster report from the UN Intergovernmental Panel on Climate Change (IPCC), which drew on the work of hundreds of scientists around the world, had found ‘a much smaller increasing trend over the past 15 years 1998-2012 than over the past 30 to 60 years’. Explaining the pause became a key issue for climate science. It was seized on by global warming sceptics, because the level of CO2 in the atmosphere had continued to rise.

..

In the weeks after the Pausebuster paper was published, Dr Bates conducted a one-man investigation into this. His findings were extraordinary. Not only had Mr Karl and his colleagues failed to follow any of the formal procedures required to approve and archive their data, they had used a ‘highly experimental early run’ of a programme that tried to combine two previously separate sets of records.

..

Dr Bates revealed that the failure to archive and make available fully documented data not only violated NOAA rules, but also those set down by Science. Before he retired last year, he continued to raise the issue internally. Then came the final bombshell. Dr Bates said: ‘I learned that the computer used to process the software had suffered a complete failure.’

The reason for the failure is unknown, but it means the Pausebuster paper can never be replicated or verified by other scientists.

..

Whatever takes its place, said Dr Bates, ‘there needs to be a fundamental change to the way NOAA deals with data so that people can check and validate scientific results. I’m hoping that this will be a wake-up call to the climate science community – a signal that we have to put in place processes to make sure this kind of crap doesn’t happen again.

Dr Bates said: ‘How ironic it is that there is now this idea that Trump is going to trash climate data, when key decisions were earlier taken by someone whose responsibility it was to maintain its integrity – and failed.’

NOAA not only failed, but it effectively mounted a cover-up when challenged over its data. After the paper was published, the US House of Representatives Science Committee launched an inquiry into its Pausebuster claims. NOAA refused to comply with subpoenas demanding internal emails from the committee chairman, the Texas Republican Lamar Smith, and falsely claimed that no one had raised concerns about the paper internally.'

- Exposed: How world leaders were duped into investing billions over manipulated global warming data, February 4, 2017


Context '..conduct more meetings on ethics .. Respectful discussion of different points of view should be encouraged.' - John Bates

Climategate: Follow the Money - By Bret Stephens

Those Who Control the Past Control the Future, Climate Data Edition, February 5, 2017

'..Earth is warming more rapidly than previously thought was correct..'


'Trees are the best known ‘technology’ to cool our planet'

Focus Fusion - '..So, production reactors by 2020 or so.'

(Earth Defence - Earth Shield) - Faraday - Tesla - 'The Accelerating Winds of Venus.' (Electric Universe - Solar Climate Change)


(The Electric Universe - Earth Defence - Earth Shield) - Electric Fossils and Thundercrabs

(The Electric Universe) - '..weather systems .. an electric “wind” surrounds and often precedes an electric arc.'

(Thymology - Haptopraxeology) - '..entrepreneurship .. actions he will carry out and estimates the future effect of those actions..'


'...The peer review process is broken...' - '...don't have the "situational awareness"...'

On the Mail on Sunday article on Karl et al., 2015, February 5, 2017

          'We have no experience in stopping a nuclear war.' - Sidney Drell (no replies)        
'..My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The “Titanic Effect” is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'

'The harsh rhetoric on both sides increases the danger of miscalculations and mistakes, as do other factors. Close encounters between the military aircraft of the United States and Russia have become routine, creating the potential for an unintended conflict. Many of the nuclear-weapon systems on both sides are aging and obsolete. The personnel who operate those systems often suffer from poor morale and poor training. None of their senior officers has firsthand experience making decisions during an actual nuclear crisis. And today’s command-and-control systems must contend with threats that barely existed during the Cold War: malware, spyware, worms, bugs, viruses, corrupted firmware, logic bombs, Trojan horses, and all the other modern tools of cyber warfare. The greatest danger is posed not by any technological innovation but by a dilemma that has haunted nuclear strategy since the first detonation of an atomic bomb: How do you prevent a nuclear attack while preserving the ability to launch one?

..

..the Cuban Missile Crisis, when a series of misperceptions, miscalculations, and command-and-control problems almost started an accidental nuclear war—despite the determination of both John F. Kennedy and Nikita Khrushchev to avoid one. In perhaps the most dangerous incident, the captain of a Soviet submarine mistakenly believed that his vessel was under attack by U.S. warships and ordered the firing of a torpedo armed with a nuclear warhead. His order was blocked by a fellow officer. Had the torpedo been fired, the United States would have retaliated with nuclear weapons. At the height of the crisis, while leaving the White House on a beautiful fall evening, McNamara had a strong feeling of dread—and for good reason: “I feared I might never live to see another Saturday night.”

..

The personnel who command, operate, and maintain the Minuteman III have also become grounds for concern. In 2013, the two-star general in charge of the entire Minuteman force was removed from duty after going on a drunken bender during a visit to Russia, behaving inappropriately with young Russian women, asking repeatedly if he could sing with a Beatles cover band at a Mexican restaurant in Moscow, and insulting his military hosts. The following year, almost a hundred Minuteman launch officers were disciplined for cheating on their proficiency exams. In 2015, three launch officers at Malmstrom Air Force Base, in Montana, were dismissed for using illegal drugs, including ecstasy, cocaine, and amphetamines. That same year, a launch officer at Minot Air Force Base, in North Dakota, was sentenced to twenty-five years in prison for heading a violent street gang, distributing drugs, sexually assaulting a girl under the age of sixteen, and using psilocybin, a powerful hallucinogen. As the job title implies, launch officers are entrusted with the keys for launching intercontinental ballistic missiles.

..

..A recent memoir, “Uncommon Cause,” written by General George Lee Butler, reveals that the Pentagon was not telling the truth. Butler was the head of the U.S. Strategic Command, responsible for all of America’s nuclear weapons, during the Administration of President George H. W. Bush.

According to Butler and Franklin Miller, a former director of strategic-forces policy at the Pentagon, launch-on-warning was an essential part of the Single Integrated Operational Plan (siop), the nation’s nuclear-war plan. Land-based missiles like the Minuteman III were aimed at some of the most important targets in the Soviet Union, including its anti-aircraft sites. If the Minuteman missiles were destroyed before liftoff, the siop would go awry, and American bombers might be shot down before reaching their targets. In order to prevail in a nuclear war, the siop had become dependent on getting Minuteman missiles off the ground immediately. Butler’s immersion in the details of the nuclear command-and-control system left him dismayed. “With the possible exception of the Soviet nuclear war plan, [the siop] was the single most absurd and irresponsible document I had ever reviewed in my life,” Butler concluded. “We escaped the Cold War without a nuclear holocaust by some combination of skill, luck, and divine intervention, and I suspect the latter in greatest proportion.” The siop called for the destruction of twelve thousand targets within the Soviet Union. Moscow would be struck by four hundred nuclear weapons; Kiev, the capital of the Ukraine, by about forty.

After the end of the Cold War, a Russian surprise attack became extremely unlikely. Nevertheless, hundreds of Minuteman III missiles remained on alert. The Cold War strategy endured because, in theory, it deterred a Russian attack on the missiles. McNamara called the policy “insane,” arguing that “there’s no military requirement for it.” George W. Bush, while running for President in 2000, criticized launch-on-warning, citing the “unacceptable risks of accidental or unauthorized launch.” Barack Obama, while running for President in 2008, promised to take Minuteman missiles off alert, warning that policies like launch-on-warning “increase the risk of catastrophic accidents or miscalculation.” Twenty scientists who have won the Nobel Prize, as well as the Union of Concerned Scientists, have expressed strong opposition to retaining a launch-on-warning capability. It has also been opposed by former Secretary of State Henry Kissinger, former Secretary of State George Shultz, and former Senator Sam Nunn. And yet the Minuteman III missiles still sit in their silos today, armed with warheads, ready to go.

William J. Perry, who served as Secretary of Defense during the Clinton Administration, not only opposes keeping Minuteman III missiles on alert but advocates getting rid of them entirely. “These missiles are some of the most dangerous weapons in the world,” Perry wrote in the Times, this September. For many reasons, he thinks the risk of a nuclear catastrophe is greater today than it was during the Cold War. While serving as an Under-Secretary of Defense in 1980, Perry also received a late-night call about an impending Soviet attack, a false alarm that still haunts him. “A catastrophic nuclear war could have started by accident.”

Bruce Blair, a former Minuteman launch officer, heads the anti-nuclear group Global Zero, teaches at Princeton University, and campaigns against a launch-on-warning policy. Blair has described the stresses that the warning of a Russian attack would put on America’s command-and-control system. American early-warning satellites would detect Russian missiles within three minutes of their launch. Officers at norad would confer for an additional three minutes, checking sensors to decide if an attack was actually occurring. The Integrated Tactical Warning/Attack System collects data from at least two independent information sources, relying on different physical principles, such as ground-based radar and satellite-based infrared sensors. If the norad officials thought that the warning was legitimate, the President of the United States would be contacted. He or she would remove the Black Book from a briefcase carried by a military aide. The Black Book describes nuclear retaliatory options, presented in cartoon-like illustrations that can be quickly understood.

..

Although the Air Force publicly dismissed the threat of a cyberattack on the nuclear command-and-control system, the incident raised alarm within the Pentagon about the system’s vulnerability. A malfunction that occurred by accident might also be caused deliberately. Those concerns were reinforced by a Defense Science Board report in January, 2013. It found that the Pentagon’s computer networks had been “built on inherently insecure architectures that are composed of, and increasingly using, foreign parts.” Red teams employed by the board were able to disrupt Pentagon systems with “relative ease,” using tools available on the Internet. “The complexity of modern software and hardware makes it difficult, if not impossible, to develop components without flaws or to detect malicious insertions,” the report concluded.

In a recent paper for the Royal United Services Institute for Defence and Security Studies, Andrew Futter, an associate professor at the University of Leicester, suggested that a nuclear command-and-control system might be hacked to gather intelligence about the system, to shut down the system, to spoof it, mislead it, or cause it to take some sort of action—like launching a missile. And, he wrote, there are a variety of ways it might be done.

..

Strict precautions have been taken to thwart a cyberattack on the U.S. nuclear command-and-control system. Every line of nuclear code has been scrutinized for errors and bugs. The system is “air-gapped,” meaning that its networks are closed: someone can’t just go onto the Internet and tap into a computer at a Minuteman III control center. At least, that’s the theory. Russia, China, and North Korea have sophisticated cyber-warfare programs and techniques. General James Cartwright—the former head of the U.S. Strategic Command who recently pleaded guilty to leaking information about Stuxnet—thinks that it’s reasonable to believe the system has already been penetrated. “You’ve either been hacked, and you’re not admitting it, or you’re being hacked and don’t know it,” Cartwright said last year.

If communications between Minuteman control centers and their missiles are interrupted, the missiles can still be launched by ultra-high-frequency radio signals transmitted by special military aircraft. The ability to launch missiles by radio serves as a backup to the control centers—and also creates an entry point into the network that could be exploited in a cyberattack. The messages sent within the nuclear command-and-control system are highly encrypted. Launch codes are split in two, and no single person is allowed to know both parts. But the complete code is stored in computers—where it could be obtained or corrupted by an insider.

Some of America’s most secret secrets were recently hacked and stolen by a couple of private contractors working inside the N.S.A., Edward Snowden and Harold T. Martin III, both employees of Booz Allen Hamilton. The N.S.A. is responsible for generating and encrypting the nuclear launch codes. And the security of the nuclear command-and-control system is being assured not only by government officials but also by the employees of private firms, including software engineers who work for Boeing, Amazon, and Microsoft.

Lord Des Browne, a former U.K. Minister of Defense, is concerned that even ballistic-missile submarines may be compromised by malware. Browne is now the vice-chairman of the Nuclear Threat Initiative, a nonprofit seeking to reduce the danger posed by weapons of mass destruction, where he heads a task force examining the risk of cyberattacks on nuclear command-and-control systems. Browne thinks that the cyber threat is being cavalierly dismissed by many in power. The Royal Navy’s decision to save money by using Windows for Submarines, a version of Windows XP, as the operating system for its ballistic-missile subs seems especially shortsighted. Windows XP was discontinued six years ago, and Microsoft warned that any computer running it after April, 2014, “should not be considered protected as there will be no security updates.” Each of the U.K. subs has eight missiles carrying a total of forty nuclear weapons. “It is shocking to think that my home computer is probably running a newer version of Windows than the U.K.’s military submarines,” Brown said.In 2013, General C. Robert Kehler, the head of the U.S. Strategic Command, testified before the Senate Armed Services Committee about the risk of cyberattacks on the nuclear command-and-control system. He expressed confidence that the U.S. system was secure. When Senator Bill Nelson asked if somebody could hack into the Russian or Chinese systems and launch a ballistic missile carrying a nuclear warhead, Kehler replied, “Senator, I don’t know . . . I do not know.”

After the debacle of the Cuban Missile Crisis, the Soviet Union became much more reluctant to provoke a nuclear confrontation with the United States. Its politburo was a committee of conservative old men. Russia’s leadership is quite different today. The current mix of nationalism, xenophobia, and vehement anti-Americanism in Moscow is a far cry from the more staid and secular ideology guiding the Soviet Union in the nineteen-eighties. During the past few years, threats about the use of nuclear weapons have become commonplace in Moscow. Dmitry Kiselyov, a popular newscaster and the Kremlin’s leading propagandist, reminded viewers in 2014 that Russia is “the only country in the world capable of turning the U.S.A. into radioactive dust.” The Kremlin has acknowledged the development of a nuclear torpedo that can travel more than six thousand miles underwater before devastating a coastal city. It has also boasted about a fearsome new missile design. Nicknamed “Satan 2” and deployed with up to sixteen nuclear warheads, the missile will be “capable of wiping out parts of the earth the size of Texas or France,” an official news agency claimed.

..

Russia’s greatest strategic vulnerability is the lack of a sophisticated and effective early-warning system. The Soviet Union had almost a dozen satellites in orbit that could detect a large-scale American attack. The system began to deteriorate in 1996, when an early-warning satellite had to be retired. Others soon fell out of orbit, and Russia’s last functional early-warning satellite went out of service two years ago. Until a new network of satellites can be placed in orbit, the country must depend on ground-based radar units. Unlike the United States, Russia no longer has two separate means of validating an attack warning. At best, the radar units can spot warheads only minutes before they land. Pavel Podvig, a senior fellow at the U.N. Institute for Disarmament Research, believes that Russia does not have a launch-on-warning policy—because its early-warning system is so limited.

For the past nine years, I’ve been immersed in the minutiae of nuclear command and control, trying to understand the actual level of risk. Of all the people whom I’ve met in the nuclear realm, Sidney Drell was one of the most brilliant and impressive. Drell died this week, at the age of ninety. A theoretical physicist with expertise in quantum field theory and quantum chromodynamics, he was for many years the deputy director of the Stanford Linear Accelerator and received the National Medal of Science from Obama, in 2013. Drell was one of the founding members of jason—a group of civilian scientists that advises the government on important technological matters—and for fifty-six years possessed a Q clearance, granting him access to the highest level of classified information. Drell participated in top-secret discussions about nuclear strategy for decades, headed a panel that investigated nuclear-weapon safety for the U.S. Congress in 1990, and worked on technical issues for jason until the end of his life. A few months ago, when I asked for his opinion about launch-on-warning, Drell said, “It’s insane, the worst thing I can think of. You can’t have a worse idea.”

Drell was an undergraduate at Princeton University when Hiroshima and Nagasaki were destroyed. Given all the close calls and mistakes in the seventy-one years since then, he considered it a miracle that no other cities have been destroyed by a nuclear weapon—“it is so far beyond my normal optimism.” The prospect of a new cold war—and the return of military strategies that advocate using nuclear weapons on the battlefield—deeply unnerved him. Once the first nuclear weapon detonates, nothing might prevent the conflict from spiralling out of control. “We have no experience in stopping a nuclear war,” he said.

..

Donald Trump and Vladimir Putin confront a stark choice: begin another nuclear-arms race or reduce the threat of nuclear war. Trump now has a unique opportunity to pursue the latter, despite the bluster and posturing on both sides. His admiration for Putin, regardless of its merits, could provide the basis for meaningful discussions about how to minimize nuclear risks. Last year, General James Mattis, the former Marine chosen by Trump to serve as Secretary of Defense, called for a fundamental reappraisal of American nuclear strategy and questioned the need for land-based missiles. During Senate testimony, Mattis suggested that getting rid of such missiles would “reduce the false-alarm danger.” Contrary to expectations, Republican Presidents have proved much more successful than their Democratic counterparts at nuclear disarmament. President George H. W. Bush cut the size of the American arsenal in half, as did his son, President George W. Bush. And President Ronald Reagan came close to negotiating a treaty with the Soviet Union that would have completely abolished nuclear weapons.

Every technology embodies the values of the age in which it was created. When the atomic bomb was being developed in the mid-nineteen-forties, the destruction of cities and the deliberate targeting of civilians was just another military tactic. It was championed as a means to victory. The Geneva Conventions later classified those practices as war crimes—and yet nuclear weapons have no other real use. They threaten and endanger noncombatants for the sake of deterrence. Conventional weapons can now be employed to destroy every kind of military target, and twenty-first-century warfare puts an emphasis on precision strikes, cyberweapons, and minimizing civilian casualties. As a technology, nuclear weapons have become obsolete. What worries me most isn’t the possibility of a cyberattack, a technical glitch, or a misunderstanding starting a nuclear war sometime next week. My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The “Titanic Effect” is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'

- Eric Schlosser, World War Three, By Mistake, December 23, 2016


Context

The International Day for the Total Elimination of Nuclear Weapons

          (Bazaarmodel - To Heal - Teal) - '..is it possible to build a truly Evolutionary-Teal school?' (no replies)        
'This factory-like system seems increasingly out of date. More and more people are crying out for innovation in education and starting to experiment with curricula, technologies, and governance in schools. But is it possible to build a truly Evolutionary-Teal school? And what would it look like? A superb example can be found in the center of Berlin in Germany. The “ESBZ” is a grade 7-12 school that opened its doors in 2007 with more than a bit of improvisation. Just three months before the start of the school year, the city council had suddenly given a decrepit prefabricated building from communist times to a group of pesky parents who simply wouldn’t let go of their dream. When the school year started, only 16 students were registered. A few months later, at the mid-year point, 30 more students had joined, mostly rejects and troublemakers other schools had expelled. Hardly a promising start for a new school. And yet today, only a few years later, the school has 500 students and attracts hundreds of principals, teachers, and education specialists from all over the country who want to study the ESBZ model.'

- Frederic Laloux, (Reinventing Organizations, Chapter 2.2 _ Self-management Structures), page 93


'..Yet unlike Sudbury, Montessori or Steiner schools, Rasfeld’s institution tries to embed student self-determination within a relatively strict system of rules. Students who dawdle during lessons have to come into school on Saturday morning to catch up, a punishment known as “silentium”. “The more freedom you have, the more structure you need,” says Rasfeld.

The main reason why the ESBC is gaining a reputation as Germany’s most exciting school is that its experimental philosophy has managed to deliver impressive results..'


'..At Oberländer’s school, there are no grades until students turn 15, no timetables and no lecture-style instructions. The pupils decide which subjects they want to study for each lesson and when they want to take an exam.

The school’s syllabus reads like any helicopter parent’s nightmare. Set subjects are limited to maths, German, English and social studies, supplemented by more abstract courses such as “responsibility” and “challenge”. For challenge, students aged 12 to 14 are given €150 (£115) and sent on an adventure that they have to plan entirely by themselves. Some go kayaking; others work on a farm. Anton went trekking along England’s south coast.

The philosophy behind these innovations is simple: as the requirements of the labour market are changing, and smartphones and the internet are transforming the ways in which young people process information, the school’s headteacher, Margret Rasfeld, argues, the most important skill a school can pass down to its students is the ability to motivate themselves.

“Look at three or four year olds – they are all full of self-confidence,” Rasfeld says. “Often, children can’t wait to start school. But frustratingly, most schools then somehow manage to untrain that confidence.”

The Evangelical School Berlin Centre (ESBC) is trying to do nothing less than “reinvent what a school is”, she says. “The mission of a progressive school should be to prepare young people to cope with change, or better still, to make them look forward to change. In the 21st century, schools should see it as their job to develop strong personalities.”

Making students listen to a teacher for 45 minutes and punishing them for collaborating on an exercise, Rasfeld says, was not only out of sync with the requirements of the modern world of work, but counterproductive. “Nothing motivates students more than when they discover the meaning behind a subject of their own accord.”

Students at her school are encouraged to think up other ways to prove their acquired skills, such as coding a computer game instead of sitting a maths exam. Oberländer, who had never been away from home for three weeks until he embarked on his challenge in Cornwall, said he learned more English on his trip than he had in several years of learning the language at school.

Germany’s federalised education structure, in which each of the 16 states plans its own education system, has traditionally allowed “free learning” models to flourish. Yet unlike Sudbury, Montessori or Steiner schools, Rasfeld’s institution tries to embed student self-determination within a relatively strict system of rules. Students who dawdle during lessons have to come into school on Saturday morning to catch up, a punishment known as “silentium”. “The more freedom you have, the more structure you need,” says Rasfeld.

The main reason why the ESBC is gaining a reputation as Germany’s most exciting school is that its experimental philosophy has managed to deliver impressive results..

..

Aged 65 and due to retire in July, Rasfeld still has ambitious plans. A four-person “education innovation lab” based at the school has been developing teaching materials for schools that want to follow the ESBC’s lead. About 40 schools in Germany are in the process of adopting some or all of Rasfeld’s methods. One in Berlin’s Weissensee district recently let a student trek across the Alps for a challenge project. “Things are only getting started,” says Rasfeld.

“In education, you can only create change from the bottom – if the orders come from the top, schools will resist. Ministries are like giant oil tankers: it takes a long time to turn them around. What we need is lots of little speedboats to show you can do things differently.” '

- Philip Oltermann, No grades, no timetable: Berlin school turns teaching upside down, July 1, 2016


Context

(To Heal - Teal - Bazaarmodel) - Striving for wholeness '..We have let our busy egos trump the quiet voice of our soul; many cultures often celebrate the mind and neglect the body..'

(Bazaarmodel - To Heal - Teal) - 'Your physical .. cultural .. soul heredity..'

(To Heal) - Overview of Focus Levels '..to areas of greater free will choice.'


(To Heal) - Overview of Focus Levels '..to areas of greater free will choice.'

          '..Russia .. cyberpower proved the perfect weapon .. political sabotage..' (no replies)        
' “We’d have all these circular meetings,” one senior State Department official said, “in which everyone agreed you had to push back at the Russians and push back hard. But it didn’t happen.”

..

Mr. Putin, a student of martial arts, had turned two institutions at the core of American democracy — political campaigns and independent media — to his own ends..

..

..The Russians clearly had a more sophisticated understanding of American politics, and they were masters of “kompromat,” their term for compromising information.

..

..the hackings of the State Department, the White House and the Pentagon..

..

What seems clear is that Russian hacking, given its success, is not going to stop. Two weeks ago, the German intelligence chief, Bruno Kahl, warned that Russia might target elections in Germany next year. “The perpetrators have an interest to delegitimize the democratic process as such,” Mr. Kahl said. Now, he added, “Europe is in the focus of these attempts of disturbance, and Germany to a particularly great extent.” '



'..the White House’s reluctance to respond forcefully meant the Russians have not paid a heavy price for their actions, a decision that could prove critical in deterring future cyberattacks.

..

..President Vladimir V. Putin of Russia moved beyond mere espionage to deliberately try to subvert American democracy and pick the winner of the presidential election.

..

..A low-cost, high-impact weapon that Russia had test-fired in elections from Ukraine to Europe was trained on the United States, with devastating effectiveness. For Russia, with an enfeebled economy and a nuclear arsenal it cannot use short of all-out war, cyberpower proved the perfect weapon: cheap, hard to see coming, hard to trace.

..

The United States had two decades of warning that Russia’s intelligence agencies were trying to break into America’s most sensitive computer networks. But the Russians have always managed to stay a step ahead.

Their first major attack was detected on Oct. 7, 1996, when a computer operator at the Colorado School of Mines discovered some nighttime computer activity he could not explain. The school had a major contract with the Navy, and the operator warned his contacts there. But as happened two decades later at the D.N.C., at first “everyone was unable to connect the dots,” said Thomas Rid, a scholar at King’s College in London who has studied the attack.

Investigators gave it a name — Moonlight Maze — and spent two years, often working day and night, tracing how it hopped from the Navy to the Department of Energy to the Air Force and NASA. In the end, they concluded that the total number of files stolen, if printed and stacked, would be taller than the Washington Monument.

Whole weapons designs were flowing out the door, and it was a first taste of what was to come: an escalating campaign of cyberattacks around the world.

..

The Russians were also quicker to turn their attacks to political purposes. A 2007 cyberattack on Estonia, a former Soviet republic that had joined NATO, sent a message that Russia could paralyze the country without invading it. The next year cyberattacks were used during Russia’s war with Georgia.

..

Mr. Obama was briefed regularly on all this, but he made a decision that many in the White House now regret: He did not name Russians publicly, or issue sanctions. There was always a reason: fear of escalating a cyberwar, and concern that the United States needed Russia’s cooperation in negotiations over Syria.

“We’d have all these circular meetings,” one senior State Department official said, “in which everyone agreed you had to push back at the Russians and push back hard. But it didn’t happen.”

..

Last year, the attacks became more aggressive. Russia hacked a major French television station, frying critical hardware. Around Christmas, it attacked part of the power grid in Ukraine, dropping a portion of the country into darkness, killing backup generators and taking control of generators. In retrospect, it was a warning shot.

..

..CrowdStrike’s nicknames for the two Russian hacking groups that the firm found at work inside the D.N.C. network. Cozy Bear — the group also known as the Dukes or A.P.T. 29, for “advanced persistent threat” — may or may not be associated with the F.S.B., the main successor to the Soviet-era K.G.B., but it is widely believed to be a Russian government operation. It made its first appearance in 2014, said Dmitri Alperovitch, CrowdStrike’s co-founder and chief technology officer.

..

Only in March 2016 did Fancy Bear show up — first penetrating the computers of the Democratic Congressional Campaign Committee, and then jumping to the D.N.C., investigators believe. Fancy Bear, sometimes called A.P.T. 28 and believed to be directed by the G.R.U., Russia’s military intelligence agency, is an older outfit, tracked by Western investigators for nearly a decade. It was Fancy Bear that got hold of Mr. Podesta’s email.

..

It was bad enough that Russian hackers had been spying inside the committee’s network for months. Now the public release of documents had turned a conventional espionage operation into something far more menacing: political sabotage, an unpredictable, uncontrollable menace for Democratic campaigns.

..

Julian Assange, the WikiLeaks founder and editor, has resisted the conclusion that his site became a pass-through for Russian hackers working for Mr. Putin’s government or that he was deliberately trying to undermine Mrs. Clinton’s candidacy. But the evidence on both counts appears compelling.

..

Mr. Putin, a student of martial arts, had turned two institutions at the core of American democracy — political campaigns and independent media — to his own ends. The media’s appetite for the hacked material, and its focus on the gossipy content instead of the Russian source, disturbed some of those whose personal emails were being reposted across the web.

..

In late 2014, hackers working for Kim Jong-un, the North’s young and unpredictable leader, had carried out a well-planned attack on Sony Pictures Entertainment intended to stop the Christmastime release of a comedy about a C.I.A. plot to kill Mr. Kim.

In that case, embarrassing emails had also been released. But the real damage was done to Sony’s own systems: More than 70 percent of its computers melted down when a particularly virulent form of malware was released. Within weeks, intelligence agencies traced the attack back to the North and its leadership. Mr. Obama called North Korea out in public, and issued some not-very-effective sanctions. The Chinese even cooperated, briefly cutting off the North’s internet connections.

As the first Situation Room meetings on the Russian hacking began in July, “it was clear that Russia was going to be a much more complicated case,” said one participant. The Russians clearly had a more sophisticated understanding of American politics, and they were masters of “kompromat,” their term for compromising information.

..

..code was put out in the open by the Russians as a warning: Retaliate for the D.N.C., and there are a lot more secrets, from the hackings of the State Department, the White House and the Pentagon, that might be spilled as well. One senior official compared it to the scene in “The Godfather” where the head of a favorite horse is left in a bed, as a warning.

..

As the year draws to a close, it now seems possible that there will be multiple investigations of the Russian hacking — the intelligence review Mr. Obama has ordered completed by Jan. 20, the day he leaves office, and one or more congressional inquiries. They will wrestle with, among other things, Mr. Putin’s motive.

..

Did he seek to mar the brand of American democracy, to forestall anti-Russian activism for both Russians and their neighbors? Or to weaken the next American president, since presumably Mr. Putin had no reason to doubt American forecasts that Mrs. Clinton would win easily? Or was it, as the C.I.A. concluded last month, a deliberate attempt to elect Mr. Trump?

In fact, the Russian hack-and-dox scheme accomplished all three goals.

What seems clear is that Russian hacking, given its success, is not going to stop. Two weeks ago, the German intelligence chief, Bruno Kahl, warned that Russia might target elections in Germany next year. “The perpetrators have an interest to delegitimize the democratic process as such,” Mr. Kahl said. Now, he added, “Europe is in the focus of these attempts of disturbance, and Germany to a particularly great extent.” '

- Eric Lipton, David E. Sanger and Scott Shane, The Perfect Weapon: How Russian Cyberpower Invaded the U.S., December 13, 2016


Context '[Russia] may become a threat to the world. That is the worst thing that could happen to Russia.' - Yegor Gaidar

'..Russian strategy of hybrid influence and destabilization .. German Council on Foreign Relations.'

'German intelligence says Russia is trying to destabilize German society..' - '..war that Moscow is waging against the West..'

'[Putin is doing] anything that can and will expand Russian influence to U.S.S.R.-era levels of power.'


'..Zero tolerance for Russian intrusions .. Estonia .. policy of publicly naming or prosecuting spies..'

'..the Soviet Union was cut off from Western financial markets and was effectively under permanent sanctions..'

          TOT/TDW and other peace corps acronyms        
Quiche dinner in the transit house Those of us who are helping with training this summer/rainy season are in Yaounde this week and next for the TDW (Training Design Workshop) and TOT (Training of Trainers). Gabe and I are here designing the technical training sessions for the 5 incoming computer literacy trainees as well as working [...]
          Chrome - Google Tone        


I continue to be impressed by the options for access that are being developed for the Chrome Web Browser.  Google just released an experiment called Google Tone.  The concept is that it will play a short tone that other computers can hear, and they will open the URL you shared.  The extension must be installed on all the computers nearby (wish it worked on mobile devices!) and have access to the microphone.  Just click the link in the toolbar and it sends out the "tone".  You can install the extension here - g.co/tone and it works in Chrome for Mac, Windows and all Chromebook devices.  Happy Sharing!



Share this
Do you know somebody else who would find this post interesting or useful? Please forward it to them. Did somebody forward this post to you? Visit Teaching All Students and subscribe to receive posts for free. If you need a RSS Reader please visit this post Google Reader Replacements.

          Three days in Berlin (or improving the pim user experience)        

KDE Project:

Last weekend I've met with some of our old timer KDEPIM developers and some of the newer ones who are interested in KDEPIM or related technologies in the KDAB offices in Berlin.
Being a KDAB employee for a few years already (wow, time is passing quickly), the place was familiar, the people looked familiar. The foosball table was slightly familiar, although some players changed their dresses in order to spread confusion inside the visitor's heads. That is the only reason we've lost against locals with 5-0, 5-0.
Suprisingly enough, the table wasn't used that much. Why? Because people were busy either working and talking. What they talked about I don't know too much, as I focused on some issues I planned to fix, but others can testify that Volker did not sit too much in front of his computers, but was dragged from one place to another for various discussions.
Most of us started on Friday around noon. I won't tell too much about what others did, that is mostly their problem. Especially if they were on the other side of the room and I didn't saw their screens, I can't tell if they worked at all or not. They looked like they did though. ;) I can share some things about what some sitting nearby did. See later.
As recently I became the de-facto maintainer and bugfixer for mail filters, I worked mostly on them. Unfortunately the first attempt to fix a bug failed: a bug that bothers me, although it is not the most reported one. It is about mails not being filtered for a while after a resume from hibernation. It is hard to reproduce, and although I run into it, I couldn't reproduce reliably enough and in a way I can debug it. After fighting with it and realising it won't work, I gave up. See you next time.
Meantime we had some excellent food in an Indian restaurant, then when finally everybody arrived (almost everybody to be honest, plus even some more from KDAB who didn't sign up, but show up there), we were ready to start with presenting the kdepim and Akonadi architecture. Old time pimsters Volker Krause, Kevin Krammer and Tobias Koenig helped me with it, and sometimes saved me, as my knowledge in some area proved to be superficial. We ended up with a pretty impressive drawing on the whiteboard:
Hopefully for those being on site it was understandable.

Time passed, so we went out for dinner to a Greek restaurant at the corner. Nice place, third time being there, good food (seems Berlin has only good eating places). We even saw how Germany won over Ireland. Too bad Steveire (Stephen Kelly) was not there... We continued with some more talks and hacking, then everybody went to their sleeping places.
Some left earlier, some later waiting for remote developers to show up and discuss the patches (he didn't show up).

Day 2
Next day started around 9 o'clock for some. Later for others. I continued with the filter debugging and fixing. I looked at the bugreports and tried to come up with some bugs that are both would help the users and myself. I'm selfish, I want to fix the bugs I run into. ;) One problem that bothered me for a long time is that email content from online IMAP is downloaded even if no filter for IMAP requires it (but a filter for e.g POP3 needs the full content). Now this is fixed and those who use online imap could notice a great speedup in mail syncing (depending on their filter setup). Another often reported issue was duplicating the mails, especially after spam filtering. You've ended up with a mail in the spam folder and a mail in the original place. This could be combined with a conflict dialog shown up as well for that mail. This problem actually revealed a not-well handled case down inside the Akonadi stack that was created by a reordering of filter commands in the filtering code. For those who want technical details: if there was a move action (like "move mail to spam folder") followed by a modify action (like "mark as read"), the filter reordered this to "mark as read" followed by a move. Unfortunately this exposed two problems, (mostly, but not only) IMAP specific: on IMAP you can't modify a mail, instead you create a new one and delete the old. What happened here is that a filter changed the mail (run through bogofilter/spamassasin), then the "mark as read" action was executed, which uploaded the changes, including the changed mail to the IMAP server. This caused a new ID for the item on the IMAP server. The mail with the old ID was deleted. Then the filter agent performed a move, but he had only the *old* ID, before the modifications. The move - if performed between two different resources, like IMAP and local maildir - is technically a copy followed by a delete. The copy worked fine, but the delete didn't. It tried to delete the old mail again (which was gone), not the modified version. That's how you ended up with a duplicate.
The current solution is to reorder the filtering pipeline, so the move is performed before the flag modifications. The extra benefit is that the filtered message is not uploaded again just to be deleted the next second. Speedup, less network traffic, better user experience. This doesn't fix the main problem with Akonadi, but it is an acceptable workaround. The reordering is so far only in the master branch (KDE 4.10), but the relevant code will be backported to the 4.9 branch, so it will be in 4.9.3.
And speaking of conflicts, that was the next hot topic, and one of the often reported bugs. It was mostly caused by conflicting flag changes (read/spam/important/etc), either caused by KMail itself plus the filtering or just KMail. After some discussion we agreed, that reporting conflicts on flag changes doesn't make sense, so we should not bother the user. It is not data loss, and in worst case some flag is reset. In normal case nothing wrong happens, as Akonadi is able to merge two changes in the flags (or so claims Volker).
I have to admit that this fix was not completed at the sprint, I finished it today, as I noticed more code in KDEPIM that didn't disable conflict check on flag changes.
While doing the changes, I did quite some refactoring, cleaning up the code as much as I could do for the parts I touched. The code was originally deep inside KMail (as most of other code), got extracted from it for 4.8.0, and now we are at the stage that we can make the extracted code more cleaner, we can remove some things that doesn't make sense anymore now that the filtering is not inside KMail.
While reading the bug reports, I also run into one indicating that mails arriving to an MBOX account (like /var/spool/mail/username) are not filtered automatically. Sounds like an easy bug to fix and so was it. Now they are filtered.
Finally another annoying issue was fixed: there was no indication that filtering is ongoing. Now when this happens, you can see in the KMail's progress bar.
The net result of the above: faster filtering, less annoying and useless error dialogs for the users. And according to bugzilla, 31 bugs less (some were duplicates though).

Nepomuk...one of the things that, well, so far I was always recommending for users to turn off. Slight detour here: what is Nepomuk and its relation to KMail? Nepomuk helps you to find data. It indexes all kind of data and with some queries you can find e.g every file where my name is mentioned, all email addresses from any file, etc. There is a process that goes through the akonadi data (emails, calendars, etc) and "feeds" to it for Nepomuk to be indexed. Then there are queries and code in KMail accessing Nepomuk: getting email addresses for composer's autocompletion, searching inside mail bodies, tagging your emails with custom tags, etc.
Unfortunately there are problems around it. One is that some queries ae processed quite slowly, that in turn slows down KMail, leading to poor user experience. E.g switching between mails, sending mails, etc. is slow. Or startup is slow or even blocked. I tried to fix the last part as I just run into it, but as this was my very first Nepomuk related patch, I'm not sure 100% succeeded. We found a problem with the Nepomuk API itself, and I informed Vishesh, the Nepomuk developer about it (even if I used non-blocking calls against Nepomuk, one call is blocking without question). He suggested something I might try later, although I'd be more happier if somebody with real Nepomuk knowledge could give a review of the pim Nepomuk usage.
Then there is the Akonadi feeder, that gives the data to Nepomuk. Something is not perfect there and the indexing causes a serious slowdown, where either itself or Nepomuk (actually its storage backend, virtuoso) starts to use the CPU *a lot*. This is the main reason I recommend to users to disable Nepomuk so far. We had Christian Mollekopf the author of the feeder in the sprint, and he worked on some optimizations. Hopefully this will improve the situation. Meantime we (and I) tried to convince Vishesh to use KMail, so he can see himself the problems our users face.

As a break we had another presentation, this time about KMail itself, what components make up KMail, how they are distributed. As far as I saw, this was less interesting to the audience, they rather looked at their computers and hacked on something. Luckily our KMail maintainer, Laurent Montel, is super active, but I wouldn't mind more contributors. Too bad he wasn't at the sprint.

We had a lunch at a nearby place, nothing extra, but the food was (again) good.

What did other do? Let's see what I can remember... Sune dreamed about crypto stuff and composite jobs. He worked on making some cryptographic code asynchronous and started to get faimiliar with kdepim code. I'd not say he picked up the easiest job.
Volker run around all the time, discussed various things like "spanish sync" with Alex Fiestas (see here), database backends with Martin, change recorder with David Faure (who remotely joined the meeting and got lost inside the change recorder code ... he has the solution now in his head, so be patient, we will end up with a better implementation for it that again speeds up Akonadi), job pipelines with me, and who knows what with others, as for a long time he just disappeared with a bunch of developers. They actually ended up in the lobby discussing "stuff". Milian Wolf, who is not (or not yet?) a KDEPIM developer, but mainly a KDevelop one, joined us and used massif to track down some ugly memory usage in KMail. And he did a good job in it. Previously KMail used more and more memory as you navigated between large folders (Alex mentioned some 2GB for him), while now it levels up at one point and doesn't increase. He might blog himself about, as he has also some nice graphs.
Then there were two guys from KDAB, who are old time pim developers (quiz: find their names in this blog), but they cooked something else, not related to KDEPIM, not related concretely to KDE, but to a lower level: to Qt. It is an amazingly cool stuff, but I don't want to give more details. Expect it to be presented a the Qt Developer Days, either in a talk or at the KDAB booth. Don't worry, I'm pretty sure it will be freely available what they did and KDE can enjoy it in the future.
I'm sorry that I don't remember what the rest did. In general I know that Martin Klapetek worked on the social network resources, Mark Gaiser, who recently started to work on KDEPIM stuff eagerly listened to our presentations and worked on a QML calendar application, Alex kept reporting bugs and discussed improvements with Volker, while John Layt, the "timezone KDE guy" worked on plasma calendar related issues.
As a KDE person Chani also joined us for a while, we quickly nominated her as the QML and Plasma person, so all questions related to them were immediately redirected to Chani. Jos Poortvilet was also supposed to join for some talks, but he could show up only on Sunday for personal reasons.
At the end of the day everybody was so busy, so instead of going out for eating, we just ordered some pizza. And most of us stood in the office well past midnight.

Day 3
Well, the above partially happened on Sunday. It was a shorter day for me, due to the late night standup before, and that I had to go to the airport after lunch. A lunch that wasn't exactly as planned. We went out for a Doner Kebab place that is supposed to be the best one in Berlin. It is just a small kiosk on the sidewalk in a street, but man, there was a big queue for it. On a Sunday! Locals says it is worse on weekdays. Even after almost an hour, we still had 10 persons in front of us, my departure time was approaching, so I gave up and instead bought some (quite good) chinese fast-food from a nearby place, then rushed to the airport.
A long journey awaited me with a 3 hour stopover in Munich, but luckily I had a power supply there and even some network (they offer 30 minutes/day/phone number), so I could continue on the work I started at the sprint. After flying and driving another 2.5 hours, I arrived late (or rather early) morning next day back home, and after sleept until around 10. Then I started to work again for KDAB, a work that is just as enjoyable as working for KDE. After all, the two communities has a serious overlap. ;)
That's from the sprint. If you'll be at the Qt Developer Days Europe, we might meet there. I'm looking forward for a good conference.


          KMail - making it more usable        

KDE Project:

KMail is one of the most important applications inside KDE, I think hardly can argue anybody about it. Everybody is using email, and even if some think that a webmail solution can be just as good, most of us still do what we did 10-15 years ago: download mail to our computer/phone/tablet and carry that around.
And for that we need a mail application.
It is not news that KMail got just too big and not flexible enough in the KDE 3.x days. Somehow it was ported to KDE 4, but this was a crude port, without much improvements in its design. A new generic PIM backend was growing up meantime, and with some corporate support from KDAB, a new generation of KMail, KOrganizer and other PIM application started to take shape.
From those I can tell about KMail, as I was more involved into it. As we wanted to have a mobile, touchscreen version as well, the work of porting KMail to Akonadi was done together with breaking KMail into smaller pieces, more or less standalone libraries to reuse as much code as possible. Time, manpower and other reasons limited what we could do, so this was a part success. We created and improves some generic usage libraries (KIMAP, KMime), some internal libraries that are nice, some that are not that nice, and in the end we had something that could have been a good foundation for KMail 2 series.
I started to use KMail2 at that time, and in the beginning it was a fustrating experience. I can't count how many times I deleted and created again the accounts, the Akonadi database. But after a while I realized that I don't have to do anymore. KMail2 was still not released to the public, but got better and better. Unfortunately only slowly, as even less people worked on it, and only in their free time. It had bugs, some more annoying, some less annoying, but was usable enough to not force me to go back to KMail1.
Then the PIM community took a deep breath - just like the KDE community did with KDE 4.0 - and finally released KMail2 officially.
Funny or not, around this time I started to have problems with it. A migration of my second computer failed horribly. A cleanup of the Akonadi database and changing from the mixed maildir to maildir format was also painful. I blamed the developers a lot (including myself :) ). Then things started to move on and KMail got a new maintainer, who is very active (hi Laurent!). And we organized a developer sprint to stabilize KMail.
The sprint took place last weekend in KDAB's Berlin office and was sponsored by the company. Everybody who knows the KDAB office, knows about the famous foosball table. Do I have to said that in the weekend we played only once? Yes, people were coding intensively, Volker had to raise the priority of the "FOOD" topic often.
Issues were listed on the whiteboard. And everybody picked up what he was interested to do. Work was done on the migrator, the mixed maildir agent, the maildir resource, on the akonadi server, performance bottlenecks were identified and a new filtering resource was created, fixing the most hated KDE bug (should be closed as soon as Tobias Koenig is happy with his work).
My choice in the sprint was mostly maildir related work, I tried to make it more reliable, more standard compliant and somewhat faster than before. And the biggest win is that I fixed most issues that bothered me with KMail's maildir handling. Yes, I was selfish.
The sprint did not end in Berlin, for me it continued on the flight back home (that thanks to the weather and Lufthansa was almost a day longer than expected). And somewhat still continues as of now, although daily work reduces the time I can allocate to KDE.
I can say that I'm happy again with KMail and Akonadi starts to gets less and less in the way of me and the users. The biggest success will be when users will not know that there is a nice server helping them, called Akonadi.
For those eager to try out the changes, unfortunately most of them are in the master branch only (the upcoming KDE 4.8). We will try to port as much as possible into the KDE 4.7 bugfix releases, but as some changes required library additions, this won't be always possible.


          KDE and NVidia (updated)        

KDE Project:

The above combination was never a painless experience, still at some point in past it seemed to be better to have a NVidia card on Linux then anything else, so I continued to buy them whenever my system was upgraded. Lately although it started to make me rather bad. I have two computers, one that is a 4 core Intel CPU with 8GB of memory, the other is a Core2Duo with 3GB. The latter is a Lenovo laptop. Both have NVidia, nothing high end (Qudaro NVS something and 9300GE, both used with dual monitor setup), but they should be more than enough for desktop usage. Are they?
Well, something goes wrong there. Is that KDE, is that XOrg, is that the driver? I suspect the latter. From time to time (read: often), I ended up with 100% CPU usage for XOrg. Even though I had 3 cores doing nothing the desktop was unusable. Slow scroll, scroll mouse movements, things typed appearing with a delay, things like that. Like I'd have an XT. I tried several driver version, as I didn't always have this issues, but with newer kernel you cannot go back to (too) old drivers. I googled, and found others having similar experience, with no real solution. A suspicion is font rendering for some (non-aliased) fonts, eg. Monospace. Switching fonts sometimes seemed to make a difference, but in the end, the bug returned. Others said GTK apps under Qt cause the problem, and indeed closing Firefox sometimes helped. But it wasn't a solution. Or there was a suggestion to turn the "UseEvents" option on. This really seemed to help, but broke suspend to disk. :( Turning off the second display and turning on again seemed to help...for a while. Turning off the composite manager did not change the situation.
Finally I tried the latest driver that appeared not so long ago, 256.44. And although the CPU usage of XOrg is still visible, with pikes going up to 20-40%, I gain back the control over the desktop. Am I happy with it? Well, not....
As this was only my desktop computer. I quickly updated the driver on the laptop as well, and went on the road. Just to see 100% CPU usage there. :( Did all the tricks again, but nothing helped. Until I had the crazy idea to change my widget theme from the default Oxygen to Plastique. And hurray, the problem went away! It is not perfect, with dual monitor enabled sometimes maximizing a konsole window takes seconds, but still in general the desktop is now usable. And of course this should also make me have more uptime on battery.
Do I blame Oxygen? No, not directly. Although might make sense to investigate what causes there the NVidia driver going crazy and report to NVidia.

So in case you have similar problems, try to switch to 256.44 and if it doesn't help chose a different widget style.

Now, don't say me to use nouveau or nv. Nouveau gave me graphic artifacts and it (or KDE?) didn't remember the dual card setup. Nv failed the suspend to disk test with my machine and doesn't provide 3D acceleration needed eg. for Google Earth.

UPDATE: I upgraded my laptop to 4.5.1 (from openSUSE packages).Well, this broke composition completely, I got only black windows. I saw a new driver is available (256.53), let's try it. So far, so good, even with Oxygen. Let's see on the long run how it behaves, I didn't test it in deep.


          KDE4: is it usable for you?        

KDE Project:

I know it is not so nice to complain and bash a project when you don't contribute to it. And yes until now, I did not contributed to the KDE4 desktop as I wished. I compiled it regularly and used the libraries, but did not run the KDE4 desktop or KDE4 version of the applications except KDevelop and Quanta.
But as 4.0 is approaching, I decided that it is time to test, use, report bugs and even make fixes to it. I use KDE since a long time (~7 years), I think I always compiled from source, and for several years I compiled from CVS/Subversion regularly. I wasn't afraid to use the alpha/beta/whatever version as my daily desktop.
But with KDE4 somehow I feel lost. I tried a few days ago to start a KDE4 session. After getting through some issues that the libraries were not found unless LD_LIBRARY_PATH is modified (and knotify even with this setup has problem to find libkaudiodevicelist.so), I finally got it running. Well, it looks nice at first. So what to do there? I can start the KDE4 applications from the Run Command dialogbox. This dialog is a nice improvement over the old version, especially the autocompletion is handy.
In my version the menu was still missing, which isn't nice, but I don't care that much. What I care more is the speed, or to be exact, the lack of it. I blamed first the debug version of the libraries and the desktop, so I did a complete fresh build without debug information (a sidenote: my KDE3 is compiled WITH debug info and works fast enough). Sadly, it isn't faster. An example: right click on the desktop, and until the menu is shown, 3-4 seconds can pass. During this time Plasma and XOrg are heavily using the CPU. Moving around a window makes again ~58% CPU load (by kwin). Moving the mouse over the taskbar gives me 60% CPU usage by plasma AND 50% CPU usage by XOrg.
This slowness if everywhere on the desktop. I click somewhere and it takes some seconds until it reacts. The "natural" reaction is to click again, which makes things worse. What is the reason of this slowness, I don't know. But I am worried about it, because I have a fairy decent computer here, everything is fast except my video card: AMD Opteron 180 Dual Core (2.4Ghz), 2GB Dual Channel RAM, 7200RPM SATA HDD, Nvidia FX5500 card (with the binary drivers). The card isn't the state of the art one, but should be more than enough for desktop usage. I tried compiz with it, and it works OK. I can see the reaction lag with compiz as well (compared to the KDE3 version of kwin, which is lightning fast), but it is still quite usable.
I tried to remove kwin and use another window manager. This made at least the window operations faster, but the desktop was still slow.
That's about the speed.
Now about the usability side: I have no idea if what I tried is implemented at all or not, if there are plans to do them for the final release or not, but certainly I can say that as it is now, it is close to be unusable. There is the panel on the bottom with the taskbar and the clock. The taskbar let's say works, but I couldn't figure out what really a left/right click on an empty area of the taskbar does. It minimizes/restores the running applications, but I don't see the logic. I also don't know how to move around the taskbar on the panel. I don't know how to move the panel. It is possible to add new applets to the desktop, but I don't know how to move those applets to a panel. Moving them around on the screen is terribly slow.
There is also an Unknown Applet on my panel which "could not be created". I have no idea what it is or how it appeared there.
I also saw some bugs, like black boxes on top of windows appearing when you move a window over an applet, but this kind of issues are just simple bugs, acceptable at this stage of the development.
Unfortunately this experience can have only one outcome: I cannot use KDE4 as my daily desktop. Not even as a testing desktop.
So the solution is to test only the libraries and the applications. Luckily it is pretty easy to have a setup where you can run KDE4 applications under KDE3. Well, the first and one of the most important applications is Konqueror. I'm writing this blog from Konqueror4. Altough I feel a slowness here as well (when navigating through the menus, for example), this isn't a big issue, it is usable. I saw some rendering bugs, an ugly infinite loop when loading a certain page, but I saw similar issues with the old Konqui as well.
There is a problem with the editor area where I write the blog text (home bring to the beginning of the text, not the beginning of the line, mouse scrolling does not work) and the closing buttons on the tabs do not work, but again, in beta stage these are "normal" bugs.
For the applications the solution is to report the bugs or try to fix them. :) I will happily report them.

My conclusion: as it is now, the KDE4 desktop should not be released. Luckily we have some months left until the final release, so who knows, it might really be usable. I have more confidence in the base libraries and the applications. I think there only some polish is needed, in general they should be usable, but as I said, I didn't test many of them either. But what I started up for a quick test seemed to work.


          Unlocking G Suite for Nonprofits: Improve internal workflow and communication        

Whether you have a team of five or 500 a seamless, collaborative workflow is critical in the digital age. Our goal is to make sure that your nonprofit is able to focus on changing the world by using technology to save time -- not waste it. In the digital age though, information sharing can often be complex; your team might not work in the same office, or even the same timezone. Some team members might be in an office with computer access, while others are in the field on mobile devices. Who from your team should be able to access confidential documents?

This brings us to a key question: How do you empower team members to work together towards a common goal, and use technology to enable it?

Great question. We’d like to introduce you to G Suite - (formerly  Google Apps for Work ). G Suite aims to help teams work together in real-time -- no matter where they are in the world.

Today, we’re spotlighting a few nonprofits to share how their teams  are using Google tools and apps to improve workflow and internal communication.

Mercy Beyond Borders - Internal Communication with Sheets & Sites

Mercy Beyond Borders (MBB) is a U.S. nonprofit that aims to forge opportunities for women and girls in extreme poverty to learn, connect, and lead. Utilizing a small office in the U.S. as home base, MBB targets rural areas in Haiti and South Sudan. In both of these areas, cultural norms and poverty prohibit full participation of women. In fact, these areas offer minimal education and opportunities for employment, which often  impedes the development of leadership skills or positions. Mercy Beyond Borders focuses its programs on providing trainings, scholarships, leadership camps, and business loans for women.

To achieve their mission, Mercy Beyond Borders faces the challenge of balancing US-based operations with field work in remote areas like South Sudan and Haiti. Their nonprofit partners range from large organizations to local schools to individuals. So how does Mercy Beyond Borders ensure that all staff, vendors, and partners stay connected and working together in sync?
MBB-trained nurse in South-Sudan village
MBB-trained nurse in South Sudan village. Photo credit: Mercy Beyond Borders

Mercy Beyond Border began using G Suite to streamline its workflow, connecting their team across the globe. Using G Suite, MBB’s team is able to access, share, and collaborate together in real-time. Take a glimpse into how they do it:

  • Track Finances: MBB manages their overseas program budget expenditures in Google Sheets. Using this tool, the domestic office tracks monthly vendor payments in Haiti. This enables the staff to wire more money as needed in order to ensure program success. Additionally, using Sheets enables the team to provide transparency in the organization, clarifying spending and creating a simple overview of total annual expenses. This standardized and collaborative approach to data enables better efficiency and communication between domestic and international offices.

  • Store images: Mercy Beyond Borders regularly takes photos in the field to keep the domestic office up to date on progress and communicate stories to their donors. The team overseas is able to upload the pictures to Google Drive, which allows them to share or retrieve the images at any time.

  • Share Information: It’s imperative that MBB shares frequent updates with the Board of Directors, highlighting current developments, areas for growth, and new opportunities. To keep the Board of Directors apprised of progress, the team created a MBB Board website with Google Sites as a way to provide updates outside of meetings. The site functions as a central hub, where the Board can find all relevant information and resources at their discretion. The website is organized in subsections including internal updates from the Executive Director, background articles on country conditions and descriptions of new partnerships. To take it one step further, MBB also added a comment section for board members to engage in open communication.

“It [G Suite] helps to better connect, engage, and keep Board members up-to-date in between meetings, or  if they are unable to make a meeting (in which case they can view the Meeting Archives page),” said Adrienne Perez.


MyFace - Increasing productivity and improving internal workflow by remote access

Established in 1951, MyFace was founded to address the medical, surgical and psychological needs of those living with facial deformities. The organization offers access to care and treatments --- regardless of the severity of the anomaly, the length of treatment, or the family’s ability to afford care. In America alone, 1 in 650 children is born with an facial cleft. Every year, MyFace helps more than 1,000 patients seek treatment. Of this population, 85% are children, 70% live in poverty, and 95% require long-term care. The costs involved in this are high and verges on insurmountable for low income families. With this in mind, MyFace ensures that all children receive highest quality interdisciplinary and comprehensive reconstructive care by doctors who provide their services pro bono.

As a small nonprofit (their staff of eight including their therapy dog, Bentley), employees are required to perform a variety of different tasks. On any given day, team members might be responsible for website design, grant proposal writing, and marketing strategy. And oftentimes, what one employee starts today is  picked up by another employee tomorrow. Because it’s often all-hands-on-deck, collaboration is particularly key for MyFace.

Our mission of changing faces and transforming lives can be fulfilled with the help of technology from G4NP Carolyn Spector Executive Director MyFace

To address their challenge, MyFace began using Google Drive to centrally store, access, and share information from anywhere at anytime. Drive helped decrease the amount of time that MyFace spends on administrative tasks, like sending documents back and forth or working with out-of-date data or information. Drive’s tools like Docs and Sheets enable the team to collaborate both in and out of office.

MyFace also deals with an overwhelming amount of data and information. The team needs this data to not only be easy to store, retrieve, and share — it needs to be secure, since it contains confidential and personal patient information. G Suite offers that as well, ensuring that all information is kept private and secure. (Want to know more about G Suite security and how safe they really are? Read more about it here).

“Our mission of changing faces and transforming lives can be fulfilled with the help of technology from G4NP because it offers invaluable resources to nonprofits of any size at no cost,” stated Carolyn Spector, Executive Director of MyFace.

MyFace Staff photo
MyFace team. Photo credit: MyFace

Having global teams of different sizes with varying access to technology can make timely communication difficult, if not impossible. While nonprofits like Mercy Beyond Borders and myFace strive to accomplish unique missions, both organizations are passionate about changing the world. And about using the right technology to help. Utilizing tools like G Suite has been key for nonprofits like these in order to improve internal workflow and communications. For Mercy and my Face, making information shared, up-to-date, and secure has been crucial for navigating the Technology Age.

Interested in learning more about the tools available to your nonprofit? Check out our website to see how G4NP can help your nonprofit with real-time, up-to-date communication and data sharing.

//

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours free access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.

Footnote:  Statements are provided by Nonprofits that received free products as part of the Google for Nonprofits program, which offers free products to qualified nonprofits.


          A nonprofit's guide to online security: So you want to learn the lingo?        
This year marks the 25th anniversary of the World Wide Web becoming publicly available. For many of us, this is a reminder of just how much the Internet has transformed our daily lives. This rings true for nonprofits too: The Internet has revolutionized the way that nonprofits communicate, fundraise, and recruit volunteers. It has enabled nonprofits like yours to share their mission with a global audience. To raise awareness. And to change the world. 

But the power of the Internet also comes with great responsibility -- namely the need to keep information safe and secure. As a nonprofit, it can be difficult to keep up with online security, especially when terminology seems complicated. Yes, you might have heard of terms like “phishing” or “cookies,” but what do they mean?

Today, you can find the answers to your questions with our quick & easy to guide to online security terminology. In less than five minutes, you’ll be well on the way to helping keep your nonprofit safe on the Internet. 

Let’s get started! Here’s a quick guide to familiarize yourself with common lingo and learn how to distinguish terms that are friends vs foes in the online security realm. 


THE BAD GUYS: MALICIOUS ACTIONS/TERMS

  • Advanced Fee Fraud (419 scams): A technique which tricks users into sending or paying money to fraudsters on the promise of receiving greater rewards afterwards. It is most commonly associated with Nigeria, and 419 is the section of the Nigerian legal code that covers this fraud.
  • Botnet: A network of computers that are infected with malicious software without users’ knowledge, used to send viruses and spam to other computers.
  • Malware: Malicious software with the purpose of infecting devices and systems, gathering personal information, gaining access to systems or disrupting the operations of the device or systems. Essentially, any software that maliciously alters or compromises the system or device.
  • Phishing / Social Engineering Attack: An attempt by hackers who pose as trustworthy individuals or businesses in order to get your personal information such as usernames, passwords, and financial information.
  • Trojans: Malicious programs posing as or bundled with legitimate ones, which are designed to compromise your system. They are usually installed on computers from opening attachments in scam emails or by visiting infected websites. The term comes from the Trojan Horse in Greek mythology.

How to avoid social engineering attacks

THE GOOD GUYS: ONLINE SAFETY TERMS


  • [Internet] Cookie: A piece of data from a visited website and stored in the user's web browser in order to remember information that the user has entered or engaged with such as items in a shopping basket on an e-commerce site.
  • Encryption: The process of encoding data, messages, or information, such that only authorized parties can read it.
  • Firewall: A security system used to block hackers, viruses, and other malicious threats to your computer. It does this by acting as a barrier, acting on predetermined rules, which allows trusted traffic but blocks untrusted or non-secure traffic. 
  • HTTPS (Hypertext Transfer Protocol): is the protocol for secure communications over a computer network used on the Internet. It essentially provides authentication of the website and the web servers associated with it. 
  • Transport Layer Security (TLS): TLS is a protocol that encrypts and delivers mail securely, both for inbound and outbound mail traffic. It helps prevent eavesdropping between mail servers – keeping your messages private while they're moving between email providers. 
  • Two Factor Authentication / Two Step Verification: A method of using an additional process to verify your identity online. It combines both ‘something you know’ (like a password) and ‘something you have’ (like your phone or security key) — similar to withdrawing money from an ATM/cash machine, where you need both your PIN and your bank card.

That’s a wrap for now! Pass on these tips to your nonprofit partners to stay safe and secure online, so you can focus on what matters most: changing the world. 

//

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here.


          Four ways to keep your nonprofit safe & secure online        
safety security g4np
For nonprofits, the Internet serves as a powerful vehicle for change — creating a way to access information, connect with users, and drive innovation. But navigating the web can also be a tricky task. Online safety and security has become increasingly pertinent for all digital users, including nonprofits. While it’s relevant to all though, it’s unattended by many. This raises the question: “How do we keep our nonprofit (and the community we serve) safe and secure online?”

Today, we’re partnering with Google’s User Advocacy Group to share four smart tips to keep your nonprofit, your users, and you safe online.

1. Secure your passwords

Many of us “know” that it’s smart to pick a strong password, but out of convenience we also continue to use our favorite pet’s name (e.g. “Clifford”) or other not-so-creative passwords like “password.” Although pets like Clifford are great, they don’t make great passwords. Rather, this weak protection creates vulnerable access to some of your nonprofit’s most sensitive information.

Picking strong passwords that are different for each of your accounts is extremely important -- it’s also good practice to update your passwords regularly.  Check out the following tips: 

  • Use a unique password for each of your accounts. Would you give a burglar a key that accessed your home, car, garage, and more? Using the same password for multiple accounts creates the same type of risk. Ensure you’re protecting your data by using unique passwords for each account.

  • Include numbers, letters and symbols in your password. The longer your password is, the harder it is to guess. Adding numbers, symbols and mixed-case letters makes it harder for someone to gain access to your account.

  • Create password recovery options and keep them up-to-date. If you forget your password or get locked out, you need a way to get back into your account. Many services will send this information to a recovery email address to reset your password, so be sure your recovery email address is up-to-date and accessible. You may also be able to add a phone number to your profile to receive a code to reset your password via text message. Having a mobile phone number on your account is one of the easiest and most reliable ways to help keep your account safe.

2. Take the security checkup


Google’s Security Checkup is a quick, easy way to review the following information about your account (and more)!
  • Recent activity: This is a quick overview of your recent sign-ins to Google. If you see any activity from a location or device you don’t recognize, change your password immediately.

  • Account permissions: These are the apps, websites, and devices connected to your Google account. Take a look and make sure you trust—and actually use—all of them. You might want to remove an old phone, or that dusty app you never use.

  • Check your 2-step verification:  Most people have only one layer of protection with their password. 2-step verification adds an additional layer of security to your account by requiring a phone or security key to access your account information.

3. Understand your privacy settings


If you do your personal and business work on the same computer, you will want to also check your privacy settings through Google’s Privacy Checkup. Privacy Checkup allows you to control what information like photos, videos and reviews are shared to the public or to whomever you choose.
  • Manage your sharing: You can decide what information you want to share such as videos, photos and reviews. Perhaps your nonprofit videos are only shared with your friends, when you want them to be shared with anyone. This is a simple way to check to see who can see what.

  • Personalize your google experience: One additional function of privacy checkup is to see what information you’re sharing with Google. Google uses this information to provide better search results and more relevant information to get you answers quicker and more relevant information to share to your nonprofit community.


Review important information about how Google uses data to make services better for you and your nonprofit.

4. Ensure you're switching between your personal & business accounts


We understand that as a nonprofit, you wear many hats and manage multiple business accounts in addition to personal ones. Google makes it easy toggle between accounts — visit your account settings to quickly determine which data you’re accessing, and rest easy knowing your personal and business information are separate.

  • Guest Mode or Incognito mode: Share Chrome with other people in your organization and ensure everyone has their own settings and bookmarks. You can also utilize Guest mode or Incognito mode to open a private browsing session in Chrome without leaving browser history or cookies behind once you’ve logged out.

  • Using Chrome on an unfamiliar device or machine: If you’re using an unfamiliar device or machine, ensure you’ve properly logged out of your account before heading off to your next meeting.


Online security doesn’t have to be difficult. These simple steps will give you peace of mind and protect your nonprofit’s valuable work. If you have any other online security questions or want to recommend a topic for a future blog, please add a comment below. 

To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more — all at no charge. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more + enroll here.  


          HAPPY 13TH BIRTHDAY, Google Ad Grants        
Happy 13th birthday, Google Ad Grants! We launched Ad Grants 13 years ago to offer nonprofits a free online advertising solution to share their causes with the world. 

Over the years, we’ve learned a lot together about what it means to be a nonprofit in the digital age. And as the industry landscape has changed, we’ve aimed to ensure that AdWords consistently helps to deliver your mission online. 


We’ve celebrated the ability of groups to change the world — one day, one person, one place at a time. At the same time, we’ve also come to understand the challenges of the nonprofit sector by both listening to your stories, as well as working directly alongside you. In doing so, we recognized that nonprofits struggle to find the time or resources to manage an AdWords account. So in 2015, we launched AdWords Express for Ad Grants as a part of Google for Nonprofits.

AdGrantsInfographic.width-495.png
With nonprofits’ limited time and resources in mind, we created AdWords Express to be an automated advertising solution that serves the same effective ads on Google Search as standard AdWords. AdWords Express requires less ongoing maintenance than AdWords, while still delivering an exceptional experience for Ad Grantees. 


With AdWords Express, your nonprofit can create an online ad quickly and easily, attracting more users to your website. There’s minimal ongoing management necessary, and AdWords Express runs and automatically optimizes your ads for you. Much like AdWords though, you can still reach customers on desktop computers and mobile devices (such as smartphones and tablets), as well as review the effectiveness of your ads in your dashboard. 


Sign up for Google Ad Grants here. For more information on AdWords Express, how to get started, and country availability, please visit our Ad Grants Help Center. 


To see if your nonprofit is eligible to participate, review the Google for Nonprofits eligibility guidelines. Google for Nonprofits offers organizations like yours free access to Google tools like Gmail, Google Calendar, Google Drive, Google Ad Grants, YouTube for Nonprofits and more. These tools can help you reach new donors and volunteers, work more efficiently, and tell your nonprofit’s story. Learn more and enroll here. 


          Google for Education presents: Google RISE Awards!        

Google for Education just opened applications for the Google RISE Awards, a $10-25k USD grant given to nonprofit organizations globally that give girls and underrepresented students access to computer science through extracurricular outreach programs. In 2015, 37 organizations from 17 countries received RISE Awards for projects ranging from programming clubs in Johannesburg to workshops on CS and music production in San Francisco. 

chromebooks.JPG
Learning about CS promotes valuable problem solving skills that students can apply to any field of study. Unfortunately, many students have a negative perception of what CS is and who it’s for. By partnering with nonprofits that are providing students with access and exposure to CS, we hope to change this perception and encourage more students to pursue CS. We’ve been inspired by the creativity and passion we’ve seen from our past RISE awardees, and this year we’re excited to expand the reach of the RISE awards by opening two rounds of funding applications for nonprofit organizations. 

The RISE Awards are now accepting applications through February 19, and more information on the application process is listed on our website. Visit g.co/csedu to learn more about Google’s other CS resources, including our CS teacher professional development awards, Computer Science for High School (CS4HS), which is also currently accepting applications for the 2016 year.


          KVM virtualization with Allwinner A20 on Debian: libre, low-power, low-cost        
Introduction Various cheap ARM boards based on the Allwinner A20 SoC are available already for a few years. The first EOMA68 computer [1] will be also based on this chipset. Not many users know that the Allwinner A20 supports hardware-supported virtualization as well. Its Cortex A7 cores allow running hardware-accelerated ARM virtual machines (guests) using Read more »
          Backing up and restoring data on Android devices directly via USB (Howto)        
Motivation I was looking for a simple way to backup data on Android devices directly to a device running GNU/Linux connected over a USB cable (in my case, a desktop computer). Is this really so unique that it’s worth writing a new article about it? Well, in my case, I did not want to buffer Read more »
          Î— Ρωσία προωθεί νόμο απαγόρευσης των proxies, Tor και VPNs        


Σύμφωνα με το Bleeping Computer τα δύο νομοθετικά σώματα της Ρωσίας, ενέκριναν και προώθησαν στο γραφείο του προέδρου Πούτιν, νομοσχέδιο που απαγορεύει την χρήση proxies, Tor και VPNs, από τους χρήστες στην χώρα. Η έγκριση του έγινε παρά τις έντονες διαδηλώσεις υπέρ του ελέυθερου Internet την χώρα.

Οι πάροχοι Internet της Ρωσίας υποχρεούνται να επιβάλουν την πλήρη απαγόρευση χρήσης όλων των τρόπων παράκαμψης των περιορισμών της πρόσβασης περιεχομένου, που έχει γίνει με κρατική εντολή.

Αν τελικά περάσει σαν νόμος, τότε η Ρωσία θα γίνει η πρώτη χώρα που θα επιβάλει επίσημη απαγόρευση proxies, Tor και VPNs.

[via]
          Comment: Artificial intelligence is coming, ready or not        
The other day, I got into a discussion about singularity and artificial intelligence with a computer science student. He's young, smart and full of ...
          Review: Laneige Water Bank Eye Gel        
This is my second post on my purchase from Althea. Other than the Missha Red Ginseng Sheet Mask, I also bought Laneige Water Bank Eye Gel. Eye bags and dark eye circles runs in the family. So whenever I do not have enough sleep, my eye bags and dark circles become more apparent. I have always wanted to buy a good eye cream while I was schooling but couldn't really afford because you know how expensive eye cream can be. So once I got my first paid I decide to get one. My first ever eye cream is Laneige Water Bank Eye Gel which is from Laneige Water Bank series.


Contents in Laneige Water Bank Eye Gel Box
The box comes with an instruction sheet, a glass bottle of eye gel and a spatula for ease of application. The description on the box states the Water Bank Eye Gel is 'A moisturizing eye gel that gently soothes the dry and sensitive eye area and relieves eye zone stress'. The box also states that the gel expires after 12 months after opening.



Removing the seal from the bottle
The gel/cream is slightly translucent and light. It is also really light and not sticky. When applied, it gives a slightly cooling sensation on your eye area. I am really impressed by how detailed the instruction booklet is. I always try to follow the instruction unless I am really tired.

Instruction 1

Instruction 2

So what is my verdict? I think the gel really helps to make my eyes feel less tired after spending a whole in front of the computer  at work. I could really feel the effects when I first apply it. My eyes felt less heavy the next day. However, I feel it doesn't really help to lighten my dark eye circles and it only help to my eyes become less puffy by slightly. Perhaps because my eyes isn't very puffy initially.  I tried using the cream on my mother who had really puffy eyes and it showed some visible effects! I can give inputs on its moisturizing function because my eyes' area are never dry in the first place.

I'll give this product 4/5.

          USA's Mr. Robot's Revolution will be Televised. But You Still Should Not Watch It.        

This week’s episode of USA’s Mr. Robot saw the computer-hacker, techno-geek drama finally get over its mid-season identity crisis, and get back to its obvious intended purpose: glorifying cyber revolution for the purpose of mass income redistribution.


          Malware: How we are Infected [InfoGraphic]        
So you have a computer, but if it was infected with a virus, what would you do? Would you even know it was there? It is a well-known fact that over 32% of all computers in the world have malware of some sort. Today we will be talking about the infamous computer virus and what it is.

So let's start with something you all have probably heard of, Malware. Malware is a program made to infiltrate your computer, disable parts of it, and thus gain access to your hard drive, search history and such to aid with stealing information. However, there are other types of malware out there. Let's get to know them and how much of the 32% they infect.

At 57%, first we have the virus. This is a software that has the capability to copy itself and send itself into other folders. Then there is the "Trojan" at 21%. The Trojan is malicious software that hides on the internet disguised as some sort of program or free item, and ce you download it, you will soon discover it is malicious. But the Trojan has a brother at 7%, called the "Trojan Downloader". This type of virus does the same thing as the simple Trojan, but once on your computer it downloads more viruses and software, then begins to use those programs.

Then at 3% there is the "Exploit", which finds a glitch, bug or system error and uses that to hack into your computer. Next we have the "Worm" at 2%, this malicious bug works the same as a Trojan, but then copies and pastes itself across your computer network.

But not all viruses seem so bad when you get them, for instance the "Adware" at 3%. This type of virus infects your computer so nothing happens at first, but once you log into your web browser, then immediately your screen will be flooded with ads. There is also the "Monitoring Tool" with 2% of the 32% infected. This malware infects your computer and hides, not doing anything but monitoring your activity, (Search history, keyboard history etc.) and then sends those back to a remote server.

There is also one of the worst at 1%, the "Back Door". This virus infects your computer remotely, not allowing your anti-virus security to even detect it, but sure enough it does. And lastly we have one of the worst but luckily at a low percentage of 0.01%, "Spyware". This diabolically designed software infects your computer and takes the most important pieces of information it can find and sends it back to wherever it came from. This information is generally passwords, credit card numbers and other sensitive information.
All of these viruses have devastating effects. Last year there were 27 million strains of malware made, which means 74,000 new viruses are created every day. The number of homes in the United States that experience spam is 24 million. The number of homes with serious viruses in the last 2 years is 16 million, and the number of houses that had spyware in the last 6 months is 6 million. But most devastating of all, over 1 million of all homes have lost money to spyware in the last year. Another devastating fact is that Viruses cost the world 4.55 billion USD every year.

So be safe, don't download anything you are unsure of, and be sure to have an anti-virus software. But most importantly learn how to detect these programs when you get them.























          WhatsApp spam used by ASProx Botnet to Deliver Kuluoz Malware        

5448944597_8e70da64ab_o.png

Photo by: Sean MacEntee




As you probably know, Facebook bought WhatsApp for an obscene amount of money in stock earlier this year. What you might not know is that there's a lot of WhatsApp spam that is being used by ASProx Botnet to deliver nasty Kuluoz malware to unsuspecting  users. This is not good news any way you look at the situation. Keep reading if you want to know more about this as well as what you should do to stay safe.


Here's a look at some of the dates when the WhatsApp problem has made Malcovery's "Today's Top Threats" list.


  1. SEPTEMBER 19, 23, 24, 25, 26
  2. OCTOBER 2, 3, 4, 7, 8, 9, 10, 11, 16, 17, 18, 21, 22, 23, 24, 25
  3. NOVEMBER 14
  4. JANUARY 9, 13, 15, 20, 28


Looking at that list, it's easy to start wondering why nothing has been done sooner about the problem. Additionally, it really makes you wonder why Facebook paid so much for the company by offering them stock options.


Going back to November of last year, ComputerWorld published an article about how WhatsApp was one of the top five brands imitated to deliver malware with spam. That's quite a bit of recognition - and not in a good way.


Here's a look at some specific ways you can stay safe and avoid Kuluoz and other malware.

  • Use Protection - The very first thing you want to do is make sure you're using some type of protection. The good news is that you don't need to spend a lot of money to get decent anti-virus software these days.
  • Update Protection - Having protection software is nice, but if you never update it at all, you're going to find that there's still a high chance your computer will get infected and quit working correctly.
  • Be Suspicious - If you're not sure of something online, you want to err on the side of caution and not take any unnecessary risks. Even with a brand like WhatsApp - that's connected to Facebook now - you want to be very careful and know what you're doing.
  • Educate Yourself - Last but most certainly not least, you should make an effort to stay informed about how malware works and the steps you can take to protect yourself from it whenever possible. This is really the best way you can make sure your computer stays safe and virus free.


Following the advice above, there's a good chance you'll be able to avoid WhatsApp spam and not get infected with Kuluoz malware. Still, it's a good idea to pay attention and update your anti-virus software all the time. If you have any experience with WhatsApp that's negative, please leave us a comment below. 







Guest Post - 
 
Written by: Jenny Corteza deals with staff outsourcing all the time. She's a writer and dealing with editors and others can sometimes be a problem. Still, she loves writing articles about technology. Go figure.






          What is Remote Code Execution? How to Hack Websites        
According to Wikipedia, Remote Code Execution can be defined as “In computer security, arbitrary code execution or remote code execution is used to describe an attacker's ability to execute any commands of the attacker's choice on a target machine or in a target process. It is commonly used in arbitrary code execution vulnerability to describe a software bug that gives an attacker a way to execute arbitrary code. A program that is designed to exploit such vulnerability is called an arbitrary code execution exploit. Most of these vulnerabilities allow the execution of machine code and most exploits therefore inject and execute shell code to give an attacker an easy way to manually run arbitrary commands. The ability to trigger arbitrary code execution from one machine on another (especially via a wide-area network such as the Internet) is often referred to as remote code execution”

vBulletin RCE Injection

Few websites running vBulletin are vulnerable to Remote Code Execution, by exploiting the vulnerability we can get our PHP backdoor shell uploaded on the website. We’ll use a dork to find the vulnerable website.

Note: Don’t keep yourself restricted when it comes to using dorks, use other search engines too other than Google, like Bing, Yahoo etc. Use of multiple search engines will help you to get more vulnerable websites.

Dork: inurl:faq.php & intext:"Warning: system() [function.system]"

Now, select any website of your choice from th search result, and go to its faq.php page. If the website is vulnerable, you will get the following on the page.


You will get an error similar to Warning: system() [function.system]: Cannot execute a blank command in [path]/faq.php(324) : eval()'d code on line 1

So, firstly upload your PHP shell on any free hosting website or you can use sh3ll.org/c99.txt as it has already got an uploaded .txt shell. (We will be first uploading our shell in .txt form, and later will be changing the extension to .php after the upload process is completed.

Suppose the vulnerable website is http://www.vulnerable.com/faq.php. So in order to upload our shell enter the following in the URL bar:

http://www.vulnerable.com/faq.php?cmd=cd /tmp;wget http://sh3ll.org/c99.txt

To check if we were able to successfully upload our shell, enter the following in the URL bar 
http://www.vulnerable.com/faq.php?cmd=cd /tmp;ls -la c99.txt

Were c99.txt is the name of your uploaded shell. If we were successful in uploading our shell, we see the following text on the page. (Might be a little different in some cases)
-rw-r—r—1 nobody nobody

We know that our shell is successful uploaded on the website, now it’s time to change the file format from .txt to .php in order to execute it on the server.

http://www.vulnerable.com/faq.php?cmd=cd /tmp;mv c99.txt check.php
(You can change check.php to any other name of your choice)

Now, the file format is change. It’s time to execute our shell, so to execute it enter the following in the URL bar
http://www.vulnerable.com/faq.php?cmd=cd /tmp;mv c99.txt check.php
 

Bingo!! We successfully exploited vBulletin Remote Code Execution Vulnerability.


          Technology and it's threat         

Technology and its threat

It's true that technology makes everyone dance on its tone. Now we have computers with the help of which we can get information about everything. It has also changed the way of communication. Earlier we use to talk via letters and phones. But, now we have a webcam through which we can do video calling or conferencing. It's true that machines have been created by men, but they make fewer mistakes as compared to men. You just need to program the computer properly and it will work accurately. With the help of computer everything is done perfectly in less time. Now days it’s not surprising if students carry their laptop and mobile to school. Technology has truly made our lives easier.



But a computer also faces health issues, which can be treated by an Antivirus Software program.
Following are  top 8 threats and no one should ever ignore them

Viruses: - The name itself describes it. It can disrupt a computer and can damage the available data. Viruses can be received via numerous options that also include e-mail attachments. So, always beware when you get an e-mail from an unidentified server or person.

Spyware: - A Spyware is used to spy on computers. It can steal your personal information and send it to others who can misuse it. Today everyone is concerned about being the victim of identity theft. Spyware are generally attached to a freeware downloaded from the web. So be cautious when downloading and installing a software tool.

Spam: - Spam mails are promotional in nature and usually promote products of sexual or dubious nature. Some websites are harvested by spammers, from where they steal your e-mail ids.
Adware: - Adware are responsible for producing advertisements on a system without user’s consent, which you often see on your computer screen. It can be in the form of pop-ups, pop-under, and other sources. People generally do get irritated by these adware but at many times are not aware of its causes.

Dialers: - Dialers are the programs, which are designed to redirect phone calls to expensive numbers without even informing you. You’ll get to know about it, when you will receive the bill.
Hackers: - A computer always consists of so much personal data, including your bank and credit card details. Hackers always try to steal this data and recover your passwords in order to do malicious activities and even may burgle you.

Hijackers: - The hijackers take remote control of your computer screen and can reset your homepage and search pages. They do it in order to do thievery on your behalf so that they can be away from the agencies and you’ll be in danger.

Phishing: - Phishing has become the most threat full of all malicious activities over the internet. It is because Phishing websites look similar to the real websites, and are designed to make fools out of the customer and are generally scams to harvest usernames and passwords of prominent websites.

In order to be away from these 8 threats, download Security Software Optimo Defender, which also scans for threats and performs virus removal programs on a computer by offering various features like Antivirus,

Anti-Trojan, Anti-Spyware, and System Security Suite. There are a lot of Antivirus programs available on the internet, but like everything else they also vary in quality. You tend to get what you pay for.
Anna Asthesia is chief technical head in optimodefender.com & working from last 5 years. She likes to write article on antivirus software program, security software & how to find genuine online tech support for Laptops, Computers & Smartphones.

About the Author
Anna Asthesia is chief technial head in optimopro.com & working from last 5 years. She likes to write article on windows registry , computer problems & how to find genuine online tech support for Laptops, Computers & Smartphones.You can read her latest blogs onblog.optimopro.com



          How To Speed Up Your Computer with Optimo Pro        
Computer users are inundated with tribulations frequently. The way you eat food to keep you going and to keep you fit, likewise, computer machine also needs maintenance every now and then. Your body demands food to keep you going. So how can your computer lag behind? Computer optimization is the buzz word. Everyone wants to speed up computer to reap more benefits.

Regular holdups that stall the computer’s performance become a complete nuisance. Virus attacks, malware intrusions, Trojan horse, and other cruel problems slow down the speed of your system. But most of the users find it difficult to understand the problem and resolve them. What you require is good quality pc cleaner that deals with junk files, registry errors and much more.
Quite a few PC cleaners are doing the rounds in the market, some fake and some real. Fake ones rather than solving any setback embed a set of virus and infections that results in loss of time and money. Real ones effectively optimize your computer system that helps speed up computer.
Optimo Pro is software that comes with more than one program. They scan the computer within minutes and help the customer get back to work. Within months of its launch, Optimo Pro has had immense outreach and has helped computer users, be it consumers or business. The increased usage of Optimo Pro has been phenomenal.



What all it does?

  • Removes data footprints from at least 25 browsers
  • Protects your confidentiality
  • Wipes and cleanses up to 25 browsers like Google Chrome, Safari, Firefox
  • Takes care of the clutter that clogs the system
  • Features:
  • Windows Registry cleaner
  • Apps Errors cleaner
  • Files cleaner
  • Browser cleaner
  • Short cut cleaner
  • Trace cleaner
  • Registry Optimizer
  • Junk Files cleaner
  • PC Optimizer
  • Complete computer cleaning software



All these apps work in tandem with each other and help increase the speed of your PC. A PC cleaner acts a scrubber that scrubs manifold parts of the computer and helps keep it in good shape. Be it fixing your registry or cleaning junk files, it does all.
With the kind of success Optimo Pro has gathered, it becomes worthwhile to at least give it a try. Download Optimo Pro from www.optimopro.com  and make use of the trial version. Our customer service number is 1-800-413-1289. You can ask any question and we will be more than happy to serve you.

About the Author
Anna Asthesia is chief technial head in optimopro.com & working from last 5 years. She likes to write article on windows registry , computer problems & how to find genuine online tech support for Laptops, Computers & Smartphones.You can read her latest blogs on blog.optimopro.com


          Basics Of Wi-Fi Security         


Hi all today i am just going to discuss how you can secure your wifi network from hackers. you must have came across many tips on securing wifi network from various blogs and all but here we will discuss from a hackers point of view and all practical and genuine approach to securing Wi-Fi network so lets begin.










 

 

Tips On Securing Wi-Fi Network -


Be Sure To Use the strongest wireless encryption your modem or router provide Making your wireless modem with wpa or wpa2 encrypt do give a trust that your wifi netwok is safe. Typically our router or modem uses various methods of encryption to protect data sent over wifi network. Always use WAP or WPA2 to use secure your wifi network if your router/modem is not having those encryption then never select that brand router/modem. If your modem/router does not provide WPA or WPA2 encryption it is strongly recommended that a new device be purchased.So you must have heard about WEP (Wired Equivalency Privacy) it is quite older technique of securing which easy for hackers to crack with that I can never say you are completely secure.




Remember the use(Change default pass) of strongest possible network password / network
key always ensure better security -














Again Its a simple tips which applies on all field for better security, As  you know general rule, the longer and more complicated the password, the more difficult for hackers to crack it. I do recommend to use minimum an eight character password should be used to allow access to your wireless network. And remember don't forget to change your modem/router default password people do forget it many time which lead to compromise the wifi network. Never use the same password to control or access more than one system or program and never use your wireless network name as your password! Doing such stupid activity makes things too easy for anyone to hack your wifi easily. Its obvious thing that most of the time our modems are designed to use a default password such as “admin”, “password” or the manufacturer’s name. These settings are easily accessible to a user when the modem and network is being set up, however because they are easily accessible and often use weak passwords will unless changed, remain potentially accessible to anyone who wishes to gain access. There are many sites available on internet which give away default passwords for modems /routers (vendor specific as well). Changing your modem or router’s default password offers a simple but effective security measure against unauthorized remote access.




Hide your SSID (network name)  - 









I know the Wi-Fi network is still Hack-able when SSID Is hidden but it makes thing bit difficult for hackers to crack any Wi-Fi network which is invisible. Typically all Wi-Fi network broadcast its presence (beacon frames) when they are turned on so making the SSID hidden keep another layer of protection in securing Wi-Fi network because if the network is not broadcasting its name that make difficult for hackers to hack it.




Access to Remote modem administration -

These days most modern modems or routers can be remotely administered over the internet. If yours can, then someone besides you can potentially locate your modem’s IP (Internet Protocol) address and potentially hack your modem.A simple fix to this vulnerability is to disable remote administration for your modem or router. If you absolutely require remote access then you can try limiting access to a particular IP address or limited range of addresses, to reduce the chance of unauthorized users gaining access to your modem’s configuration settings. As a general rule for home networks, remote access is not necessary and possibly the safest thing is to disable remote access to your modem/router.




MAC address filtering for improve security -



Encryption including WPA2 and strong passwords are the best methods to control who accesses your network, however most modems and routers offer further methods to control your network. It is a better option to make your Wi-Fi network more secure is to use mac filter as you know mac address (unique hardware address of a system)  so it ensure better protection .i know mac address can be spoofed but with all WPA2 and strong password ,mac filtering whole together ensure better security . All Most all modern modems offer the capability to restrict access to a wireless network to known devices (known MAC addresses). Trouble here is if you not setting mac filter properly then you man miss the Wi-Fi services (cannot connect to the network).





Enable modem/router firewall and security features -

Most modern modems and routers come standard with a built in firewall. A firewall can prevent unauthorized people accessing your network, can control which programs inside the network access the internet and should be enabled by default.Some hi-tech modems and routers also feature security programs known generally as intrusion detection systems (IDS). Such systems are capable of detecting attempts at unauthorized access to the system they are protecting and block many forms of attack. For additional security, all computers connected to your network should also have a software firewall system installed, or the manufacturer provided operating system firewall enabled.




Update your modem/router Firm-ware -

Some if your modem is outdated firm ware it may lead to some ready-made exploits using which any attacker can hack your network so it’s better to update firmware also the modem manufacturer provide this update firmware service for free (On modem’s website). Also keep one thing on mind unnecessary you should not make your wifi modem broad cast signal to long distance range (100m).its better to limit your modem/router signal upto 20-30 m. also always better to keep your modem at central position.So keep these things on mind while installing any wifi network and i am sure the hackers will definitely have to go through Hercules task.




This article is a Guest post by -  Chandrakant Nial



          How to transfer your contacts/message/pictures/music/video from pc to iPhone        
If you have been using an iPhone for some time now, you would be pretty familiar with the fact that the transference of data between your iPhone and your computer is very important due to a number of different reasons. You often need to transfer your contacts, messages, pictures, music & videos from your PC […]
          meaningful tattoo quotes small        

tattooed on her shoulder



tattooed on her shoulder
letter tattoo on shoulder

tattooed on her shoulder



tattooed on her shoulder
text tattoo

meaningful tattoo quotes small



meaningful tattoo quotes small
meaningful tattoo sayings for women

meaningful tattoo quotes small



meaningful tattoo quotes small
tattoo cross designs for women

meaningful tattoo quotes small



meaningful tattoo quotes small
wings tattoo

meaningful tattoo quotes small



meaningful tattoo quotes small
heart and star tattoo designs

meaningful tattoo quotes small



meaningful tattoo quotes small
text tattoo

meaningful tattoo quotes small



meaningful tattoo quotes small
tattoo hand

meaningful tattoo quotes small



meaningful tattoo quotes small
word tattoo

meaningful tattoo quotes small



meaningful tattoo quotes small
kit tattoo

meaningful tattoo quotes small



meaningful tattoo quotes small
oni mask tattoo designs

meaningful tattoo quotes small



meaningful tattoo quotes small
love quote tattoos

meaningful tattoo quotes small



meaningful tattoo quotes small
small tattoo ideas

meaningful tattoo quotes small



meaningful tattoo quotes small
oni mask tattoo designs

meaningful tattoo quotes small



meaningful tattoo quotes small
tattoo font styles

meaningful tattoo quotes small



meaningful tattoo quotes small
pictures of tattoos with sayings

meaningful tattoo quotes small



meaningful tattoo quotes small
love quote tattoos

meaningful tattoo quotes small



meaningful tattoo quotes small
arm tattoo ideas for men

meaningful tattoo quotes small



meaningful tattoo quotes small
letter tattoo on shoulder

meaningful tattoo quotes small



meaningful tattoo quotes small
tattoo cross designs for women

meaningful tattoo quotes small



meaningful tattoo quotes small
arm tattoo ideas for men

meaningful tattoo quotes small



meaningful tattoo quotes small
meaningful tattoo sayings for women

meaningful tattoo quotes small



meaningful tattoo quotes small
wings tattoo

meaningful tattoo quotes small



meaningful tattoo quotes small
kit tattoo

meaningful tattoo quotes small



meaningful tattoo quotes small
tattoo for forearm

blog entry 197
blog entry 35



          Burn After Reading        

Who’s Who
What’s What

In the World of CIA Fronts, Partners, Proprietaries & Contractors




NEW BOOK:

The Almost Classified Guide to CIA Front Companies, Proprietaries & Contractors
By WAYNE MADSEN
ISBN: 978-1-365-11196-9


Cool Justice Editor's Note: Following are excerpts from author Madsen's introduction and the body of the work. Additional suggested reading: News story about Madsen's book via the Washington, D.C. based Justice Integrity Project [link at the bottom of this post].

EXCERPTS:

From the Introduction


One of the most pervasive uses of companies as intelligence partners was under the CIA’s Operation MOCKINGBIRD. During the Cold War, the CIA, often with the approval of corporate executives, infiltrated their agents to work as journalists in newspapers, radio and television networks, wire services, and magazines. The following pages in this book are rife with examples of this penetration of the Fourth Estate – all too many in the opinion of this journalist. The CIA admitted to at least 400 journalists on the agency’s payroll at the height of MOCKINGBIRD. The CIA traditionally understates its capabilities, especially when its covert activities become publicly known. Moreover, the end of the Cold War did not stop the practice of the CIA in infiltrating the media and slant news reports to its wishes.

*

An insightful look behind the veils of secrecy into the CIA’s use of fronts, proprietaries, and partners calls into question the purpose of the CIA. Created by President Harry S Truman to serve as a central collector and repository of intelligence, the CIA became much more than that. A few weeks after the United States witnessed the assassination of President Kennedy in the middle of downtown Dallas, Truman penned an op-ed piece that appeared in several newspapers around the country. In it, Truman shared his regret for having created the CIA in 1947:

“I think it has become necessary to take another look at the purpose and operations of our Central Intelligence Agency—CIA . . . For some time I have been disturbed by the way CIA has been diverted from its original assignment. It has become an operational and at times a policy-making arm of the Government. This has led to trouble and may have compounded our difficulties in several explosive areas.

"I never had any thought that when I set up the CIA that it would be injected into peacetime cloak and dagger operations. Some of the complications and embarrassment I think we have experienced are in part attributable to the fact that this quiet intelligence arm of the President has been so removed from its intended role that it is being interpreted as a symbol of sinister and mysterious foreign intrigue.”

*

The 21st century’s CIA’s partners are more likely to be found among high-tech companies marketing the latest and greatest mobile applications and data mining programs than among banks, law offices, and advertising agencies. However, in the post-World War II era, the CIA’s top and middle echelons were normally found operating through cover as typewriter-pecking journalists, traveling Madison Avenue admen, corporate lawyers, and chain-smoking oilmen. In the 1970s and 80s, CIA contractors and partners began showing up in the high-tech field, with database, local area networking, and on-line information retrieval systems attracting the most interest by Langley.

*

As this book went to press, the smart phone game application Pokémon Go fad was sweeping the planet. Unbeknownst to many of the on-line game’s avid fan’s was the connection of the game’s developers to the CIA’s venture capital firm IN-Q-TEL. All users saw their geo-location and other smart phone data being swept up by a CIA partner firm.

SELECTED ENTRIES

Amazon, Inc. [CIA contractor]. Company provides cloud computing services for the CIA. Amazon’s CEO Jeff Bezos also owns The Washington Post.

American Historical Society. [CIA partner]. Many society officials were OSS/CIA officers.

American Press Institute. [CIA front]. Operating out of Columbia University, the institute’s director in the 1950s was a CIA officer.

AmeriCares. [CIA partner]. A non-profit organization that is often the “first in” at refugee situations. Founded by tycoon J. Peter Grace, a board chairman of the CIA front, the American Institute for Free Labor Development (AIFLD) and a trustee of another CIA front, the American Committee for Liberation from Bolshevism, AmeriCares was involved in funding the Nicaraguan contras. The group has also provided the CIA with recruiting opportunities at mass refugee sites, particularly in Latin America and Asia.

Bechtel Corporation. [CIA contractor]. Bechtel is a large construction company that has included former CIA director Richard Helms, CIA pseudonym “Fletcher M. Knight,” among its executive ranks. Bechtel was active in providing corporate cover for the OSS in the Middle East during World War II. Bechtel has been a consummate service company for various CIA operations, including support for the CIA-inspired coup against the Syrian government in 1949, the Iranian government of Prime Minister Mohamed Mossadeq in 1953, and President Sukarno of Indonesia in 1965. From the 1960s to the 1970s, Bechtel provided cover for CIA agents in Libya under both the regime of King Idris and his successor, Muammar Qaddafi. Sometimes called a “secret arm” of the CIA, Bechtel’s executives included those who would join President Reagan’s Cabinet, including Secretary of State George Schultz and Secretary of Defense Caspar Weinberger.

Before World War II, Steve Bechtel formed a military-industrial complex partnership with John McCone. McCone later became the chairman of the Atomic Energy Commission and later, director of the CIA. The CIA has used Bechtel to provide cover for non-official cover CIA operatives abroad.

Blackstone Investment Group. [CIA front]. With offices in Washington, DC and Moscow, arranged for the purchase of KGB documents following the collapse of the Soviet Union. Among the documents sought by the front company were any related to illegal CIA activities during the Cold War, including the 1963 assassination of President John F. Kennedy.

Bourbon and Beefsteak Bar and Restaurant. [CIA front]. Opened in 1967 in King’s Cross in Sydney, Australia. Served as a rendezvous point for CIA, Australian Security Intelligence Organization (ASIO), and organized crime figures. Its proprietor was Bernie Houghton, a CIA operative with links to Nugan Hand Bank, CIA weapons smuggler Edwin Wilson, and CIA clandestine services officers Theodore Shackley, Rafael Quintero, and Thomas Clines.

Center for Democracy. [CIA front]. Administered under the aegis of Boston University, the center maintained offices in Boston, Washington, DC, Guatemala City, and Strasbourg, France. Involved in CIA operations in eastern Europe, Central America, and Africa.

Colt Patent Firearms Company. [CIA partner]. Based in Hartford, Connecticut, provided corporate cover for CIA officers operating abroad.

Daddario & Burns. [CIA partner]. Headed by former OSS officer Emilio Daddario, a Democratic Representative from Connecticut, the Hartford-based law firm provided services to the CIA.

DC Comics. [CIA partner]. Worked with the International Military Information Group (IMIG), a joint CIA/Pentagon unit at the State Department, to disseminate propaganda comic books, featuring Superman, Batman, and Wonder Woman, in Serbo-Croatian and Albanian, to youth in the Balkans during the military conflicts in that region.

Disney Corporation. [CIA partner]. CIA agents who were adept at creating front companies and shell corporations in Florida, worked closely with Disney in preparation for the construction of Disney World near Orlando, Florida. OSS veteran “Wild Bill” Donovan and CIA shell company expert Paul Helliwell helped create two fake Florida cities, Bay Lake and Lake Buena Vista, as well as a number of shell corporations, to keep secret the plans for Disney World. This kept land prices low because real estate speculators were unaware of the prospective value of the land in a desolate area of central Florida.

Emory School of Medicine. [CIA partner]. Located in Atlanta, Georgia. Involved in the CIA’s MK-ULTRA behavioral modification project.

Enron Corporation [CIA partner]. Houston-based firm that was used by the CIA to provide commercial cover for its agents around the world. There were at least 20 CIA employees on Enron’s payroll. Andre Le Gallo, a former official of the CIA’s Operations Directorate, went to work as a corporate intelligence officer for Enron.

Fair Play for Cuba Committee (FPCC). [CIA front]. Officially established by American Trotskyists, the group was penetrated by CIA operatives. The FPCC New Orleans office was a CIA front that provided cover for the anti-Fidel Castro activities of Lee Harvey Oswald, Clay Shaw, and David Ferrie, among others. The New Orleans FPCC office was located at 544 Camp Street and shared the same building entrance with Guy Banister Associates, Inc., a private detective agency, the address for which was 531 Lafayette Street and around the corner from 544 Camp Street.

In December 1963, after the assassination of President John F. Kennedy, the FPCC ceased all U.S. operations.

General Electric Company. [CIA partner]. Based in Fairfield, Connecticut, provided corporate cover for CIA officers operating abroad.

General Foods Corporation. [CIA partner]. Advertising account at CIA’s Robert Mullen Company handled by an active CIA employee.

Google, Inc. [CIA partner]. Developed as a result of a research grant by the CIA and Pentagon to Stanford University’s Department of Computer Science. The CIA referred to the research as the “google project.”

Greenberg Traurig. [CIA partner]. Washington, DC “connected” law firm.

Guy Banister Associates, Inc. [CIA partner]. New Orleans private detective agency headed by former FBI agent Guy Banister. The detective agency coordinated the activities of various anti-Castro Cuban groups in New Orleans, including Banister’s own Anti-Communist League of the Caribbean, as well as the Cuban Revolutionary Council, the Cuban Democratic Revolutionary Front, Friends of Democratic Cuba, and the Crusade to Free Cuba Committee.

Banister and Associates shared office space with the CIA’s New Orleans front, the Fair Play for Cuba Committee, headed by Lee Harvey Oswald.

Hale and Dorr. [CIA partner]. Boston-based law firm that provided cover for CIA’s Independence and Brown Foundations.

Halliburton. [CIA contractor]. Based in Houston, it is the world’s largest oil service company. Recipient of a number of CIA sole-source contracts for services worldwide.

Harper and Row, Inc. [CIA partner]. Manuscripts submitted to the New York publisher that dealt with intelligence matters, particularly CIA operations, were turned over to the CIA for censoring edits before publication.

Hewlett Packard Corporation. [CIA partner]. Sold computers to Iraq for Saddam Hussein’s missile program with the knowledge and approval of the CIA.

Hill & Knowlton. [CIA partner]. Public relations firm that teamed with the CIA on a number of operations. Hill & Knowlton’s numerous offices abroad provided cover for CIA agents. One known Hill & Knowlton office that was a CIA front operation was in Kuala Lumpur.

Kerr-McGee. [CIA partner]. Provided corporate cover for CIA officers operating overseas.

Kissinger Associates, Inc. [CIA partner]. New York-based international consulting firm founded by former Secretary of State and National Security Adviser Henry Kissinger. Former National Security Adviser Brent Scowcroft is a co-owner. The firm provided support to the CIA-linked American Ditchley Foundation and the Bilderberg Group. Much of the 1982 seed money for Kissinger Associates was provided by Goldman Sachs.

Knight Foundation. [CIA partner]. Also known as the John S. and James L. Knight Foundation. Based in Miami, the foundation provides funding for various CIA-connected media operations in the United States and around the world.

Kroll Inc. [CIA partner]. Founded in 1972 by Jules Kroll, who had links to both U.S. and Israeli intelligence. Based in Manhattan. French domestic law enforcement believed Kroll’s Paris office was a CIA front. Kroll handled the security for the World Trade Center after the 1993 terrorist bombing and continued to be responsible for security up to, during, and after the September 11, 2001 terrorist attack. Kroll employed former FBI assistant director for counter-terrorism John O’Neill, who died in the collapse of the World Trade Center.

Lincoln Savings and Loan. [CIA partner]. Based in Irvine, California and headed by notorious swindler Charles Keating, Jr., involved in laundering funds for the Iran-contra scandal.

Lone Star Cement Corporation. [CIA partner]. Based in Stamford, Connecticut and linked to the Bush family, provided corporate cover for CIA officers operating abroad. Involved in the Iran-contra scandal.

Mary Carter Paint Company. [CIA front]. A money-laundering operation for the CIA. Involved in casinos in the Bahamas.

Monsanto. [CIA partner]. The firm contracted with former CIA official Cofer Black’s Total Intelligence Solutions (TIS), a subsidiary of the CIA-connected Blackwater USA, later Xe Services, to monitor animal rights groups, anti-genetically modified (GM) food activists, and other groups opposed to Monsanto’s agri-business operations worldwide.

National Enquirer. [CIA partner]. The tabloid’s founder, Generoso (Gene) Pope, Jr., worked for the CIA’s psychological warfare unit and the agency’s Italy branch in 1950. In 1952, Pope acquired The New York Enquirer broadsheet and transformed it into a tabloid, renaming it The National Enquirer. This transformation bore the imprimatur of the CIA’s Operation MOCKINGBIRD media influence program.

Newsweek. [CIA partner]. Magazine reporters and stringers fed information to the CIA. Newsweek’s stringers in southeastern Europe and the Far East were CIA agents. When Newsweek was bought by The Washington Post Company in 1961, cooperation between the magazine and the CIA increased. It was a participant in the CIA’s Operation MOCKINGBIRD media influence program. Much of the staff of Newsweek was absorbed into a new online publication, The Daily Beast, which continues to disseminate CIA-influenced articles. See Washington Post.

Nieman Foundation. [CIA partner]. Located at Harvard University, the foundation awarded Nieman Fellowships, some on behalf of the CIA, for foreign journalists to study at Harvard. The journalists were subjected to CIA recruitment efforts prior to their returning to their home countries.

Pamela Martin & Associates. [CIA partner], Escort firm run by Deborah Jeane Palfrey, the so-called “DC Madam.” During her 2008 trial for mail fraud, Palfrey attempted to invoke the Classified Information Procedures Act in order to discuss her relationship with the CIA. The U.S. Court refused Palfrey’s request and she was convicted and later said to have committed suicide before her sentencing hearing in Washington, DC. One of her clients was Randall Tobias, the head of the CIA-connected USAID. Another was Louisiana Republican senator David Vitter.

Paris Review. [CIA front]. Literary magazine edited by George Plimpton. Published works by Jack Kerouac and Samuel Beckett. The magazine’s co-founder, Peter Matthiessen, relied on his affiliation with the magazine as his CIA cover.

Quaker Oats Company. [CIA partner]. Worked with the CIA and Atomic Energy Commission to place trace amounts of radiation in breakfast cereal served to boys at the Fernald School for the mentally retarded in Waltham, Massachusetts.

Radio Corporation of America. [CIA partner]. Provided corporate cover for CIA officers operating abroad, particularly in Iran, Philippines, Japan, and West Germany. Provided technical assistance to CIA-financed clandestine and propaganda radio stations worldwide, including Radio Free Europe. RCA founder David Sarnoff was a major supporter of CIA operations, including propaganda dissemination around the world. RCA chairman and chief executive officer Thornton F. Bradshaw was active in the operations of the CIA-linked American Ditchley Foundation.

Reily Coffee Company. [CIA partner]. Also known as William B. Reily Coffee Company and based in New Orleans, this company employed Lee Harvey Oswald and a number of other U.S. government employees, many of whom were suspected CIA officers.

Robert M. Mullen Company. [CIA proprietary]. A Washington, DC public relations firm, it was used as a front for CIA activities. E. Howard Hunt, the CIA agent, worked for Robert Mullen when he was arrested in the break-in of the Democratic National Committee headquarters at the Watergate Hotel in Washington in 1972. The Senate Watergate Committee reported that “the Mullen and Company has maintained a relationship with the Central Intelligence Agency since its incorporation in 1959. It provided covers for agents in Europe (Stockholm), Latin America (Mexico City), and the Far East (Singapore) at the time of the Watergate break-in.”

Rockefeller Foundation. [CIA partner]. Used by the CIA to direct scholarships and grants to the Third World and Eastern Europe. Rockefeller Foundation money was funneled to the American Committee for a United Europe (ACUE), created in 1948. The chairman of ACUE was OSS chief William J. Donovan and the vice chairman was Allen Dulles. One of ACUE’s board members was Walter Bedell Smith, the first CIA director.

Summa Corporation. [CIA partner]. Owned by Howard Hughes, Summa is believed to have skimmed gambling profits from the Sands, Desert Inn, Frontier, Silver Slipper, Castaways, and Landmark casinos in Las Vegas and Harold’s Club in Reno for the CIA and the Mafia. Provided financial cover for the CIA’s Glomar Explorer project.

Teneo Intelligence. [CIA partner]. Branch of Teneo Holdings, which is headquartered in New York. Teneo Holdings’s intelligence branch includes former CIA officials. Teneo is closely linked to former President Bill Clinton and Hillary Clinton. Teneo Intelligence has offices in New York, London, Rome, Brussels, Dubai, Bogota, New Delhi, and Tokyo.

Texas Commerce Bank (TCB). [CIA partner]. Houston-based bank founded by the family of James Baker III. Texas Commerce Bank was used to provide commercial cover for CIA agents. After serving as vice president for Texas Commerce Bank in Caracas from 1977 to 1979, Jeb Bush joined his father’s presidential campaign in 1980. Serving with Bush on the campaign was Robert Gambino, the CIA deputy director of security who gave Bush his orientation brief at Langley in 1977.

Kenneth Lay, the chairman of Enron, which had its own links to the CIA, served on the board of Texas Commerce Bank. Texas Commerce Bank was acquired by Chemical Bank in 1987.

The bank provided major loans to Howard Hughes’s Summa Corporation. See Summa Corporation.

United Fruit Company [CIA partner]. Involved in 1954 CIA overthrow of Jacobo Arbenz government in Guatemala. Published the Latin America Report, a publication that was a CIA front used for clandestine activities. The CIA transferred weapons to United Fruit employees in Guatemala who were involved in undermining the Arbenz government. The joint CIA-United Fruit plan was code named OPERATION FORTUNE. Company provided an airfield in Guatemala for the CIA’s training of Cuban exiles for the Bay of Pigs invasion of Cuba.

U.S. Rubber Company. [CIA partner]. Headquartered in Naugatuck, Connecticut and later called Uniroyal, provided corporate cover to CIA officers operating abroad. Included those operating under the cover of the Dominion Rubber Company of Canada, a subsidiary of U.S. Rubber Company.

U.S. Youth Council (USYC). [CIA front]. Founded in 1945 and based in New York. Some 90 percent of its funds came from the CIA. USYC received funding from the Foundation for Youth and Student Affairs (FYSA), a CIA front. The USYC was composed of American Youth Hostels, Camp Fire Girls, 4-H, American Unitarian Youth, National Catholic Welfare Conference, National Students Assembly, YMCA and YWCA.

Wackenhut. [CIA contractor]. Wackenhut, a Palm Beach Gardens, Florida-based security firm, stood accused of providing the CIA with specialized services around the world, including Chile, Greece, and El Salvador. Its Venezuelan branch, Wackenhut Venezolana, C.A., was accused in 2002 of involvement in the CIA’s coup against President Hugo Chavez. William Casey served as Wackenhut’s outside counsel before becoming CIA director in 1981.

Wackenhut eventually merged into the global security firm G4S.

Washington Post. [CIA partner]. The Washington Post was part of the CIA’s Operation MOCKINGBIRD, the agency’s media influence project. Post publisher Phil Graham was a close friend and associate of MOCKINGBIRD chief Frank Wisner, Sr. and CIA director Allen Dulles. Wisner assisted Graham in acquiring The Washington Times-Herald and WTOP radio, creating a sizable CIA-influenced media operation in the nation’s capital.

W. R. Grace. [CIA partner]. Provided corporate cover to CIA officers operating abroad, particularly in Latin America. Provided donations to CIA front foundations.

  • News story about Madsen's book via The Justice Integrity Project



  •           Early Beginnings         
    Perfumer's Garden - Mountain Path

    Do not mistake my lack of posting for lack of action. It's been quite the opposite - the most action-packed few months of my life. Here is what I've accomplished - to put your minds at ease and satisfy any curiosity that might have remained among those of you who haven't given up on SmellyBlog yet:

    - Designed, planned agonized over and built a new Perfume studio, Pilates studio - and renovated my old home) while making new friends with the builders and architects involved
    - Lived in a yurt for 4 months (November through March) while I was at it - and also found myself adopting a cat of all creatures (not intentional, but seems to work out)
    - Transitioned my daughter into a Hebrew-speaking high school for another two years of education
    - Moved from the yurt to the house
    - Adopted a rescued female Doberman (that was a dream come true)
    - Taught two Perfumery Courses back to back: Fougere and Orientals (while meeting with Dan Riegler - a Canadian- Israeli from Ontario who gifted me with the most incredible incense resins imaginable - more on that in a separate post
    - Became auntie to one more niece and nephew (that was quite effortless!)
    - Continue to try and establish my perfumery studio (and Pilates studio) in the new surroundings
    - Try my best to be with my grandma, who's 93 years young and had a heart event about a month ago. Every moment with her is so pure and precious.
    - Planning and beginning to plant my Perfumer's Botanical Garden, which is truly taking much of my time and is the main reason I haven't been blogging. The photo above is from the section of it that is on the mountain and is dedicated to fragrant Mediterranean plans and medicine herbs.

    I spend very little time around the computer (after months of wifi & electricity-free yurt life and bad battery in my laptop - old habits have been broken to little shreds and I only post quick updates via my phone on my Facebook, Instagram and Twitter accounts)
    Hopefully I've gotten to the point when I'm settled down to return to regular blogging - as demanding as life has been all these months, I know deep in my heart that it does do me good to write regularly. It's not just a fragrance/perfumery blog, but also functions as a personal journal to me.
              As the Conceptual Age fades the Meaning Age rises        
    For years, we filled our brains and the mouths of the transaction between the information age - the era of computerization - and the conceptual age in the hope that this could save western economies from the ultimate nightmare of globalization of work and offshoring. We believed that thanks to our supposed greater ability to design great products, experiences and eventually statuses, we may have succeeded to the threat. The news is that this is not happening.
              Chrome OS: from Personal Computer to Personal Computing. A matter of trust.        
    Google is gradually shifting the user ownership from hardware computers to computing sessions hosted on it's infrastructure. Are you ready for the shift?
              Schlecht notiert ist halb vergessen: So behältst du die Übersicht        

    Es gibt viele Feinde eines erfolgreichen Zeitmanagements. Einer der größten ist sicherlich, die Übersicht zu verlieren oder sich zu verzetteln.

    Das gilt besonders für Notizen. Während der Sitzung macht man sich Notizen auf Papier, das Telefonat hält man am Computer fest und die Ergebnisse aus dem Gespräch mit dem Kunden sind nur im Kopf. Ach ja, und ein paar Dinge stehen im Smartphone, da das gerade so schön verfügbar war.

    So gehen gute Ideen verloren und die Gefahr ist riesig, Aufgaben zu vergessen.

    Wo wärst du heute, wenn du all deine tollen Ideen, die du vergessen hast, wirklich umgesetzt hättest?

    Diese Frage wage ich nicht mal, mir selbst zu stellen.

    Früher war ich da sehr chaotisch. Auch in meinen Coachings ist dieses Thema ein Dauerbrenner.

    Doch jetzt als Produktivitätstrainer weiß ich, wie’s geht.

    Die Shownotes findest du unter https://ivanblatter.com/notizen-machen/


              #044: So erstellen Sie einen Notfallplan         

    So erstellen Sie einen Notfallplan

    Was passiert eigentlich, wenn Ihnen etwas zustößt? Was ist, wenn Ihnen etwas passiert und Sie sind nicht mehr da? Finden Ihre Angehörigen dann die relevanten Daten und digitalen Dokumente?

    Das sind keine einfachen und schon gar keine angenehmen Fragen. Doch auch Sie sollten sie sich stellen. Denn diese Fragen betreffen nicht nur Unternehmer und Selbstständige, sondern uns alle.

    Hier sind meine Gedanken zu dieser Situation und was Sie tun können.

    So erstellen Sie einen Notfallplan

    In der Folge stelle ich ein paar Fragen, die Ihnen helfen, einen Notfallplan zu erstellen:

    • Wie lautet das Passwort für Ihren Computer?
    • Wie lautet das Passwort für Ihr Mobiltelefon (inkl. PIN und PUK)?
    • Wo befinden sich die weiteren Passwörter?
    • Wie ist die Logik bei der Verzeichnisstruktur?
    • Welche Daten/Dateien sind besonders wichtig?
    • Welche Bankkonti gibt es?
    • Wie lauten die PIN-Codes für die Bankkarten?
    • Wie kann man sich für das E-Banking anmelden?
    • Welche Verträge haben Sie zu erfüllen bzw. müssten gekündigt werden?
    • Welche Webseiten haben Sie und wo sind sie gehostet?
    • Wo befinden sich die (Kunden)Adressen?
    • Wo sind Ihre Termine?
    • Wo haben Sie Ihre Fotos gespeichert?
    • Wie lauten die Passwörter für Ihre E-Mail-Accounts?
    • Wie kann man Mails automatisch weiterleiten oder eventuell eine automatische Antwort einrichten?
    • Wie kann man eine Nachricht auf Ihre Webseite setzen und wie soll sie lauten?
    • Wie soll mit den sozialen Netzwerken umgegangen werden (Facebook, Twitter, Google Plus, Xing, LinkedIn usw.)? Sollen die Profile einfach gelöscht werden?

    Weiterempfehlen

    Hat Ihnen diese Folge gefallen? Dann empfehlen Sie den Podcast doch weiter. Damit unterstützen Sie gleichzeitig mich und meine Arbeit.

    Besonders hilfreich sind positive Bewertungen bei iTunes. Klicken Sie gleich weiter unten auf den iTunes-Link und schenken Sie mir ein paar Sterne. Vielen Dank!

    Den Podcast abonnieren

    In meinem Podcast “einfach produktiv” geht es jede Woche darum, Ihr Zeitmanagement zu verbessern. Sie können meinen Podcast abonnieren. Sobald eine neue Folge erscheint, erhalten Sie sie so automatisch:


              Computer Makers Making a Shift to Colored Laptops        
    It’s hard to imagine a world without computers now that they have become so popular. One remembers when computers used to be the sole domain of offices and large corporations who could afford their lofty maintenance costs. In the last 50 years, computers have revolutionized the way we work and conduct business. Learning has also […]
              Get Your Pink Laptop Today        
    Personal computers, otherwise known as PCs, have been in existence now for the last two and half decades and have revolutionized the way people work and share information. This is a long cry from when computers used to occupy three or four story buildings because of their bulky size. They also used to be predominantly […]
              Generate Money Online        
    Generate Money Online - Learn how to use your computer to generate money online, find opportunities ways to generate money online from home with a website...
              Dean Koontz's "Moonlight": how a commercially prolific suspense novelist remains relevant as technology and politics change         

    During my first year of employment at USLICO in Arlington in 1990 (what would become my last main job, for 12 years and four owners), I read the Dean Koontz 1989 novel “Midnight”, and shared it (paper, Putnam was original publisher) with a few people in production control in what would become a coffee break book club.

    The novel is remarkable in its huge number of chapters, and organization into three parts each with its own chapter 1.



    The novel starts with a jogger running in a California beach town (Moonlight Cove  -- “In the Moonlight, Do Me” indeed) being attacked by a mysterious alien-like creature, and soon the mystery, somewhat in a “Twin Peaks” -like fashion, is examined from the viewpoint of various characters, whose narratives gradually connect.  (Irving Wallace had used this technique for building plots for Cold War spy novels back in the 1960s).  It seems as though people are getting converted into hybrid creatures and that a sociopathic computer scientist Shaddock is involved.



    I would have thought that this novel would make a good miniseries on a cable channel,, even today, as the premise has less dependence on political circumstances and even technology than most sci-fi suspense novels.  Koontz sometimes gets into Shaddack’s head, anticipating the psyche of a modern terrorist, deflecting the social issues (like gay rights in one passage) in surprising ways.
    I mention the novel because Koontz is often heralded in some circles as the ideal author who writes strictly to sell, and he indeed has a huge career of a long list of novels, divided into various subcategories of suspense.   Literary agents love his approach, because it is so commercial.  So do trade publishers.

    One problem with developing suspense novels is that sometimes they become very vulnerable to changes in world politics, which can come suddenly and be largely unexpected by suspense authors, like the fall of the Soviet Union at the end of 1991.  Today it’s not clear who is the biggest threat: North Korea, Iran, ISIS, Russia, China.

    I’ve had that problem, and my own approach to fiction has to start with my own narrative first.  I make no apologies, despite the disruptive advice and sales calls from others.


              Cyber Security for the Small Business        

    Cyber Security Month October is Cyber Security Month. If your company uses any kind of computers, cell phones, networks, software, etc. to go about its business, then this month applies to what you do day in and day out. Having these technologies makes our lives more advanced and efficient but they also leave us open […]

    The post Cyber Security for the Small Business appeared first on Blog: News & Legal Articles from Our Team.


              Pelatihan ti        

    Panitia penyelenggara pelatihan SIM Sanitasi Rumah Sakit, Tria sangat mengharapkan untuk bisa diundang kembali dalam pelatihan lanjutan SIM guna memantapkan kembali dengan biaya yang tidak lebih mahal dari sekarang. saya usul untuk pelatihan yang akan datang pengajar praktek computer ditambah tenaganya karena untuk memudahkan peserta mengikuti dengan cepat dan mengerti, terimakasih dan mohon maaf atas segala kesalahan saya baik disegaja maupun tidak, semoga ilmu yang saya peroleh bermanfaat buat Rumah Sakit Bekasi,saya pribadi dan masyarakat.


    Mencari semua teman di Yahoo! Messenger?
    Undang teman dari Hotmail, Gmail ke Yahoo! Messenger dengan mudah sekarang!
              Work At Home Earn Upto $10000 Working At Home        
    Work At home online, learn the exact data entry system an unemployed dad went from nothing to 10,000 per month working online from his computer. Visit Website... Get Started Now...
              Acer Chromebook 14 CP5-471 schematic – Acer ZDA M/B schematic        
    The motherboard schematic for Acer Chromebook 14 CP5-471 laptop/notebook,  Quanta ZDA Mainboard CPU:  SKY LAKE ULT  Integrated PCH + LPDDRIII OEM:Quanta Computer Inc. Document Number: ZDA Rev: 8A Format: PDF Total Pages: 43 File size: 1.19 MB Price: $10.5 Block Diagram:
              Acer Chromebook R13 CB5-312T schematic – Acer ZSE M/B schematic        
    The motherboard schematic for Acer Chromebook R13 CB5-312T laptop/notebook,  Quanta ZSE Mainboard CPU:  Mediatek MT8173  + LPDDR3-800 OEM:Quanta Computer Inc. PROJECT: ZSE Rev: 1A Format: PDF Total Pages: 29 File size: 926 KB Price: $10.5 Block Diagram:
              Sony SVF15 schematic – DA0HK9MB6D0 – Sony HKC M/B schematic        
    The motherboard schematic for Sony SVF15 Series   laptop/notebook Quanta HK9/HKC Mainboard CPU: Intel Shark Bay  Haswell ULT +  Lynx Point-LP + DDR3L + Nvidia N14P-GV2 OEM:Quanta Computer Inc. PROJECT: HKC Rev: 1A Format: PDF Total Pages: 40 File size: 984 KB Price: $10.5 Block Diagram:
               5.7.5         
    updated on 19-03-2010 CDT - The computer program "the school Certificate" represents the computer module of filling of...
               2011 4.5.83         
    updated on 01-10-2012 CDT - The computer program Diploma-standard NPO 2011 for the press of title pages and appendices to diplom...
              Comment on Say Yes to the Dress by Becky        
    Dear Carly, I appreciate so much your desire and willingness to donate a wedding gown to the Women’s Recycle Center. Your dress will help them to come even closer to the goal of self-sufficiency. You will not find them on the web as they do not have computers or have many people who can speak English in this impoverished country. There are a few Heaven’s Family ministry directors who make this trip yearly and we will bring the gowns with us and hand deliver them. Our beloved contact, Simeon Muhunga, has been working tirelessly to help over 100 abused women for several years. It is a dream he has had for a long time and it is very slowly coming to pass, and many thanks to you and others, who have a heart of compassion for them. The way to get the gowns to us is to mail them to: Heaven’s Family P.O. Box 12854, Pittsburgh, PA 15241 May the Lord richly bless you for your compassion upon the women in DR Congo and their families. Becky Servant
              Five Ways to Have the Best-Ever Virtual Genealogy Conference!        
    Can you believe how fast summer is sailing by? Which means the Family Tree University Virtual Genealogy Conference is right around the corner, Sept. 13 to 15.

    This online event has the excitement and shared knowledge of a genealogy conference, without the expense and difficulty of travel and being away from family and work. Or the pressure to change out of your fuzzy slippers.


    Wikimedia commons, Ch2410

    You get a weekend of video classes (which you can download to keep), networking with genealogy researchers and experts via our conference message boards, and a live keynote. Classes and Q&A sessions cover genetic genealogy, websites, methodology, organizing and preserving your research, and ethnic research.

    I hope you'll join me there. Use coupon code FALLVCEARLY to save $40 on registration! (Code expires Aug. 11, 2017.)

    As a seasoned Virtual Conference attendee, I've got a few tips for making the most of the experience:

    1. Peruse the program ahead of time.
    Most of the conference is on-demand—you log in to watch videos and post to the message board any time during the conference. But Lisa Louise Cooke's keynote presentation on Sunday, "Big Pictures in Little Details," is live, as are the expert Q&A sessions on the message boards. Mark the scheduled bits on your calendar (remember the Virtual Conference is on East Coast Time).

    Since you can download the classes to watch again, don't worry if you can't squeeze them all into the weekend. But do try to watch the ones most related to your research during the conference so you can discuss them on the message boards.

    2. Free up some time.
    The time-saving convenience of attending from home is a MAJOR draw. But carve out some time over the weekend to watch the videos and chat on the message boards. The Virtual Conference genealogy inspiration gets me excited about trying new strategies and resources, so I usually want to spend some time researching, too.

    I minimize errands that weekend, and declare a pizza night for the kids. Daddy does something fun with them and we grant them more screen time. Therefore, my children enjoy the Virtual Conference almost as much as I do!

    3. Log in on Friday.
    Even if you're not planning on doing much conferencing on Friday, take 15 minutes to log in, go over the orientation and click around the conference. Make sure you can download a video. If you have any problems accessing the conference content, just post to the Technical Issues board and we'll address it as quickly as possible.

    4. Play along.
    You'll get the most benefit out of the classes and opportunities to interact with others if your research is fresh in your mind. Go over your tree before the conference to refamiliarize yourself with difficult ancestors. Make a list of your surnames and places for the surnames message board.

    A lot of action happens on those boards! Introductions are made, tips shared, questions answered, brick walls solved, books and websites recommended. We'll even exchange recipes and family stories. Check here often during the conference, post your questions, and answer other peoples'.

    5. Get comfy.
    Everyone talks about how great it is to do genealogy in your pajamas. NOW'S YOUR CHANCE!! Wear your comfiest PJs and fuzziest slippers. Don't bother doing your hair. Make some coffee or tea, fetch your favorite snack and pad over to your computer. Revel in it.

    Visit FamilyTreeUniversity.com to check out the conference details and sign up today. Remember to save $40 (before Aug. 11) with coupon code FALLVCEARLY!


    SaveSaveSaveSave
              How I Created a Genealogy Timeline To Show My Grandfather's Life        
    My grandfather Joe moved around a lot during his lifetime: Texas, North Carolina, Louisiana, Mississippi, back to Texas, elsewhere in Texas, Ohio, more places in Texas, various Ohio cities, South Dakota, Ohio again. 

    Timelines organize an ancestor's or a family's family tree data—dates, places of residence, jobs, historical events, children's births—in an orderly fashion. I love them.

    So when I was making a photo book about my grandfather as a Christmas present for my dad, I thought a timeline was just the thing to help summarize all those migrations. Matching up the timeline with a map of all the places would be even better.

    My Grandfather's Migration Timeline
    Here's the timeline and map I came up with:



    The right-hand page lists each place Joe lived, with dates and details about what he did in that place. The information comes from my research in censuses, city directories, newspapers and other genealogy records. I'm lucky to have copies of a job application my grandpa filled out with his work history.



    Looking at it now, I can see some things I'd change. But overall, I'm pleased with it.

    For the map, I first tried customizing a Google map using free numbered place markers downloaded from here (Google's marker options don't include numbers). To create your own Google maps timeline, add a generic place marker to the map, click the paint can to edit the marker style, choose More Icons, then Custom Icon, and select the marker image file from your computer. You'll need a Google account to save the map.

    I didn't love the result for my photo book, though, so I imported a map image into desktop publishing software I have access to through work, and added numbered place markers I created myself. Then I exported the file as a JPG to use in the photo book. 



    I know a few tricks, but I'm not a graphic designer, so there's probably an easier and more artful way to go about making the map.

    Using Timelines in Your Genealogy Research
    Timelines are among your best genealogy tools. In addition to helping you easily share genealogical information, they let you: 
    • get an overview of a person or family in historical context

    • sort out a confusing jumble of information you've found in records

    • spot problems (why was Great-grandpa here and Great-grandma over there?)

    • note periods of missing information

    • brainstorm answers to research questions, such as why a relative immigrated or where your great-grandparents met
    Our new independent study online course Using Timelines in Your Genealogy helps you take advantage of all these genealogy benefits of timelines.

    It'll show you how to use timelines to understand your ancestors' lives and solve research problems, and how to create a timeline by hand or using websites such as Twile and Treelines. Best of all, you can take this independent study course at your own pace and download the videos and research guides to keep.

    See all the details for our Using Timelines in Your Genealogy course and register at FamilyTreeUniversity.com.

    SaveSaveSave
              Button - Wood Button - Giant Wood Button by ColdCreekBrewing        

    25.00 USD

    A GIANT Button, made by Ryan, of course! :)

    It's made of solid, yet light weight, rustic pine. Easy to hang on the wall with the hole drilled in the back. (We use push pins!)

    This listing is for 1 (ONE) Button

    Approx. 11" x 1.5"

    If you would like a finish that we don't offer, please choose the "Custom Finish" option and let us know in the "Note to Seller" box at checkout what you would like. We will do our best to accommodate, but cannot guarantee exact matches. :) Though we do our best to portray accurate colors of stain, finish work, etc. coloring can vary on computer monitors. Additionally, the grains and knots in received orders will vary from the ones pictured.

    **** PLEASE READ THE FOLLOWING INFORMATION**** THANK YOU!! :)

    These are made to order by Ryan for you. :) Though "Quantity" may show more than one is available, this is our method to allow you to either order more than one at a time, and also the way we are able to "auto" renew our listing on Etsy.

    We ask to allow up to 14 days from cleared payment for your order to ship. Feel free to contact us if you need your order expedited and we'll see what we can do! :)

    **INTERNATIONAL ORDERS: Shipping prices are for USPS International First Class. Unless over 4 pounds, then it will be Priority. Shipping cost does not include any Duties, Taxes, VAT charges that may be imposed upon arrival by your Government. We just like to mention this, so you don't have an unpleasant surprise if you haven't placed an International Order before. :)

    ****If you live in Alaska, Hawaii OR would like shipping upgrades, as in Priority, Expedited, or Insurance, please contact us BEFORE checkout so we can customize the listing to reflect the correct shipping fee. Or go ahead and purchase the items and we will just invoice you for the price difference. Items will ship after payments and additional invoices have cleared.

    Please read over our Shop Policies to learn more about our items, shipping, payment and returns.


              The Queen of Manipulation        

    This is Bella one of my rescue Shelties. I think she is trying to tell me it’s time to get off of the computer!? Not very subtle is she, Michael? :))

    Sheltie Nation - Largest Community of Sheltie Lovers on the Net!


              Computer Equipment CAN be useful!        

    I can’t imagine it was comfortable, but maybe it was warm?Maybe Cody just wanted to be near you Sue.  :)

    Sheltie Nation - Largest Community of Sheltie Lovers on the Net!


              PC foot warmer        

    Little Lady likes to nap where she can be ready to help mom on the computer. Thanks to Kristin!

    Sheltie Nation - Largest Community of Sheltie Lovers on the Net!


              A US firm is microchipping staff – here’s what they should fear        
    Sure, an electronic implant will do away with troublesome security cards and forgotten computer passwords, but beware the hidden downsides, says Jamais Cascio
              The mythology of programming language ideas        

    If you read a about the history of science, you will no doubt be astonished by some of the amazing theories that people used to believe. I recently finished reading The Invention of Science by David Wootton, which documents many of them (and is well worth reading, not just because of this!) For example, did you know that if you put garlic on a magnet, the magnet will stop working? Fortunately, you can recover the magnet by smearing goats blood on it. Giambattista della Porta tested this and concluded that it was false, but Alexander Ross argued that our garlic is perhaps not so vigorous as those of ancient Greeks.

    You can just laugh at these stories, but they can serve as interesting lessons for any scientist. The lesson, however, is not the obvious one. Academics will sometimes read those stories and use them to argue against something they do not consider scientific - arguing that it is like believing that garlic break magnets.

    This is not how the analogy works. What is amazing about the old stories is that the conclusions that now seem funny often had very solid reasoning behind them. If you believed in the basic assumption of the time, then you could reach the same conclusions by following fairly sound reasoning principles. In other words, the amazing theories were scientific and entirely reasonable. The lesson is that what seems a completely reasonable idea now, may turn out to be wrong and quite hilarious in retrospect.

    In this article, I will look at a couple of amazing theories that people believed in the past and I will explain why they were reasonable given the way of thinking of the time. Along the way, I will explore some of the ways of thinking that we use today about programming and computer science and why they might appear silly in the future.


              Philosophical questions about programming        

    Combining philosophy and computer science might appear a bit odd. The disciplines have very little overlap. Both philosophers and computer scientists get taught formal logic at some point in their undergraduate courses, but that's probably as close as they get.

    But the fact that the disciplines do not overlap much might very well be the reason why putting them together is interesting. In an article about Design and Science, Joichi Ito (from MIT Media Lab), describes the term antidisciplinary and nicely summarizes why looking at such unusual combinations is worthwhile:

    Interdisciplinary work is when people from different disciplines work together. But antidisciplinary is something very different; it's about working in spaces that simply do not fit into any existing academic discipline.

    [When focusing on disciplines, it] takes more and more effort and resources to make a unique contribution. While the space between and beyond the disciplines can be academically risky, it (...) requires fewer resources to try promising, unorthodox approaches; and provides the potential to have tremendous impact (...).

    As you can see from some of my earlier blog posts, I think the space between philosophy and computer science is an interesting area. In this article, I'll explain why. Unlike some of the previous posts (about miscomputation, types and philosophy of science), this post is quite broad and does not go into much detail.

    At the danger of sounding like a collection of random rants, I look at a number of questions that arise when you look at computer science from the philosophical perspective, but I won't attempt to answer them. You can see this article as a research proposal too - and I hope to write more about some of the questions in the future. I wish antidisciplinary work was more common and I believe looking into such questions could have the tremendous impact that Joichi Ito mentioned.


              Philosophy of science books every computer scientist should read        

    When I tell my fellow computer scientists or software developers that I'm interested in philosophy of science, they first look a bit confused, then we have a really interesting discussion about it and then they ask me for some interesting books they could read about it. Given that Christmas is just around the corner and some of the readers might still be looking for a good present to get, I thought that now is the perfect time to turn my answer into a blog post!

    So, what is philosophy of science about? In summary, it is about trying to better understand science. I'll keep using the word science here, but I think engineering would work equally well. As someone who recently spent a couple of years doing a PhD on programming language theory, I find this extremely important for computer science (and programming). How can we make better programming languages if we do not know what better means? And what do we mean when we talk about very basic concepts like types or programming errors?

    Reading about philosophy of science inspired me to write a couple of essays on some of the topics above including What can programming language research learn from the philosophy of science? and two essays that discuss the nature of types in programming languages and also the nature of errors and miscomputations. This blog post lists some of the interesting books that I've read and that influenced my thinking (not just) when writing the aforementioned essays.


              Miscomputation: Learning to live with errors        

    If trials of three or four simple cases have been made, and are found to agree with the results given by the engine, it is scarcely possible that there can be any error (...).

    Charles Babbage, On the mathematical
    powers of the calculating engine (1837)

    Anybody who has something to do with modern computers will agree that the above statement made by Charles Babbage about the analytical engine is understatement, to say the least.

    Computer programs do not always work as expected. There is a complex taxonomy of errors or miscomputations. The taxonomy of possible errors is itself interesting. Syntax errors like missing semicolons are quite obvious and are easy to catch. Logical errors are harder to find, but at least we know that something went wrong. For example, our algorithm does not correctly sort some lists. There are also issues that may or may not be actual errors. For example an algorithm in online store might suggest slightly suspicious products. Finally, we also have concurrency errors that happen very rarely in some very specific scenario.

    If Babbage was right, we would just try three or four simple cases and eradicate all errors from our programs, but eliminating errors is not so easy. In retrospect, it is quite interesting to see how long it took early computer engineers to realise that coding (i.e. translating mathematical algorithm to program code) errors are a problem:

    Errors in coding were only gradually recognized to be a significant problem: a typical early comment was that of Miller [circa 1949], who wrote that such errors, along with hardware faults, could be "expected, in time, to become infrequent".

    Mark Priestley, Science of Operations (2011)

    We mostly got rid of hardware faults, but coding errors are still here. Programmers spent over 50 years finding different practical strategies for dealing with them. In this blog post, I want to look at four of the strategies. Quite curiously, there is a very wide range.


              How I found my brother - Part 1        

    I said I would tell you about how we found our brother and here it is - true to my word. How my brother found us (Part 2) will follow soon.
    =======================================================

    One Friday evening in February 2013, my OH and I were on our way to Kettering to meet up with my brothers. We were stopping at the eldest brother's to pick him up and then go on to the the youngest brother's for a drink and a catch up. My mum and eldest brother had moved to Kettering from London in 1999, and my youngest brother moved to Kettering in 2006. My mum died in 2009 and my dad died, aged only 47, in 1980.

    When we got to the eldest brother's house he told me that someone had come to the door earlier in the day; spoken to him and had left him a card. He said the person - a man - said that he used to work with my mum. This immediately rang alarm bells because I knew my mum had for most of her working life, worked predominantly with women.

    When I read the card (I still have it), I literally went weak at the knees and had to sit down, but I knew at once that what it said was inescapably true. On 13th February, 1953; thirteen months before I was born in March 1954, and before my mum married my dad; my mum gave birth to a baby boy whom she called 'Julian Jerome Flynn' - (her maiden name was Flynn). She gave birth to Julian in St. Pelagia's Home for Penitent Girls (I kid you not) which was  in Highgate, North London. It's since been demolished and is now a gated development.

    All three of us were very close to our mum. We all loved her deeply. She was our rock, we knew she loved us unconditionally and she was always there for us. She was great fun to be with; we loved her company and spending time with her. Yet, none of us knew about this other brother. On that night I could only feel shock at the not knowing as we set off to the younger brother's house.
    Image result for St Pelagias Home for Penitent Girls image
     St. Pelagia's Home
    LOST HOSPITALS OF LONDON

    St Pelagia's Home
    St Joseph's Maternity Home
    34 Highgate West Hill, N6 6NJ
    Medical dates:

    Medical character:
    1889 - 1972

    Maternity
    St Pelagia's Home for Destitute Girls at No. 25 Bickerton Road in Upper Holloway was founded in 1889 by the Roman Catholic order of the Sisters Servants of the Sacred Hearts of Jesus and Mary.It provided  accommodation for unmarried mothers and their first-born babies, who were allowed to enter the Home when the child was a fortnight old.
    The girls were admitted free of charge on condition that they contributed to the earning power of the Home by working in its laundry.
    The Home later occupied the neighouring house at No. 27 Bickerton Road.

    In 1934 it moved to West Hill Place, a large house on Highgate West Hill, where it re-opened in 1936 after the Convent of Sacred Hearts had been built adjoining the original mansion.

    In March 1948 Mayfield, an adjoining 2-storey Victorian house, was bought and equipped as an antenatal and maternity home.  It had 18 beds and was named St Joseph's Maternity Home.

    The Labour Ward was on the first floor, while the ground floor contained 6 antenatal beds, and 12 postnatal beds in 3- or 5-bedded wards, with 12 cots for the babies.  An isolation room was added later.

    The patients, who stayed for an average of 12 weeks,  were cared for by three nurses.

    The LCC paid a guinea (21 shillings - £1.05) a weeks to the Home for expectant mothers and 25 shillings (£1.25) for mothers and babies (this was later increased to £2 10s (£2.50) a week).

    In 1954 the Homes had 70 beds for mothers and their babies.  Both properties had extensive gardens of 2 acres, but the buildings were in much need of repair, with damaged ceilings in St Joseph's and a leaking flat roof.

    The Homes closed in 1972.


    Present status (February 2009)
    The Homes and the convent were demolished in 1970.  Their site now contains Hill Court and the West Hill Park estate.



    Source: Google (for both photos)

    This is an article about St. Pelagia's from the Telegraph. http://www.telegraph.co.uk/news/uknews/10932969/Convent-that-forced-young-mothers-to-give-up-their-babies.html

    It is certainly worth reading although I don't believe my mum was forced to give Julian up by the nuns, but it would have been extremely difficult to have kept him. One, it would have got back to her parents in Ireland and the shame of having an unmarried daughter with a child could have led to ostracism by their community. Secondly,  in England there wasn't much in the way of good affordable childcare in the 1950s and mum would have to have worked to support herself and her child. There was a lot of stigma and shame attached to being an unmarried mother at that time.

    When we got to the youngest brother's house I told him get himself a glass of wine and sit down as we had some news for him! We spent the rest of the night on the computer trying to find out more information. The one thing we did know was that our dad wasn't Julian's dad. 

    I rang Ireland and spoke to two of our surviving aunts - my mother's sister's - they were totally unaware of Julian. One of the aunt's told me they had only been made aware of my existence (and my mum's marriage) when my mum turned up in Ireland with me aged 11 months! I was left  with my grandparent's and my aunt's, who were only young teenagers at the time, for about 3 months whilst she returned to England and work - of which more later.

    Our searches on the computer kept taking us to an agent who represented Brian May (of Queen) and eventually brought us to a picture of someone called 'Julian Littman. This person looked exactly like one of our first cousins; the eldest son of my mum's older and closest sister, Aunty Betty.  Unfortunately, this aunt had died in the late 1980s.

    The card that had been left had telephone contact numbers on it and we agreed that in the morning I would call the numbers. I didn't sleep a wink that night and got up really early to search on my own computer for any information. This is what I found:

    grabbed the title again at the competition in New York City this afternoon. He's the first texting competitor to win back-to-back titles.

    Last year, finalist Rachel Taylor Blakely said she practiced by texting her friends AND texting the words from her schoolbooks.

              Welcome to Reality        

    computer-1185626_1280

    Last Saturday, 780 degrees and certificates were awarded to SCC students. Many of these students will go on to a four-year college or university to pursue a Bachelor’s degree. Others will pursue employment. No matter what your immediate goal is, … Continue reading

    The post Welcome to Reality appeared first on SCC Blogs.


              Home computer repair - Home computer repair Tampa troubleshooting        
    The basic parts of a Home computer repair are monitor, motherboard, SMPS, processor, daughter board, network cards, RAM, CMOS battery, hard disk, buses (cables), keyboard, mouse, UPS and modem. So these components will face damage as they are electronic components.


     Long beep sound heard while starting custom pc repair tampa and OS is not loading. Your RAM is damaged. So buy a RAM either D RAM or SD RAM after checking the slot in your motherboard and install new RAM.


    Your Operating system OS may be damaged due to improper shutdown or due to missing of some files. Please re install your OS. Another problem can be your hard disk damage.


    Huge sound coming from CPU. Your cabinet cooling fan may be making that huge noise while working. Try to replace that bad cooling fan with a good one.


    Sometimes there will be problem in Home PC repair Tampa booting. So Home computer repair boot troubleshooting can be done by pressing delete button while restarting PC and providing appropriate settings in BIOS.


    If you are like most people who often use computer repairs Tampa at work or in your home, then you must also know how frustrating it can be when your Home computer repair crashes in the middle of an important task. Home computer repair errors such as crashes and file corruption are often a result of registry problems. To make sure your PC always performs efficiently, you have to invest in registry repair software.


    Do you use a free windows registry repair for your Laptop computer repair? There are a few guidelines that you need to keep in mind when purchasing software and these are:


    It is important to note however, that software that can find many errors aren’t necessarily the best kind. Some dubious repair programs list errors where there aren’t actually any so choose well.


    Unless you are a certified Home computer repair genius, it is best to choose user friendly software. Everyone needs free window registry repair programs.



     



    Some Home computer repairs actually come with a built-in registry repair program and while you may be tempted to fix the registry yourself, remember that you might inadvertently delete information that is critical to Home computer repair operations.


    About the author: Tampa pc pros inc takes pride in offering a wide range of computing solutions like: Pc Repair Tampa , Computer Repair Tampa , Custom Pc Repair Tampa , Computer Repair Service Tampa , Virus Removal Service Tampa.

    computer security help: data backup

    computer security help: data backup

    Article Source: www.articlesnatch.com


              Chatbots, IoT and VR, Oh My: A Look Ahead at Tech in Real Estate        
    Technology in the real estate industry doesn’t start and stop with the computer and smartphone. Regardless of your role in the real estate transaction, you can no longer afford to dismiss the impact of technology in the home buying process. Technology in real estate is designed to improve the end-to-end experience for home buyers and …Read more
              Royal 3D Chess        
    Royal 3D Chess is a Free Board Strategy game. Play and learn with computer AI to become chess champion.nnIt is single player chess 3d game. Play and develop your own strategies and show your genius to win against AI.nnIt has extensively designed graphics; to make you feel like you are playing the real chess board […]
              Tag! You're It        

    Biologists catch and tag big sawfish in Florida waters

    Food for Thought

    Once a common top predator throughout coastal seas around the globe, sawfish have become remarkably rare. Indeed, today most populations are threatened with extinction. So spotting even one of these animals is reason to rejoice, notes Beau Yeiser of Mote Marine Laboratory in southern Florida. And this week, "we are nothing but giddy," he reports.

    He and colleague Tonya Wiley just returned from a 2-day sawfish-scouting expedition during which they tagged a 7-foot male on Oct. 16. At that size, the strapping youth may be 5 to 7 years old, Yeiser says. He cautions, however, that estimating age is challenging "as we try and piece together the life history of this species. We don't even know its size at maturity yet."

    These animals—essentially flattened sharks with wings—are members of the ray family. Only one species of this fish remains in U.S. waters, mostly off of Florida. Over the first half of the 20th century, this smalltooth sawfish (Pristis pectinata) was fished to the brink of extinction—largely by accident.

    Although many cultures eat sawfish—the animals' fins are especially prized in Asia as the featured ingredient in a pricey soup—most of the animals in U.S. waters were landed and destroyed as bycatch, that is, nuisance species hauled in by commercial fishing fleets. The dire status of sawfish globally won these animals protection, last month, under a treaty banning international trade in endangered species (see Hammered Saws).

    So far this year, Yeiser and Wiley have caught just 14 sawfish, most of them less than 4 feet long. Those would still be little kids, considering that these fish are almost a yard long at birth. Then again, the pair had expected only small ones because they've mainly been cruising coastal shallows this year in hopes of running into newborns and youngsters.

    The scientists attach a numbered identification tag to the dorsal fin of every sawfish they catch—and then release the animal.

    But last week's catch was so big that it qualified for a second identifier: a pop-up archival tag, or PAT. These recording devices are so heavy that they're reserved for large sawfish—at least 7-footers. To date, only some dozen of these animals have received PATs. Costing at least $4,000 each, these data-storage systems collect information every minute, for months, on the depth at which its host is swimming, the water temperature, and light levels. The latter information gets plugged into a computer program that roughly gauges the animal's geographic coordinates at any moment.

    Researchers program a PAT to pop off the fish on a particular date. Once it floats to the surface, it sends its stored information in spurts, twice a day, to a satellite. That orbiting relay station then shoots those data back to Earth and the scientists' email addresses.

    Last week's sawfish encounter took place in a southern Florida national wildlife refuge, in very shallow water. Investigated as a possible nursery, Yeiser says "I was expecting any sawfish that I might catch to be perhaps 4 to 5 feet in length." Instead, he found a much older juvenile. "But that's the beauty of this [sawfish] project; you never know what you are going to get when you're scouting a species that has not been studied much!"

    Yeiser named the youth that he tagged last week Raloff. Hmmm—I like the sound of that. Its tag is programmed to pop off on March 15. Stay tuned for an update on my namesake's travels.

    If all goes well, that is.

    A 7- and an 11-foot sawfish each received PATs in May. Although the satellite tags had been programmed to pop off 3 months later, they actually surfaced within just a couple weeks, Yeiser says—and were never recovered.

    So, each time biologists deploy the pricey devices, he says, "we just cross our fingers that they won't pop up early—or get lost in the middle of the Gulf."

    Don't try this yourself

    The sawfish is an endangered species, so federal law forbids its capture—except by researchers who have been granted a waiver. And even they need to release an animal after measuring and tagging it.

    It's against the law to even harass the animals. Still, anglers may inadvertently snag one of the toothy marvels. When that happens, this species "should be released by keeping the fish in the water and cutting the line as close to the hook as possible," according to guidelines issued late last year by the National Marine Fisheries Service in St. Petersburg, Fla. "If it can be done safely, untangle the line if it is wrapped around the saw. Do not handle the animal or attempt to remove any hooks on the saw, except for with a long-handled dehooker," NOAA says.

    Biologists request that any anglers who sight a sawfish report their encounter to the Mote lab. Its scientists are maintaining a database to help them identify important habitat for these endangered animals.

    As interesting as these piscine oddities are, biologists would prefer that the public give the fish a wide berth. The primary reason: Approaching the animals can stress them, chase them from what should be waters safe from predators, or even interfere with their reproduction.

    But there's another reason to steer clear, according to Captain Harvey Lee Hamilton, who charters a fishing boat out of Pineland, Fla. "I've caught plenty of sawfish in my life, and I'll tell you: They're dangerous. I'm still scared to death of them." Their saws—which he terms blades—are edged with dozens of razor-sharp "teeth." The muscular animals slash those saws from side to side to kill prey or defend themselves.

    Says Hamilton: "Those fish get big, with blades that can go to at least 5 foot." And they slash those blades "so fast," he says, "that they could slice your feet off." Indeed, he told Science News Online: "I'd rather fight a shark than a sawfish."


    If you would like to comment on this Food for Thought, please see the blog version.

    Citations

    Beau Yeiser and Tonya R. Wiley

    Center for Shark Research

    Mote Marine Laboratory

    1600 Ken Thompson Parkway

    Sarasota, FL 34236

    Smalltooth Sawfish Coordinator

    National Marine Fisheries Service

    Southeast Regional Office, Protected Resources Division

    263 13th Avenue South

    St. Petersburg, FL 33071
    Further Reading

    2006. Mote scientists to help eBay identify species in new sawfish ban. Mote Marine Laboratory news release. Jan. 25. Available at [Go to].

    Mote Marine Laboratory. How you can help save the U.S. smalltooth sawfish. Available at [Go to].

    Raloff. J. 2007. Hammered saws. Science News 172(Aug. 11):90-92. Available at [Go to].

    ______. 2002. Clipping the fin trade. Science News 162(Oct. 12):232-234. Available at [Go to].

    Sawfish in Peril: Sawfish Education Program. Available at [Go to].

              Computerized Plans        
    Our computerized blueprints are accurate and complete.  Stretch your imagination with your own design or choose from one of our stock plans. We offer a variety of logs and methods of construction including Post & Beam, Butt & Pass, Dovetail, and Swedish Cope – This unique method of construction provides the ultimate in structural strength. [...]
              Kommentar zu Docs & Demo von Anne Poe        
    I am still trying to correct the problem of downloading a gpx file using the download button on the maps generated by your GPX viewer plugin. I have pasted the code you supplied into my hosting site (Bluehost) in the folder sequence of hidden files/ public-html/wp-content/uploads/.htaccess (which I created). After refreshing and even rebooting, I still get the code text files when I click the download button associated with each map on my website page Exactly what am I supposed to get? I'm expecting to get a GPX file that I can save to my computer or upload into my Garmin. Thanks again for helping. Anne Poe
              Photonic nanostructures by design        
    Wrinkle lithography and computer-based calculations are a winning combination for making quasi-random structured surfaces.
              Comment #10        
    Each state has its own system but I know NY has a computer system called player tracking they know how much you spend ;what you played and how many others accross the state played the same also ....thats how they know if a number is sold -out ;

    777-1111-7777-222-333 and 1953 has been sold out for 4 years by 7pm
              RE[2]: not exactly        
    I think that's kind of Apple's plan "Look we sell really small, cool computers at a fairly reasonable price. But wait - we also sell iMacs which offer so much more in the way of features and at not that much more of a price! Aren't we amazing!"
              RE[3]: Apple just released their new budget PC        
    Well, considering those models are 5 years old, of course they (how the hell would they ship an iMac without a screen....was it a cube with a gaping hole in it???) are going to include CRTs and not LCDs. That'd be like saying the 386's from IBM back in 1992 were expensive because you can buy much faster computers from Apple in 2006.
              RE[2]: Apple just released their new budget PC        
    Its not a sweet spot in the US either... I worked at Dell a couple years ago trying to sell computers on the phone, $399 is the sweet spot for these chumps. Anyway, $999 would easily get me a month of expenses (however, I live with 2 other people so my rent is cut pretty low), but I doubt it would last two.
              RE: not a bad price, but....        
    We have a 20" iMac here. We like it for a few reasons: - it sits tidily and attractively in our living room (no mess of wires and no ugly boxes) - it does the business and is nearly silent - I do not get tempted to take it apart It will be here doing its job until the (John Lewis) warranty runs out in four (and a bit) years time. Sooner or later computers need to become appliances! Even geeks need to channel their efforts into enjoying their specialties.
              RE[2]: not a bad price, but....        
    One day, after a hot July, your drive will show signs of crashing. You will immediately try to do a backup using CCC. It will abort 90% of the way through. You will open the case, and discover a hard drive positioned in such a way that it is guaranteed to overheat. Never mind, you have your backup. You'll try to start from it. Oops. Its USB. Can't boot from USB, only Firewire. OK, you install a new drive, install the OS from scratch, now you try to get back your settings. Scattered in library files at random all over the place, and when you do copy them back, they don't work right. Yes, sooner or later computers need to become appliances. But they have not in the iMacs. When they go wrong, and they will, you are royally screwed. Make a clone to a firewire drive, and make it now. Maybe your idea of an appliance. Not mine.Edited 2006-09-06 21:36
              RE[2]: not exactly        
    Yet still, the Mac Mini is not Core Duo 2... which remains a disappointment. I think that for some more buck, one should get the new 17" iMac [the full featured version]. If you are looking for a $600 computer, just build yourself a PC. That makes more sense.
              SCOPE        

    Forty-one students participated in the 8-week summer research program, SCOPE, a student-faculty collaborative experience, conducting research in animal behavior, biology, chemistry/biochemistry, kinesiology, math/computer science, and physics.


              The Art of Lovin' Animals --- Featured Group of Artists Inspired by Their Beloved Pets.        
    "Enilde And Our Children" Oil on Panel 42" x 60"
    Painting by Luke Van Hook, 2003
    Painting and Photograph copyright by Luke and Ginger E. Van Hook, 2004
    Courtesy of the Van Hook Collection

    The Art of Lovin' Animals
    Features a group of artists inspired,
    motivated or influenced by their beloved pets
    and appear in this blog in the following order:

    Joshua Elias, Simone Gad, Betty Glass, David Newsom,
    Monrovia Association of Fine Arts supporters
    (KidsArt Studio, PaintNPlay Art Studios, Tyson & Tillman Skate Dogs)
    Family Dog and Cat Hospital in Monrovia, California (displays animal artwork).
    Ginger Van Hook, Luke Van Hook,
    Alex in Welderland, Elena Wolek, and Zareh.

    Additionally as part of the "Art of Lovin' Animals"
    there is a special book and movie review of
    John Grogan's book "Marley and Me", and the recent hit movie
    starring Jennifer Aniston and Owen Wilson


    Written by Enilde G. Van Hook with special thanks to all participating artists!


    Do you remember your first pet? I do. I even have a picture of how much bigger my cats’ paws were than my two feet put together at the age of three. My mother, tells me I had a yellow duck, a small dog and a large yellow tabby cat that owned me as a child.
    These three pets were protective, possessive and they were my first companions as I ventured out, for the first time, into my wild back yard of dirt and weeds. I was born in Rosario Argentina and to me now as an adult, my backyard is still my world. I live in Los Angeles, California but the romance of the Argentinean Pampas is not lost on me. From the pictures of my past, I gathered that my Belgian Grandfather, Francisco, ran a plant nursery in Buenos Aires and that my father, Luis, grew up to be an inventor in America. But the most unique connection I have to my past is my relationship with animals. I’ve had a pet at almost every age as I grew up. The importance of this type of companionship has not been explored enough in the art world, at least, this is my opinion. This is the reason I am blogging about the subject of the art and inspiration of lovin’ pets. I hope to instigate discussion, if not compassion. I hope to motivate an artistic response to my thoughts as well. You may have a completely different experience, so I personally encourage you to post your comments after you read this entry.
    This is what I asked myself for the subject of the essay for Ginger's Art Journal. What is the relationship of animals and pets to the art world? How involved are animals throughout the art strata? How much inspiration is gathered from the love of a pet? Can that even be measured? Does the love of a pet inspire political causes? Activism? How does one explain the pangs of loneliness from the loss of a pet? Does the death of a pet make an artist create more art? Does the gift of a new life of a pet inspire hope and renewal in artists? How do artists express their love and affection for the four-legged critters of our earth? How do animals, pets, pet trees, pet rocks or pets of any kind affect the process of making art?
    There are a number of artists that I have followed for a period of time to investigate the questions that will make up this entry. Studying the work of a number of local artists from the Los Angeles and surrounding areas that work with pets in their art practice, I will present some of their unique stories with photos. The artists, in alphabetical order, include Joshua Elias, Simone Gad, Betty Glass, David Newsom, Ginger Van Hook and Luke Van Hook, Alexandra from Alex in Welderland, Lena Wolek and Zareh. Additionally, the art of lovin’ animals has made a seamless transition from the literary art into the film arts so I will discuss one of my favorite books by John Grogan named “Marley and Me” as it compares to its latest movie version of “Marley and Me” starring Jennifer Aniston and Owen Wilson which opened in December for Christmas Day.
    The method selected to choose these artists was random. I began my animal photographic study in 2006. Through my daily practice of studying the arts, I have come across people who were “in my back yard” and came to connect with me in a special way. I didn’t set out to write a story about animals. I merely went about my daily routine of photographing people and artwork that caught my “eye” because I was at the right place at the right time. Believing that the universe has a special plan for me, I allowed this story to evolve of its own volition. What I discovered both surprised me and opened me up. What I mean by this is that I was surprised to discover that artists who had pets had a great deal in common with other artists who had pets. Most people know and understand the history that reveals how the Egyptians revered cats and how the dog is considered “man’s best friend”. While it was common to have general conversations about how great it was to have pets and create pet portraits, I rarely came across artists that spoke to the deeper underlying significance in the arts about this specifically. While doing this research, I came across the most extreme case of worshiping our pets. The act of cloning has been in the news ever since the cloning of “Dolly” the sheep, but did you know that now there is a company that has launched itself into a commercial venture to clone man’s best friend? I discovered this and lots more so enjoy the new year in 2009 with a renewed commitment to your beloved pet. This is an ongoing story so don’t feel left out if your best friend isn’t included in this entry. I’m still reviewing artwork and pet portraits,
    feel free to send me an email about your animal story and I’ll include it in the followup stories!

    *********************************************************************************

    JOSHUA ELIAS
    Fine Arts Painter

    Joshua Elias, Exhibition, DCA Fine Arts
    Santa Monica, California
    Photo copyright Ginger Van Hook, 2007
    Winston and Lucille read art literature on the couch and
    wait for Joshua Elias to become inspired to feed them.
    Photo copyright Ginger Van Hook, 2008
    Paintings by Joshua Elias
    Art in the making at the Brewery Artist Colony
    Los Angeles, California, 2008
    Studio visit by Ginger Van Hook
    Photo copyright Ginger Van Hook
    Artist brushes belonging to Joshua Elias
    The instruments by which Joshua Elias creates the canvas of weather and inspiration.
    Photo copyright Ginger Van Hook, 2008
    DCA Fine Arts Gallery, Joshua Elias with Mathew Heller and his girlfriend
    Photo copyright Ginger Van Hook 2007
    Joshua Elias, Exhibition at DCA Fine Arts Gallery
    Santa Monica, California
    Photo copyright Ginger Van Hook, 2007
    Joshua Elias with his cats Winston and Lucille
    in his studio at the Brewery Arts Complex in Los Angeles, California
    Photo copyright Ginger Van Hook, 2008

    Joshua Elias
    Artist Statement

    Art has become about large quantities of Resin, masquerading as Content. The focus has been on Process, confusing it with Content. Enough. I wish to focus on Content. Story and Vibration lead the way for me to paint.

    I work in oil because of the depth and movement that it allows for me, as a medium. I focus on Landscapes that are rearranged. Traveling spirits act as guides, to the movement of a particular painting. The influence of Moorish architecture and its many doorways offers and allows entryways into paintings.

    At present we are in a period of Time where there seems to be long standing fights over Space, Time Religion, Money, Ideology, and Relationships. Enough. The one thing we do all share is Weather. Through the action of Creating our own environment, our own personal Weather, the Repositioning of Weather can illuminate and allow for more Creation to happen, more of a Life Force to shine and to take shape.

    ï¿_ Joshua Elias

    Courtesy of the DCA website
    *************************************************************************************************************************



    SIMONE GAD
    Fine Arts Painter, Collage Artist, Actor and Performer
    Simone Gad, Artist, Solo Show, L2Kontemporary Gallery
    February 2008 Chinatown, Los Angeles, California,
    Photograph by Ginger Van Hook, copyright 2008


    Selfportrait with Max and Bella/Autoportrait avec Max et Bella
    Private collection, photo courtesy of Simone Gad, Artist, copyright 2005
    Gad/Rin-Tin-Tin Collection Long Beach Museum of Art
    Courtesy Simone Gad, Artist, copyright 2005


    Picture Holocaust Clowns - Pinups 127, Gad and Poodle
    Courtesy Simone Gad, Artist, copyright 2005

    Selfportrait with Cat and Jesus
    Private collection, Courtesy of Simone Gad, Artist, copyright 2005

    Hommage a Ma Mere 2005 Painting Collage
    Copyright and Collection- Simone Gad
    Courtesy Simone Gad-Artist
    Photograph by Antonio Garcia





    Autoportrait avec Kashmir, painting collage 2005/06
    Courtesy Simone Gad- Artist and L2Kontemporary Gallery
    Chinatown, Los Angeles, California. Copyright Simone Gad


    Portrait of Bella, the Brindle cat, acting secretary for Artist, Simone Gad
    Los Angeles, California, Artist studio visit
    Photograph by Ginger Van Hook, copyright 2008



    Bella the Brindle Cat, (on the Marilyn and JFK Installation)
    Photo copyright and courtesy of
    Jesse Bonderman and Simone Gad,

    Bella, the Brindle Cat #2 (Marilyn Installation)
    Photo courtesy of Jessie Bonderman and Simone Gad


    Portrait of Simone Gad, Artist with companion, Bella.
    Los Angeles, California, Artist studio visit
    Photograph by Ginger Van Hook, copyright 2008

    Portrait of Bella
    The Brindle cat, Artist assistant, model
    and loyal companion to Simone Gad.
    Los Angeles, California, Artist studio visit
    Photograph by Ginger Van Hook, copyright 2008

    Max and Bella pose for pictures in the window of Simone Gad's artist studio
    Los Angeles, California
    Photograph by Ginger Van Hook, copyright 2008

    Simone Gad poses with one of her paintings of Chinatown
    during her solo show at L2Kontemporary Gallery
    Chinatown, Los Angeles, California
    Photograph by Ginger Van Hook, copyright 2008



    Enilde Van Hook writer's notes: I met Simone Gad at an exhibition of her work in Chinatown in the spring of 2008. The L2Kontemporary Gallery is a unique gallery located at 990 N. Hill Street #205 in Downtown Los Angeles (90012), California. I received an email from ArtScene, a wonderful source of local Art Events that is produced by the staff of Coagula Art Journal. Special thanks to Michael Salerno and Mat Gleason, because somewhere in the announcement, I read that Simone Gad was a Belgium-born artist and this led me to want to meet her to talk about the art in Belgium, where my grandfather had been born. Once I attended her exhibit and got a chance to meet Simone, I realized there was a distinct cultural connection we had through our reverence to the animals. She used images of her cats to make intriguing and poignant self-portraits and insightful photographic collages.
    I have followed Simone Gad’s work into 2009 and you will enjoy visiting her site through the L2Kontemporary Gallery located in Chinatown in Los Angeles: Follow these links to get to know a renaissance artist, a versatile film and TV actress, a woman of many talents and an artist who has a great deal of compassion to show for her animal friends: visit the online gallery site at http://www.l2kontemporary.com to view her solo show at L2k for Feb 08 plus her updated resume which may be viewed at saatchigallery.org by writing in her name or wooloo.org by writing in Simone Gad’s name.
    Special thanks to the L2Kontemporary Gallery for cooperating with my interview! (www.L2Kontemporary.com and L2Kontemporary@sbcglobal.net and phone: 323-225-1288)

    Simone Gad
    Artist Statement and Biography: 2009

    I've been showing in museums and galleries for 40 years-am a 6 times grants recipient, including a CRA Grant 1986, the Woman's Building 1985/6, New Orleans Contemporary Museum of Art 1984, the Gottlieb Foundation-NYC/Painting Medical Emergency Grant, Change Inc-Robert Rauschenberg Foundation Grant-both in 2002 for painting and medical emergency, and Artist Fellowship Foundation Grant in 2007-NYC. I am included in the Archives of the National Portrait Gallery/Smithsonian-Washington, DC, and will also be included in the Lyn Kienholz Encyclopedia of Los Angeles Artists who have shown between 1944 and 1979. In Los Angeles, I am represented by L2kontemporary Gallery-Chinatown, Jack Fischer Gallery in San Francisco, and am showing in Spain. I am also in the traveling museum exhibition-Your Documents Please thru 2010 in Japan/Europe/Mexico curated by Daniel Georges of Brooklyn, NY. I was born in Brussels, Belgium to holocaust survivor parents, from Poland. We came to the US in the early 1950's and settled in Boyle Heights/E.L.A, after arriving at Ellis Island. My mother got me into show-biz at the age of 4 upon our immigration. I grew up in the entertainment field as a young actress-have been working professionally in film, tv, commercials and theatre ever since. Have always had a dual career-.visual/performance artist and actor. George Herms and Wallace Berman were my first mentors. Al Hansen was my mentor from 1972 to 1995 when he passed away in Koln, Germany.

    My cats Max and Bella Bettina Kashmir are my inspiration for many of my painting collages-have been so for many years. I've always been inspired by my cats and dogs that I've had since I arrived to this country from War torn Europe. My father got me my first dog-Teddy Queeny when I was a child living on Folsom Street-We had just returned from a movie on Brooklyn Avenue when we saw the puppies on our way home. I was allowed to have one-and I was so happy. But my mother hated animals and wouldn't let me keep my pet with me in my bedroom and it cried all night. I was heartbroken when I got home from Nursery School the following day and found that my dog was gone. My mom told me she had sent it to New Jersey to live with my Tante Sally. I wasn't allowed to have any animals after that. Years later I visited my aunt and asked her if she had taken care of my Teddy Queeny and she told me she never did-she never got the dog-didn't know what I was talking about. I realized that my mother had lied to me and had possibly killed my beloved doggie. I had moved to Topanga Canyon for a while in the late 1960's-that's where I got to know Wallace Berman and George Herms. I was given a miniature sheppard-who I named Lady. She was my constant companion and I adored her. She was run over by a couple of friends who were staying with me one night. I found her bleeding from her mouth by the driveway. She died in my arms and I could feel her spirit leave her body. We buried her the next morning. I was devastated for years. A friend of mine gave me a dash-hound and I took it home to be with me when I left Topanga and stayed with my parents for a while. I named her Wiggle Butts because she had this habit of wiggling her behind when she walked. I was not allowed to keep her-once again-so I called a friend and had her drive from The Canyon to pick Wiggles up and take care of her for me. When I left my parents and got an apartment, I got a cat-Nathaniel-my very first cat-who was with me for 15 years until he passed away. It was then that I started to incorporate animal objects into my collages-in the mid 1970's.

    copyright Simone Gad 2009

    http://www.l2kontemporary.com to view Simone Gad’s solo show at L2k for Feb 08 plus her updated resume-you may also get it on saatchigallery.org by writing in her name or wooloo.org by writing in Simone Gad’s name-

    ************************************************************************************


    BETTY GLASS

    Focus One Gallery in Monrovia, California. Sponsored by M.A.F.A.,
    the Monrovia Association of Fine Arts and Focus One Community Credit Union.
    Photo by Ginger Van Hook, copyright 2006

    Betty Glass celebrates Christmas with Lulu at home in 2008.
    Lulu, wearing her new holiday sweater,
    pokes her nose into the gift bag
    to see if she likes what Santa has brought her.
    Photo copyright and courtesy of Betty Glass and James Glass.
    Turtle Painting, Watercolor Artwork by Betty Glass reminiscent of her pet turtles.
    Photo copyright and courtesy of Betty and James Glass.
    Trojan Horses, Watercolor painting by Artist, Betty Glass
    Photo copyright and courtesy of Betty and James Glass.
    Hummy, Watercolor Painting by Artist, Betty Glass.
    Photo copyright and courtesy of Betty and James Glass.

    Yankee and Sugar, Watercolor Painting by Artist, Betty Glass
    memorializing the life of her beloved friends.
    Photo copyright and courtesy of Betty and James Glass.

    Yankee (5-17-80 --- 4-20-94)
    the larger white and orange Brittany on the right,
    and Sugar (7-20-90 --- 12-24-04)
    the smaller Brittany on the left.
    "Beloved Friends and Forever in our hearts!"
    Loyal Friends, Inspiration and Companions
    to Artist, Betty Glass and her family.
    (Special thanks to husband, James Glass
    for his technical computer assistance
    with digital photography formating of Betty Glass Artwork.)
    Photo copyright and courtesy of Betty and James Glass


    Enilde Van Hook, Writer's Notes:
    I met Betty Glass through the Monrovia Association of Fine arts in 2006. We were showing together at the Focus One Gallery on Huntington Drive in Monrovia, California. When Betty came into the gallery, she was toting her adorable poodle named Lulu. I was charmed immediately and I just had to have a photo of this beautiful female pooch with a twinkle in her eye and the gumption to come into an art gallery where only humans gathered. This little poodle had no clue there was any difference between her and her owner, and she acted like she was looking at the art just like everyone else. At the time, I considered this a very cultured poodle and I told Betty so. Betty giggled and let me take her snapshot with Lulu and then we did not see each other again until we had another show together, also at Focus One Gallery two years later in December of 2008. When I saw Betty this time, I saw the connection of her artwork and the love of her animals come through her work and later, she agreed to participate in the interview for my blog. You may enjoy Betty Glass's artwork by visiting her website at www.bhglassart.com

    Betty H. Glass
    Artist Statement about Animal Art

    Through art we communicate our feelings and thoughts.
    Our art reflects what experiences in life have influenced us.
    I have had a lifetime of pets
    ranging from goldfish, parakeets, and turtles and, of course,
    the loyal dog—always your friend even when the sky seems to be falling.
    I am still sketching and painting animals, birds, and fish.
    The softness of their fur, the texture of their feathers and fins,
    the variations of color are very appealing to me,
    because color is part of my artistic signature.
    Sometimes they are presented in a realistic fashion.

    Other times I use animals in a more stylized way—
    using their shapes as patterns, semi-abstracting them and their background.
    For example, my painting Trojan Horses shows flattened stylized figures of horses.
    Hopefully artistically pleasing and calling to mind ancient Greece.

         

    Normale prijs: € 346,95

    Aanbiedingsprijs: € 319,95


              iiyama G-MASTER G2730HSU-B1 27" Full HD TN Mat Zwart computer monitor LED display        

    Normale prijs: € 229,95

    Aanbiedingsprijs: € 207,95


              Acer SA270BID 27" Full HD IPS Zwart computer monitor        

    Normale prijs: € 239,95

    Aanbiedingsprijs: € 219,95


              Acer KG241Q 23.6" Full HD TN+Film Zwart computer monitor        

    Normale prijs: € 189,95

    Aanbiedingsprijs: € 179,95


              Samsung S27H650FDU 27" Full HD TFT/PLS Zwart computer monitor        

    Normale prijs: € 399,95

    Aanbiedingsprijs: € 369,95


              LG 22BK55WY-B 22" IPS Mat Zwart computer monitor        

    Normale prijs: € 215,00

    Aanbiedingsprijs: € 192,00


              DELL UltraSharp U3417W 34.14" UltraWide Quad HD IPS Zwart computer monitor LED display        

    Normale prijs: € 917,95

    Aanbiedingsprijs: € 899,95


              The Internet        

    As Homer Simpson once said: "Did you know they have the internet on computers these days?"


              NEC MultiSync E245WMi 24" PLS Zwart computer monitor        

    Normale prijs: € 337,95

    Aanbiedingsprijs: € 307,95


              iiyama G-MASTER GB2488HSU-B3 24" Full HD TN Mat Zwart computer monitor        

    Normale prijs: € 327,00

    Aanbiedingsprijs: € 288,00


              LG 27UD58 27" 4K Ultra HD IPS Zwart computer monitor        

    Normale prijs: € 432,95

    Aanbiedingsprijs: € 392,95


              Philips Brilliance 4K Ultra HD LCD-scherm met MultiView BDM4037UW/00 computer monitor        

    Normale prijs: € 721,95

    Aanbiedingsprijs: € 695,95


              ASUS PG279Q 27" Wide Quad HD IPS Mat Zwart computer monitor        

    Normale prijs: € 967,95

    Aanbiedingsprijs: € 879,95


              All Moved In...Almost        
    I haven't had much time for stitching these past few months. Paperwork, packing, moving, unpacking, and cleaning has taken up most of my free time. Despite the fact that we officially moved in at the end of March, we're still transporting stuff over from our parent's homes. Our spare bedroom has become a storage area for the yet-to-be-unpacked boxes. 

    My favorite room in the house is my computer/craft room. I have my own computer desk, a craft desk, and a large closet full of crafting supplies in organized storage bins. It couldn't be any more perfect!

     

    This is the birth announcement for my boyfriend's cousin's baby after another six hours of stitching (sixteen hours total). All that's left to do is the rest of the moon, the placement of the text, and the beaded stars. The text, of course, will have to wait until after little Braiden is born, which won't be long now. Within the next week or two, I think. I need to hurry and get the rest of the moon done!

              Benq EW3270ZL 32" Quad HD AMVA+ (SNB) Zwart computer monitor        

    Normale prijs: € 599,95

    Aanbiedingsprijs: € 529,00


              DELL S Series S2216H 21.5" Full HD TFT Mat Zwart computer monitor        

    Normale prijs: € 174,95

    Aanbiedingsprijs: € 159,95


              DELL P1917S 19" HD IPS Wit computer monitor        

    Normale prijs: € 202,95

    Aanbiedingsprijs: € 184,95


              Benq BL912 19" Zwart computer monitor        

    Normale prijs: € 169,95

    Aanbiedingsprijs: € 142,95


              Corsair SP120 Computer case Fan        

    Normale prijs: € 69,95

    Aanbiedingsprijs: € 63,95


              Corsair HD120 Computer case Fan        

    Normale prijs: € 39,95

    Aanbiedingsprijs: € 31,95


              mako        
    ------------
    Note 1: So you got a Nexus 4. Congratulations. You have an incredibly powerful device in your hands. This post is not N4 specific, so you can try several of these with any top-of-the-line Android device. N4 because all of these have been field-tested on mine. If you've got interesting apps/uses to share, shoot in the comments, I'd love to hear 'em. Otherwise, if 'Angry Birds' is all you've done, read on, you must. ;)

    Note 2: I'm sure someone at Google is huge Guillermo Del Toro fan. Galaxy Nexus was code-named 'toro', Nexus 4 is code-named 'mako' (ref: Pacific Rim).
    ------------


    Part I: use mako

    Part II: root mako

    Part III: sudo mako



    Part I: use mako


    a) Lock screen

    Widgets were always the strength of the Android ecosystem, and 4.2 Jelly Bean added the capability to add widgets on the lock-screen. There are several lock-screen widgets, but none standout like Roman Nurik's DashClock widget, which is beautiful, and isn't heavy on the battery. There are several extensions for this widget available in the store, so suit yourself.




















    b) Home screen

    I use the Android stock launcher. What you see in the background is the Ice Galaxy Live Wallpaper. This fellow, Maxelus, makes beautiful wallpapers. Most of the widgets are created using Zooper Widgets, and the icon pack is Minimalist.

    Nova Launcher is a popular choice for launcher replacement. It gives you a lot of options to customize just about everything. A shoutout to Buzz Launcher, which attempts to create a marketplace for out-of-the-box homescreens, which you can download and apply in a flash! Worth checking out if you are among the lazy ones.


    Head here for some inspiration.
















    c) Computer-phone connectivity apps (Productivity)

    Chrome to Phone - Send links from Chrome browser on desktop to your android phone.

    Phone To Desktop - Send links from your android phone to Chrome browser on desktop.

    Desktop Notifications - Get notifications from your phone on Chrome browser on desktop as desktop notifications.

    AirDroid - Transfer files to/from phone to desktop over wi-fi. Send SMS, use phone camera as a webcam, manage contacts, apps, music et al, from your desktop.

    TeamViewer - Remote control/remote desktop your computer from your phone over a data connection.

    GOM Remote - Control GOM Player on your computer through a remote-like interface on your phone.

    Unified Remote - Use your phone as a keyboard/mouse for your computer.



    d) Travel apps

    FlightTrack - Beautiful interface which shows flight path on a map. Gives schedule and gate information. Excellent, excellent app.

    Currency - Offline currency conversion.

    Google Maps / Google Translate - Their 'offline' mode is sweet! Download maps, and language packs for offline use! Very, very handy if you are planning a foreign holiday soon!

    Triposo - Travel guide.



    e) Special mention

    SMS Backup+ (backs up SMS, call logs, and now WhatsApp messages to Gmail!),
    Clean Master (clear system cache),
    Battery Doctor (battery optimisation),
    CamScanner (excellent app to get scanner level quality for documents through the phone camera),
    TrueCaller (it's creepy how they get the unknown numbers right, but they do),
    Light Manager (customise phone's LED notifications),
    SphereShare (photosphere images sharing community),
    TV Show Favs (track TV show episodes), and
    Default App Manager (manage default apps for any phone action).


    ...and since you will install so many apps, it is easy to get lost. Enter: App Dialer, yep, an app to find apps installed on your phone!




    Part II: root mako


    Rooting gives you the ability to flash custom ROMs on your phone. I haven't flashed any custom ROMs yet, I am pretty happy with the stock ROM. But rooting allows you to make full backups of your phone, and some pretty nifty apps. Most of the methods of rooting Nexus 4 factory resets the phone, and guides are easily available if you google it.


    The method I used doesn't factory reset the phone. (Motochopper method)

    1: Get motochopper and the drivers from here.

    2: Root. Yep, that simple. A full guide here (they even have a video!). The guide is for Galaxy S4, but it works just the same for Nexus 4 (I've done it!).


    All the other methods unlocks bootloader first, and then applies root. Hence the factory reset.

    Motochopper roots without unlocking the bootloader. Once you have achieved root, you can unlock your bootloader using BootUnlocker (yep, there's an app for that!). Android 4.3 update was announced today, so there's a decent chance you'll lose root after the update. You can use Voodoo OTA RootKeeper to preserve root during the OTA update.








    Part III: sudo mako

    Well... you have a rooted phone. What now?

    ShareKM - My favorite root app's gotta be ShareKM. It's brilliant! It connects the phone to your computer over wi-fi/data/bluetooth. Slide the mouse pointer from the edge of the screen, and voila!, the mouse pointer jumps to your phone! You can now use your computer's keyboard to type on your phone, or copy text from one to the other. It's really neat, you should check it out if you have a rooted Android device. Video of this app in action embedded below:





    OBackup - Nandroid Backup - Nandriod backup means a full image backup of your phone. So if you mess up something tinkering, you can always restore the phone exactly to how it was. OBackup does cloud backups and you can schedule your backups, which is pretty neat.



    LMT - LMT enable features on stock Android that are typically available on custom ROMs, and is often the reason why people do install custom ROMs. It isn't avaialble on Google Play, but can be downloaded from here. A full review here, and video of the app in action below:






    Spend time configuring your phone, it'll be worth it. Tinker. Enjoy.

    mako...

              Special 322: WWDC 2017        

    TWiT Live Specials (Video-HD)

    At their 2017 World Wide Developers Conference, Apple announced six new things. tvOS gets an update and Amazon Prime Video. watchOS 4 includes new faces and functionality. macOS High Sierra will incorporate Apple File System and improvements to Safari, Mail, and Photos. MacBook Pros and iPads get a spec bump, and iMacs can now handle VR with the HTC Vive. The iMac Pro, coming later this year, might fill the MacPro-sized hole in power users' hearts. iOS 11 will include a slew of new features and improvements, most notably machine learning and augmented reality. The new 10.5" iMac Pro further blurs the line between tablets and power computers. And last, but surely not least, the new HomePod is the rumored "Siri Speaker," with a big focus on music.

    Hosts: Nathan Olivarez-Giles and Megan Morrone

    Download or subscribe to this show at https://twit.tv/shows/twit-live-specials.

    Thanks to CacheFly for the bandwidth for this special presentation.


              8 Tips For Safe-Guarding Small-Business Computer Data (Infographic)        
    Click image to enlarge. View the full post that goes with this infographic. Share This Image On Your Site Please include attribution to https://kunzonpublishing.com/ with this graphic. Hashtags: #selfpublishing #smallbusiness 8 Tips For Safe-Guarding Small-Business Computer Data (Infographic) https://t.co/pY8izvKtO0 via … Continue reading
              Computer-Data Backup-Strategy For Self-Publishers (Infographic)        
    Click image to enlarge. View the full post that goes with this infographic. Share This Image On Your Site Please include attribution to https://kunzonpublishing.com with this graphic. Computer-#Data Backup-Strategy For Self-Publishers (Infographic) https://t.co/LyRZwzOdTW @jckunzjr #selfpub — Carla Douglas (@CarlaJDouglas) January … Continue reading
              Computer-Data Backup-Strategy For Self-Publishers        
    Synopsis Protecting your computer’s data files is something every self-publisher must know about and deal with before it’s too late. Therefore, it’s essential that you keep the back-up process simple and automatic. It’s also imperative to create multiple copies, on-site, … Continue reading
              8 Tips For Safe-Guarding Small-Business Computer Data        
    Synopsis No matter how small your business is, you still must have a data backup plan in place. No one method alone is a guarantee that your data is completely safe. So here are some tips that show you how … Continue reading
              Re: Refactoring Day 2 : Move Method        

    Since it can be difficult to find human opponents for a face-to-face game and I don't like playing against the computer, I will have to try out the internet chess site. Thanks for the info.

    http://healthconditions.edu...
     


              Treating Smoking in Adults With Co-occurring Acute Psychiatric and Addictive Disorders        
    imageObjectives: Tobacco use is undertreated in individuals with psychiatric and substance use disorders (SUDs), with concerns that quitting smoking may compromise recovery. We evaluated outcomes of a tobacco intervention among psychiatric patients with co-occurring SUDs. Methods: Data from 2 randomized tobacco treatment trials conducted in inpatient psychiatry were combined; analyses focused on the subsample with co-occurring SUDs (n = 216). Usual care provided brief advice to quit and nicotine replacement therapy during the smoke-free hospitalization. The intervention, initiated during hospitalization and continued 6 months after hospitalization, was tailored to readiness to quit smoking, and added a computer-assisted intervention at baseline, and 3 and 6 months; brief counseling; and 10 weeks of nicotine replacement therapy after hospitalization. Outcomes were 7-day point prevalence abstinence from 3 to 12 months and past 30-day reports of alcohol and illicit drug use. Results: The sample consisted of 34% women, among which 36% were Caucasian, averaging 19 cigarettes/d prehospitalization; the groups were comparable at baseline. At 12 months, 22% of the intervention versus 11% of usual care participants were tobacco-abstinent (risk ratio 2.01, P = 0.03). Past 30-day abstinence from alcohol/drugs did not differ by group (22%); however, successful quitters were less likely than continued smokers to report past 30-day cannabis (18% vs 42%) and alcohol (22% vs 58%) use (P < 0.05), with no difference in other drug use. Conclusions: Tobacco treatment in psychiatric patients with co-occurring SUDs was effective and did not adversely impact recovery. Quitting smoking was associated with abstinence from alcohol and cannabis at follow-up. The findings support addressing tobacco in conjunction with alcohol and other drugs in psychiatric treatment.
              Purchasing & Production Manager        

    Production & Purchasing Manager | Full Time Position

    Bazzaz, Inc. is seeking to fill a full-time position for a Purchasing & Production Manager. 

    Bazzaz is a designer and manufacturer of superior-quality motorcycle & ATV electronics and dynamometers located in Chino Hills, CA. We are committed to providing customers the very best experience which we believe stems from hiring the best employees. For more information on the company please visit bazzaz.net.

    Location: Chino Hills, CA

    Description: Seeking an individual who will plan, organize, and control production at Bazzaz Z-Fi fuel controller factory, which produces harnesses, strain gages, and printed circuit boards. Candidate must be committed to ensuring that Bazzaz products are produced efficiently, on time, within budget and to the highest quality standard. Issues Purchase Orders for the raw materials. Candidate should be solution-driven and acutely focused on quality. Listed below are the basic duties and requirements of the position:

      • Supervises production assembly team of 12-20 persons. Subordinates perform assembly of products or sub-assemblies according to verbal or written instructions, or by following drawings or diagrams. Provides work direction and reviews work performance.
      • Responsible for light maintenance of production machinery for harnessing and SMT.
      • Production Planning and ability to apply LEAN manufacturing techniques.
      • Manages the purchasing function according to department policy and procedure. Accepts and scrutinizes vendor bids or proposals. Selects sources based upon analysis. Arranges vendor contracts, bargains for best costs, and observes quality of purchased materials. Prepares reports and required documents. Organizes activities with sales, engineering, production, or warehouse personnel.
      • Manages inventory of materials, parts, and finished product to maintain required supply. Maintains records, replenishes stock, and plans for future requirements based on orders, production schedules and forecasts. Strives to achieve JIT.
      • Quality assurance - Manages quality assurance operations for the factory. Comes up with new ideas to enforce and improve quality programs. Monitors Production Department's conformance with QA standards and procedures. Conducts quality assurance training for employees engaged in materials handling or product assembly. Suggests methods for improving product quality or design, or manufacturing processes.
      • Manages shipping & receiving staff. With an emphasis on efficiency and accuracy.
      • Provide production updates to Bazzaz Team.
      • Harness Documentation / Create BOM.
      • Assist R&D.
      • Reports to Vice President.

    We are looking for a responsible, highly motivated and detail oriented individual, who wants to be part of a growing and dynamic company. This person must be a problem solver, have a get it done attitude, and enjoys working with a team. Bazzaz is on the leading edge of technology in the motorcycle aftermarket industry and this position plays a critical role in delivering the ultimate customer experience.

    Desired Qualifications:

      • Minimum of a 2 year degree.
      • Minimum of 2 years of experience in production and/or purchasing for wiring harnesses and/or printed circuit board assembly.
      • Winning attitude. Must be a team player and enjoy working in a fun yet focused atmosphere.
      • Experience with MRP/ERP software.
      • Computer literate with accurate data entry skills.
      • Able to read a wiring diagram.
      • Person shall demonstrate competency when using scales and other hand tools. Individuals should exhibit strong communication and organizational skills.
      • Mechanically inclined.
      • Ability to lift 50 pounds.
      • Bilingual in Spanish and English, preferred but not required.

    Benefits:

      • Starting salary is $40-50K annually, based on experience.
      • After six months eligible for company Health/Dental/Vision Insurance.
      • 1 week vacation. 6 Paid personal days. Paid Holidays.
      • Monthly bonus plan.

    Applicant must successfully pass a drug screening, E-Verify, and background check in order to qualify.

    Bazzaz, Inc. is an at-will, equal opportunity employer. If you believe yourself to be a good candidate and meet all requirements, please e-mail a brief description of your qualifications and resume to jbuxton@Bazzaz.net.

    *Position descriptions and anticipated skills acquired are neither conclusive nor definite and can be expected to change throughout term of employment. 


               Final implementation of SEACON: new scope and new open system platform.         
    Mahou, A L y Soto, F J y Blanco, F y Pastor, G y Serna, J y Alfageme, M A y Corera, J y Criado, R. y Ferrer, V y Martin, J y García-Santesmases, J M (1997) Final implementation of SEACON: new scope and new open system platform. In Power Industry Computer Applications., 1997. 20th International Conference on. IEEE Conference Publications . IEEE Xplore Digital Library , pp. 54-59. ISBN 0-7803-3713-1
              Lighten Your Load: Five Things You Should Leave at Home When You Travel to Ireland        

    For the last twenty years, I’ve been hosting visitors to Ireland, and certain items always get packed, but rarely used. Here’s a look at some things you should think twice about before bringing them to the Emerald Isle. Computers Aren’t the Only Way to Go Digital Now that phones and tablets have essentially become handheld […]

    The post Lighten Your Load: Five Things You Should Leave at Home When You Travel to Ireland appeared first on Irish Fireside Travel and Culture.


              I Flew RyanAir, and I Almost Liked It        

    What it’s really like to fly on a €10 flight from Ireland. After typing in dates for a flight from Shannon – Ireland’s west coast airport – to London, my computer search churned out an insanely broad range of flight options. Several came in at around €130 ($140), loads more were over €200 ($217), and […]

    The post I Flew RyanAir, and I Almost Liked It appeared first on Irish Fireside Travel and Culture.


              Apples to Oranges        
    As promised, here is the battle station in action:


    Two computer screens, and a fancy desktop way in the back corner there that lets off a lot of pretty light shows. And an executive chair. If we're home, he's here.  :o)

    A a consequence of our fabulous CSA we have been getting, we have had apples and oranges sitting around begging to be used up. For some reason, we can't keep up with eating them before another round comes. The Boy mentions: "hey, you should find something to use up these apples." But I know there are also a ton of citrus in there. I think, gee- I'll just google something.

    Yeah. The FEW recipes I find that involve both apples and oranges seem overly weird (shortening in quick bread?). So, I start inventing my own. I just purchased a kitchen scale for these as well. Using the book, Ratio, I concocted the delicious:

    Apples to Oranges Muffin
    Dry:
    6 oz. AP flour
    2 oz. whole wheat flour
    1 t. salt
    1.5 t. baking powder
    .5 t. baking soda
    zest from 2 oranges
    1.5 t. cinnamon (might want to add a touch of ground cloves if you have any)
    Wet:
     4 oz. orange juice
    6 oz of grated apple
    4 oz melted butter (1 stick)
    2 large eggs
    .5 t. vanilla

    Oven at 350.
    Combine Dry.
    Combine Wet.
    Mix wet with dry until just combined. 
    Spoon into 12 muffin cups. ( I added toasted pecans to the top of half because I like the texture/crunch.)
    Bake for about 20 minutes, or until a paring knife inserted into the center of a muffin comes out clean (as per Michael Ruhlman).

    And they are GREAT. The Boy likes them too! Yay!!  I love the concept behind this book - that baking is all a matter of getting the ratios right, and then you can invent to your hearts desire. Not gunna lie, totally turned on by the fact that I have a kitchen scale and I can invent tons of weird new flavors of cakes and muffins and breads. If that makes me wrong, then I don't wanna be right.

    Cheers!







              Fix your Xperia X10        
    Many reviewers test a product over a period of 1 week and feel they can adequately give someone advice on whether or not to buy a certain product. I’ve lived with the Xperia X10 for almost a year now so my review is very personal and will touch on all the –ve’s and positives for the phone.

    Camera

    The camera on the phone is great and it was one of the key buying points when I got the phone. I have however realised that I don’t use the camera nearly as often as I thought I would. The camera is good compared to other phones, but no where near as good as a good 5 megapixel camera – such as Canon IXUS range.

    The dedicated camera button can take 4-10 seconds to launch camera app – that is annoying. I have not found a fix for that yet.

    TimeScape and MediaScape

    Those 2 apps were another reason I bought the phone. They were great for about 2-3 weeks, after which I wanted toknow how to get rid of them. The problem with those 2 apps is that you can get many apps on the market that can do a better job. For example, I don’t use MediaScape for music or video – instead I use PowerAmp and RockPlayer. Not X10 users I know use MediaScape. As for TimeScape – I used it for 1 week and never touched it again. It’s a shame that these are the 2 apps that hold back quick Android updates on the X10 – one has to wonder just how important they are to Sony Ericsson (yes no user would mind if you got rid of them)?

    Perhaps Sony Ericsson would do well to offer a customised version of X10 and a non customised version. If there was ever a phone that could have toppled the iPhone it was this phone. Sony Ericsson needs to be very careful not to fall in the Microsoft trap – for 10 years Microsoft thought it had the formula for Smartphones figured out. Users view their Smartphones like Computers. When a new OS comes out – give me the ability to update. If Sony Ericsson employees have computers, they will understand how important it is to be able to remove manufacturer add-ons – like MediaScape and TimeScape. Instead of wasting money on MediaScape why not just buy PowerAmp????

    On the Move Music Player Test

    You cannot select music using MediaScape if you’re walking. IMPOSSIBLE! The buttons are too small and the swipe bar at the bottom is just too thin. iPhone music player buttons are bigger and easy to select music as you walk. Blackberry Bold is also easy, albeit not touch screen. Sony Ericsson – maybe it’s time you fired you UX team! Seriously, pick uo one of the phones and walk at a moderate pace and try and select Album – Scroll to one in the middle of the list – select a song in the middle of the album! IMPOSSIBLE! Yet, this is an afterthought for iPhone or people who download a 3rd party app!


    Fixing Headset Volume on Xperia X10

    A quick look around on any train ride and ½ the people have headphones on. Music player functionality just has to be spot-on in this day and age where the iPod/iPhone set the benchmark over 3-4 years ago.

    The headset volume of Xperia X10 running Android 1.6 is just terrible. Many of you will say that the X10 is now on Android 2.1 Éclair. Great – so I retested and decided that the 2.1 results would be the best and most up to date. I compared it to 2 of my old phones – the iPhone 3G the Blackberry Bold (9000) and my wife’s iPhone 4. I conducted the test with a pair of in-ear JVC-FXC80 headphones and over-ear AKG 701. The X10 volume is still terrible. It is about ½ as loud as the iPhone 3G. The Blackberry Bold is very loud and clear – the iPhone 4 has no reception but sounds great all the same.

    I downloaded PowerAmp and tried to boost the volume that way. DISTORTION! That’s right, when it’s loud the music is simply too distorted. This is obviously not the fix for the volume. PowerAmp is a great music player, but it is definitely not going to sort out your music playing experience on the X10.

    I did a quick search using Google and there were suggestions that the Nordic ROM would fix the headphone problem. So at last after almost 10 months I decided to download a custom ROM and root my phone whilst I was at it.

    So I went here - http://forum.xda-developers.com/showthread.php?t=835308 and downloaded the custom ROM, loaded it on the X10 and fired up the music player.

    FIXED!

    Yes, the music is now louder. Shame on you Sony Ericsson!

    Saving Battery

    Here is the best tip anyone can give you. Download a plain black background and use it as your wallpaper. Turn down your screen brightness (contrast is better with the black wall paper) and there you have it. 20-30% better battery!

    Keyboard

    Does anyone actually use the Default X10 keyboard? I use SwiftKey.

    Making Phone calls

    The buttons are now bigger and pressing the call button does not tale you to another menu item like in 1.6 but makes the call! Good job. I think the calling functionality is good. Just make the letters a little bigger on the contacts menu.

    Hindsight

    In hindsight I probably should have gone for the Google Nexus One. The fact that it receives updates before any other phone is justification enough. I have lived on Android 1.6 for almost 12 months and my contract ends in 6 months time. Logic would suggest – once bitten twice shy. The other reason is the volume on the Nexus One. I could play my music properly.

    My next phone will run be an HTC or Vanilla Android. I’m not interested in silly customisations that delay software upgrades – HTC somehow has their upgrades figured out.

    In 6 months time I’ll upgrade to a phone with better than 640 x 960 resolution. If Samsung can get AMOLED screens to 640 X 960 then they have a winner. But it would be silly to play catch up with the iPhone. I would suggest 640 X 1024.
              Comment on How To Get Into a Fully Funded PhD Program: Contacting Potential PhD Advisors by ProFellow        
    Hi! Please see our article Fully Funded PhD Programs in Computer Science: https://www.profellow.com/fellowships/fully-funded-phd-programs-in-computer-science/
              Comment on How To Get Into a Fully Funded PhD Program: Contacting Potential PhD Advisors by sanjay        
    Hi, I am would like to do Phd in computer science. Request you kindly let me university that are providing fully funded With Regards
              Sending Tado Data to Loggly        

    I've just had a Tado smart thermostat installed at home: it's a clever device that controls the boiler, central heating and hot water and is linked to the internet. It has a room thermostat and takes account of the external temperature as well. You can control it from your smart phone or from the web app and, if you want, it will track your location so that when you leave the house it turns the temperature down and brings it up again in time for when you get home again.

    I expect the web app and the mobile app are both in constant development and right now there are features only available in one or the other. For instance, you can only set the hot water schedule in the web app but can only see the historic temperature data in the mobile app (you have to turn your phone to landscape orientation to make it magically appear).

    I wanted to see the historical temperature data on my computer instead of my phone so I had a poke around and have found a way to get hold of the data on one of my Raspberry Pis and send it to Loggly to graph it.

    Read more… (9 min remaining to read)


              Raspberry Pi System Logging and Loggly        

    I've already written about how useful Loggly is to log data from a Raspberry Pi, but like me, you may want to know more about how system logging actually works and what the extra configuration added by the Loggly setup script means.

    This post explains how system logging works and how Loggly fits into it. It describes how the log files are rotated to avoid them filling up the disc and it also goes into a lengthy detour regarding how to encrypt the log traffic between your computer and Loggly, how all the encryption actually works and how you know you can trust it.

    Read more… (20 min remaining to read)


              Monitoring Broadband Speed with Loggly        

    I've been having trouble with the speed of my network at home and needed to check whether the broadband link to the internet was working as fast as it should be. To check this, you really need to make many measurements over time, as at different times of the day the performance will vary depending on how many other people in the area are using the same link. To check the speed, I have plugged a spare Raspberry Pi directly into the my Virgin Media Superhub via an ethernet cable and set it up to measure and report the speed every hour. I'm sending the data to an online logging service called Loggly so that I can access it and graph it easily from any other computer.

    Read more… (11 min remaining to read)


              CD-i floppy inventory        
    Last weekend I future-proofed my CD-i floppy collection. A bit to my surprise, all floppies except one turned out to be perfectly readable (nearly twenty years after they were last written!). Luckily, the one exception was a backup copy so I didn’t lose any contents.

    I had originally intended to use the borrowed CDI 182 unit for this (it has two floppy drives). The primary motivation for this was that my unstowed CDI 605 could not read beyond track zero of any floppy, but after giving the matter some thought I decided to try my other CDI 605 first, the primary motivation for this being speed (see below). It turned out that this 605 could read the floppies perfectly, including the three 38U0 format ones that gave problems on the 182 unit. Microware has defined a number of OS-9 disk formats for floppies, the 38U0 one supposedly being the “universal” 3.5" format (there is also a 58U0 “universal” 5¼" format).

    The problem with the “universal” formats is that track zero can be (and on my floppies, is) in a different density which makes it a bad fit for most tools, both on CD-i and PC. It also means that only 79 tracks are used for data storage, giving a raw capacity of 79 × 2 × 16 × 256 = 632 KB. The 3803 format used by all my other CD-i floppies uses all 80 tracks and consequently has 8 KB more of raw storage for a total of 640 KB (these are both double-density, double-side formats (DS, DD) with 16 sectors of 256 bytes per track like nearly all OS-9 disk formats).

    Before unstowing my other CDI 605 (it was nearly at the bottom of a 150 cm stowed equipment stack) I tried reading the floppies with my trusty old Windows 98 machine which still has floppy drives. I could not quickly find a DOS tool that handled the 256 byte sectors (not even raread and friends), although I suspect that Sydex’s TELEDISK product would have handled it just fine. I also tried Reischke’s OS9MAX which should handle all OS-9 formats under the sun according to its documentation. The demo version ran under MS-DOS and gave me working directory listings, even for the 38U0 floppies, but it does not support actually reading the files and I am somewhat doubtful about the current availability of the paid-for full version (even apart from cost concerns).

    Why did I decide to use the 605? It was not a question of reading the disks (the 182 did this mostly fine) but of handling the data thus read. The 182 unit has a SCSI connector but I have no drivers for it (yet) and dumping my full floppy collection over the serial port did not really appeal to me for speed and reliability reasons (it could have been done, of course).

    The 605 player has a SCSI connector and includes drivers for it so I could have just connected it to the SCSI disk in my E1 emulator and copied the floppies to hard disk (I would still have needed to transfer them to my laptop which would have been a two-step process via the Windows 98 PC as I have no SCSI connection on my laptop).

    Instead I used the BNC network connector of the 605 to directly transfer floppy images to my laptop (it needs a network switch supporting both a BNC connector and the modern RJ45 connectors, but luckily I have two of those, even if they are only 10 Mbit/s). Starting up the network environment of the 605 took only two OS-9 commands at the command shell prompt:
    ispmode /le0 addr=10.0.0.120
    mbinstall
    After this I could just ftp in to my laptop where I ran ftpdmin, a very minimal ftp server program, and transfer floppy disk images directly:
    ftp 10.0.0.110
    bin
    put /d0@ floppy.dsk
    (where /d0@ is the raw floppy device, for 38U0 I used /d0uv@, both are built-in for the 605).

    The transfers ran at the maximum speed of the floppy drive (way below the 10 Mbit/s network speed), and the resulting .dsk files are perfectly readable using the –v option (virtual disk) of Carey Bloodworth’s os9.exe program even though that program was originally written for Tandy Color Computer OS9/6809 floppies (the floppy disk format was not changed for OS-9/68000 which is at the core of CD-i’s CD-RTOS operating system).

    For easy access I also created a “tar” format archive of each floppy on a RAM disk:
    chd /d0
    tar cvf /r768/floppy.tar .
    and ftp’d those to my laptop as well (the /r768 device is a 768 KB variation of the /r512 built-in 512 KB RAM disk device of the 605 player).

    I ended up with the following collection of unique floppy disk images:
    • 605h3 - 605 H3 Driver Update (1 floppy)
    • 605upd - 605 Driver Update (1 floppy)
    • bcase - Basecase Tests (1 floppy)
    • eboot41 - Emulation Boot Diskette (1 floppy)
    • eburn41 - Emulation and CDD 521 Boot Diskette (1 floppy)
    • inet - CD-I Internet Installation Disk - V1.3 (1 floppy)
    • nfs - OS-9/68000 Network File System V.1.0 (1 floppy)
    • os9sys - OS-9 System Diskette (1 floppy)
    • pubsoft - OptImage Public Domain Software (2 floppies)
    • pvpak - OptImage Preview Pak Installation Disk (1 floppy)
    • ubridge - OS-9 UniBridge Resident Utilities (3 floppies)

    The 605* and eb* floppies are mostly interesting for CD-i 605 or E1 emulator owners, but the bcase floppy contains a set of CD-i standard conformance test programs that.

    The inet and nfs floppies contain a full set of Internet software including Telnet and FTP servers and clients and an NFS client (all except the latter are also in the 605 ROMs).

    The os9sys floppy contains a full set of Professional OS-9 programs and is my original source for most of the OS-9 CD-i disc that I described earlier (most of these are not in ROM on any CD-i player that I’ve seen so far).

    The pubsoft floppies contain miscellanous utilities such as bfed, du, kermit, umacs and vi, most of which can be obtained elsewhere, some CD-i specific utilities such as da (CD-i disk analyzer) and iffinfo (CD-i IFF file dumper) as well as library source files for the CD-i IFF file library.

    The pvpak floppy contains preview software for CD-i images that will preview CD-i IFF files from an NFS-mounted host file system directory.

    The ubridge floppies are the goldmine (and also the 38U0 format ones) as they contain a full set of native Microware C compiler/assembler/linker/debugger software for OS-9 complete with CD-i header files and libraries and C runtime startup sources. Both the srcdbg and sysdbg debuggers are included as well as the rdump utility for dumping ROFF (Relocatable Object File Format) files.

    Unfortunately, most of the above software except for the pubsoft contents is copyrighted property of Microware (now Radisys) or OptImage (a former Philips/Microware joint venture) which means that I cannot distribute it, even though they could be very useful to CD-i homebrew developers. For that the hopefully soon-to-be available GCC cross-port will have to be enough...

    While investigating all of the above I also stumbled upon a 450 MB OS-9 hard disk image for MediaWorkshop. The os9.exe program recognizes it just enough to say that it does not support it so I have no real idea about its contents except the obvious.

    To remedy that problem I’m in the process of adding SCSI disk support to CD-i emulator so that I can use the SCSI support in the CD-i 605 ROMs to mount the disk image and look at it. This should also allow the CD-i 180 to boot from a SCSI disk if I ever find drivers for it (a possible path to that has just appeared, we’ll see...).
              Comment on Digital and Independent Media Revolution in Hawaii by Roger Thomas        
    I run a 3D Computer Animation and Visual Effects studio here on the Big Island. I'm interested in learning more about digital media in Hawaii. Thanks! - Roger Thomas
              Smadav Pro Rev 10.1 Full        
    Smadav Pro Rev 10.1


    Smadav Pro Rev 10.1 Full

    SmadAV Pro 10.1 PRO 2015 is a latest version antivirus for PC. It software today release 2015. Smadav antivirus have a best protection and make secure your PC full time when you offline or online. Crack Smadav 10.1 serial key make your PC more secure and best protection. It is one of the best antivirus is all over the world by developing Indonesia. Also best popular antivirus Indonesia and many Indonesia people use this software.

    Smadav PRO 2015 Features:

    • SmadAV 10.1 very simple and easy to use software.
    • It antivirus software automatic update.
    • It software non profit use as computer or laptop.
    • Smadav support windows operating system.
    • New version easily changing the color theme.
    • If you use this software, you can easily faster scanning PC.

    How to Install SmadAV Pro 10.1 Crack/Serial Key?

    • First disable your antivirus and disconnect your internet.
    • Download SmadAV Pro 10 software.
    • Install SmadAV  and do not run it.
    • Now use Crack/Serial Key to active this software.
    • All Done!! Enjoy… SmadAV Pro 10 Full Version Software.
    • SmadAV Pro 10.1 Support Operating System:
    • Windows XP, Windows Vista, Windows 7, Windows 8/8.1 (32-bit & 64-bit).
    Download Link

              IDM 6.23 Build 12 Final Full Version        

    IDM 6.23 Bulid 12 Final Full Version

    Internet Download Manager (IDM) is a tool to increase download speeds, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

    What's new in version 6.23 Build 12 :

    • Added support for Firefox 39
    • Improved video downloading for several types of web sites
    • Fixed bugs
    Download Files

              Winzip 18 Pro with Patch and Serial Key        
    Winzip 18 Pro
    Winzip 18 Pro with Patch and Serial Key | 82.43 MB

    Unzip all major formats
    With just a click, open all major compression file types, including Zip, Zipx, RAR, 7Z, TAR, GZIP and more.

    Protect your privacy
    Easily encrypt files as you zip to keep information and data secure. Add watermarks to deter unauthorized copying.

    Simplify cloud sharing
    Share directly to more cloud services, manage your cloud files more easily, and quickly share links to your cloud files.

    Just add WinZip
    Bring popular WinZip features into the software you use most with new WinZip Express Add-Ons*.

    Features:
    Zip and manage content
    Compressing large files and folders makes them easier to transfer and saves storage space. Choose files from your PC using simple, drag-and-drop functionality or get files you've stored on Box, SkyDrive, Dropbox, Google Drive, CloudMe and SugarSync to zip instantly. Zip files are perfect for sharing because they let you organize multiple files into one convenient package.

    Unzip anything
    Extract content from the industry's widest selection of compressed file types, including Zip, Zipx, RAR, 7Zip, BZ2, LHA/LZH and many more. When extracting encrypted files, WinZip auto-wipes all temporarily extracted copies to prevent misuse.

    NEW! Connect to more cloud services
    WinZip connects directly to Box, SkyDrive, Dropbox, Google Drive, CloudMe and now SugarSync, so you can organize all your cloud files at once. Use WinZip to zip and save large files to the cloud or retrieve files or links to share. Secure your files and save precious online storage space by zipping and encrypting them first.

    NEW! One-stop cloud file sharing
    Imagine being able to see all your cloud files—even if they are saved on various cloud services—in a single view. Now you can, with WinZip 18. Instead of wasting time moving back and forth between various services to see where your files are and how much space you have, enjoy fast, easy cloud file sharing without leaving WinZip.

    Zip and share to social media
    Use ZipShare to share any type of file to Facebook, Twitter and LinkedIn. Keep everyone in the loop by posting content to all three social networks at once. Simply select the files you want to share, compose your message, and pick the social networks where you want your files to go.
     
    NEW! Email large files with just a click
    WinZip 18 lets you email large files or folders using any of your cloud services. Your files are automatically uploaded to your default cloud service and a link to them is placed in your outgoing email. Send up to 50MB free if you're using the ZipSend cloud or move up to ZipSend Pro to send up to 2GB. and etc

    What's New:
    NEW! Zip and share to more clouds
    Protect your files in the cloud and use less space by zipping them first. WinZip 18 lets you connect directly to your cloud services, including Box, Google Drive, SkyDrive, Dropbox, CloudMe and SugarSync. Zip before you upload, open zip files saved in the cloud, or select files from the cloud to zip and share.

    NEW! Streamlined cloud navigation
    Access and manage your cloud files as easily as you access the files on your computer. WinZip 18 makes it simple to send files to and from the cloud, save between your cloud accounts and monitor your cloud storage space.
     
    NEW! Copy and share Cloud Links
    Quickly send links to your cloud files by email, instant messaging and on social media sites.
     
    NEW! Work faster with WinZip Express Add-Ons
    Bring the power of WinZip into the software you use every day. Download the WinZip Express Add-On for Explorer for free and get instant access to the WinZip features you use most directly within Explorer. Add-Ons are also available for Microsoft Outlook, Photos and SharePoint.
     
    NEW! Compress files even more
    Make Zip and Zipx files even smaller with the enhanced zip engine in WinZip 18.

    Download Link
              A crucial week for justice        
    On Tuesday we'll see if our elected political representatives yet again undo the good work of our unelected representatives as the Legal Aid Bill returns to the Commons for MPs to consider the Lords' amendments.

    Peers made changes to the Bill that would mean that the worst of the legal aid cuts in the legislation would be removed. Access to legal aid and the way that it is delivered would be protected for those who have suffered domestic violence, for vulnerable children and for disabled people.

    The government will be no doubt keen to use financial privilege as an excuse to overturn these changes like they did recently to reverse changes to their controversial welfare reforms. However, if costs are to be used as an excuse as removing access to free legal advice to hundreds of thousands of people when they need it most, perhaps Ministers should consider the £43 million spent on consultants by the MoJ in the last year and the £12m that's been wasted an an e-Working system that is years behind schedule and has virtually collapsed.

    What's really happening to our legal system here of course is that it is becoming increasingly the preserve of those who are able to pay for it. As Heather Brooke pointed out last week, while 140 local courts have been closed and legal aid is cut, £300m has been invested in the Rolls Building (home of the failed e-Working system) which is to handle high-end commercial disputes for a mostly foreign clientele.

    It's not just Russian Oligarchs that are benefiting from changes to our justice system. The Association of British Insurers has admitted it will profit from the legal aid cuts. Last year it was revealed that the Justice Minister responsible for driving through these reforms, Jonathan Djanogly will personally profit from the plans as he has a personal stake in the insurance industry. Now that's what I call financial privilege.

    Possibly the best hope of amendments - like Baroness Scotland's that ensures victims of domestic violence have access to legal aid and former Paralympian Tanya Grey Thompson's that ensures those who are eligible aren't forced to phone a call centre for advice - surviving the glare of the coalition is the lack of time Parliament has been able to afford to the legislation between the Easter break and the end of this parliamentary session. Who says MPs having long holidays is a bad thing!

    If you'd like to contact your MP to ensure we don't lose out on legal aid when we need it most visit the 38 degrees site ahead of Tuesday's vote.
              Internet Download Manager 6.18 build 2 Final Retail        
    Internet Download Manager 6.18 build 2
    Internet Download Manager 6.18 build 2 Final Retail | 5.7 MB

    Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download accelerators and managers that segment files before downloading starts, Internet Download Manager segments downloaded files dynamically during download process.

    Internet Download Manager reuses available connections without additional connect and login stages to achieve better acceleration performance. Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.

    Main Features:
    - All popular browsers and applications are supported! Internet Download Manager has been tested with the following browsers: Internet Explorer, MSN Explorer, AOL, Netscape Communicator, Netscape 6, Netscape 7, Mozilla, Mozilla Firefox, Mozilla Firebird, Opera, NetCaptor, UltraBrowser, Slim Browser, Avant Browser, MyIE2, Optimal Desktop, Ace Explorer, Advanced Browser, 27 Tools-in-1 Wichio Browser, WindowSurfer, 550 Access Browser, FineBrowser Freeware, Kopassa Browser, Fast Browser Pro, Enigma Browser, GoSuRF, K-Meleon, Smart Explorer, The Off By One Web Browser, Smartalec Voyager, CrystalPort AppCapture, The Family Browser, XANA Web Browser, Bluto, AutoSurf, 32bit Web Browser, BrowseMan, WrestlingBrowser, Eminem Browser, UltraBrowser, Cygsoft LDAP Browser, and Net M@nager. Internet Download Manager supports all versions of popular browsers, and can be integrated into any 3rd party Internet applications.
    - Easy downloading with one click. When you click on a download link in a browser, IDM will take over the download and accelerate it. IDM supports HTTP, FTP, HTTPS and MMS protocols.
    - Download Speed Acceleration. Internet Download Manager can accelerate downloads by up to 5 times due to its intelligent dynamic file segmentation technology. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
    - Download Resume. Internet Download Manager will resume unfinished download from the place where they left off.
    - YouTube grabber. Internet Download Manager can grab FLV videos from popular sites like YouTube, MySpaceTV, and Google Video.
    - Simple installation wizard. Quick and easy installation program will make necessary settings for you, and check your connection at the end to ensure trouble free installation of Internet Download Manager
    - Drag and Drop. You may simply drag and drop links to IDM, and drag and drop downloaded files out of Internet Download Manager.
    - Automatic Antivirus checking. Antivirus checking makes your downloads free from viruses and trojans.
    - Advanced Browser Integration. When enabled, the feature can be used to catch any download from any application. None of download managers have this feature.
    - Built-in Scheduler. Internet Download Manager can connect to the Internet at a set time, download the files you want, disconnect, or shut down your computer when it's done.
    - IDM includes web site spider and grabber. IDM downloads all required files that are specified with filters from web sites, for example all pictures from a web site, or subsets of web sites, or complete web sites for offline browsing. It's possible to schedule multiple grabber projects to run them once at a specified time, stop them at a specified time, or run periodically to synchronize changes.
    - IDM supports many types of proxy servers. For example, IDM works with Microsoft ISA, and FTP proxy servers.
    - IDM supports main authentication protocols: Basic, Negotiate, NTLM, and Keberos. Thus IDM can access many Internet and proxy servers using login name and password.
    - Download All feature. IDM can add all downloads linked to the current page. It's easy to download multiple files with this feature.
    - Customizable Interface. You may choose the order, and what buttons and columns appear on the main IDM window.
    - Download Categories. Internet Download Manager can be used to organize downloads automatically using defined download categories.
    - Quick Update Feature. Quick update may check for new versions of IDM and update IDM once per week.
    - Download limits. Progressive downloading with quotas feature. The feature is useful for connections that use some kind of fair access policy (or FAP) like Direcway, Direct PC, Hughes, etc.

    What's new in version 6.18 Build 2 ? (Released: October 9, 2013)
    - Resolved compatibility issues with Google Chrome 30
    - Fixed downloading of groups of links for several file sharing sites

    Download Link
              AVG Internet Security 2014 v14.0.0.4016 x86 Full        
    AVG Internet Security 2014
    AVG Internet Security 2014 v14.0.0.4016 x86 Full | 125.91 MB

    AVG Internet Security 2014 is a capable security suite which does a generally very good job of protecting your PC from dangers, both on and offline.

    At the program's core is AVG's strong antivirus engine. A little more accurate in this release, and with significantly reduced scanning times, this monitors every file you access, detecting and removing malware before it can cause any damage.

    The suite also includes a firewall, which protects you from network attacks and monitors running programs to make sure malware can't "phone home".

    The spam filter is also significantly enhanced. The last edition blocked only 55% of our test junk emails; AVG Internet Security 2014 has raised the detection rate to an impressive 88%.

    The suite's Windows 8-style interface is little changed, but simple to use, with the various tiles delivering quick access to the program's various functions and features. An Options menu allows you to carry out just about any Internet Security Suite action in just a couple of clicks, and if you're still a little confused then a good local Help file will quickly point you in the right direction.

    As with the previous edition, AVG Internet Security only highlights potentially dangerous search engine results if you install its toolbar, which the setup program will do by default (although if you choose the Custom Installation option then you can change this).

    Fortunately, the suite does include other technologies to help keep you safe online. AVG's LinkScanner module vets web pages before they're displayed in the browser, and if something does get through then it'll still be vetted by the antivirus engine, which will detect and remove most dangerous files.

    The 2014 release looks and feels much like previous builds, but it does feature improved malware detection and full Windows 8.1 compatibility, as well as adding two useful new privacy additions to the suite.

    If you have any confidential documents then the new Data Safe option allows you to protect them in an encrypted file (click Computer > Create Your Safe).

    And if you want to delete confidential files and be sure they're gone forever, with no hope of recovery, then you'll appreciate the Shredder. Simply right-click a file or folder in Explorer, select "Permanently shred with AVG", and after confirming your decision it'll be securely deleted.

    Download Link
              TuneUp Utilities 2014 14.0.1000.88 Final Full Version        
    tuneup utilities 2014
    TuneUp Utilities 2014 14.0.1000.88 Final Full Version | 28.79 MB

    low pc ? no tension .when we install new windows on our pc ,our pc become running fast.but after some days our pc become slow .

    Because we install many software on our computer as our need and for that our registry loaded heavily.

    And as result,our pc become slow.for solve this problem try this software that will help you for cleaning registry and junk files also remove and fix other errors that helps to keep pc running slower.

    Features:
    Windows Drives Defragmenter
    Start-up Programs Manager
    Useful offers for Speed up your Windows
    Automatic System Scanner and Problems Fixing
    Windows Registry Defragmenter
    Junk/Temp Files Remover
    Make your Windows more Secure
    Optimize your Windows on one Click
    Files Without Recovering Remover
    System Process Manager
    Scan everyone of your Windows Portations and Fixing Errors
    Deleted Files Recovering
    Smart Uninstall manager

    Note : 
    1.Disconnect your internet connection while installing the software and use regkey for activision.
    2.Block internet access of this software from firewall.

    Download Link
              Windows Doctor 2.7.5 Final With Activator        
    Windows Doctor
    Windows Doctor 2.7.5 Final With Activator | 7.52 MB

    Windows Doctor is the perfect solution to all kinds of registry problems. Its advanced scan engine is able to scan your entire registry within a few seconds to identify every single registry error and safely repair them for you. With Windows Doctor, you’ll see immediate increases in performance and decreases in system conflicts. It will make your computer run as fluently as new and error-free. Windows Doctor applies the most professional and effective registry cleaner to solve your registry problem. Editing registry items is a highly risky task in that improperly modifying registry items may cause severe system damages. Windows Doctor knows the right way to deal with Windows registry. With a professionally designed scan engine, it carefully screens out the system-sensitive entries and accurately identifies and removes registry errors to boost Windows performance and eliminates Windows freezes and hangs. Windows Doctor guarantees 100% safety and effectiveness.

    In addition to the registry cleaner, Windows Doctor provides many other useful tools to optimize your Windows so that you don’t need to spend extra money on the expensive single-task software.
    • History Cleaner can clean all tracks of your activities to protect your privacy and improve PC performance;
    • Shortcuts cleaner identifies and removes the annoying redundant shortcuts that point to non-existent or invalid files.
    • Registry Defragger will defragment your registry to acquire linear registry structure, reduce application respond time and registry access time.
    • Start-up Manager allows you to easily inspect, delete or temporarily disable the start-up programs.
    • Uninstall Manager can safely remove the unwanted applications installed on your computer.
    • System Optimizer allows you to optimize your system settings, and as a result, boosts your system speed and improves system performance.
    • IE Manager can easily repair your IE problems as well as settings changed by malicious websites.
    • Additionally, Windows Doctor collects a list of very useful system tools to help you better manage your computer, such as Disk Cleanup, Disk Defragmenter, DirectX Diagnostic Tool, Registry Editor, etc.

    Registry Cleaner – Fix PC Errors & Boost System Performance
    • Professionally designed scan engine will scan your entire registry within a few seconds.
    • A comprehensive error report after scan will list the found registry errors in 20 categories
    • User is allowed to easily sort the error report according to 10 different attributes
    • Powerful registry fixer will quickly fix all registry problems with one simple click
    • For advanced computer users, it provides more freedom by allowing user to select items to fix by himself.

    Windows Doctor will fix all the registry errors that cause system instability, PC errors, crashes, system slowdown, including but not limited to:
    • Invalid User software settings
    • Invalid class keys
    • Invalid system software settings
    • Invalid fonts
    • Invalid browser helper objects
    • Invalid start-up programs
    • Invalid custom control settings
    • ActiveX errors
    • Errors in uninstall sections
    • Obsolete history lists
    • Shared DLL errors
    • Invalid file paths
    • Sound and AppEvents errors
    • Invalid file extensions
    • Startup popup window
    • Invalid software locations
    • Invalid System settings
    • Windows services error
    • Invalid help and resources
    • Invalid virtual devices
    • Empty registry keys
    • Invalid device drivers

    System Optimizer allows you to optimize your system settings, and as a result, boosts your system speed and improves system performance. The System Optimizer will optimize the following settings to speed up your system:
    • Automatically end hung applications
    • Enable UDMA66 support
    • Optimize Internet connection
    • Force Windows to Unload DLLs from Memory
    • Speed up Windows refresh
    • Speed up browsing remote computers
    • Speed up loading internet explorer pages
    • Speed up the menu show delay
    • Boost up the Windows prefetcher service

    OS: Windows 2000. XP, Vista, Windows 7, Windows 8 32-bit and 64-bit.

    Download Link
              Lazesoft Data Recovery Unlimited Edition 3.4 + Keygen        
    Lazesoft Data Recovery Unlimited Edition
    Lazesoft Data Recovery Unlimited Edition 3.4 + Keygen | 112 MB

    Lazesoft Data Recovery offers home users and businesses complete solutions to recover deleted files or lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown or software failure.

    With easy to use interfaces and the most powerful data recovery software engine, you can using Lazesoft Data Recovery recover data by yourself, preview recovered files while the search is in progress.

    Easy recovery in all major data loss cases.
    Accidentally deleted files or emptied from recycle bin
    Formatted media/disk drive/partitions/dynamic volumes
    Logically crashed disk
    Data deleted using Shift+Del keys
    Files corrupted due to virus attacks
    Software crash
    Power faults
    partition with corrupt file systems, etc.
    Recover files even when your computer cannot boot up and cannot enter Windows.

    Recover Data When Windows Cannot Boot up normally!
    On some disk or Windows serious crashed, you might not be able to boot up your computer and enter Windows. Lazesoft Data Recovery can burn a bootable data recovery CD/USB and allow you to boot up your computer and rescue your data.
    Boot from various brands of desktops, laptops like Dell, ThinkPad, Hp, Sony, Toshiba, Acer, Samsung, etc.
    With WinPE-based and linux-base bootable disk builder, Lazesoft Recovery Suite has best hardware compatibility.
    Boot up computer from CD or usb disk.
    User friendly Boot Media Builder interface

    Download Link
              Deep Freeze Enterprise 7.70 + keygen        
    Deep Freeze Enterprise 7
    Deep Freeze Enterprise 7.70 + keygen | 35.02 MB

    The function of the program to those who heard him the first time: the program and his job are keeping the device as it is after you install the program
    In other words, when you run this software, you can install programs as you like and delete what you want and change whatever you want, but after you restart the device will return the device as it was, and will delete what you added and retrieval what ..
    So it is important for owners of cafes and computer teachers to protect their devices, as well as matter owners Alajhazh to the their children are using their devices

    Deep Freeze instantly protects and preserves baseline computer configurations. No matter what changes a user makes to a workstation, simply restart to eradicate all changes and reset the computer to its original state - right down to the last byte. Expensive computer assets are kept running at 100% capacity and technical support time is reduced or eliminated completely. The result is consistent trouble-free computing on a truly protected and parallel network, completely free of harmful viruses and unwanted programs. While Deep Freeze provides bulletproof protection, its non-restrictive approach also improves user productivity and satisfaction. Placing no restrictions on a user's ability to access all system resources, users avoid the frustration of downtime due to software conflicts, operating system corruption, virus attacks, and many other problems. Users are always assured of computers that are consistently operable and available

    Explain the work of Enable and Disable the program:
    1 - press the Shift and DoubleClick the program Econh.
    2 - Write responded basses if you've chosen before (if you do not press the Inter and salvation)
    3 - to work Disable press Boot Thawed
    4 - Enable press work Boot Frozen
    5 - Restart the device.

    NOTE Please Disable Your Anti Virus For 10-20 Minutes And Use The KeyGen For Activation.
    1) Install the Application
    2) Run Keygen follow instrunction.
    3) Done.

    Download Link
              Norton PartitionMagic 8.05 Build 1371 (Boot CD) + Serial        
    Norton PartitionMagic 8.05
    Norton PartitionMagic 8.05 Build 1371 (Boot CD) + Serial | 276.14 MB

    Norton PartitionMagic lets you easily organize your hard drive by creating, resizing, copying, and merging disk partitions. Separate your operating system, applications, documents, music, photos, games, and backup files to reduce the risk of data loss if your system crashes. You can use Norton PartitionMagic 8.0 to run multiple operating systems safely.

    Features :
    1. Divides a single hard drive into two or more partitions
    2. Lets you safely run multiple operating systems on the same PC
    3. BootMagic makes it easy to switch between different operating systems
    4. Allows you to copy, move, resize, split, or merge partitions as needed - without losing any data
    5. How-to wizards guide you step by step through the partitioning process
    6. Intuitive Windows-based browser lets you find, copy and paste files in both Windows and Linux partitions
    7. Allows you to create and modify partitions up to 300 GB
    8. Supports USB 2.0, USB 1.1, and FireWire® external drives
    9. Supports FAT, FAT32, NTFS, Ext2, and Ext3 file systems
    10. Converts partitions among FAT, FAT32, and NTFS without losing data
    11. Allows you to enlarge an NTFS partition without restarting your computer
    12. Resizes NTFS system clusters to the most effective size
    Download Link

              Internet Download Manager IDM 6.17 Build 2 Final        
    IDM 6.17 Build 2 Final
    Internet Download Manager IDM 6.17 Build 2 Final | 5.09 MB

    Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

    Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.

    Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.

    Version 6.17 adds Windows 8.1 compatibility, adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Videos. It also features complete Windows 7 and Vista support, YouTube grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

    What's new in version 6.17 Build 2
    (Released: July 12, 2013)
    >Improved IE 11 integration (Windows 8.1)
    >Added support for new youtube changes
    >Fixed bugs

    Download Link
              ØªØ³Ø±ÙŠØ¹ الفلاش ميمورى " الفلاشة " عن طريق تغير نظام الملفات         



    تعد منظمات الملفات ÙƒÙ…ا ذكرنا من قبل هى العقل المدبر للذاكرة " ÙŠÙ…كنك الرجوع للموضوع عن طريق الضغط هنا " ÙˆÙƒÙ…ا ذكرنا ايضا ,, فإن تعدد تلك المنظمات او الانظمة راجع إلى اختلاف فى اولويات ذلك النظام , فمنهم من يعطى السرعة الاهمية الاكبر على حساب التوافق مع انظمة التشغيل , وبالتالى فإنه وبالتأكيد توجد بعض الانظمة التى يفضلها المستخدمون عن غيرها بسبب حاجتهم لسرعة كبيرة لنقل ملفاتهم من وإلى الذاكرة , وفى موضوع اليوم إشارة بسيطة إلى ان نظام NTFS هو اسرع نظام لنقل الملفات من وإلى الذاكرة ولكنه يعمل بشكل كامل مع مستخدمين الويندوز فقط ! ولكن الفرق كبير وملحوظ عن استخدام هذا النظام دون غيره

    وإليكم تلك المقارنة السريعة بين عملية نقل ملف إلى ذاكرة تستخدم نظام NTFS ونظام FAT32  :-




    عند استخدام نظام ال FAT32 :





    وعند استخدام نظام ال NTFS فى نقل نفس الملف :


    نلاحظ ان السرعة تضاعفت تقريبا ! وهذا الفرق ليس بسيط ابدا إذا كنا نستخدم هارد ديسك خارجى يتصل عن طريق ال USB 3 مثلا لنقل 200 جيجا من البيانات فضعف السرعة ليس امر هين ! ولمن لا يعرف طريقة تغير نظام الملفات فالطريقة بسيطة جدا ونستعرضها فى السطور القادمة .

    طريقة تغيير نظام الملفات .

    اولا وبعد فتح My computer نقوم بالوقوف على الذاكرة " الفلاش ميمورى او الهارد ديسك" ثم نضغط كليك يمين ونختار Format 


    بعد ذلك نختار NTFS من File Systems ونضغط على Start " ملحوظة هامة سيتم مسح كل الملفات الموجودة على الذاكرة "




    وهكذا ستتمكن من الحصول على زيادة مؤثرة فى سرعة نقل البيانات من وإلى اى ذاكرة

              Softchoice Cares in India: Follow their Journey        
    From Oct. 8-22, 2016, the Softchoice Cares board is volunteering in Rajasthan, India with Jatan Sansthan. The team will be working to update two computer labs that Softchoice Cares built last year, and train locals from the community, particularly kids, on how to use them – among many adventures. Check this blog post for regular […]
         

    Related Stories

     

              Kenya 2013: Perspectives from the Ground        
    Softchoice sends employees on international charitable missions for a number of reasons, among them are to develop leadership skills, experience the impact of giving first hand, and to help bridge the digital divide – providing computers and technology know-how to help children and adults develop new skills and break the cycle of poverty. Some wonder […]
          

              Softchoice Cares: Does aid really make a difference? [Video]        
    The first week of February marks International Development Week (IDW) – a time to explore and celebrate the difference volunteers are making around the world. In honor of this year’s event, Softchoice Cares – an employee-led philanthropic program focused on furthering computer literacy – has produced a video documentary of their 2012 trip to Bali. […]
          

              Softchoice Cares + 7 IT Companies = A future for 500        
    When I heard about the Softchoice Cares mission to Bali I was intrigued. The thought of twelve employees going half way around the world to build computer labs for local kids is pretty inspiring and rare. But I was even more amazed by the number of partners who were going out of their way to […]
          

              Join us for A Nightmare on Liberty St!        
    Who says trick or’ treating is just for kids? On October 28th, Softchoice dares you to go door to door in Liberty Village in support of Project Connect – a joint initiative with Habitat for Humanity to put computers in the homes of needy families across North America! For $20 you’ll get to enjoy $1 […]
          

              Metabolic Assessment        
    I wanted to share the results / process of the metabolic assessment that I had today.

    As I eluded to earlier, last February I began to enter races for this year. I had a long time off from running after neuroma surgery and it just really took a long time for me to be able to run again. 8 months or something dumb like that. Anyhow, that is a long time.  

    When I was able to finally run again, I wanted to run again withOUT pain, withOUT beating myself up. I am also so done with restriction and being hungry all of the time. For years. I just want to run, to feel great, to eat!

    I began to research different training methods when I again came across Maffetone low heart rate training. I remembered that my Dad used Phil Maffetone methods as he trained for Grandma's Marathon in 2000. We ran together and it was so awesome!   I then saw that  my friend, Tracy Hoeg, was training clients using Phil's methods. In February I reached out to her and she was willing to take me on.  At first, in order to keep my heart rate at 140 or under, I had to WALK. I'd run a few steps, and walk. It was disheartening, going so slowly, but it wasn't beating me up, either. Every 3-4 weeks  Tracy had me run a 10 mile MAF test. At first my MAF miles were in the 12-13 minute mile area. I was discouraged. I had to walk some of each mile to keep my heart rate down.  As time went one, I would see great improvement. Pretty soon I was taking off 1:30 each mile, no walk breaks and feeling really good. I couldn't believe that I could run 10 miles, on track, without any ankle pain, without any joint soreness. I had also at this time, added in fats, due to Tracy's and Phil's recommendation.

    I'm excited to preform another 10 mile MAF test next Thursday. 

    So today I had an Active and Rest Metabolic Assessment at LifeTime Fitness, Chanhassen. A friend of mine, Heather, is a trainer there and preforms this test. I was so curious to see how my fat burning has increased. I knew that I was doing pretty well, because at Grandma's last Saturday I ran the whole race at 140 HR, had NO issues, it was hot, I did it on one bottle of UCAN. Incredible. I'm the one who needed one gel every 30 minutes. 

    I had to go into the test fasted. No breakfast, no coffee!  I did fine without the breakfast but the coffee was tough! I stopped at Caribou on the way back from the test.

    Heather hooked me up to a machine, attached a mask and the computer would read the data from my breathing. First was a rested assessment. I sat in a chair, closed my eyes and relaxed for 20 minutes. I learned that I now burn a lot of fat at rest. 96% of my burn is   from fat while at rest.

    We then went to the treadmill. After a warm up she had me run at 5.5 mph, 6, 6.5, 7, 7.5 to watch my fat/sugar burn and define my heart rate zones. I burn most of my fat at below 147 HR.

    I learned that I should eat more calories. My body burns 2180 just breathing. I burn 2834 going through life, without my workout.


    I learned that my VO2 score is 48.7

    My heart rate zones/burn
    It was very informative and I'm glad that I completed the testing. Heather was very thorough and gave me so much data. There is more information that I still have to wade through. Heather really impressed upon me  that I need to eat more food. I have restricted for so many years that this is kind of scary to me but I have made progress. I know that science shows I need to eat more. I'll have another assessment in a few months. It will be fun to compare the data.

    In other news, Steve and I are heading out for a drive vacation out west next month. We'll hit Glacier National Park to camp and hike for a few days and then south to Utah, where I've entered Capital Reef 50K. It begins at 7000feet elevation and much of the race is at 11000feet elevation. It ought to be a great trip, we are looking forward to it!



     


              Son tornato!        
    È da un bel po' che non mi faccio vivo.
    Non so perché, forse proprio non avevo nulla di interessante da raccontare, o meglio: se l'avevo era più interessante viverlo che raccontarlo!
    Ci sono un mucchio di novità, ma prima quelle più fresche:
    vi scrivo dal mio computer, ma con una BELLISSIMA , che in quanto a grafica e comodità è ampiamente avanti a Windows XP (su Vista non mi pronuncio).
    E da qualche minuto riesco pure a fare quella gran bella (inutilissima) cosa che fa tanta invidia ai Windowsiani: il cubo!

    Per una dimostrazione venire a casa mia (e possibilmente prima che si rompa la magia...)

    Che altro?
    Oggi il clima semi-estivo ed il gran vento mi hanno proprio stordito: bello bello, ma a me è parso più che altro un presagio di morte... caldo, a tratti afa... SUV ed auto che passano per le strade appestando l'aria, sole che pare dire: "questo giugno vi massacro tutti!".

    Ah! ieri mi son fiondato al Lumiere a vedere Joe Strummer: Il futuro non è scritto.
    Titolo tradotto a parte, era da tempo che il cinema non riusciva ad emozionarmi tanto. Ed anche messo da parte il mio amore per il personaggio, è proprio un documentario fatto bene.
    Chi conosce i Clash non può non andarlo a vedere; chi non li conosce, o non ricorda bene chi sia questo , è bene che non perda l'occasione: il film-documentario è ben fatto, chiaro, trasmette le giuste emozioni.
    Non è esaustivo, non potrebbe neanche lontanamente, ma da un quadro interessante ed emozionante.

    Ora ricordo perché non ho più scritto sul blog... depressione politica...
              Per finire la triennale        
    La seguente è una manovra disperata: utilizzare lo sputtanamento pubblico per tentare di imporre una disciplina alla mia mente eternamente distratta.

    Dunque:
    * da oggi fino al 16 dicembre studio per il seminario di Le Monde Diplomatique (bellissimo);
    * dal 17 dicembre al 20 gennaio studio per l'esame di Storia moderna;
    * durante le vacanze ed entro il 30 gennaio preparazione delle "prove" per l'esame di Informatica per le scienze storiche (caliamo un velo pietoso...);
    * dal 7 febbraio al 15 aprile preparare l'esame di Storia delle dottrine politiche (paura)

    avanti così con gli esami in vista di una laurea per dicembre... ce la farò?

    Ho già qualche idea per la testa... mi piacerebbe approfondire la storia dell'informatica e del computer e la questione del digital divide.
    Il problema sarà trovare docenti che non si son fermati al motore a scoppio...

    Altre idee ne ho, ma per ora sto fantasticando su questa, una alla volta!

    Tag: , ,
              SCHWENKLER – O MAGO DO 3D        
    Nº74 MOTO REPORT Fevereiro 2008
    Nº47 MAGIK TUNNING PLUS Março 2008

    Na edição anterior revelámos o talento de um jovem português e a sua paixão pela criação de motos através do método da realidade virtual. Nesta edição terminamos o tema mostrando aquilo que será o expoente máximo, ao nível mundial, e aquilo que um homem e um computador, juntos, são capazes de fazer. Fomos ao encontro de quem faz das suas criações 3D um modo de vida. Na América, Russ Schwenkler (ou “Dangeruss”, que é como gosta de ser chamado no meio), fez uma pausa no seu trabalho para nos revelar alguns segredos da sua magia.

    «Sempre tive um fascínio enorme por tudo o que estivesse relacionado com veículos. Em criança coleccionava miniaturas e desenhava eu próprio veículos agressivos. Agora que tenho 46 anos, tenho de admitir… faço a mesma coisa. É engraçado ter conseguido combinar o meu trabalho artístico com o entusiasmo que tenho por máquinas com motor. Profissionalmente os meus desenhos destinam-se a empresas de desenvolvimento na indústria do car tuning, fabricantes de brinquedos, fabricantes de jogos para PC e consolas, e empresas de web design.»

    MOTO REPORT: É motociclista?
    DANGERUSS: Sou desde 1986. Tive uma data de motos desportivas. A última foi uma Suzuki GSXR1000, com muita potência e muitas alterações personalizadas. Infelizmente os ladrões entraram na minha garagem e levaram-na. Limparam tudo desde os meus capacetes, fatos de cabedal, ferramentas, etc. Ainda não a substituí, mas a nova Ducati 848 é bastante tentadora. Fora as motos sou praticante regular de BTT.
    MR: Quando se iniciou no 3D?
    D: Foi em 1990. Tive de aprender modelação 3D para o meu emprego de então. Comecei com o 3D Studio® para o MS-DOS®. Na altura não havia o Google®, por isso eu não podia pesquisar pelas centenas de recursos que existem hoje em dia, à distância de um clique. Aprendi por tentativa e erro. Eu sou um admirador do estilo realista (pintura) e com o 3D conseguimos atingir um nível de realismo muito bom e com menor esforço do que se utilizássemos as técnicas de pintura. Há partes da modulação 3D que são comuns, e por isso são aproveitadas. As opções para acrescentar brilho, reflexos ou sombras, simplificam muito o trabalho. É claramente melhor para o artista.
    MR: Por que precisam os seus clientes de imagens 3D dos produtos que eles próprios fabricam?
    D: Eu tenho trabalhado com todos os vectores (principais, complementares e derivados) da indústria automóvel. Muitos clientes vêm ter comigo para que eu conceba algo que vai existir, mas ainda não existe. Eles esperam, ou necessitam, ver um conceito ou uma imagem antes de ela ser transposta para o mundo real. Por exemplo, a capa e o material promocional de um jogo de corridas para a X-BOX 360® necessitava de um determinado carro. O carro não existia na vida real, mas era importante que aparecesse e que mostrasse uma lista específica de patrocínios, determinadas cores, e que estivesse inserido num ambiente gráfico altamente estilizado. O carro tinha de parecer altamente real, preferencialmente tinha de aparecer numa situação de velocidade. Ora, usando técnicas de modelação 3D, foi-me possível criar este ambiente de fantasia, não sendo portanto necessário construir um carro real, pagar a um piloto e a um fotógrafo, alugar o espaço e retocar o resultado final.
    MR: Quanto custa desenhar uma moto?
    D: A resposta a essa pergunta não é simples. Para um projecto 3D normal, facilmente despendo quarenta horas para moldar as formas, mais doze horas para acabamentos realísticos e materiais. Como cobro aos clientes por hora, quase sempre os trabalhos ultrapassam os 2.600 euros, mas tudo depende do nível de detalhe. É como quando vamos comprar uma casa.
    MR: Que software usa actualmente?
    D: Desde o início da minha carreira que uso 3D Studio® e o 3D Studio MAX® da Autodesk®. Já devo ter actualizado as versões mais de uma dúzia de vezes. Para mim, são as que funcionam melhor pois, como ferramentas, são muito poderosas e a capacidade de integrar situações e contextos é literalmente infinita. Para arte digital 2D uso, maioritariamente o Adobe Photoshop CS2® e recorro ao Adobe Illustrator® para tarefas tecnicamente mais precisas como logótipos.
    MR: E hardware? A renderização de imagens pode demorar horas infindáveis…
    D: Com efeito é preciso alguma potência ao nível da máquina. Actualmente uso 2 processadores Intel® Core Duo® a 3.0GHZ com 4GB de RAM e uma placa gráfica aceleradora bastante dispendiosa. Trabalho em simultâneo com dois monitores Flat-Panel de 22 polegadas.
    MR: Que parte do seu trabalho o entusiasma mais?
    D: Eu gosto muito de dois aspectos do meu trabalho. Primeiro, é a arte realística. Entusiasma-me criar imagens que mais tarde podem passar a fotos. Adoro incluir o máximo de detalhes possível. Segundo, e em oposição, adoro desenhar motos e outros veículos fantásticos e agressivos, com aerodinâmicas exageradas e pormenores de competição acima da média. Muitas vezes esses veículos têm origens muito humildes. É engraçado pegar num Fiat e transformá-lo num carro de corridas de milhões de dólares.
    MR: Já alguma vez criou uma moto para si ou alguém pegou numa das suas motos originais e a mandou construir?
    D: Eu não faço muitas criações originais. A maior parte do meu trabalho assenta em desenhos já existentes, ou em modificações dos mesmos. Portanto não há nenhuma criação original minha a rodar na estrada. Mas estou a trabalhar com um australiano que quer produzir um Super Car baseado num Corvette. Tenho-me dedicado à parte da carroçaria. Se alguma vez ele conseguir realizar o projecto será espantoso!
    MR: Qual a relevância actualmente do 3D?
    D: Nenhuma moto é construída sem ferramentas 3D CAD (Computer Aided Design). A visualização 3D é usada em muitos sectores para produzir imagens indistinguíveis de fotografias. São usadas em anúncios de TV, outdoors, filmes de cinema etc. Os construtores de motos conseguem mostrar imagens das suas mais recentes criações antes mesmo de os protótipos estarem construídos. Com este recurso, os fabricantes conseguem determinar a dimensão ideal para os componentes das suas motos, como se interligam com outros componentes, quais as cores que jogam melhor, que tipos de jantes servem os melhores propósitos das motos, qual a suspensão mais adequada, e tudo isto sem a moto estar ainda construída. Depois de construída, em termos reais, e como disse, acaba por ser mais barato recorrer a imagens 3D do que expedir uma moto para um local exótico e preparar uma vasta equipa técnica para fotografá-la.
    MR: Vê-se a si próprio mais como um artista ou como um especialista gráfico?
    D: Creio que um pouco de cada. Para mim 3D e arte digital são formas de arte perfeitamente legítimas. Como para criar imagens 3D é necessária uma grande dose de técnica, acontece que a actividade não é tanto encarada do ponto de vista artístico, mas mais como uma sequência de inputs precisos. Quem manipula 3D tens de criar, literalmente, ou tem de instruir a aplicação para produzir absolutamente tudo. Todos os objectos de cena têm de ser introduzidos, os materiais aplicados, luzes, reflexos, sombras, cenários, operação de câmara, texturas, ângulos, efeito atmosférico, etc. E para tudo isto não há nos programas um botão que diga: “Fazer Arte”.
    © Todos os direitos do texto estão reservados para MOTO REPORT, uma publicação da JPJ EDITORA. Contacto para adquirir edições já publicadas: +351 253 215 466.
    © General Moto, by Hélder Dias da Silva 2008

              BWW Review: BACK TO THE 80S at Theatre In The Park        

    It's big hair, even bigger music numbers, and a little Star Wars as Theatre in the Park takes audiences BACK TO THE 80S.

    The musical, written by Neil Gooding, takes place as a flashback with an older version of protagonist Corey Palmer (Langston Hemenway) narrating his senior year of high school and the trials and tribulations that is involved with being a teenager in the 80s, and is all centered around Billboard's top songs from the 80s.

    Younger Corey (Alec Bridges) is running for senior class president with his friends (the hilarious Hewleek McKoy and Ryan Richeson) as his cohorts. He is running against the most popular guy in school, Michael Feldman (Alec Walberg), and the techno geek always ahead of his time, Feargal McFarrin (played by the witty Gerald Briscoe). Corey's whole platform is based on a benefit concert he wants the school to put on to raise money, but when Michael Feldman finds Corey's speech and goes first, stealing his ideas, Corey is left flabbergasted and can't bring himself to think of anything else to say in his speech.

    Feargal is then laughed off the stage when he unveils his plan to make the school more technologically advanced with powerful computers, something no one believes will actually happen. Briscoe's rendition of "Video Killed the Radio Star" starts off as a joyful interpretation complete with a robot dance, but ultimately ends sad when the other students start to mock Feargal.

    To no one's surprise, Michael Feldman wins the school elections. That's when, unbeknownst to both of them, Michael and Corey decide to put the moves on Tiffany (the delightful Korrie Murphy) with her favorite group's song (and my favorite number in the show) "I'm Gonna Be (500 Miles)" competing for her heart. Though both put in a valiant effort, Tiffany chooses the popular guy instead of our protagonist. In the pains of broken teenage love, Corey runs off the stage, and older Corey comes out to sing a heartfelt version of "You Give Love A Bad Name."

    Corey is avenged when later in the second act it is revealed that Michael had been stuffing love letters in the new girl's locker with plans to ask her to prom, but stand her up. Tiffany finds out and Michael is no longer the ladies' man of the school. And what would a show that takes place in high school be without a big showstopper at prom? The whole cast dances together to perform a reprise of Wham's "Wake Me Up Before You Go-Go."

    My favorite part of the show was the girls' costumes. The 80's had such defined fashion, and these girls didn't disappoint with sparkly frocks, fringe boots, and plaid skirts. Their song "Girls Just Want to have Fun," sung by Murphy, Maggie Hutchinson, Anna Hastings, and Colette Worthington, was my second favorite song in the show with their iconic dance moves.

    The show is riddled with 80's references; Feargal working with nerdy Billy Gates on computers, a karate class taught by Mr. Miyagi, and of course a Star Wars number that will have you laughing in your seats.

    BACK TO THE 80S plays at Theatre in the Park for just two more days, and you don't want to miss out! Go to https://www.theatreinthepark.org/ticket-options for tickets.


              So entschlüsseln Sie externe Laufwerke am Mac        

    Wer beim Schutz seiner Daten auf Nummer Sicher gehen möchte, der verschlüsselt nicht nur die eigene Festplatte, sondern auch externe Laufwerke und USB-Sticks. Dennoch kann es vorkommen, dass man den Verschlüsselungsschutz samt Passwort bei dem externen Gerät entfernen möchte, damit ein freier Zugriff auf das Laufwerk gewährt wird. Wir zeigen Ihnen, wie das auf Mac-Computern schnell und einfach funktioniert.

    (Weiterlesen)
              Engaged!        
    Today started like any other Sunday, waking up late and lazy and having a delicious breakfast (smoothies and peanut butter toast). Then we quickly packed up and left for an afternoon hike in Auburn at Hidden Falls Regional Park. We walked about forty minutes along the trail until we got to a beautiful secluded spot with trees all around, with a very convenient picnic table, where we took out and enjoyed our pasta salad, chocolate covered almonds, and sweet tea. After lunch we continued down to the falls, which were beautiful and also very crowded, so we didn't stay long.

    Hidden Falls at the Overlook
    We walked back to the main trail and then decided to hike the Pond Turtle Road towards the Seven Pools Loop and Vista Trail, where luckily we discovered there was hardly anyone around! We walked to the end of Pond Turtle and found a little vista overlook next to the river. We played in the river and attempted to skip rocks, and then went up a little hill and found a beautiful shady spot with some trees and flowers and a great view.


    We sat down and enjoyed the scenery for a while, and had fun taking some pictures with Nick's fancy camera and the teeny tiny tripod. We had a hard time finding the right soft light but eventually got it right! It was set on a delay and took five pictures at a time. It was a beautiful day and was about three o'clock in the afternoon.


    Nick set up the camera one last time to get a picture of us sitting down. He set the camera up and then walked back over to me, but instead of sitting, he got down on one knee and asked, "Will you marry me?"


    Of course, the answer was YES! It came out "Duh!" first, of which I am not very proud of, but looking back is pretty funny. I said "Yes!" immediately after, so hopefully that fixes it. Nick just laughed.

    Happy! 
    Immediately after/during this photo, we were interrupted by a shirtless hippie hiker, who awkwardly asked to get past us on the trail. Poor guy! Now, we were still at the bottom of the trail, a good half hour away from the car, and I was so excited I practically ran up the first hill! We hiked up the rest of the way (all uphill!) holding sweaty hands and admiring my ring. I felt like shouting out at everyone we passed, "We're engaged! We just got engaged! LOOK!" and shoving my hand in their face so they could see what a beautiful ring Nick had custom designed for me. It even has my great-grandmother's (suspected) wedding ring melted into the gold, which makes it even more special.

    Sparkly! My precious. ^_~
    Once we reached the car, I called my house to see who was home, being very sneaky and casual about everything. My mom was running errands with Nanny, so we decided to surprise Nick's family first! We pulled into their driveway and they all came out of the house to greet us. Their first thought was that somethin was wrong, because we came up with no notice. We walked over to the deck and Nick told them we had a surprise for them. I held up my hand.

    Their reaction was great! Nick's mom clapped both hands to her face and gasped, and they were all so surprised! They were also happy, which made me happy too, because I really love Nick's family. We spent about fifteen minutes there talking about how he asked, and when the wedding might be, and admiring my ring, and then his dad had to leave to pick up his grandparents from the airport (they just got back from Hawaii!) and so we left and drove to my parents house.

    My mom was still out but would be coming back in about a half hour, and my dad had a member of his band "Close to You" (Carpenter's tribute band, they sound great!) over to practice, so I twisted my ring around so it looked like just a band and we pretended everything was normal. For over two hours, until the friend left.

    IT WAS TORTURE.

    It was pretty funny afterwards, though! I was dying to tell everyone and was having the hardest time keeping my hand from flinging out and accidentally giving it away. I kept my hand curled over and at my hip a lot, and spent the whole time my mom was back avoiding her. Last night we went out to the symphony with my parents, and my mom noticed that I had taken off my normal small diamond ring from when I was sixteen and was wearing a different costume ring. I knew she would notice this, so I had to stay far away! Nick and I took the dogs for a walk around the circle, and I spent a lot of time running around checking on the cats, and bringing in dog food, and looking at the flowers, and not talking to mom.

    Today there was a solar eclipse! We poked a hole in paper with a pin and used it to cast the light from the solar eclipse onto another piece of paper. It was very cool, but also hard, because my mom was always there and I was so afraid she would see my ring and we would have to tell them then! I wanted it to be a big surprise.

    After dinner the band friend left (I felt bad, I spent the whole time wanting him to leave instead of making him feel welcome) and we were sitting outside on the deck eating cantaloupe and mango and strawberries when I brought up our hike. Mom asked us how that went, and I said, oh, fine, you know, we saw the waterfall and then walked out to this beautiful secluded area by the river and Nick gave me this. And I held up my hand.

    Mom and Dad just froze, and Dad asked, "What kind of ring is that?" and I said, "An engagement ring!" and then they kind of exploded and were like "WHY DIDN'T YOU TELL US!" and they got up and gave us hugs and were so excited and happy and it was so much fun! And Troy was on his computer and only paid attention at the part where mom and dad freaked out so he was like, rewind and tell the story again! So we did. 

    Currently my mom has sent me about five different emails with wedding venues that look good, and is so, so excited. She has been watching wedding shows for a while since she knew Nick and I were serious. Now she has a reason to plan and be excited! She and dad I think are both very happy for us, and a little bit melancholy for when we were little kids and not getting married. Troy is kind of shocked and keeps saying "I feel old!", but is also being so sweet and happy for us. 

    I called all my family and friends and shared the news and they are all so happy for us! Everyone loves Nick already so it was so great to tell them that we were making it official! It was really a very fun evening, and we appreciate everyone's congratulations and good wishes! 

    Nick and I are very happy and kind of overwhelmed right now. Tomorrow we are driving back up to Auburn to tell his grandma in person and to drive to my Nanny's and see her in person. I have some more calls to make and then will post it on facebook to let everyone know. 

    I feel so very lucky and extremely happy right now! 

              Catching Up . . .        
    Well. I certainly seem to excel at waiting months between posts and then writing a belated summary of events, don't I? We'll see if I can nix that habit, but for now I will continue in that glorious tradition:

    Work is going great: I love the kids that I teach computers to and my coworkers are all made of awesome.

    ONE WEEK OF SCHOOL LEFT OMG. Technically two, but I do not have finals so HA SUCKS TO BE YOU NICK. Mwahaha!

    Speaking of Nick, things are going great! Coming up on 4 1/2 years next month! And wow, it seems like our 4 year anniversary just happened, where the heck is time going? I have a feeling I am going to be one of those perpetually bewildered old people, always wondering how I suddenly got to be old when just a few minutes ago I was typing this post!

    We're started going to the Farmer's Markets around us, and WOW real tomatoes taste amazing! I've been snacking on raw broccoli and ate a pear for breakfast and the oranges are so delicious and the eggs are tasty and the apple juice is . . . well, actually not as good as I hoped, I will try a different vendor next time. Overall, however, we love it.

    My Uncle Steve is doing good! His fight with the brain cancer glioblastoma is documented here. To summarize: his surgery went well, his chemo sucked but he did it, and his latest MRI was the best it could be! There have been a lot of ups and downs and scary moments, but right now is good.

    Oh! Hey! I got an ipad 2 for Christmas and I LOVE IT SO MUCH.

    We ran in the Davis Lucky 7k and finished in like 48 minutes, or something. I forgot. But we did finish! We keep talking about doing more and then we don't. But I have found three new races in Sac that look interesting, so I will keep you posted.

    I have one semester left at Sac State, and then I graduate! I should be graduating in December of 2012!!! Yaaaay!

    That means I have to decide where to get my credential, and possibly my masters. Eep!

    As for me, I keep pretty busy between work and school, especially this semester. I had to do 70 hours of fieldwork at 4 different sites, and write a lot of papers! That plus upping my work from 2 to 3 days a week teaching plus 2 days after-care . . . was challenging at times, but generally I enjoyed it. My stomach has been behaving (remember those days of gastritis/IBS/acid reflux? Me neither. Yay!) My biggest stressor lately has been trying to keep our apartment clean. That, plus wishing we had more sunshine on our patio so I could grow some non-shady plants (I would kill to grow some basil!).

    Hopefully I will remember to update this blog every now and then. ^_~

    Ciao!


              Back in the Swing        
    We are now five weeks into the fall semester of college, and six weeks into teaching computers at the elementary school.

    I'm kind of tired.

    But in a good way!

    Work is fun. Today I taught 3rd graders the entire left hand homerow for typing, showed 4th graders how to make a pie chart with M&M's (that they got to EAT after, whee!) and 7/8th graders how to do the basics of html. The only problem is I don't have as much time as I would like to spend on my lesson plans as I would like, because . . .

    Yeah, school. It's kind of homework-y. The last two or three weeks each Sunday has been like 7 hours of homework. In a ROW. That is a lot of homework. Plus, ya'know, trying to actually spend time with my boyfriend (who is still wonderful) and my family (who are also busy) and Nick's family (Hi Clair!) and I am just BUSY.

    (Notice I am up at nearly 1am on a school night just so I could have some goof off time. Normal hours rebellion, ahoy! Also, zzzzzz.)

    Um. What else. Taekwondo is good! Mostly. And I did a cardio class! And got really sweaty. Um, I need to clean my fish tank. I need to clean my apartment. The list of things I need to do is kind of long, so let's just skip that and I'll say I'm totally going shopping tomorrow morning, because Kohl's gave me a $10 off coupon and I need work clothes! Yay, shopping!

    I'm off for bed.

    Ciao!
              Craaaaazy Girl        
    "Crazy Girl" by the Eli Young Band is adorable. Just throwing that out there. (It's a country song, don't listen to it dad!)

    * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

    On Saturday I broke down my 20 gallon freshwater aquarium and moved it to our apartment. That . . . was fun. Yeah. Just about seven whole hours of fun. Whee! (Tips for moving aquariums may follow in the future, but right off: 5 gallon Home Depot buckets with lids are awesome, don't use styrofoam because they leak all over your trunk and your jeans and are super hard to carry, move as much of your cycled water as possible, at least 50%, and once you're all done setting it up test your water again because the new water will not be the same pH. Oh, and if you are a crazy girl like me and decide to change the substrate at the same time, wash it ahead of time and leave some of your old gravel in a nylon hose in the new tank so that your bacteria from the old gravel keep the aquarium's chemistry levels from bouncing all over and getting new tank syndrome. It seems to be working so far!)

    We also purchased six ghost shrimp and two mystery snails, and they are adorable. My corycat is SO much happier with the new sand substrate instead of harsh gravel, and my killifish is killing me with his possibly being sick but then being perfectly fine and MAKE UP YOUR MIND ALREADY, DAMMIT. Oh, and if he is sick then I can't treat him with my malachite green because apparently it is bad for invertebrates and snails. AWESOMENESS.

    I am totally obsessed with my tank again, yay! I want more tanks, including a super awesomely expensive saltwater, not yay!

    * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

    The private school I work at as the computer teacher/after-school teacher has their graduation tomorrow, and a field day on Wednesday where the staff and parents play the kids in a softball game and have a bbq! Should be fun!

    * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

    I . . . have run out of things to talk about. My brain is going a mile a minute about tanks and aquarium plants and getting gourami and how I want angels but need a taller tank but I've had angels before but they've died after a year or so and waaaaaaah. If only money wasn't an issue! (Sob!)

    * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

    Oh yeah! Kauai! I go to Kauai on the 22nd until the 2nd, with Andra! Yaaaay!
              ESM's QuickLessons A DearMYRTLE Genealogy Study Group Lesson 20        

    Hilary Gadsby


    QuickLesson 20: Research Reports for Research Success
    Elizabeth Shown Mills, “QuickLesson 20: Research Reports for Research Success," Evidence Explained: Historical Analysis, Citation & Source Usage (https://www.evidenceexplained.com/content/quicklesson-20-research-reports-research-success  :  accessed 17 Sept 2016).

    This week we will be discussing the research process.

    How do we do our research?

    How should we do our research?

    Can we improve how we research?

    With the growth of the internet how many of us can find ourselves joining in with the quick click genealogy we frequently criticise.

    Why do we criticise this way of doing things?

    1. Insufficient preparation
    2. Poorly recorded
    3. Insufficient analysis
    So what should we be doing?
    Ask yourself these questions.
    1. What do I want to find?
    2. Where should I be doing my research?
    3. How am I going to do the research?
    4. How am I going to record what I find?
    5. How am I going to review what I find?
    We can use pen and paper or our computers to assist in these tasks.

    We know how to interrogate the databases online and how to enter our results in our software program. There is plenty of information to tell us how to do this either digital or paper.

    Do any programs tell us what we need to look for?

    Do any programs tell us whether what we find is relevant?

    Poor preparation and lack of analysis can lead to hours of wasted research.

    How can we know what we need to find if we have not analysed what we already know.

    Creating a research plan will be the best thing you do. It will keep you on track. 

    If we wish to move on from being just "information gatherers and processors" as ESM states in this lesson we must consider how we approach our work.

    This weekend I came across an individual who had been recorded by another researcher in the Wiki Tree website with the maiden name of ROSLING. However this was not the surname for the parents. The link to the 1911 census revealed that she was recorded as their adopted daughter. There was also a link to an army record showing her date of birth in keeping with the census record.
    I am researching the surname ROSLING and was interested in knowing where she fitted in the lineage I am constructing.
    If I just entered her name in a search would I find anything and how would I know if what I found was relevant.

    Experienced researchers will often know exactly where to research and which records may help them find what is available. This does not preclude them from the planning stages but it may reduce the time needed to formulate the plan. Even the experts find themselves stumped occasionally and have to consider alternative strategies. Researching in a new area be it geographical or an unfamiliar set of records may require a different skill set and a whole new learning experience. If we are to complete a thorough research we have to be aware of the resources available. 

    Even the best plans may need to be altered in the light of new information. Being prepared and analysing what has been found may alter our focus or the manner in which we carry out our research.
    The ability to plan and analyse helps us make better use of the research time.

    Complex questions may only be answered if we look at all the information we have and understand what it's telling us. 
    Some researchers have found that a program such as Evidentia can help them formulate a plan for these complex problems. By entering each piece of information deciding what it is saying and importantly how reliable that information may be we have a clearer understanding of what we already know. 
    The source of any information may be flawed. Awareness of the reliability and being able to resolve conflicting information are analysis skills that may only come threw experience and education. 
    Learning from others and sharing personal experience helps each of us become better researchers by improving the knowledge base.

    Do we read any accompanying information about a record group that we find online before we enter a name in the search box. If not, why not, surely we need to know if the record will be likely to provide us with the information we need before we search. Would you travel miles to an archive or cemetery without checking that they have what you are looking for first. The same should be true for online records. Finding information and blindly entering it into a database is as boring and pointless as writing lines was as a school punishment. If you want the reward of finding that elusive connection you need to spend time preparing and analysing, formulate a plan, familiarise yourself with what may be available, pinpoint the best way to approach the task and adapt the plan as and when more information is discovered. Not forgetting that negative results do not mean negative evidence, it may be that any record has just not survived.

    As we near the end of this study group, we need to pull together all that we have discussed.

    I am writing about my research mentioned above on my One Name Study blog. I have not included specific examples this week as I believe that this lesson is more about understanding the process and the importance of doing this well. 
    Only we as individuals know whether we have been disciplined in the past.
    Hopefully our discussions may have helped at least one of those watching to become researchers rather than gatherer/processors.

    Researching when few records or indexes were available online and internet access was expensive.  
    I was not aware of research plans so I would go armed with notes that I had made to guide my research. 
    Whilst looking for ancestors in the BMD indexes on microfiche I would have a name, range of years, and geographical area. When I found a possible candidate I would record and order a certificate. 
    The only way I could access the census was using indexes and then when I could get to the local archive I would have to scroll through the microfilm to find what I wanted. 
    The internet has made finding many records easier but has it also created a group of individuals who may believe the adverts that show families building trees using only the online website. 
    No website will ever contain all the records and whilst the records support our research they are not the researcher. 
    Who pieces together which record is relevant to each individual, who is related to who and how are all these individuals related, it is us as researchers who analyse the information and decide its relevance.

    The reporting suggested by Elizabeth Shown Mills may sound quite prescriptive and academic and unless you have an academic background you may switch off at the thought of report writing. However what she is saying is this. 

    1. Compile your findings complete with the information needed to find them again. 
    2. Collect them together in a manner that you are comfortable working with or that fits with your findings.
    3. Summarize what you have found.
    4. Decide whether you have answered your research question.
    5. Decide whether you need to do more research and create a new research plan.
    6. Make a conclusion and write a reasoned report to support this.
    Personally I would say that Evidentia will help you do all of these in a guided way.

    Finally here is a link to a Google Sheet I created called The Family History Research Process. It contains links to documents that others may find useful. Please add your comments if you think I may have missed something useful that could be added.

              Making Progress - Making Distractions        

    ORGANIZATIONAL DISCIPLINE


    Introduction

    In this post I will discuss why I am not following the Organisational Prompts in the Get Organized challenge. 

    What I am doing instead.  

    The challenges this approach has had and how I have dealt with them.



    FINALLY Get Organized challenge

    This year I had intended to follow along with the weekly challenges set by DearMYRTLE in her FINALLY Get Organized prompts. 
    Week 1 
    I had previously done much of what was suggested, somewhat fortuitously, with the week coinciding with catching up at work after the Christmas and New Year breaks.
    Week 2
    This was where I started to see that the system being suggested was close to what I had previously tried. This way of organizing I had found to work for some of my digital files but not everything.
    Organizing by family group works for items specific to that family but stumbles when previously unconnected groups collide. One example of this would be a group photograph at a wedding or a newspaper report of that same event.
    I am trying to avoid duplicates of the records and have devised a modified version keeping the family group as a hub containing an index to the relevant documents and other media.

    I have gradually realised that a key element in citation is being able to accurately pinpoint the provenance of the source. Whilst digital files can have this information embedded in the properties it is a greatly underused function. Most of the files just contain the filename for that computer and a date. Making use of this ability will take time so I have started with a quicker fix to ensuring the correct provenance is recorded.


    The System


    This is a screenshot of my system as it stands today



    I discussed this system briefly in my featured earlier post.
    The Media file in my Family Historian project has subfolders which I have colour coded using Folder Marker .


    I have further subdivided the folder named Official Archives as shown below



    I expect some of the folders will be moved, renamed or deleted as I decide the best place to use for those census images and other items I have downloaded. I need the flexibility at present that this system provides. I also want something that can be easily modified at a later date.

    The process has been far from straightforward and I find myself having to go through earlier emails trying to discover who sent me pictures or documents. When I find the relevant email I have sent it to Evernote and added tags.

    This has slowed down my folder organization but will pay dividends when I start to rebuild my tree as part of my Genealogy Go Over.

    I did not create a research log when I started out so I am going to create one retrospectively from interviews, photographs, scans and correspondence to ensure the sources are correctly cited.
    If I am unable to accurately date something I can no longer replicate, such as an interview with a deceased relative, I will date with a year range.

    I am sure I will find other distractions to send me "off course" but hopefully most of them will help me attain my ultimate goal to get organised and digitised so I can find, analyse and preserve the history of our family. 


              More Than I Hoped For        
    It's over. Those two simple words now describe my Writing for the Internet class. This class was much more than I was expecting and hoping for. When I walked in to sign up for classes on my orientation day, they sat me down at Dr. Jerz's table. He walked me through choosing a few classes I had to take, and then he introduced me to a class of his, Writing for the Internet. I decided to take the class. I'm not sure exactly what I was expecting, but it definitely was not what I got.

    These are some of the main things I got out of this class.
    • Blogging - I was not expecting blogging. I'm not sure if it was mentioned, or if I chose just to ignore it, but I don't remember having to blog being in the description of this class. At times it frustrated me, but I really did enjoy the blogging. It was such a great way to respond to the reading and assignments. I felt that I could say what I wanted, how I wanted to. It felt much more personal than writing a three page essay response.
    • Web Design - I didn't think we would be designing and uploading websites. I've had a bit of previous experience with HTML, but nothing like this. The more I thought about it, the more I realized that HTML really is writing for the web in it's basest form. If I can't code a page, there's no way I can put my writing on the web without using someone else's coding. Writing code is what writing for the internet is.
    • Web Appropriate Text - This is all that I thought the class would cover. The tips and corrections I received in this section of class were great. Reading on the computer is much different than reading an essay, a magazine, or a book. There are so many different techniques that people use when reading something on the Internet. Knowing that most people don't scroll unless forced to, that they don't read huge chunks of text, and that they find bulleted lists helpful are all things that I did not realize about writing specifically for the internet.
    • Usability Testing - I never knew what usability testing was, and now I realize that it is a vital part of designing a website. Without this testing, no website is ready to be published on the web. Knowing how to conduct usability testing really helped me in my final project.
    • Creative Hypertexts - This was such an interesting part of the class. I've never encountered stories on the web in this format or interactive fiction. While I got frustrated with both quite easily, it was interesting to have the chance to code something I'd never even heard of before.
    This final portfolio covers my work for my term project. For my term project I chose to write a website that explores Click to Give sites. These blog entries covered my progress through my project.
    Through this project, I also helped with the projects of others.
    I gave suggestions and encouragement to
    I was a tester for
    • Jessie - I tested her game for the alpha testing.
    • Andy - I looked at his site and then gave him individual suggestions.
    • Aero - I looked at his site after he e-mailed me the link and sent him my critique.
    • Jed - I played his game for beta testing.
    • Dani - I used her site for alpha testing.
    • Denamarie - I did the same for her site that I did for Andy's.
    I think I liked this section of the class best. We each chose what we wanted to work on. Then we all helped each other to come up with the best final project possible. I thought it was a great display of classmates helping each other and working to our potential.

    Other's final thoughts on the class.

              Ephenation evaluation report        

    Vision of Ephenation

    To have a game like World Of Warcraft, where players are able to add their own adventures. I think this is a probable future development. This type of games should be fully realized and generally available in something like 10 to 20 years.

    Goals

    Unlimited world

    The size of the world should not be limited. It is easier to implement a flat world than a spherical world, and a flat world can be unlimited. The nature will obviously have to be created automatically.

    Unlimited players

    This is not possible, of course, but the number of simultaneous players should be big. Limitation to 10 or 100 is much too small, as everyone would more or less know everyone and work on the same project. A minimum would be 1000 players, but preferably more than 10000. That will lead into a situation where you always meet new players you don't know, and the world is big enough so as to always find somewhere that you have not explored.

    Unlimited levels

    Most RPG type of games have a limited set of levels. But that will put a limit on the game play. After reaching the top level, the game is no longer the same. Not only that, but there is a kind of a race to reach this top level. Instead, there shall be no last top level. That will put an emphasis on constant exploration and progress.

    Allocate territory

    Players should be able to allocate a territory, where they can design their own adventures. This territory shall be protected from others, making sure no one else can interfere with the design.

    Social support

    The community and social interaction is very important. That is one reason for the requirement to support many players, as it will allow you to include all friends. There are a couple of ways to encourage community:
    1. Use of guilds. This would be a larger group of players, where you know the others.
    2. Temporary teams, used when exploring. It is more fun to explore with others.
    3. Use of common territories. It shall be possible to cooperate with friends to make territories that are related and possibly adjacent to each other.

    Mechanics

    It shall be possible to design interesting buildings, landscapes and adventures. The adventures shall be advanced enough so as to support triggered actions, with dynamic behavior that depends on player choices.

    Execution

    This is a description on how the project was executed. It was started end of 2010. Most of the programming was done by me (Lars Pensjö), but I got support with several sub modules.

    Server

    It was decided to use Go as the programming language for the server. Go has just the right support for this type of software:
    1. High performance (compiled language)
    2. Object oriented and static typing
    3. A concept of gorutines (light version of threads)
    4. A very high quotient for "it works when it compiles"
    5. Garbage collection
    The disadvantage of Go when the Ephenation project was started, was that Go was a new language, in transition, with uncertain future. This turned out to not be a problem, and the language has today a frozen specification (Go 1).

    To be able to manage the massive amount of players, quadtrees are used for both players and monsters.

    It is the server that has full control over all Model data. Player attributes, melee mechanisms, movements, etc.

    Client

    The client was initially designed in C, but I soon switched to C++. There are still some remains from C, which explains some not-so-good OO solutions. OpenGL was selected, instead of DirectX, partly as a random choice, but also because I wanted to do the development in Linux.

    It was decided to use OpenGL 3.3, instead of supporting older variants. There are some nice improvements in OpenGL that makes design easier, which was deemed more important than supporting old hardware.

    The world consists of blocks, voxels. This is difficult to draw in real time with high FPS, as the number of faces grow very quickly with viewing distance. Considerable effort was spent on transforming the list of cubes into a list of visible triangles. It is also difficult to make a level of detail (LOD) algorithm that gradually reduce details on long distances.

    Another technical difficult with a world based on cubes was to make it look nice, instead of blocky. Some algorithms were investigated that used a kind of filter. As the view distance is limited, there can be a conflict when being underground.

    The game engine can't know whether the far distance, which is not visible, should be replaced by a light background (from the sky) or from a dark background (typical to being underground). A compromise is used, where the color of the distance fog depends on the player being at a certain height.

    Protocol

    There are strict requirements on the protocol. If a server shall be able to handle 10000+ players, the communication can easily become a bottleneck. TCP/IP was selected in favor of UDP/IP, to make it easier to handle traffic control. The protocol itself is not based on any standard, and completely customized for Ephenation.

    Mechanics

    There are two major choices. Either use a scripting language to control the aspects of the world, or a graphical approach. A scripting language is more powerful, but on the other hand it is harder to learn. There is also the problem with supporting a massive amount of players, in which case time consuming scripts would make it unfeasible.

    The choice was to go for a limited set of blocks, with a special block type that can be used to initiate predefined actions. Inspiration was taken from the principles of Lego blocks. With a relatively small set of basic blocks, it is possible to construct the most amazing things.

    Evaluation

    Game engine

    The client side was designed from scratch, instead of using an existing game engine. This may have been a mistake, as the main development time was spent on graphical technology, instead of exploring the basic visions.

    Adventure design and mechanics

    The set of blocks and possible actions with "activator blocks" are currently limited. It is not enough to construct full adventures that are fun to explore and provides great entertainment.
    Early version of the game, where a player abused the monster spawner

    Game play

    The basic world is automatically generated. This usually make a game of limited interest, as game play is bound to become repetitive. Support from initial players enabled the creation of a world with many new buildings and creations. The more advanced features that support dynamic behavior was not added until later, which unfortunately lead to most part of the current world being too static.

    Graphics

    The graphics is working, but far from a production level. There are several glitches, e.g. camera falling inside the wall and lighting effects cut off. As the world is dynamic, the possibility to do offline precalculations are limited. That means most graphical effects has to be done live, which is a difficult requirement. For example, it is not known how many light sources that should be possible to manage. It was chosen to use a deferred shader, which improves the decoupling from geometry and shading.
    Early attempt to create automatic monsters. This was later replaced with fully animated models.

    Social

    The social side of the game play has been explored very limited. There are ways to send message to nearby players, and to communicate privately with any player. Although this is a very important aspect of the final vision, it is known technology and not difficult to implement.

    Performance tests

    The aggressive requirement to support 10,000 simultaneous players is hard to verify. A simple simulator was used, adding 1000 players at random position with a uniform density. These players simply walked around. If they were attacked, they attacked back again. If they were killed, they automatically used the command to revive again.

    On a Core I7 with 8 GBytes of RAM, the load from the server was approximately 10%. This is no proof that the server can actually manage 10,000 players, as there may be non linear dependencies. There are known bottlenecks, for example monster management that is currently handled by a single thread. That means at most one core can be used for this, but it should be possible to distribute this task into several smaller goroutines.

    The communication was measured at around 100 MB/s. With linear scaling, it would be 1GB/s for 10,000 players. The intention is that the scaling should be linear, as cross communication between players is designed to be of constant volume. Still, it remains to be proven.

    There is the obvious question whether the simulator is representative to real players. One way to improve that assessment would be to measure the actual behaviour of real players, and compare with the simulator.

    Another possible bottle neck is the communication with the player database (MongoDB). This depends on the number of login/logout and auto saves. It also depends on load generated from the web page. This has not been evaluated. Typically, an access takes about 1ms. The MongoDB is currently located on the same system as the game server, minimizing communication latency. The database will have to be managed by another computer system for a full production server.

    Equipment

    The objects that the player can wear and wield are simplified. As the game as a concept is unlimited, it is not possible to hand craft objects. Instead, there are 4 defined qualities for each object, per level.

    Communication

    TCP/IP has a higher overhead than UDP/IP. Some packages are big (the complete chunks), which would have required several UDP/IP packets and a complicated transmission control. It may be that UDP/IP should be used instead. However, this was not an issue for evaluation of the project.

    As the server is responsible for all object atributes, the clients need to be updated frequently. Player and monster positions are updated 10 times per second. This generates some data, so the update is limited to nearby players. Because of this, the client need to do interpolation to be able to show smooth movements, and the client need to be able to manage stale information about other players and monsters. The advantage of having the server manage all attributes is that it is not possible to cheat. The client source code is available, and it would have been easy to do changes.

    Conclusion

    Moore's law

    I believe the computers will continue to grow more powerful exponentially for many years still. However, the full power will probably not be accessible unless the game server can scale well with increasing number of cores. The performance test were done on hardware from 2011, and there are already much more powerful equipment available.

    Adventure design

    As a proof of concept, I think the project was successful. The thing I miss most, is a powerful enough mechanism that supports custom adventures. This is a key point of the game concept, but I believe, with more personnel involved, that new ideas would be available that would improve the possibilities considerably.

    Document update history

    2013-02-22 First published.
    2013-02-24 Added discussion about using voxels on the client side.
    2013-02-27 Information about entity attribute management and communication.
    2015-05-04 Pictures failed, and were replaced.

              Earn Money Fast!        
    By Tommy Anderson

    Are you tired of chasing "earn money fast" methods in hopes that THIS TIME, you have found a way that actually works? Then make yourself a promise right now - read this whole article. Then take action - follow every step and don't stop till you're done. If you do, I promise you that you not only will earn money fast - you will make money today - even within the next hour or two.

    The best part? You will make money with no money. There is no investment here. Just an honest (albeit unconventional) method to earn money fast.

    This method is known as Paid Forum Trading, but it has nothing to do with stocks, don't worry.

    I was extremely broke last year and I used this wonderful method to earn money fast - to the tune of almost $400 in 4 days. Not bad when you consider that I sat in the comfort of my own home, sipping coffee and working on my computer. From what I remember, I'd say I didn't put in any more than 3-4 hours per day.

    Although its specifically designed for someone to earn money fast, this method does have some limitations. The main one is that there is a cap to how much money you can make. After working for about a week, you'll top-out, at which point you won't make much money anymore. However, by that time, you will have made several hundred dollars, which, when you're running low on cash, is a real life saver!

    Remember, this is not a "business opportunity" - this is a very straightforward, honest way to earn money fast - as in today. (Having said that, there IS a way to turn this into a full-time living - for free of course. This is covered in detail on the web-site, for those of you who want to go beyond just making quick money).

    ...you know that feeling you get when you put on a jacket you haven't worn in a long time and find a $20 bill in your pocket? That's how a lot of people describe this method - myself included. It blows my mind how someone came up with this concept to earn money fast, and how, several years later, it still works - every time.

    For more information on this method, visit: http://makemoneyfastthehonestway.com

    Tommy Anderson is a successful online marketer who specializes in making money fast, followed by building a solid residual income online. His passion is showing struggling online marketers how to earn money fast by taking advantage of the web's best kept secrets and strategies.

    Article Source: http://EzineArticles.com/?expert=Tommy_Anderson

              The Place of Internet Marketing        

    By Monica Kumar

    Several developments in Technology have completely transformed the world and made life easier for people in the transaction of business and work. Notable among these is what is called "internet marketing". In essence, this activity enables buyers and sellers of goods to get their tasks accomplished without the necessity to travel. It may be defined as the marketing of products and services over the internet. Among the benefits, we can mention the low cost of distributing information to a wide audience and advantage in the form of instant response.

    Features of Internet marketing

    1) It straddles the entire world and people from widely dispersed geographical locations can transact business with each other.

    2) Business organizations can reach a large clientele for a fraction of the traditional advertising budget and thus it is less expensive.

    3) Thanks, to the nature of the medium, consumers can conduct research while browsing, and purchase products and services according to their own convenience.

    There are various fascinating facets associated with internet marketing and one of these form a link between the creative and technical aspects of internet technology. It is natural that design, development, advertising and sales activities come under this category. Again the methods cover a wide spectrum such as search engines, display advertising, email marketing and affiliate marketing.

    Many business models that can work in tandem with internet marketing are now available. Prominent among these is e-commerce in which goods are sold directly to the customer or business houses. Secondly, lead based websites where an organization generates value by getting sales leads from their site. Besides there are several other models which depend on the specific needs of individual or businesses launching a campaign for internet marketing.

    How does Internet marketing differ from "off Line Marketing"

    There are several ways by which internet marketing differs from traditional or what we call off line marketing.

    a) Customer browses the internet on their own with the net result that marketing messages reach them personally. The users, for instance locate advertisements for specific products or services with the help of specific key words. This is one to one versus one to many approach.

    b) In an online marketing campaign, it is possible to trace measure and test almost all aspects of the campaign. It is possible to identify the messages or offerings which are more appealing to the target audience. Here the advertisers pay per banner impression or per click of the mouse or per action or result that is effective. This feature ensures "measurability".

    c) In internet marketing, the users access the products of their choice by activity on their part, whereas traditional off-line marketers target their markets according to age group, sex, geography and general criteria.

    d) All initiatives connected with internet marketing require the users to click on the message, go to a website and perform a specific targeted action. Hence the results of advertising campaigns are at once tracked and measured. By contrast, in traditional marketing, it is extremely difficult to measure the actual readership and even actual impact of an advertisement.

    There can be no doubt that internet marketing has grown considerably in the last 3-4 years even in the developing countries of Asia. In the US, the UK and Europe, it has almost become a routine, thanks to widespread availability of personal computers, laptops and internet facilities on mobile phones. Today, every

    Mobile professional has the need to remain connected with the world, while on the move. He can easily avail the benefits of Internet Marketing from his cell phone. Moreover he can also get in touch with the company through emails. These days there are various options available which allow users to free access to emails form their mobile phones. Like one can easily send an email through free mobile email services by clients like gmail, email@mobile, etc

    Thus the trend of internet marketing is most likely to inject a greater sense of accountability on both the advertising agencies and their clients.

    Monica is a vetran in the field of writing and loves to share her views with her readers. Please feel free to contact her at monika@emailatmobile.com


              Introduction and First Thoughts        

    Introduction

    Hi! I was accepted to build a Crystal Space World Editor for Google Summer of Code this summer.

    A little about me: I'm an 18-year-old computer engineering major at University of Maryland. My main interests beside computers are classical guitar and biking.

    In this blog I'll post my ideas and progress on this project. Comments and suggestions will be greatly appreciated.

    Here is the abstract as given in the proposal:

    Crystal Space, being a 3d engine, deserves a good art pipeline so that applications using it can focus on creating assets, not editing world files by hand. Having worked on several game projects using CS over the past 2 years, I have experienced directly the difficulty of getting art into the engine. I would like to help take a huge step in improving it by creating a usable world editor.

    The editor should have a completed framework by the end of the work period, including a working plugin system, undo/redo system, selection system, tool system, save/load functionality, scene browser, factory browser, and property editor. Also, basic selection and transform tools will be implemented. Any remaining time will be used to polish the user interface or implement tools for other CS features, such as terrain.

    The project is currently in the design stage, but the ideas are becoming more focused.
    Here is some of the progress so far.

    Name of the editor

    We had nearly an hour-long name-throwing session on IRC about this, but I don't think any of them stuck. The consensus seems to be that the name shouldn't be too serious. Some highlights: Ochre, Composotron IV, Crystal Latte, Crystachino, Deity for Dummies, Quartz, Chainspoon, Turbospoon, CrystalGarden, Plow, Colloid Space. I would choose Anvil, but it is already the name of my old editor. Maybe Anvil Reloaded? ;) Any more ideas?

    User interface

    The editor will use wxWidgets as a GUI library.
    I'll use wxAUI and wxPropertyGrid widgets. wxAUI is a really nice docking toolkit that should give a very flexible, modern-looking interface. wxPropertyGrid will be great for the property editor.

    wxAUI has been included in wxWidgets 2.8.0+, but wxPropertyGrid is a contrib widget. To handle the dependency, the editor will probably require wxWidgets 2.8.0+ and wxPropertyGrid will be included in the source tree.

    I'll use wxFormBuilder to design the more complex dialogs for the editor (options, material editor, etc) and save them as XRCs. The main window will be done in code, using wxAUI.

    Tools

    Tools allow the interface to remain consistent when switching between different editing functions. Tools will handle events like mouse move, mouse click, keyboard press, and draw to allow for extra information to be drawn on top of the scene. Examples of tools are select, move, rotate, scale. Plugins can also add tools. Tools will be available through a toolbar. In addition, tools can provide a panel for tool-specific settings.

    There are several types of tools.

    Mesh-specific tools: These tools will be shown based on the type of the selected object.
    e.g. for particle system editor, an emitter editor. For a terrain editor, a tool to modify heights with a brush.

    Creation tools: Tools which create things, e.g. a tool which creates mesh primitives, or a tool which creates an initial flat terrain.

    One-shot tools: Tools which perform one "non-interactive" action, like "compress vertices" or "generate normals".

    Scene Browser

    The scene browser is basically a tree that will show all of the instances in the world file (e.g. all the stuff that goes in between <sector> tags).

    There could possibly be multiple "view modes" for this: Group by sector, group by object type, sort alphabetically.

    Plugins should be able to add 3rd party types to the scene browser (e.g. CEL entities).

    Project Manager

    This should show some of the files that the world file depends on. It will allow you to link or unlink libraries to the world file.

    Assets Browser

    Formerly named "factory browser", the assets browser will allow you to browse through mesh factories, materials, etc. It should allow you to remove them, or edit their properties when selected (in property editor). Adding mesh factories can be accomplished through importing or linking to a library. Or you can use a tool which creates primitives.

    Mesh Browser

    This will show all of the available mesh factories, rendered to textures. The selected one will show a rotating preview.

    Material Browser

    This will show all of the available materials rendered on tiny spheres. You should also be able to create an empty material from here.

    Browsers

    With all of these browsers, there seems to be a commonality between them: they generally provide a view of a certain category of objects, and when selected, they should publish an event to listeners, including the property editor which will allow you to edit the selected object. It seems like they could share a lot of code.

    Property Editor

    There will be a property editor shown for the selected object.

    I will need to implement some custom property types, including one for matrices.

    Another thing I would like is a "link" to another object. It would basically allow you to choose one of the available objects of that type. And it will allow you to follow the link and show the linked-to object in the property editor. For example, the mesh instance property editor will have a link property "Material", which will allow you to choose which material is used for the mesh.

    Saver Improvements

    Since the saver doesn't fully support saving all CS objects, and since it is desirable to preserve comments in the world files, I'll be supplementing the loader to attach the original DOM nodes to engine objects when they are loaded (and only when the saveable flag is on). The editor will then keep track of which objects are modified, and only save those. This means that all unsupported nodes will be preserved. A main failure of the current way of using the saver is that it obliterates any unsupported nodes. Judging by the rate at which the loader advances versus the rate at which the saver plugins advance, this will be necessary for some time.

    The sooner this is implemented, the sooner the editor will be useful for making small tweaks to existing world files. So I do regard it as quite important, although it is not trivial.

    Wrap-Up

    Whew! There are a lot of ideas there. I hope I get some good feedback on this.

    I still have approximately 2 more weeks of school, so I'll be trying to think of this and post when I'm not taking exams. Then, summer! :)


              Convocation 2012        

    Loading the player...

    September 4, 2012

    Amherst marked the beginning of the 2012–13 school year with Opening Convocation at Johnson Chapel on Sept. 3. The first formal gathering of the first-year class, the annual ceremony enables the college’s president and the faculty, dressed in their academic regalia, to officially welcome the new students. Every year, it features a procession, music by the Choral Society and the awarding of master of arts degrees to faculty who have reached the rank of full professor but aren’t graduates of Amherst. (View photos of the entire event at the Amherst College Flickr set.)

    In this year’s Convocation address, President Biddy Martin commended the members of the Class of 2016 for having the courage to learn, to be challenged by new ideas and to “combat our own willful ignorance.” “Critical thinking cannot be programmed, but it can be exemplified,” she explained to the audience of first-year students, faculty, staff and others. “It is our job to exemplify it by turning our analytical skills and our patience outward but also inward toward ourselves. The quality of this institution depends on the willingness of our students and faculty and everyone else who works to put their ‘taken-for-granteds’ at risk.”

    She discussed the relationships the students would cultivate at college and reminded them of the value of their Amherst education as well. The latter, she told them, is “a launching pad or platform for the work that needs to be done to address the monumental challenges in the world—economic, political, cultural, environmental.… It’s an opportunity to learn not only how to think but [how] to relate to people from every conceivable background, how to engage the world and how to lead.”

    Prior to speaking to the first-years, Martin conferred honorary master’s degrees on Catherine Epstein, professor of history and chair of her department; Jeffrey Ferguson, the Andrew W. Mellon Professor of Black studies and American studies; Caroline Goutte, professor of biology; Amelie Hastie, professor of English and film and media studies and chair of the film studies department; and Nasser Hussain, professor of law, jurisprudence and social thought. She also acknowledged Scott Kaplan ’95, professor of computer science, who was also promoted to full professor but already holds an Amherst degree.

    President Biddy Martin’s 2012 Convocation Address

    TRANSCRIPT

    Good evening, and welcome once again. We are gathered to mark the beginning of the academic year, to celebrate teaching and learning and to affirm their importance. We are lucky to be learning and teaching in a community of smart, curious and creative people. By the very nature of this event and its rituals, we commit ourselves to one another and to a larger world that desperately needs its Amhersts. We are all eager just to get on with it, but it makes sense to dwell, even if only briefly, on our work, our relationships, and, perhaps, even our fun.

    I know the faculty feels fortunate to be teaching a student body with your talent, curiosity and diversity. You, who are our new and continuing students, are lucky to study with faculty who are contributing to their scholarly fields, creating new knowledge across disciplinary boundaries and investing their creativity in the art of teaching. The Amherst faculty treats teaching with same seriousness they bring to original research. I know from experience that such seriousness is rare. 

    In their senior survey, members of the Class of 2012 reported that their favorite teachers were the ones who had the highest expectations of them, who demanded their best work. This is a place that reveres the life of the mind and challenges us to continue a long tradition, a 191-year-old tradition of setting high standards.

    In a meeting of Amherst alumni in the chapel last spring, I was asked by an alum what motivates serious scholars to spend their careers teaching undergraduates; “What’s in it for them?” I believe he asked. I had a response ready, based on my own experience as a teacher of both undergraduate and graduate students, but I caught sight of Professor Sarat, a political scientist, who happened to be standing in the back of Johnson Chapel; I asked him to come forward and give the audience his perspective—and he was glad to oblige. I want to read the summary account he sent me later, because what he said is representative of Amherst faculty as a whole. I cannot imagine any member of the faculty who would not agree. “Amherst classrooms at their best,” he said, “are places that combine love, challenge and hope. We want our students not just to learn, but to love ideas, images, mathematical equations.”

    “Love,” he cautioned, “cannot be programmed, but it can be exemplified.” We want our students not only to learn, but also to love learning. He continued: “At our best, we try to put our students in a place of productive discomfort … we want to unsettle their taken-for-granteds. We want to challenge their moments of complacency. The return for those of us who teach, of seeing students take up the challenge, venture into that place of productive discomfort, is being inspired by their courage and reminded of what it is like to move beyond our own comfort zones.”

    He concluded by saying, “I guess it is all about what they and we are willing to put at risk.”

    I like the combination of challenge, love and hope. I like thinking about what it means to put our assumptions, even ourselves, at risk, within what is ultimately a pretty safe environment. If anyone among you doubts that it takes courage to question what we think we know or put our beliefs at risk, you need only look at the ideological rigidity in the world around us and consider the tenacious refusal in broad swaths of the public to accept scientific conclusions or listen to the views of others.

    It takes particular courage to combat what we might call our willful ignorance, but we are here to do just that. By “willful ignorance,” I mean the active suppression of knowledge or truth, the kind of ignorance that cannot be changed by the mere addition of new information. In moments of uncertainty and fear, we are particularly prone to indulging our ignorance, and the times are nothing if not uncertain. Our resistance to change is purposeful, but often only at an unconscious level by virtue of our stubborn internalizations.

    Last week, [DeMott Lecturer] David Nevins [’88] told you that the most creative periods in his career have often been the most anxiety-ridden; they have come when he was making the transition from one job to another, before he knew the rules and had not yet internalized them. He encouraged you to take advantage of the transition you are making, giving yourselves permission to think otherwise. Permission of that sort requires a fight, because we are largely unaware of the structure of our ignorance, and our prejudices can be forms of love for those from whom we learned or absorbed them. Critical thinking cannot be programmed, but it can be exemplified, and it is our job to exemplify it. The quality of our institution depends on the willingness of students and faculty, and everyone who works here, to put their “taken-for-granteds” at risk.

    Amherst sometimes seems like a treasured island, a respite from the inanity or insanity or the ugliness in the world, but it is not an island, and we don’t want it to be. We want it to be a platform or a launching pad for the work that needs to be done if we are to address the monumental challenges we face—economic, environmental, political, social, cultural and psychological. Amherst provides an opportunity to acquire the skills and the quality of thought that is adequate to the problems; it is also an opportunity to learn how to engage and build relationships with people from all over the world; it is an opportunity to learn how to lead.

    When I was in London visiting our alumni this summer, I asked some of my interlocutors how they accounted for their love of Amherst. “It’s a place,” said one, “where it was cool to be smart.” We are fortunate to be in a place where it is cool to be smart; cool to be different; cool to be an athlete who puts academics first or finds the right balance between the two; cool not to be an athlete; cool to sing, to dance, to stay up all night studying, even when there is no exam the next day; cool to grasp and appreciate the nature of reality and the complexity of our lives.

    I have lots of wishes for you, but I will emphasize two: first, that you reject the substitution all around us of only dimly related bullet points for genuine analysis. I hope you will use your time here to hone your intellectual skills and use them to reach for an understanding of the world—one that integrates the different modes of thought to which you will be exposed; one that displays close reading, critical thinking, analytical reason, creativity and a commitment to clear, compelling exposition. I hope you take full advantage of Amherst’s commitment to great writing and to other forms of creative expression. I hope you go beyond scattered “bullet points” or decontextualized data to a working understanding, or an approach to understanding, that honors imagination, distinguishes between fact and fiction and remains open to new knowledge.

    Second, I hope you find ways to let your leisure time be inflected by your intellectual development. It is popular here, as well as at other colleges and universities, to oppose play to work. “Work hard—play hard” becomes a kind of mantra, and sometimes a misguided one. I encourage you not to think of work and play as oppositions. Satisfying play is not the absence of work. It, too, takes cultivation and learning. And work is neither successful nor satisfying if it lacks experimentation, whimsy and fun. Play can be deadening when it is conceived only as an escape from thought. It is possible to relax and have fun, even to be a little oppositional, even a little bad, without suppressing all awareness and judgment.   

    You are here to learn not only how to be successful at work but also at play, and much of your playing will occur in relationships with your peers. Indeed, relationships will be a significant focus of your experimentation and growth while you are here—the friendships, love relationships, sexual ones. At least some of you will take an interest in sexuality. Good experiences and relationships cannot be programmed any more than the love of learning can, but they can be exemplified, and they will benefit from the work of thought. I will close with a good example of thought when brought to bear on questions of love and sexuality. In the early part of the 20th century, the German poet Rainer Marie Rilke wrote a letter to a young poet offering advice about the relationship between love, sensuality and work. Rilke warns the young poet against the tendency of young people to abandon themselves in pursuit of love or of one another, and he offers an account of love and marriage that has been cited many times over the past hundred years:

    Like so much else, people have also misunderstood the place of love in life, they have made it into play and pleasure because they thought that play and pleasure were more blissful than work; but there is nothing happier than work, and love, just because it is the extreme happiness, can be nothing else but work. For one human being to love another: that is perhaps the most difficult of all our tasks; the ultimate, the last test and proof, the work for which all other work is but preparation …

    but young people fling themselves at one another, when love takes possession of them, scatter themselves, just as they are, in all their untidiness, disorder, confusion … And then what? Each loses himself [herself] for the sake of the other and loses the other and many others still to come. And loses the expanses and the possibilities, exchanges the approach and flight of gentle, divining things for an unfruitful perplexity…

    Physical pleasure is a sensual experience no different from pure seeing or the pure sensation with which a fine fruit fills the tongue; it is a great unending experience, which is given us, a knowing of the world, the fullness and the glory of all knowing. And our acceptance of it is not what’s bad; the bad thing is that most people misuse and squander this experience and apply it as a stimulant at the tired spots of their lives and as a distraction instead of a rallying toward more exalted moments … In marriage [relationships] the goal is not to create a quick community of spirit by tearing down and destroying all boundaries. A good marriage [relationship] is one in which each appoints the other guardian of his [her] solitude.

    This last sentence is one of the most frequently cited passages in the letter. “A good [relationship] is one in which each appoints the other guardian of his [her] solitude” or separateness. Use your leisure, your play, your relaxation and your relationships with one another as a rallying toward the project of becoming who you are and letting others be engaged in the same work. Respect yourselves, your own boundaries and the boundaries of others.

    Take yourselves and your fellow classmates seriously. And, in the process, enjoy! Welcome and welcome back to Amherst.


              Structure and Interpretation of Computer Programs        
    Hal Abelson and Gerald Jay Sussman Video Lectures at MIT.
              Is Your Computer or Laptop Corrupted - 3 Top Warning Signs        
    During the lifetime of your PC or laptop, you will experience various common problems, such a decrease in the performance of your machine, plus additional DLL errors and the dreaded blue screen of death. In extreme cases your operating system will crash.
              What to Do When a Computer Crashes        
    Most computer users have experienced this similar problem during the life of their machine. You might be playing games or doing some important and vital work. Suddenly your machine freezes and nothing moves no matter what you do.
              Your Laptop Computer Doesn't Have to Be So Slow        
    A slow laptop or PC computer can happen for various reasons. When your machine starts to slow down in performance, you can become extremely frustrated and wish it was working just like when you first bought it.
              Spyware - Don't Ignore The Dangers        
    Spyware is something that any computer user shouldn't ignore. It actually has become one of the major issues surrounding computer security today. Bluntly put, it is access to your computer system without your permission.
              Why Is My Stupid Computer Freezing?        
    If your stupid computer or laptop is freezing from time to time, you must find it so frustrating, especially if you have important work to complete in a hurry. There are particular reasons why this does happen and you'll be glad to know that there is also a solution to this annoying problem.
              How to Remove Trojan Horse Viruses Safely and Quickly        
    Do you need to know how to remove trojan horse viruses from your computer quickly and also safely? Don't worry, because there are solutions and you're not alone in having this common problem. As stated, most computer users will encounter the problems of spyware, adware or viruses.
              How To Make Your Computer Run Faster        
    Do you know ways to speed up your computer or laptop? Is your PC slowing down and you are looking for ways to speed it up. Most of the problems such as a decrease in performance are mainly due to problems with your registry.
              How to Fix Windows Blue Screen Errors Easily        
    Computer usage is essential in today's computer age. When we first bring our new laptop or PC home, it's like a new toy, all working great. However as with all machines, unless we perform essential maintenance on a regular basis, problems will probably occur. Unfortunately this is the case with most computers.
              How To Remove Adware Quickly and Safely        
    Has your computer processing speed now slowed down to a snails pace. In addition you also appear to be getting these unwanted banners and pop ups appearing on your computer screen. Then you need to be aware that you have probably been infected with what is known as adware or spyware. It has been estimated by CNN that 90% of computers have been infected with spyware. It is usually occurs when you were surfing a new site or downloading music.
              Here's a Quick Way to Fix a Slow Running Computer        
    Are you asking a very common question asked by most computer users "Why is my computer running so slow?" When you first get your new computer from the store, whether it be a laptop or PC, it runs at optimum performance and you get pleasure from using it.
              My Computer Keeps Crashing - Has This Happened to You?        
    If you are asking the question "Why does my computer keep crashing?" then you are probably having problems with your computer registry and it's now time to take these problems seriously. If you just ignore them, then the crashes will get more frequent and in addition, you will probably also have DLL error messages appearing, the dreaded blue screen and a slow running computer performance which will keep getting worse. All in all, not good for the stress levels.
              Your Must Know Guide For Getting Rid of Popups        
    Have you been suddenly plagued by annoying popups that have started to appear on your computer screen. They have now started to become so annoying that you would like a way to get rid of them. There is a safe and simple way to actually do this...
              How to Get Rid of Adware and Spyware Safely        
    Computer users might treat the threat of adware and spyware such as pop ups as something of a annoying nuisance. However I must stress that there are more serious consequences if this malware is left to it's own devices. Adware and Spyware are among the one of the top growing risks confronting users and companies today and it should not be underestimated.
              How to Speed Up Computer Performance        
    "Why is my computer running so slow" This is one of the questions that you will surely ask after you own your computer for a while. When you first bring your PC or laptop home in it's new box, it will be operating at optimum performance and it's a pleasure to use. However, unless you have already been doing preventive maintenance to the operating system, problems such as the computer performance getting slower will happen.
              Get Rid of Spyware and Adware Before it Damages Your Computer        
    Are you being plagued by annoying adware popups that are suddenly appearing on your computer screen. In addition, if you noticing your computer slowing down and programs just taking too long to load, your homepage keeps changing, then you have probably been infected by spyware and adware. It must be stressed that you need to sort this out important issue as soon as possible before it damages your computer.
              Registry Repair Software Reviews - Some Important Tips You Should Read        
    Are you asking one of the most common questions, asked at least once by all computer users, "Why Is My Computer Running Slow?" If your once lovely new PC is also crashing, then it's time to take a serious look at the best registry repair programs.
              Why is My Computer Running Slowly?        
    Is your computer very slow and freezing? Unfortunately for most users you will encounter this common problem and in addition to add to your frustration there might be error messages and the dreaded blue screen. The reasons for your computer running slow can be threefold...
              Why Does My Computer Crash?        
    The joy of owning a computer (PC or laptop) is a pleasure for most computer users, especially when we first get our new brand machine. Unfortunately over time, the system will get slower and will probably crash unless we do appropriate maintenance to the operating system.
              How to Remove Spyware Infections Safely        
    If you have noticed problems such as your computer getting slower, annoying pop-up messages or too many error messages that appear on your screen, then probably you have been infected with malware such as adware and spyware. But please do not pass this problem off as annoying pop-ups, it is far more serious that that.
              XoftSpySE Review - Does XoftSpySE Work to Remove Spyware From Your Computer?        
    If you are now starting have have annoying pop ups appear on your computer screen from nowhere, plus your operating system starting to slow down, then you probably have spyware or adware. You cannot let these problems just get worse because if you are not aware, spyware software will track your viewing habits on the web so as to bring you the relevant adds to display for you. It will also can leave your personnel and private information vulnerable.
              NoAdware Review - Top Adware and Spyware Remover        
    If you are having annoying pop ups appearing on your computer screen with adverts which you do not definitely want and do not desire, then you have been infected with adware. In addition if you notice that you computer has got considerably slower then you probably have also got infected by spyware. This has happened when you probably were browsing some new site. This type of malware is very dangerous to have on your PC or laptop.
              RegSweep Review - Is Reg Sweep Safe and Easy to Use?        
    When your computer slows down to a snail's pace and it takes forever to load, then it is time to sort out that important but overlooked part of your computer's operating system. It is called your computer registry and it is one of the most important parts of the computer's operating system. Here is stored all the settings for the important applications and games which reside on your computer.
              How to Speed Up a Slow Computer With These Two Simple Tips        
    Is your computer running so slow that it is driving you crazy with frustration. In addition you are under additional stress because you have an important work to finish for a deadline tomorrow. You have even been online pricing the cost of an upgrade or even a new laptop, because it's not a pleasure any more to be working with your computer. The good news is that you probably won't have to upgrade. Here are 2 simple tips you should investigate before upgrading or purchasing another computer.
              Easy Windows Registry Repair For Newbies        
    Windows Registry Repair - One of the major problems of being a computer user is that your computer will start to slow down at some point. When this happened to me it just drove me crazy. The slowness will probably get to a point where you feel you can go and do some shopping and then maybe Windows might have finally loaded.
              How to Repair Windows Registry Errors Safely        
    Problems with your important computer registry can range from DLL errors, the dreaded blue screen, computer crashes and if that wasn't enough a slow running computer system where it takes just ages for everything to load. It will drive you so mad and leave you so frustrated that you feel like throwing the laptop or PC out of the window.
              RegCure Review - Can You Speed Up Computer Performance With RegCure?        
    All computer users will come across the problem of slow performance and also computer crashes. When we first buy our computer and bring it home in a nice new box, it performs like a race horse and it is really a pleasure to use.
              How to Fix Registry Problems Simply, Quickly and Safely        
    Most computer users are very much unaware of the important part that the computer registry plays in the optimum running of the computer operating system. It only comes to light when exasperating registry problems such as your computer running slow makes you now aware of it's importance.
              How to Fix Computer Crashes        
    If you want to learn how to fix computer crashes, then you will definitely want to read this article. Specifically we will talk about why the computer crash develops, other relevant problems and how you can prevent this problem recurring. After reading this article you should be fix or prevent any future computer crashes.
              How to Fix a Slow Running Computer        
    If you want to fix your slow running computer, then you want to read this article. We will discuss the 3 main reasons why you have this problem, from checking your important computer registry, to checking for virus, and finally also checking for spyware or adware. After reading this article you should be able to have your computer back up and running like new again.
              Repair Windows XP Registry Errors With These 3 Simple Tips        
    Your windows registry is a complex system that holds specific files and all the information and commands that are required to have the computer run smoothly. Every time that you create a file, Windows sends information about that file to its registry.
              Antivirus 2009 - How to Remove This Spyware From Your Computer Safely        
    The latest spyware to do the rounds and one of the most persistent is called Antivirus 2009. It is so annoying and yet so clever in the way that it is crafted. It is easy to see how one can be worried about the apparent spy are threat that you have been told exists on your computer. A lot of people will then go and download the software, then install it in order to fix the syware threat.
              My Computer Keeps Crashing - Should I Throw it Out the Window?        
    If your computer keeps crashing like mine not so long ago, did you actually come to a point where you nearly threw it out the window? It got so frustrating and in addition the computer was running so slow that I thought it was entering the snails race. Such a change from the laptop that I bought.
              Internet/Computer Blog        
    Articles and views on different topics like computers, blogging, Internet marketing, search engine optimization, and many other related topics.
              Dec 2011 Daring Bakers' Challenge - Sourdough        
    Sorry for posting late but I'm on holidays away from my normal computer setup and this is the first chance I've had to get onto my blog.

    This month's Daring Bakers' challenge was sourdough, yes sourdough and yes we were asked to make a fresh starter for the challenge.

    French Country Sourdough Picnic Loaf
    Photobucket
    Photobucket
    Photobucket

    I have a decade old starter called Boris (100% hydration i.e. equal weights of water and plain bread flour) so I decided to use that to make the French Country Loaf recipe. I started the process at Day 4 in the instructions. Since I had Boris already made up I saved four days. I have started a new sourdough starter to use in a few days time. In Sydney Australia it is the start of summer so I made a stuffed picnic loaf with the baked bread one of my favourite summer picnic foods.

    I used "OO" finely steel-milled bread flour and "OO" finely cold-steel-milled whole wheat flour with some stabilised wheat germ (since I couldn't find my stone ground flour).

    Boris my (100% hydration) starter, before I fed it to make the Leaven Starter, notice how Boris is burping gas
    Photobucket

    Boris feeding on the extra flour and water, notice the condensation on the top of the plastic lid which indicates that the yeastie beasties and bacteria are very active making lots of gas and tasty flavour for the sourdough
    Photobucket

    Boris full of tiny active bubbles after feeding
    Photobucket

    Comparison of Boris (left) when he is made into the leaven for the sourdough (right) in the French country loaf. Notice how wet and soft the leaven is for this recipe!
    Photobucket

    The loaf proofing for the final raise in a greased pan (I didn't want flour on the outside of the picnic loaf) before it is tipped out and slashed. The unbaked loaf is very soft and needs a mould.
    Photobucket

    The baked loaf (the unbaked loaf is very wet and soft and forms a great shape when baked) the final loaf shape is formed by squeezing (the soft out-turned unbaked loaf) with your hands, then you quickly slash it and place immediately into a very hot oven and turn the temperature to hot for 10 mins and then to the recipe temperature for the rest of the time.
    Photobucket

    Making the picnic loaf
    Hollow out the loaf, notice how moist the interior is and the 'greyish' colour which is a indication of the sourdough starter. The crumb (the texture of the interior) of the loaf is like dense sponge really good I thought, notice the dense spongy crumb in the hollowed out top of the loaf (bottom piece in the photo below).  
    Photobucket

    Line the hollow with several layers of thin ham, and then fill with a combination of ricotta cheese, chopped charred-grilled red capsicums (fire-roasted red bell peppers), spinach, basil, finely chopped spicy smoked French sausage, grated sharp cheese and lots for black pepper. The filling ingredients can be varied to suit your own tastes a great version is the famous Muffuletta sandwich (the filling is an olive paste with various cheeses and sliced meats).
    Photobucket

    Wrap tightly with plastic film and place into the fridge with a light weight on top of the loaf for a few hours (up to two days)
    Photobucket

    The finished picnic loaf
    Photobucket

    Close-up of a slice of the picnic loaf yum yum
    Photobucket

    The verdict - this recipe produces a sourdough unlike anything I have done before the crumb of the loaf is very moist almost sponge-like which I really really liked and it is a perfect foil for the pressed filling ingredients since they almost have the same texture which is what you want in a picnic loaf. Also the picnic loaf slices cleanly and thinly. I bet for an extra special treat slices of this picnic loaf would fry up beautifully. I will be using this recipe from now on to make picnic loaves.

    What to do with the leftover starter
    You can make a lot of recipes with the leftover starter examples pancakes, cakes, scones etc.  In this case I made crumpets with the leftover starter (To make the batter - to one cup of starter, sprinkle over the surface 1 teaspoon of sugar and 1/2 teaspoon salt and 1/2 teaspoon baking soda (or 1-1/2 teaspoons of baking powder), stir well, the mixture will double in volume. Dry fry 1/4 cup scoops of the batter in well greased 3" (7-1/2 cm) metal rings on a medium-low heated griddle (or fry pan) for 4-6 minutes on the bottom and optionally 30 seconds on the top if you like colour on both top and bottom of your crumpets.) These crumpets were so good I love how the holes form and the moist texture of the crumb so much better than the store bought version. You can freeze the leftover starter/leaven and the cooked crumpets. 
    Photobucket
    Photobucket
    Photobucket

       
    Comments and notes
    1. This recipe is unusual in that you knead the leaven into the dough.
    2. The leaven is very wet and soft more like soft putty so when you form the disk of dough and place the leaven onto it and knead it, the final dough-making is incredibly messy and the final dough is very very soft and spreads out very slowly (takes about 20 mins) if left on the counter. I had to add about 3 tablespoons of extra flour to make it a little stiffer.
    3. The final interior of the loaf is very moist, as compared to my normal sourdough. I really liked the final interior and the loaf. The crumb (the texture) of the interior was like soft dense sponge even slightly doughy which I really liked. The weight of the loaf feels very heavy for its size. 
    4. What to make with the leftover starter make crumpets see links below for the recipe.
    What to do with the discarded starter (use to make crumpets)
    And what to do with a neglected starter
    5. A plain flour starter seems to work very well for this recipe.

    French Country Sour Dough Open-faced sandwiches with home-made pesto, tomatoes and cured Italian ham
    Photobucket

    I made the French country loaf its starter was very easy to make and look after until it was active it only took three days for the starter to become super active since I feed it twice a day and the starter was in a moist warm environment for the entire 'brewing' time. I made up the loaf has per the recipe I used very coarse stone ground whole meal bread flour and "OO" finely milled bread flour. The dough rose in about 2 hours (really quick for a sour dough) and to twice it original volume and when baked stayed exactly the same size. Since I used such coarse flour the final texture of the crumb was very grainy. My dough was so wet and soft it really needed a mould but that was no problem.

    I wanted perfectly shaped sandwiches which means the crust has to be very smooth with crisp edges, so I went for a 'brick-shape' loaf that could be cut thinly and cleanly while having the strength so the bread slice wouldn't break or bend when the sandwich is being eaten.

    The final texture of the loaf was like a Rye European sour dough bread, not dense at all in fact, the loaf could be cut very thinly and cleanly - perfect for open-faced sandwiches.

    I had the most beautiful tomatoes and basil so I had to use them as the topping for my sandwiches.
    Photobucket

    This summer in Sydney Australia has been the coldest in the last fifty-one years, so I took special precautions in keeping the starter warm that is by enclosing the plastic container in several tea-towels on the counter on the spot that is above the hot water system. The temperature was gorgeously warmish at all times, so after three days the starter was full of energy and going for it. If you feed the starter once in the morning and in the evening it shortens the time for the starter to become active.

    The starter covered in many tea towels over a warm spot on the counter, it is toasty in there:)
    Photobucket

    I wanted to make thin open-faced sandwiches so I coated my pan with oil-spray and then with wheat germ flakes which produces a thin smooth crust on the loaf
    Photobucket

    Notice the nice straight edges and smooth faces on the loaf, it looks like a brick! Perfect for open-faced sandwiches.
    Photobucket

    Close up of the crust of the loaf
    Photobucket

    Some more photos of the loaf and the thin slices that can be cut from it
    Photobucket
    Photobucket

    I really like how thin you could slice the loaf
    Photobucket
    Photobucket

    To make the open-faced sandwiches
    Photobucket
    Photobucket
    Photobucket

    Finished sandwiches with home made pesto, tomatoes and cured Italian ham and a piece of tangy goat's cheese
    Photobucket

    The verdict - a very tasty open-face sandwich bread wonderful with the tomatoes and pesto. And so filling only a couple of quarter slices where enough. Just like the old fashioned country breads I had in my childhood.

    Some notes
    1. You can speed up the 'brewing' time of the starter by twice feeding it a day and making sure that the starter is in a moist warm place.
    2. My starter was super active it rose the dough in about two hours which is very quick.
    3. The final dough was too soft to be shaped into a free-form loaf it really needs a mould.
    4. The final crumb is very much like the classic black bread style of Northern Europe.

    Cornmeal sourdough loaf
    Photobucket

    I used the French Country starter to make a cornmeal soudough loaf that was more traditionally shaped. I replaced the whole meal flour with corn meal (polenta) I added some pure gluten flour to replace the missing gluten from the corn meal and raised the dough in a bowl lined with linen that was covered in flour and cornmeal.

    This is the largest loaf of bread I have made it was 12 inches (30 cms) in diameter and weighed almost 2-1/2 kgs (5-1/2 lbs)! It took about an hour and a quarter to bake.

    The dough is very wet and soft
    Photobucket

    The dough raising in the lined bowl
    Photobucket

    How to raise the dough during cold weather, place a plastic bag over the bowl and place that over a saucepan 3/4 filled with warm water also you can wrap the saucepan in tea towels this will keep your dough warm for many hours even overnight.
    Photobucket

    The final baked loaf
    Photobucket

    The underside of the baked loaf a wonderful yellow colour
    Photobucket

    I will use the loaf tomorrow after it has cooled down and the flavours have settled.

    I love the look of this loaf so rustic with lots of character in the crust and the yellow colour is stunning. 

    Cornmeal Sourdough Loaf part II
    Photobucket
    Photobucket
    Photobucket
    Photobucket
    Photobucket

    I use my cornmeal sourdough loaf today I was extremely pleased with the look, taste and texture of the slices. I had some beautiful beet(root) and mint on hand so I made a spicy beetroot mint dip to serve with the cornmeal bread.

    Lovely beet(root) and mint
    Photobucket

    The yellow cornmeal bread sliced into wedges so colourful and tasty
    Photobucket

    The beet(root) and mint dip served on the cornmeal sourdough slices
    Photobucket

    Another photo of the delicious bread
    Photobucket

    Gorgeous White Sourdough
    Photobucket

    One thing about sourdoughs is that they can look so beautiful as compared to the store bought loaves. I made another loaf using the French Country starter but using all white flour for the loaf. I had to add about 1/4 cup of extra flour to the dough so that the shaped loaf would hold its shape and be slashed. I double egg-washed the loaf which really gave the baked loaf a lovely shiny gloss finish. I will use it tomorrow after the loaf has had time to settle and mellow. I cannot wait.

    I used a five cup "flower-pot" shaped container which gives a nice visual proportion to the loaf 
    Photobucket
    Photobucket
    Photobucket

    Some gorgeous photos of the final loaf
    Photobucket
    Photobucket

    White Sourdough Loaf
    I made tandoori roast chicken to serve with the white sourdough loaf I had made yesterday. The crumb of the sourdough was very smooth and its hue was a light sand colour which was unexpected since I used a very white flour for the dough. The thinly sliced chicken was lovely on the sourdough sandwich. The crumb of the loaf was very similar to white wonder bread a wonderful bread for sandwiches.

    The white sourdough loaf being sliced
    Photobucket
    Photobucket
    Photobucket
    Photobucket

    The tandoori roast chicken I adore the vibrant colour of the chicken
    Photobucket
    Photobucket

    The final tandoori chicken sandwich
    Photobucket

    White sourdough loaf
    Photobucket
    Photobucket

    I repeated making a white flour sourdough but this time I added some more flour in the final stage so that the loaf would spread out so much and would hold it shape when slashed. I needed about 1 cup of extra flour to achieve the correct consistency. I was very pleased with the final result. The loaf expanded about three times it was incredible to watch it grow and bake in the oven.

    Photobucket
    Photobucket

    More things to make with the leftover starter part II
    Wholesome banana and date sourdough bread
    Photobucket
    Photobucket
    Photobucket

    I had a cup of very sour active starter left so I thought I would make my favourite banana/date bread with it, I make this recipe about once a fortnight during the summer. The recipe is easy -

    Wholesome banana and date sourdough bread
    1 cup starter (the starter doesn't need to be active)
    2 cups wholemeal flour
    2 teaspoons baking powder
    1/2 teaspoon baking soda
    1/2 teaspoon salt
    1/4 cup brown sugar
    3 tablespoons olive oil (or melted butter)
    3 tablespoons dried milk powder (or buttermilk powder)
    3 tablespoons wheat-germ
    1 large egg, lightly beaten
    3 large ripe bananas, mashed
    1 cup of dates finely chopped, soaked in orange juice until soft
    (Optional 1/2 cup of chopped walnuts)

    Sift together the flour, baking powder, baking soda, milk powder and salt, form a well in the centre of the dry ingredients. Pour into the well the sourdough starter, oil, wheat-germ, egg, brown sugar, banana and dates (and the nuts if using). Whisk the ingredients together until a normal "cake" batter consistency is formed you can add more water if you need to loosen the batter. Bake in a moderate oven 160C/320F/gas mark 3 for 1-1/2 hours until a skewer comes out clean, check at 1 hour and then every 10 mins until done. Best if left for one day before slicing, but can be sliced when completely cooled. The bread will last for 2 weeks (at least! I have always eaten it before this) in the fridge covered in foil and plastic wrap and it gets better and better with time, fabulous toasted and served with butter. The slices are super moist and not too sweet. The sourdough and bananas really makes for a moist bread. 

    White sourdough loaf
    Photobucket
    Photobucket

    I decided to make a treat for this delicious bread that is meatloaf which I really really like a lot in Australia it isn't that common basically nobody I know makes meatloaf but every time I make it the meatloaf gets rave reviews.

    For a super special treat I baked the meatloaf on two slices of the white bread these slices therefore get toasted and are dripping with gorgeous flavour I'm sure that they aren't not that healthy but once in while it is such a flavoursome treat.

    The meatloaf notice the two slices of white sourdough bread that acts as a soak of all the juices
    Photobucket
    Photobucket

    The delicious slices of bread that have been baked and basted throughout the cooking of the meatloaf
    Photobucket
    Photobucket

    The cut meatloaf. My meatloaf contains grilled red capsicums (the red pieces), shredded seaweed (the black pieces) and lots of herbs and a mixture of pork and veal with some BBQ duck and the glaze is a mixture of tomato pesto, black sugar and balsamic vinegar.  
    Photobucket
        
              Recovery of heritage software stored on magnetic tape for Commodore microcomputers        

    Digital games make up a significant but little known chapter in the history of the moving image in Australia and New Zealand.  Beginning in the early 1980s, the Australasian software industry developed a remarkable record of content creation. The ``Play It Again'' project is conducting research into the largely unknown histories of 1980s game development in Australia and New Zealand, ensuring that local titles make it into national collections and are documented and preserved, enabling the public to once again play these games.

    Microcomputers from the 1980s made extensive use of compact audio cassettes to distribute software as an inexpensive alternative to the floppy disk technology available at the time. Media from this era are at risk of degradation and are rapidly approaching the end of their lifespan. As hardware platforms and peripheral devices become obsolete, access to the data for future scholars and other interested parties becomes more difficult. In this article, we present a case study, wherein we investigate the issues involved in making digital copies with a view to the long term preservation of these software artefacts.

    A video game title stored on standard compact cassette for Commodore's popular VIC-20 machine, ``Dinky Kong'' by Mark Sibley was recorded using both inexpensive amateur and professional playback equipment. The audio files obtained were processed using freely available software, alongside a customised decoder written in MATLAB and Perl. The resulting image files were found to be playable using an emulator. More importantly, the integrity of the data itself was verified, by making use of error detection features inbuilt to the Commodore tape format, which is described in detail.

    Issues influencing the quality of the recovered image files such as the bit rate of the digital recording are discussed. The phenomenon of audio dropout on magnetic tape is shown be of some concern, however there exist signal processing techniques to compensate for such errors.

    The end result of the imaging process was a file compatible with a popular Commodore VIC-20 emulator, the integrity of which was verified by using inbuilt checksums.


              LA TERRA (per un nuovo umanesimo)        



     
    Viviamo lontani dalla terra ed in un graduale distacco dalla carne (ma questa è un'altra amnesia). Calchiamo la terra con i piedi, ma la conosciamo sempre meno, non la tocchiamo con le mani, non lasciamo orme a piedi nudi. Il fango va lavato, gli stivali e le scarpe ci proteggono, i pneumatici ci portano rapidamente da qui a là senza quasi nessun contatto.

    Fra noi e la terra abbiamo frapposto degli intermediari sconosciuti, gente lontana, che spesso parla altre lingue e viene ancora a patti con una terra lontana, ma purtroppo non per sé lavorano, ma per altre organizzazioni ancora. Enormi golem finanziari raccolgono il lavoro di questi contadini spesso disperati, grano, soia, mais, patate, zucchero, cotone e caffé e lo lavorano, lo trasformano, lo alterano chimicamente, lo confezionano e lo imballano. Spesso da un'estremità del pianeta riforniscono la parte opposta, caricando tutto su navi, treni, container, camion. Il materiale deperibile viene stipato nei frigo e rifornisce enormi ipermercati, dove si vendono cibo, computer,pupazzi di pelouche, biciclette e aspirapolvere.

    Le macchine non hanno bisogno di cibo, ma necessitano di elettricità. Il proliferare delle macchine ingurgita risorse in modo insostenibile, aliena la terra all'uomo, contamina l'acqua e svuota i fiumi. L'uomo ridotto a macchina ignora la terra, si rifornisce spesso acriticamente di combustibile organico, ma ha perso il contatto con la terra che abita. L'agricoltura nei paesi “sviluppati” ed in Italia in particolare langue. Eppure il fabbisogno di cibo sale.

    Dove si alimenta la contraddizione fra l'abbandono dell'agricoltura, dell'autosostentamento e della capacità di render fertile la terra, a cui corrisponde per contro un aumento delle necessità alimentari? Il ritorno dell'uomo, la fine del suo travestimento a macchina biologica, la riconquista della coscienza e dello spirito per un nuovo umanesimo, cercano un piano d'appoggio e questo piano d'appoggio è la terra.
    Senza la fatica, senza la pioggia e il letame, senza la vanga e la zappa, siamo condannati a rifornirci di nulla organico, facendo del cibo una sosta ad una stazione di servizio dotata di ampio parcheggio. Le mani nel fango sono un battesimo, le unghie sporche e la schiena indolenzita testimoniano di un'autenticità perduta fra questi alimenti sigillati nel polietilene.

    Non è una romantica lotta di retroguardia, più semplicemente mangiare taralli fatti con i cereali per i maiali ci uccide, così come ci uccidono molti artefatti cibi moderni: non sono adatti all'organismo, non sono dono fresco della terra.

    L'intendimento di terra come risorsa, come luogo dove massimizzare la produzione e le prestazioni, esattamente come si parlasse di un qualsiasi prodotto elettronico, è un intendimento che non solo ci esclude da una relazione con la terra, dal ringraziamento per i frutti che così generosamente ci dà, ma inesorabilmente avvelena prima l''anima e poi il corpo, mancando appunto una relazione, una dedizione ed un rispetto, che alla fine sono parte integrante del prodotto finale: il cibo.

    Ridurre il cibo ad un combustibile è un suicidio, abbandonare la terra è solo preparare un esilio volontario ed inconsapevole.


              privacy policy        
    Privacy Policy

    The privacy of our visitors to this website is important to us.
    At this website, we recognize that privacy of your personal information is important. Here is information on what types of personal information we receive and collect when you use and visit this website, and how we safeguard your information. We never sell your personal information to third parties.

    Log Files
    As with most other websites, we collect and use the data contained in log files. The information in the log files include your IP (internet protocol) address, your ISP (internet service provider, such as AOL or Shaw Cable), the browser you used to visit our site (such as Internet Explorer or Firefox), the time you visited our site and which pages you visited throughout our site.

    Cookies and Web Beacons
    We do use cookies to store information, such as your personal preferences when you visit our site. This could include only showing you a popup once in your visit, or the ability to login to some of our features, such as forums.

    We also use third party advertisements on this website to support our site. Some of these advertisers may use technology such as cookies and web beacons when they advertise on our site, which will also send these advertisers (such as Google through the Google AdSense program) information including your IP address, your ISP , the browser you used to visit our site, and in some cases, whether you have Flash installed. This is generally used for geotargeting purposes (showing New York real estate ads to someone in New York, for example) or showing certain ads based on specific sites visited (such as showing cooking ads to someone who frequents cooking sites).

    DoubleClick DART cookies
    We also may use DART cookies for ad serving through Google’s DoubleClick, which places a cookie on your computer when you are browsing the web and visit a site using DoubleClick advertising (including some Google AdSense advertisements). This cookie is used to serve ads specific to you and your interests (”interest based targeting”). The ads served will be targeted based on your previous browsing history (For example, if you have been viewing sites about visiting Las Vegas, you may see Las Vegas hotel advertisements when viewing a non-related site, such as on a site about hockey). DART uses “non personally identifiable information”. It does NOT track personal information about you, such as your name, email address, physical address, telephone number, social security numbers, bank account numbers or credit card numbers. You can opt-out of this ad serving on all sites using this advertising by visiting http://www.doubleclick.com/privacy/dart_adserving.aspx

    You can choose to disable or selectively turn off our cookies or third-party cookies in your browser settings, or by managing preferences in programs such as Norton Internet Security. However, this can affect how you are able to interact with our site as well as other websites. This could include the inability to login to services or programs, such as logging into forums or accounts.

    Deleting cookies does not mean you are permanently opted out of any advertising program. Unless you have settings that disallow cookies, the next time you visit a site running the advertisements, a new cookie will be added.
              Comment on Sansar Creator Beta: personal thoughts by Sue W        
    Yeah, Ebbe Altberg was so careful in (not) showing things too early, in order to have a good start and good first impression. So it was surprising that they opened it in this way, rather to wait more and to accept extra testers. - getting info from those feedbacks before the release - understanding with more users what impression gives your product in those first critical 5 minutes for user retention - adjusting the presentation according, and maybe developing the product something further, finding possible solutions, and be readier for the open phase. They may have had their reasons to go out so early, but it backfired a bit. Plus, there were ambiguous wording and announcements. While E. A. and Linden Lab were pretty clear in telling (since the very beginning) that it wasn't going to be SL 2.0 (indeed it turned out more SL-like than I thought, I was expecting something more aimed at showcasing things in VR at first, although more recently they seemed to give more emphasis to the VR social aspect), recently their wording didn't help against wrong expectations. Inara somewhere noted (I can't remember exactly her words) that while Sansar was announced to be going to do something new, actually those things were done in SL already. Then they announced this as beta. Actually it has been named "Creator Beta" (which can be a confusing term already), but in the news it became "Open Beta". On other hand, Linen Lab itself announced it titling the news <em>"Open Beta Begins for Sansar"</em> No wonder that, after 3 years of development, there were different expectations for an "open beta" (that actually was something else). Also in the recent talks, telling that Sansar engine runs as fast as SL, but with better graphic is a bit misleading as well, because not every SL user is running Second Life in ultra graphics (I suspect it's a minority). So this can lead to further wrong expectations and disappointments. And so on. As for the loading times, they appear long on gaming machines too. My computer specs meet the hardware requirements. My connection speed too: "10 Mbps recommended; 5 Mbps minimum." while mine is 12 Mbps. Yet it still "takes ages" to load experiences (up to 15 minutes). As Inara writes, the aim is a broader audience than Second Life, so I don't think these aspects help to reach this goal. However they could add graphic settings, progressive loading and whatever come to their mind in future.
              20 of my Favorite Free Online Tools for Writers        

    Once upon a time, the typewriter was the only piece of technology a writer had to make his work easier. Now we not only have computers, but we can also access an endless array of useful writing tools on the Internet. Best of all, many of these web applications are absolutely free! But it takes […]

    O conteúdo 20 of my Favorite Free Online Tools for Writers aparece primeiro em ActiveMedia.is/Digital and everything else.


              Comment on When Some Websites Do Not Open On Your Computer – Troubleshooting Guide by چطور مشکل باز نشدن سایت ها در مرورگرهای مختلف را رفع کنیم؟ - روژان        
    […] منبع […]
              EQUIPMENT FINANCING        
    Equipment financing




    Equipment financing
    Setting up or extending an established company can be an overwhelming experience.  In determining the right route you will require to pre-plan what sort of equipment to purchase but more essentially how to pay for it. Will you be able pay money or will development Equipment financing be required? Is it wiser to buy new equipment or will renovated or utilized equipment is a greater worth.
    Not able to pay out cash is quite normal and generally the need to search out for an equipment finance company is the finest option. In searching for Equipment financing you will want to have a crystal clear understanding of what your business requires in the way of tools and equipment and how your cash flow will enable you to purchase it.


    equipmentment financing
    Figure out the Kind of Equipment You Require
    Your equipment finance firm will require knowing specifically what type of equipment you plan to purchase, as they'll customize the fund terms to match up the requirement. Different kinds of equipment will have distinct kinds of financing. For instance, if you are planning to update your computer system the finance company may offer you short term funding as computer system equipment gets outdated in a small amount of time. The purchase of a heavy vehicle like truck may possibly have a considerably longer lifespan and be able for lengthier term financing.
    Think about Used or Renovated Equipment
    As soon as you determine how much equipment to buy, the brand-name you want, how much your funds can support, etc., you'll then need to make a decision if buying new or used equipment is the perfect path to follow.
    Renovated or utilized equipment could possibly be an excellent option, particularly if the main use is to be used as a support to your current equipment and not put into use on a regular basis.

    Equipment finance
    Don't assume all Financing Organizations are similar
    Since you know, what you need and have determined between renovated or new it is time to start exploring financing organizations. A great place to begin with is the standard bank that preserves your business bank checking account. But they might not provide the most appealing funding solutions it may provide a good contrast to an organization that is an equipment finance expert. Simply because it is all that they do, an Equipment financing organization will be more experienced than a traditional bank with respect to your particular business and equipment demands. Search for a organization that preserves its own underwriting department since these organizations are more able to answer to your inquire for Equipment financingfaster than if they had to send the application out of the department for evaluation. The final result will be you have your financing faster and shipping of your new equipment won't be deferred due to funding.
    key of finance
    If you aren't in a position to buy new or renovated equipment a different option usually provided by Equipment financingorganizations is equipment renting. This is a good option for a temporary business, someone only getting started or where tax advantages come into play. They have the practical experience and understanding to assist you in financial judgments that are correct for you.
    Edit
              Who Sets Policy?        
    In April the New York Times Magazine ran an article Is it O.K. to Tinker with the Environment to Fight Climate Change?  The article asks about the ethics of even running tests on such methods and has this quote froms David Battisti, an atmospheric scientist at UW.
    Name a technology humans have developed that they haven't used. I can't think of any. So we can work on this for sure. But we are in this dilemma: Once we do develop this technology, it will be tempting to use it.
    The article skirts the question on who makes this decision. Maybe the United Nations after some unlikely agreement among major powers. But what if the UN doesn't act and some billionaire decides to fund a project?

    As computer scientists we start to face these questions as software in our hyper-connected world starts to change society in unpredictable ways. How do we balance privacy, security, usability and fairness in communications and machine learning? What about net neutrality, self-driving cars, autonomous military robots? Job disruption from automation?

    We have governments to deal with these challenges. But the world seems to have lost trust in its politicians and governments don't agree. How does one set different rules across states and countries which apply to software services over the Internet?

    All too often companies set these policies, at least the default policies until government steps in. Uber didn't ask permission to completely change the paid-ride business and only a few places pushed back. Google, Facebook, etc. use machine learning with abandon, until some governments try and reign them in. The Department of Defense and the NSA, in some sense industries within government, set their policies often without public debate.

    What is our role as computer scientists? It's not wrong to create the technologies, but we should acknowledge the ethical questions that come with them and what we technically can and cannot do to address them. Keep people informed so the decision makers, whomever they be, at least have the right knowledge to make their choices.
              Graduation from the Other Side        

    I've attended many graduations in my time, mostly as faculty, a couple of times as a student or a brother. This last weekend I attended my first university graduation as a parent as my daughter Annie graduated from Brandeis University in Waltham, Massachusetts. Brandeis has a big graduation ceremony with lots of speeches and then different departments or groups of departments have their own diploma ceremonies with their own speakers and where they give out the actual diplomas.

    Brandeis gives out a number of honorary doctorates each year and for the first time gave one to a computer scientist, Turing Award Winner Leslie Lamport. Lamport received his PhD at Brandeis in math in 1972 before they had a CS deparment but now he has an (honorary) PhD in Computer Science. Lamport gave an eight-minute talk in the School of Science ceremony. But when you are a parent the weekend is about your child and my daughter didn't graduate from the school of science so I didn't see the Lamport talk.

    In the main ceremony, Brandeis has not only an undergrad give a speech but also a grad student. Sounds like a crazy idea, but Vivekanand Vimal, Neuroscience PhD, gave what could be best described as a performance art. Since I can't find the video of Lamport and you probably don't want to see my videos of Annie, enjoy the new Dr. Vimal's ode to the craziness of the PhD and saving society.


              Fitness and Exercise Prevent Disease        
    Fitness and exercise prevent disease. That is a proven fact, and yet more Americans than ever are suffering from obesity and type two diabetes are considered an epidemic in the United States. If you are overweight, and especially if you are obese, or if you’ve been diagnosed with diabetes, then listen to your doctor and begin a regular fitness and exercise program. You’ll be glad you did.

    One of the benefits of fitness and exercise, as any physician will tell you, it that fitness and exercise help control blood sugar. A diabetic who takes medication daily may find that less medication is needed with a regular fitness and exercise program. Many diabetics who stay with fitness and exercise programs find that they are able to quit the medication and get their diabetes under control in a totally natural way.

    Triglycerides are also too high for most Americans. High triglycerides are linked to heart disease, including heart attacks and strokes. A great natural way to reduce your level of triglycerides is to simply begin and stick with a fitness and exercise program, while eating a sensible diet. Triglycerides at too high a level are also linked to high blood sugar, and it is common for diabetics to have high triglyceride levels. Therefore, in this case fitness and exercise can take care of two potential health risks at the same time.

    Many people have marveled at the way being over weight has become an American way of life, and wondered what caused it. Many point to sedentary lifestyles, working in front of computers, and watching too much television. In addition, many Americans eat diets high in fat and carbohydrates. Whatever the root causes fitness and exercise can be a major part of the cure for this problem. Engaging in physical activity, increasing the heart rate, and just getting active can help a person loose weight, control triglyceride levels and improve diabetes and should not be ignored. Parents should restrict time spent by children with video games or watching television and encourage them to engage in fitness and exercise the way children in past generations have, playing games like baseball, basketball and jump rope. Children who learn the benefits of fitness and exercise at an early age will go into adults, who enjoy fitness and exercise, lead healthier lifestyles and tend to live longer, healthier and obviously happier lives.
              Car As Platform        
    LTE Will Let Your Car’s Computer Update Like Your Smartphone. Think about it: The average person hangs onto a car for about 11 years. The average lifespan of a computer or tablet or smartphone is, what, three at the high end? So that super-slick infotainment setup in the center console is gonna feel pretty dated […]
              My 10 Favorite Things About Living and Teaching in Korea        
    I'm two days away from leaving Korea. In two years of living here, I have developed deeply ambivalent feelings about both my experience here and the society itself. A couple days ago, I was re-reading The Prophet, and I was surprised to find a section that echoed my feelings about leaving Korea:

    The hero has been in a strange land for twelve years and upon seeing the ship that will return him to his homeland...

    "the gates of his heart were flung open, and his joy flew far over the sea. And he closed his eyes and prayed in the silences of his soul.

    But as he descended the hill, a sadness came upon him, and he thought in his heart: How shall I go in peace and without sorrow? Nay, not without a wound in the spirit shall I leave this city.

    Long were the days of pain I have spent within its walls, and long were the nights of aloneness; and who can depart from his pain and his aloneness without regret?

    Too many fragments of the spirit have I scatterd in these streets, and too many are the children of my longing that walk naked among these hills, and I cannot withdraw from them without a bruden and an ache.

    It is not a garment I cast off this day, but a skin that I tear with my own hands.

    Nor is it a thought I leave behind me, but a heart made sweet with hunger and with thirst.

    Yet I cannot tarry longer.

    The sea that calls all things unto her calls me, and I must embark.

    For to stay, though the hours burn in the night, is to freeze and crystallize and be bound in a mould."

    A bit dramatic perhaps, but it really nails how I'm feeling. But, moving along... last week I posted my 10 least favorite things about living and teaching here, and here are my 10 favorite things about living and teaching here, plus a few runners-up.

    Runners-up

    Ice cream bars -- This didn't make the top ten because it has been absolutely disastrous for my fitness. At every convenience store, and they're everywhere, there is a freezer full of delicious ice cream on a stick in every flavor you could imagine and more (one of my favorites is a chocolate bar on a stick, surrounded with "nano-silver vanilla", coated with chocolate and peanuts, another is melon, another still is watermelon flavored and shaped ice cream with hazelnut seeds). A full price bar is 700 won ($.55), and most places sell them at half price. I don't know how that can be profitable (and I probably don't want to), but it sure does make for a delicious, fattening summer.

    Elders' robustness -- Before the monsoon came with its endless days of rain, I was playing tennis every morning with a 64 year old man that was in nearly as good of shape as I am. I never saw him eat an ice cream bar. On my way to school, I routinely see 80-something year old men and women hunched over working in the fields, digging up potatoes or planting chili pepper plants. I've never seen them eating ice cream bars either.

    Lack of zoning -- Where I come from, an area is either commercial or residential, so people end up driving a lot. Here, everything is mixed together, so people walk. On one level, it's nice to have a convenience store (with ice cream bars) in the same building as my apartment. On another level, it gets people out in the streets and creates a mixing of people and a sense of community involvement that I think we could use more of at home.

    Free time -- I am ambivalent about this. Every single day here, I've had hours of free time. I play guitar, watch TV, read, watch movies, cook, paint, play online games, meditate, etc. I have learned a lot from the reading I've done, I'm a better guitarist and singer and cook, and I'm a champion of Settlers of Catan (my online game of choice), but I'm also bored a lot and frequently feel like I'm wasting my life away. It is that feeling that compelled me to take the plunge into grad school at the end of my contract here.

    Now, to the top ten....

    10. Gardens everywhere --
    This province, Gangwon-do, is notorious in Korea for being difficult to grow food. The people respond by growing food absolutely everywhere. Any land that is less than a 15% incline and is not paved over is growing food, without exception. That's true whether it's someone's front yard, a triangle of dirt between a bridge and road, or way up in the valleys that surround the towns. They're not farms, much more like what we think of as gardens. They grow chili peppers, corn, soy beans, onions, garlic, potatoes, greens, grapes and on the occasional flat section of land, rice. This is this old couple's yard. It's worth noting that it's September and they're planting, probably the third crop of the year. I'm certain they would think we are insane for the money, effort, fertilizer and pesticides we put into grass.

    9. Jjimjilbang -- These are combination health club, sauna and recreation center. Admission is about $5 and for that you soak in hot tubs infused with jade or eucalyptus or whatever, sweat in the saunas and steam rooms, and get a sports massage or a scrub down from an old Korean man wearing nothing more than briefs. There are restaurants, but for reasons that escape me Koreans seem to prefer to pig out on hard boiled eggs at these places. There are barbers and televisions and computers and massage chairs and cold and hot rooms and salt rooms and charcoal rooms and oxygen rooms. A great place to hang out and warm up in the winter or sweat out in the summer.

    8. Outdoorsiness -- Koreans love the outdoors, whether eating squid jerky and drinking rice wine behind an apartment building, or hiking through valleys (which they have done an excellent job of protecting by concentrating in the cities the population of 50 million people in a country the size of Indiana). I love the tendency toward the outdoors, especially in summer, when restaurants pull out their plastic tables and the dining room floors spill out into the streets. The images of dozens of Koreans eating, drinking and laughing in a courtyard on a warm summer night will stay with me for a long time.

    7. The sweet kids --
    Not all of them were, but the ones that were sweet were the cutest, kindest, funnest kids I've ever known.















    6. The restaurants & the food -- A lot of foreigners here complain about the cuisine, and while I admit the flavors can get a bit monotonous (sesame oil, soy sauce, garlic and chilies), I love the food, even though much of it is off limits to me as a vegetarian. Restaurants typically specialize in just a few dishes, are usually owned and run by an old lady who might work with one other old lady to prepare the food, serve the food, clean the place and everything. My favorite restaurant in town is a place where a 4' 6" 60 year old lady serves grilled fish lettuce wraps (I'm a quasi-vegetarian here) and seems to rotate through being amused, confused, appreciative and fed-up with the foreigners that frequent her place. The prices, and there's no tax or tipping, so what you see on the menu on the wall is what you actually pay, for a typically quick meal might be $3, and unless it's a very special dish (or foreign food or drink), meals rarely exceed $10 per person.

    Every meal comes with bancheon, side dishes, that always include kimchi and usually other fermented vegetables. In a cheap place, you might just get three little kimchis, in a nicer place, it's not uncommon to get over ten bancheon, and they might include fried fish or raw octopus or other treats that can be even better than the central meal itself. In most cases, everything is shared with everyone at the table. In fact, when eating with Koreans, even glasses are shared -- it's a neat little social device... if you see that someone is bored or if you want to chat with someone that you're not sitting near, you take them your empty glass and a bottle of soju (chemically fermented rice wine) and pour them a shot, and in that manner, over a meal that might last a few hours, people move around (everyone sits on the floor) and everyone talks with everyone, everyone shares germs and everyone gets drunk.

    5. Community focus -- This is the highest ranking item that is really about Korean society, as the next four each have to do with my position here. On the whole, I'm not a big fan of Confucianism, at least as it operates in modern Korea. However, the focus on social harmony is really nice, and something that I think we North Americans could learn a lot from. Where I is the dominant pronoun in the US, we is here. Studies have shown that the different mindsets actually affect visual perception, such that Asians are more inclined to view ambiguous situations from a removed, more holistic perspective, whereas Westerners are more inclined to view the same situation from inside it, from a first person perspective. Unfortunately, because of the xenophobia here, foreigners are not always considered part of the community in the same way Koreans are, which I think makes being a foreigner here harder than it would be in a more individualistic society like the US. But, while I'm sure my Korean friends still think I'm terribly obstuse and inconsiderate, this mindset has implanted itself in my head, and I'm glad for it. I hope it stays with me through the years.

    4. Income:expenses ratio -- The salary foreigners earn teaching in Korea isn't anything special, except that foreign teachers' apartments are paid for by employers, as are airfare here and home and immigration costs. Food is cheap, entertainment (at least out here in the boonies) is scarce, and buying stuff doesn't usually make sense when you know you have to fit everything you own into two suitcases at the end of the year. Health care is nationalized and very inexpensive and the tax structure is very progressive so even those who aren't exempt pay less than 4% income tax. I have been saving almost 80% of my salary, and on top of that I'll receive about two months' bonus pay at the end of my contract. No one has gotten rich doing it, but especially for folks right out of college or when the job market at home is what it is right now, it can be a very solid financial move.

    3. Vacation time & neighboring destinations -- While I've been here, I've spent time in China, Vietnam, Laos, Japan, Thailand, and Thailand again. Spending almost the entire month of February in Thailand is about as good as it gets. And it was a relatively quick flight on a lovely Asian airline to get there.

    2. Novelty in everything -- Living here is a bit like being a child. You never really know what's going on, you don't have responsibilities the same way you would at home, you're easily surprised, and routine events are novel and exciting. It's incredibly frustrating, but also really enjoyable.

    1. Anonymity & outsiderness -- There is something comforting about knowing that no one knows you, and that no one can. If people are going to stare at me as I walk down the street, I might as well wear shorts and flip-flops and sing as I walk. If my students are going to think I'm a weird foreigner anyway, it's much easier to engage them with silly foolishness that I might hold back at home. At home, as soon as you see someone, you thin-slice their age, sex, body language, clothing, and a thousand other things and make a judgement about who they are and how they relate to you in society. In a culture as foreign as this, that's impossible. Advertising doesn't affect you, because it is designed to take advantage of the human mind's inability to stop thin slicing. And not understanding what that 16 year old girl on the bus won't stop talking about can be really nice.

    I couldn't have named this at the time, but this is what brought me back to Korea f