Second Life - BRANDS IN SECOND LIFE   

A short compilation (using the cool joystick cam feature!) of some of the branded builds in Second Life (part of a 30minute longer video) - from the likes of Reuters, BMW, Sony BMG and Ericcson, BigPond, Reebok, Vodafone, IBM, ABC TV, Showtime, Pontiac, American Apparel, Virgin, Dell, NBC, Apple (unofficial), Sears, Circuit City and AOL.
          Japan Post Group, IBM и Apple поставляют iPad и специально созданные приложения, которые помогут пожилым людям в Японии пользоваться различными услугами, общаться с близкими и вести активную жизнь   
none
          Apple и IBM заключают всемирное партнёрство для преобразования мобильных разработок в корпоративной среде   
none
          Como crear una radio por internet gratuita con Listen2myradio   

Si quieres empezar a crear tu propia radio por internet gratis, aquí te damos una opción que puede ayudar en tu búsqueda. Esta web es Listen2myradio y ofrece un servicio de streaming para que sus usuarios puedan empezar a montar su radio de manera libre y sin restricciones. Les dejamos con un tutorial.

1.- Entra a Listen2myradio y damos click en Sign Up for free account y nos registramos con nuestros datos personales. Luego tendremos que abrir nuestro correo para confirmar. Seguidamente cuando demos click en el link, nos redigirá a la web de Listen2myradio y entramos a la sección Login para acceder a nuestro panel.

radio por internet gratis

Continuar leyendo para ver todo el artículo.

2.- Cuando entremos, nos aparecerá el aviso "You need to install your radio, press here to install: here" y entraremos al area de registro. En Broadcaster y admin password pondremos la clave que nos servirá para poder transmitir. En Title va el nombre de nuestra radio (tendrá que haber más de 5 palabras). En la parte de Text 1 y Text 2 escribiremos la descripción de nuestra radio, pero como queremos ahorrarte el trabajo, rellénalo con palabras de la web Limpsum. Seguidamente en Radio Url ponemos el link que tendrá nuestra radio. Luego install.

radio por internet gratis
radio por internet gratis


3.- Si hasta acá lo hemos hecho correctamente nos aparecerá un aviso que diga "For next Step of installation PRESS HERE". Ahora tendremos que escoger con qué servidor trabajaremos: recomendado el servidor UK (United Kingdom) y damos click en here. Luego nos aparecerá los siguiente datos:

new ip of broadcast server: 78.129.233.196
Port: 7889.

Con estos datos más el broadcast password, lo ponemos en nuestro software radial. Luego damos click en Radio Details (resaltado en rojo), para configurar los últimos pasos.

 
radio por internet gratis


4.- Ya terminando con el tutorial no aparecerá el panel final donde podremos editar lo que nos indica. Como el agregado de imagen a nuestro link de la radio, editar los detalles de instalación entre otros. Ahora lo más importante es la parte de "Stream Status" siempre tiene que estar en Stream is ON (letras de color verde) para que nuestra radio online pueda activarse con los datos ya puestos.

radio por internet gratis


5.-  Ahora que tenemos lista la configuración de nuestra radio, nos vamos a nuestro software radial para colocar los datos que nos proporcionó Listen2myradio. Colocamos el server IP, Server Port y Password ya entregados anteriormente. Además de llenar datos de nuestra estación online. Luego damos OK. No nos olvidemos de escoger la calidad de sonido. Mientras más conexión de internet poseas más posibilidad de escoger calidad mayor.


radio por internet gratis


6.-  Finalizando el tutorial damos click en play de nuestro Encoder y veremos que ya podemos transmitir música de manera gratuita. Para comprobar si hemos hecho las cosas bien vamos a nuestro link de la radio (Ejm: http://nombredeestacion.listen2myradio.com) para escuchar la emisión. Eso sería todo. Ya tienes tu radio por internet de manera fácil y gratuita.


radio por internet gratis

          Apple и IBM выпускают первую серию решений IBM MobileFirst for iOS   
none
          App Designer UI/UX - IBM WebSphere   

          Membetulkan Grub Rescue Ubuntu   
Empat hari yang lalu ketika saya menginstall ulang Ubuntu saya, terjadi error grub rescue. Setelah bertanya pada om kita semua (google :v), saya berhasil menemukan solusinya. Dan sekarang saya akan membagikan solusinya bagi Anda yang terkena masalah ini juga. Tapi ini hanya untuk Ubuntu Desktop, tidak untuk Ubuntu Server. :)

Untuk memperbaiki masalah ini, Anda harus menyiapkan Ubuntu Desktop Live CD Anda karena kita akan membutuhkannya.

Catatan: Jika Anda tidak mengikuti perintah-perintah dibawah ini dengan benar, kemungkinan Anda akan mendapatkan error : /usr/sbin/grub-probe: error: cannot stat 'aufs'

Langkah-langkah yang harus Anda lakukan adalah:
1. Lakukan boot melalui Ubuntu Desktop Live CD Anda.
Jika muncul tampilan seperti ini klik "Try Ubuntu"
2. Jika tidak muncul tampilan seperti di atas, bukalah Terminal dengan menekan:
    CTRL + ALT + T

3. Ketik perintah ini di terminal: sudo fdisk -l
    Perintah tersebut akan menampilkan seluruh partisi Anda.










     Partisi dengan System berupa Linux adalah partisi untuk Ubuntu Anda.
     Pada screenshot partisi tersebut berada di /dev/sda11

4. Mount partisi ubuntu Anda dengan mengetikkan perintah:
    sudo mount /dev/sdXX /mnt  (contoh: sudo mount /dev/sda11 /mnt)

5. Lalu ketik perintah:
    sudo mount /dev/sdXX /mnt/boot

6. Mount virtual filesystems:
    sudo mount --bind /dev /mnt/dev 
    sudo mount --bind /proc /mnt/proc
    sudo mount --bind /sys /mnt/sys

7. Agar hanya grub utilities dari Live CD saja yang dieksekusi, ketik:
    sudo mount --bind /usr /mnt/usr
    sudo chroot /mnt

8. Lalu ketik:
    update-grub
    update-grub2

9. Install ulang grub
    grub-install /dev/sdX (contoh: grub-install /dev/sda tidak perlu menggunakan angkanya)

10. Verifikasi grub yang diinstall
     sudo grub-install --recheck /dev/sdX

11. Keluar dari chroot dengan menekan CTRL + D

12. Unmount virtual filesystems
     sudo umount /mnt/dev
     sudo umount /mnt/proc
     sudo umount /mnt/sys
     sudo umount /mnt/boot

13. Unmount Live CD /usr
     sudo umount /mnt/usr

14. Umount device terakhir
     sudo umount /mnt

15. Reboot
     sudo reboot

Sekian dari saya untuk hari ini, sampai jumpa lagi dilain topik. ^_^

Sumber : http://opensource-sidh.blogspot.com/2011/06/recover-grub-live-ubuntu-cd-pendrive.html
          Has IBM Watson’s AI Technology Fallen Victim to Hype?   
It's doubtful that any technology meet these inflated expectations.
          Gustav Schäfer Instagram Story ɪɪ [28.06.2017] - 🌳🌳🌳🌳   


          This is the Water: Twin Peaks, Roswell and the Siren's Song (UPDATE)   

Please tell me you're watching the new season of Twin Peaks. 

Like nearly everyone else my jaw is still on the floor after last night's episode. All the more so since it seems to very closely align with a topic I explored in great detail last year and that's the explosion of the atom bomb seeming to open some kind of doorway that allowed something dangerous to enter into our reality.

And whatever it is that crossed over seems to possess us and use us to its own ends, as we seem to be seeing in recent posts.

Lynch paints this picture in a way that simultaneously feels like a fever dream, Stanley Kubrick's lost masterpiece and some kind of bizarre MK Ultra conditioning session. As we'll see, this episode drew heavily on the work of Leslie Stevens and Joseph Stefano's Outer Limits, so much so that it played like a tribute.

It's going to take time to sort through but this series seems like a oracle. It feels less like television and more like revelation. Lynch is tapped into something very deep, very dark and very important.  


And it's only because of the conjunction of Chris Cornell's death and the return of Twin Peaks that I got thrown back down the Siren's well. I really thought I was done and good with the story but it so happened that the story wasn't done with me. 

It wasn't until I started putting some of the pieces together that I began to see how Twin Peaks, Chris Cornell and the Siren's song have been locked in a spiderweb of synchronicity since the very beginning.

Pay attention here- someone may be trying to tell us a story in the same nonlinear manner David Lynch is telling the new Twin Peaks.


Chris Cornell 's only acting credit is the Cameron Crowe film Singles. He appears onscreen with Bridget Fonda.


Bridget Fonda also appears onscreen with Bill Pullman in Singles.


Bill Pullman appears in the David Lynch film, Lost Highway, which features Elizabeth Fraser's version of 'Song to the Siren'

UPDATE: Still don't believe in the dark power of the Siren's Song?

In Lost Highway, Bill Pullman plays a musician falsely accused of murdering his wife, played by Patricia Arquette (who was cast as Jeff Buckley's mother in an unproduced biopic). Though never really explained it's implied that the Mystery Man, played by Robert Blake, is responsible for the murder.

In May 2002- same month the Jeff Buckley biography Everyone Here Wants You aired on British television- Robert Blake was accused of murdering his wife, Bonnie Lee Bakely, in back of a restaurant in Los Angeles.



Just months after David Lynch's Mulholland Dr - a film about an actress (Naomi Watts†) who has her lover killed - had depicted a memorable scene about a looming horror in back of a Los Angeles restaurant.

Mulholland Dr was originally produced as a TV movie after Lynch made Lost Highway.

Blake was acquitted on account of there was no evidence to tie him to the crime, and the only testimony came from two stuntmen associated with Bakely's former lover, the convicted murderer Christian Brando.

Brando shot and killed his sister's lover at Marlon Brando's residence on- wait for it- Mulholland Dr.

And "Bakely?"
The name Bakley belongs to the early history of Britain, its origins lie with the Anglo-Saxons. It is a product of their having lived in any of the places named Buckley, or Buckleigh, in England.
Bakely's daughters later successfully sued Blake for wrongful death. 

Lost Highway was Jack Nance's last role. He died under mysterious circumstances before the film was released. David Lynch produced a documentary in his honor, released 2002.

A special thanks to longtime Shemsu Sunner Devin. I knew there was something I was overlooking.



Patricia Arquette is featured in the Lost Highway's 'Song to the Siren' scene.



Arquette also stars in True Romance, which she plays the lover of a young man who is channeling Elvis Presley, who died in Memphis and whose statue overlooks the site of Jeff Buckley's death. Arquette was cast to play Jeff Buckley's mother in the unproduced docudrama Mystery White Boy.

True Romance also features Brad Pitt and this memorable use of Chris Cornell's MDD anthem, 'Outshined'. 


Brad Pitt appears in Jeff Buckley documentary Everybody Here Wants You, which also features Elizabeth Fraser. 

Chris Cornell's tribute to Jeff Buckley, 'Wave Goodbye,' is played on the TV series Roswell, set (of course) in New Mexico 


Roswell star William Sadler played Death in Bill and Ted's Bogus Journey, starring Keanu (or Ki-Anu) Reeves

Keanu Reeves played Buddha in Little Buddha, with Bridget Fonda and Chris Isaak 


Chris Isaak starred in Twin Peaks: Fire Walk with Me, the franchise's last chapter until 2017.


Ben Rosenfield appears in its next chapter. 


Rosenfield's first feature film role is portraying Tim Buckley in the Jeff Buckley biopic, Greetings From Tim Buckley.


Roswell's William Sadler portrays Lee Underwood (the guitarist on the Starsailor version of 'Song to the Siren') in Greetings from Tim Buckley.


Tim Buckley's first public recording of 'Song to the Siren' first heard on the "Frodis Caper" episode of The Monkees, whose plot revolved around the capture of a flying saucer. 


The 1994 TV movie Roswell revolved around the capture of a flying saucer in New Mexico. 

It aired the very same day Soundgarden played the Fox Theater in Atlanta. Cornell died after Soundgarden played the Fox Theater in Detroit.

Soundgarden performs live in Singles, playing 'Birth Ritual'. Singles co-star Bill Pullman later stars in Independence Day which centers on a UFO captured at Roswell. 


Roswell starred Kyle MacLachlan, who portrays Dale Cooper on Twin Peaks. 


Cooper emerges from the Black Lodge into a storeroom where characters played by Rosenfeld and Madeline Zima were last seen. 


Madeline Zima starred on Californication (itself loaded with Siren symbolism) alongside David Duchovny. 


David Duchovny played a cross-dressing FBI agent on Twin Peaks. He'd later play another FBI agent on The X-Files.  

Duchovny would later be replaced on The X-Files by Robert Patrick, brother of original Nine Inch Nails guitarist Richard Patrick (whose band Filter recorded the rock theme for the first X-Files movie). 



Robert Patrick first appears on X-Files same episode 'Scully's Theme' first heard, which was based on Elizabeth Fraser's 'Song of the Siren'.

 

Don Davis, who portrayed Major Garland Briggs on Twin Peaks, appeared as Scully's father on The X-Files. Davis's first appearance on The X-Files was in 'Beyond the Sea', which also guest-starred Brad Dourif. 


Brad Dourif appeared in Blue Velvet, the film where Lynch tried and failed to secure rights to Elizabeth Fraser's version of 'Song to the Siren'. That film starred Laura Dern, who also appears on the new Twin Peaks. 


Laura Dern first appears in Episode 6, which also features this very Blue Velvet-like performance by Balthazar Getty, Patricia Arquette's lover during Lost Highway's playing of  'Song to the Siren'.

'Song to the Siren' was produced by John Fryer, who also produced the prophetic 'In the Gold Dust Rush.'  

Fryer also produced the first Nine Inch Nails album.

Nine Inch Nails toured with David Bowie in 1995.



David Bowie appears in Twin Peaks: Fire Walk with Me.  

Nine Inch Nails appear on Twin Peaks episode that centers around a locust chimera that possesses a girl through the mouth.

The Nine Inch Nails' album The Downward Spiral was released the same day as Soundgarden's Superunknown

Trent Reznor appears in 2014 documentary Beautiful Noise, about Cocteau Twins and the movement they inspired.

Nine Inch Nails and Soundgarden toured together in 2014. They opened in Las Vegas.

Downward Spiral, which was recorded at Manson-massacre house 10050 Cielo Drive, features a sample from the original Texas Chainsaw Massacre on the song 'Reptile'.*



Texas Chainsaw Massacre's 2003 remake features cover of Fraser's cover of "Song to the Siren."

David Bowie and Trent Reznor sang "Reptile" as a duet on their 1995 tour.

Three days before Downward Spiral released Jeff Buckley and Elizabeth Fraser began their love affair in Atlanta, sparked by Fraser's version of 'Song to the Siren'.



Fraser is from the Falkirk council area of Scotland, which boasts two enormous statues of the Kelpie, the Scottish water-demon version of the Siren, that shapeshifts from horse to human. 

Falkirk is a half-hour's drive from Rosewell, the town that borders the Rosslyn Chapel.


 There's locusts in her honey mouth 

In the final scene of Episode 8, the possessed young girl is mesmerized by the incantation of a demon who chants an incantation that wouldn't sound out of place on Garlands: 

"This is the water and this is the well. Drink full and descend.  The horse is the white of the eyes, and dark within."

Like the Sirens and the mermaids, the entity is a chimera of a frog and a locust, both plagues that Moses brought down on Egypt in Exodus. 

Elizabeth Fraser's only solo releases are the singles 'Underwater' and 'Moses'. 


The girl in Twin Peaks is played by Tikaeni Faircrest. Tikeani is an Inuit word meaning "Wolf."

After the girl is possessed you hear horses in the desert. Or perhaps it's the Kelpie.


BONUS TIMELINE

• Blue Velvet released. Includes 'Mysteries of Love', song written when Lynch was unable to license 'Song of the Siren'. September 1986 

• Ccoteau Twins release Love's Easy Tears EP September 1986. 


+++++

• Elizabeth Fraser's first child born September 1989

• Soundgarden release first major label album Louder than Love, September 5, 1989

• Julee Cruise releases her first album Floating into the Night, featuring debut of Twin Peaks theme 'Falling'. Also features 'Mysteries of Love'. Released September 12, 1989

• Nine Inch Nails releases first single, 'Down in It', September 15, 1989

+++++


• Jeff Buckley moves to New York February 1990

• Andrew Wood dies of overdose March 1990

Twin Peaks premieres April 1990

Lynch's Wild at Heart is shown at Cannes. Laura Dern stars. May 1990



+++++

• Elizabeth Fraser and Jeff Buckley first meet in New York's Roseland Ballroom, April 1991

• Jeff Buckley makes his public debut at a tribute to late father Tim Buckley in April 1991

• Chris Cornell releases Temple of the Dog, tribute to late friend Andrew Wood, in April 1991

• Twin Peaks put on hiatus April 1991 (canceled June)

+++++

• Elizabeth Fraser and Jeff Buckley begin relationship March 5, 1994 in Atlanta.

•  Superunknown by Soundgarden and The Downward Spiral by Nine Inch Nails released March 8, 1994

• Kurt Cobain is murdered April 5, 1994. Body is discovered morning of April 8, 1994. Cocteau Twins tape appearance on Tonight Show that same afternoon.

• Soundgarden play in Paris that night, where Cocteau Twins' death-omen "Road, River and Rail" is set.

Holy Matrimony opens same day, starring Lost Highway's Patricia Arquette and Joseph Gordon-Levitt. Levitt would later star in UFO-themed Mysterious Skin which features Cocteau Twins' 'Crushed' and score by Cocteau Twin (and Fraser's ex-husband) Robin Guthrie 


+++++

• Trent Reznor clashes in media with Courtney Love over liaison, Spring 1995

X-Files airs Roswell-themed 'Anasazi', set in New Mexico, featuring actor Bernie Coulson, who former roommate Brad Pitt based his character in True Romance onSpring 1995

• Courtney Love and Jeff Buckley date, Spring- Summer 1995

• David Bowie and Nine Inch Nails tour begins featuring duet on 'Reptile'
early September 1995 

• Cocteau Twins release Elizabeth Fraser's love letters to Jeff Buckley, Twinlights and Rilkean Dreams, September 1995

+++++

Lost Highway, featuring 'Song of Siren' released February 1997

The X-Files airs UFO-capture two-parter in March 1997, guest-starring Tom O'Brien, who later stars on The Dead Zone, whose theme song is Jeff Buckley's 'New Years Prayer', from album co-produced by Chris Cornell.

• Chris Cornell quits Soundgarden in April 1997

• Elizabeth Fraser records 'Teardrop', a love letter to Jeff Buckley, same day he drowns in May 1997

Air Force Roswell Report released June 1997

+++++

Twin Peaks revival announced 2014

• Soundgarden and Nine Inch Nails tour together 2014

• Cocteau Twins documentary Beautiful Noise released 2014

+++++


X-Files Season 11 schedule announced May 15, 2017 

• Chris Cornell dies near site of Siren-like legend May 18, 2017

Twin Peaks, the Return Premieres May 21, 2017, featuring Cocteau Twins wannabe's Chromatics

•  70th anniversary of Kenneth Arnold UFO sighting, June 24, 2017

• Nine Inch Nails appear on interdimensional-themed episode of Twin Peaks, June 25, 2017

• Elizabeth Fraser to make first public appearance in 5 years, July 23, 2017, the day of the   rising of Sirius, to talk about Blue Bell Knoll, whose title comes from fairy lore.



The published lyrics for the song NIN played on Twin Peaks reuses a lyric from 'Reptile': "she leaves a trail of honey to show me where she's been." That line is not on the final recording. 

Spirit possession, honey, mouth, locusts. Oh, plus gold that isn't really gold. Why does that all sound so familiar?


† Naomi Watts is married to my wife's second cousin, Liev Schreiber. Bonnie Lee Bakely is from my old stomping grounds Morristown, which is also Richard Hoagland's birthplace.

          The Present Can Only Be Viewed from the Past   


2017 might seem like the hangover after a particularly-nasty meth, glue and Thunderbird bender, but it's actually a year of major anniversaries. We're coming up on the 70th Anniversary of Kenneth Arnold and Roswell (as well as the National Security Act), the 50th Anniversary of Sgt. Pepper and the Summer of Love and the centennial of the Russian Revolution. But there are a lot more observances, all kinds of 'ennials to observe. 

I thought I'd dig into a few anniversaries germane to The Secret Sun and the topics we look at here. Readers are encouraged to weigh in with their own (observations that can be counted in multiples of five and ten, that is) in the comments.

December will see the fifth anniversary of the 2012 apocalypse/ascension/ absurdity (depending on your point of view). Needless to say, most of us are still here and the skies didn't open and Nibiru didn't come crashing into the moon. So there goes another apocalypse. 

I can't help but wonder about the 2012 meme, though. As I wrote a couple years back, it certainly seems like something changed that year, that the bottom fell out somewhere but no one seemed to notice it at the time. 

I mean, Donald Trump is sitting in the White House, isn't he? If even you're a Trump supporter you have to admit this would have seemed impossible five years ago.

Maybe the Apocalypse works on a different timeline than it does in the movies. Maybe we're living in one only we can't see the forest fire for the burning trees. History can only be written from a distance.

2007 was the year Our Gods Wear Spandex was published and the year I began actively blogging on this site, so Happy Ten Year Anniversary to me. It's also the year that a newly-elected Senator - with a weird, oblique connection to the Council of Nine - announced his candidacy for President.


This week marks the 20th anniversary of the Heaven's Gate suicides, an event I've gone into some detail on this blog. Whatever the media might have you believe the Gate were a bonafide modern Gnostic sect, were serious and rigorous about their work and were deeply troubled by the emergence of the techno-surveillance state they saw emerging at the time. 

This week also marks the 20th anniversary of the last of the Order of the Solar Temple "suicides" ( rendered in quotes since many investigators suspect foul play by outside parties with the OST mass deaths). I wrote in some detail about the OST and their influence on pop culture here (the X-Files writers seemed especially fascinated with the OST and their unique status and history and the lingering questions over their deaths).

Postmortem reports claimed that the OST committed ritual suicide in order to spiritually ascend to Sirius, where they believe their souls originated from. If this is true this is another troubling link to the "Walk-Ins from Sirius" theme from Ruth Montgomery's seminal Aliens Among Us, which has also been linked to the Heaven's Gate suicides.

Last week marked the 20th anniversary of the Phoenix Lights flap, a controversial UFO sighting that caused a major media meltdown and has been the focus of a growing mythology ever since. What is particularly interesting about the Phoenix episode- however you view it-- is that it took place right down the highway from the Heaven's Gate compound in Rancho Santa Fe, CA. 

It may have been seen as the final sign that their ride was here, seeing as how the web-savvy cult was monitoring all kinds of infostreams for omens and portents. 

Next week also marks the 20th anniversary of the Outer Limits episode "Double Helix," which plays out like an idealized fantasy world version of Marshall Applewhite's most cherished beliefs. 

Seeing as how the suicides were discovered before its airing it plays like an elegy, a bizarre epitaph for the cult, its leader and their beliefs. How the hell that happened is anyone's guess.

Speaking of double helixes, 1997 saw the announcement that the first major cloning had been done, of "Dolly" the sheep. The news was broken in Roslin, Scotland, of all places (Dan Brown fans take note). More ominously it was also the year IBM's Deep Blue beat Garry Kasparov in chess. 

Coincidentally or not, Steve Jobs returned to Apple a few months later and changed the world as we knew it. One of his last projects was designing the Apple HQ, which looks like a friggin' flying saucer.

Why do all those events feel so closely entwined? We can't say we weren't warned.



1987 is the 30th anniversary of the publication of Whitley Strieber's seminal autobiography Communion, which brought the concept of alien abduction out of the fringes and into book store in America and other parts of the world. 

It's hard to explain to younger people what a phenomenon this book was, the controversy it engendered, and the effect it had on the culture. Strieber was a well-known author of best-selling horror novels, a couple of which had been adapted into movies (Wolfen and The Hunger) but never enjoyed a success like Communion, which stayed on the New York Times best-sellers list for months and sold millions worldwide.

Daytime talkshows were suddenly fora for abductees, whether real or imagined, as were popular tabloid TV shows like Unsolved Mysteries. The craze made celebrities out of Strieber, abduction researchers like Budd Hopkins and David Jacobs and later, Harvard psychologist John Mack. 

Oldline UFO researchers stewed on the sidelines, having traditionally regarded abduction reports with suspicion, if not contempt. Communion would lead to other projects, the Travis Walton biopic Fire in the Sky, The X-Files (which became an even greater phenomenon than Strieber's book), and the Steven Spielberg maxi-series Taken (which would be the SciFi Channel's most-watched series at the time of its airing).



1987 was also the year New Age seeped into the mainstream and has been insidiously rewriting its host body like a computer virus ever since. Pop culture was the medium yet again- a miniseries based on Shirley MacLaine's "spiritual authobiography" Out On a Limb was aired on ABC and planted the seeds for the Me Generation's catch-as-catch-can Theosophy 2.0. 

1987 saw "Ramtha" go wide with the publication of JZ Knight's autobiography, A State of Mind. Channeling soon became a multimiilion dollar industry, with hundreds of mini-Ramtha's popping out of the woodwork dispensing greeting card homilies for a spiritually-indiscriminate polity.

All you needed to do was squint, loll your head around meaningfully, adopt a weird quasi-British accent and learn to spout pseudo-profoundities and you were in clover.

Again, the New Age craze is hard to explain today, though in large part because the New Age is so ubiquitous today it's woven into the cultural fabric of most Western- and many non-Western- cultures. 

Yoga studios can be found in every sizable American town. Acupuncture and other "alternative" modalities are often covered by health insurance programs. Health food stores are slowly displacing conventional supermarkets and many more traditional houses of worship offer New Age programs (meditation, yoga, self-actualization) to their congregants.

1987 also saw the Harmonic Convergence (aka the "New Age Woodstock"), meant to act as the movement's big hop over the cultural fence. But its organizers (which included the original 2012 guru, Jose Arguelles) deeply misjudged the true nature of the movement and how it actually existed in the ideational biosphere. 

This wasn't a revolution, it was a slow-moving insurrection, one that subverted culture from within, all the while denying its very existence (the hallmark of a true New Ager is that they deny actually being a New Ager). Big, showy events weren't going to do the work. Tenacious, relentless but quieter actions were going to insinuate New Age into the mainstream.



1987 saw the Iran-Contra Affair- in which arms were sold to Iran in exchange for American hostages held by Iran-controlled radicals and the profits then diverted to anti-Sandinista militants in Nicaragua- become the major news story, dominating the headlines and Sunday talk shows for the entire year and into the next. 

Iran-Contra is also arguably the impetus for the true mainstreaming of conspiracy theory (just in time for the dawning of the Internet Era). Conspiracy research wasn't a fringe hobby then, it was front page news all across the world. It's just that the virus escaped from the lab and filtered down into places the mainstream media would have rather it hadn't.

But the real groundwork for the rise of conspiracy culture would be laid ten years earlier when the first fully-functional home computer, the Commodore PET was debuted at a trade show. 

Conspiracy theory may have thrived on talk radio (and short wave and ham radio, not to mention mail order) but it would explode on the Internet, even in the crudest venues of the BBS dial-in days.

At the same time the Commodore was unveiled, a new President from Plains, Georgia took office who swore to tear the lid off government corruption (and significantly, UFO secrecy) in Washington. 

Things, predictably, wouldn't work out so well for him.

1977 saw the commoditization of the modern Hollywood blockbuster-- already having birthed itself in 1975 with Steven Spielberg's Jaws. 

George Lucas' spiritual SF epic Star Wars and Spielberg's UFO fantasia Close Encounters of the Third Kind changed the rules forever (you can throw in Saturday Night Fever if you like, as it spawned the rise of the blockbuster soundtrack as well) and, as many would argue, planted the seeds for the eventual creation empoverishment of the Hollywood they created.

In today's market, doubles and triples are no longer be enough, you need to either write a movie off as a tax loss or score a grand slam blockbuster, complete with merchandising and ancillary rights.

But Star Wars and Close Encounters were such monsters because they filled a genuine void in the culture, a need for miracle and transcendence in a rapidly-secularlizing culture. In their wake the movies would become the dream theater of the masses, in the same way the great cathedrals were to the peasants of the Middle Ages.

Both films struck at the right time- NASA tested its first space shuttle at the beginning of the year, promising a new era in space exploration. One that has yet to come to pass, 40 years later. Even so the mood was right at the time.

On the other end of the ritual spectrum 1977 also saw the arrest of David Berkowitz, whom the media named as the sole "Son of Sam" killer despite the fact that witnesses had cogently and explicitly described other shooters not matching his description. 

Berkowitz himself would later claim he was a member of a sect of the Process Church of the Final Judgement, he was not the only shooter and that the killings were human sacrifices. And as fate would have it two of the men he claimed as his accomplices would die under mysterious circumstances not long after Berkowitz was arrested. 

And their father was named Sam.

Also in the summer of 1977, Elvis Presley died after a long struggle with obesity and prescription drug abuse. 

It was poetic in a Greek tragedy kind of fashion since '77 not only saw the precipitous rise of Disco as an all-consuming craze (Donna Summer had the first hit with a totally-synthesized record, "I Feel Love," that year) but also the breakthrough of punk rock and first-wave New Wave (the Sex Pistols, the Clash, Elvis Costello and Talking Heads all released their debuts), which took the basic, four to the floor rock 'n' roll Presley cut his teeth on and wed it to postmodernism, Dada and other weird, Continental theories that old-timers like the King would never have anything to do with.

Not that most of America even noticed. The Eagles' Hotel California, Pink Floyd's Animals and Fleetwood Mac's Rumors were albums most of the public were actually buying. Punk bombed bad in its first assault on American record stores and most of the first wave bands would soon break up or radically water down their styles in a bid to make it to the US Top 40. 

New Wave, which began as a marketing ploy to ease punk into the American market, would become the musical equivalent of New Age, a contagion that would insinuate itself into the host and rewrite the matrix from within. 

40 years later New Wave concepts are so dominant (irony and sarcasm not the least among them) in pop they're no longer recognized as distinct or unique. But that process began in earnest over 35 years ago, when MTV began beaming art school weirdos from England into a growing number of American living rooms. 

In short order even Jethro Tull and Bob Dylan- the onetime crunchiest of the crunchy- were recording with drum machines and sequencers.

There's more to come. 




          Read Download Notes on Democracy (Large Print Edition) Ebook Full   

0 - Download Notes on Democracy (Large Print Edition) Ebook Free Online





Alternative Download Link - Notes on Democracy (Large Print Edition)


Gratuit Food Ideas, Recipe Nutrition Facts SELF Find the best recipe ideas, videos, healthy eating advice and cooking techniques from our experts, all on SELF. Atmel AVR 8 bit and 32 bit Microcontrollers Atmel AVR 8 bit and 32 bit microcontrollers deliver a unique combination of performance, power efficiency, and design flexibility for a wide range of applications. CBSE Class 9 10 Editing Exercise 2 blogspot.com Blog provides NCERT solutions, CBSE, NTSE, Olympiad study material, model test papers, important Questions and Answers asked in CBSE examinations. Airfoil Comparison Airfoil Comparison. Select airfoils from the airfoil database or add your own airfoils and compare the airfoil shape and lift drag polars. Fallout 4 holodisks and notes Fallout Wiki Fandom ... This page lists all holodisks and notes in Fallout 4. The content is not described in full detail on this page. For details, please see the respective articles. Linear Technology Application Notes Application Notes. To search our Application Notes, either browse the list below or type a Keyword or Part Number into our search box at the top right of this page. 3 people fired by Trump were all investigating ... Axios Join AXIOS to save stories for later, get personalized news, and more! Detroit Tigers notes: News is good for injured trio Tigers manager Brad Ausmus received some encouraging news about a couple players on the disabled list. J.D. Martinez, who has been on the disabled list since the ... The Rise of American Industry [ushistory.org] Some have called Sam Slater's mill the birthplace of the American Industrial Revolution. During the first 30 years of the 1800s, American Industry was truly born ... Global Positioning System Overview These materials were developed by Peter H. Dana, Department of Geography, University of Texas at Austin, 1994. These materials may be used for study, research, and ... Mike Millss Anti Hollywood Family Films The New Yorker Mike Millss Anti Hollywood Family Films In 20th Century Women, the director of Beginners reimagines his complex relationship with his mother. IBM Collaboration Solutions Lotus Software IBM Collaboration Solutions, formerly known as IBM Lotus Software, delivers business collaboration software through enterprise social and mail solutions. Passive voice English Grammar Guide EF Functions of the passive voice The passive voice is used to show interest in the person or object that experiences an action rather than the person or object that ... 40th Anniversary Tour Announced! TomPetty.com News Tom and the Heartbreakers are pleased to announce the first dates of their 40th Anniversary Tour. Tom announced the tour on The Tonight Show Starring Jimmy Fallon ... Java SE 6 Update 12 Release Notes. Oracle The full internal version number for this update release is 1.6.0_12 b04 (where "b" means "build"). The external version number is 6u12. This release contains Olson ... VueScan 9 Release Notes VueScan supports raw scan files for the digital cameras in the following list. However, note that the colors may will be more accurate if you use an IT8 camera target ... Study Guides and Strategies Welcome to the Study Guides and Strategies Website! Helpful hint: with print preview and print, all navigation, banners and ads are deleted; only the helpful content ... ASP.NET MVC 4 Microsoft Docs This document describes the release of ASP.NET MVC 4 . ASP.NET MVC 4 for Visual Studio 2010 can be installed from the ASP.NET MVC 4 home page using the Web Platform ... The Mesentery: The Human Body's 79th Organ? D brief Editors note: For a deeper exploration of the mesentery including if it should actually be called our 79th organ click here. To the 78 ... 2014 Chevrolet Camaro 2SS Coupe review notes Autoweek 2 of 7 The 2014 Chevrolet Camaro 2SS Coupe is equipped with a 6.2 liter V8, pushing out 426 hp with 420 lb ft of torque. VirtualDub 1.10.4 released virtualdub.org "my work on VirtualDub has been very slow, which I apologize for, but I'd like to thank everyone" We thank you, sir. I've been using VirtualDub for ten years and I ... Recording Technology History Audio Engineering Society 1907 The Dictaphone Corporation was organized when the Columbia Graphophone Co. sold its business machine division. 1908 John Lomax, on his first trip west ... Lecture Notes in Computer Science Springer The series Lecture Notes in Computer Science (LNCS), including its subseries Lecture Notes in Artificial Intelligence (LNAI) and Lecture Notes in Bioinformatics (LNBI ... Aaron Hernandez Notes: Wrote Incoherent Suicide Letter ... Aaron Hernandez Notes: Wrote Incoherent Suicide Letter To Rumored Gay Lover Kyle Kennedy? Java SE Development Kit 8, Update 101 Release Notes Release Notes for the Java SE Development Kit 8u101 release. Lipedema Karen L. Herbst, Ph.D., M.D. Lipedema is a classically thought of as a congenital fatty enlargement of the legs almost exclusively seen in women by the third decade; two cases have been reported ... Solved MCQs Notes for Preparation of NTS Tests National Testing Service of Pakistan Preparation Notes,MCQs and Material for various posts,Past Papers 2016 2017,General Knowledge,English,Pakistan Studies,Islamic ... Visual Studio 2017 Release Notes Release Date: June 9, 2017 Visual Studio 2017 version 15.2 (26430.13) Issues Fixed in this Release. These are the customer reported issues addressed in this version: I Love Lotus Notes After realising that a lot of people are ill informed about Lotus Notes Domino and its capabilities, I have established this blog (built on Lotus Notes!). 20+ Of The Funniest Notes From Moms And Dads Bored Panda Keep on scrolling to take a look at a list of hilarious notes that parents left for their kids compiled by Bored Panda. They're bound to make you laugh, or at least ... Read/download Notes on Democracy (Large Print Edition) ebook full free online.

          Technology Portfolio Transformation Consultant-Cloud Adoption Services - IBM - United States   
Decision makers – whether CEOs, CMOs, COOs, mayors, educators, physicians and public safety officials – are turning to technology as the key to innovating their...
From IBM - Mon, 17 Apr 2017 15:56:31 GMT - View all United States jobs
          Cloud IT Operating Model Consultant - Cloud Adoption Services - IBM - United States   
Decision makers – whether CEOs, CMOs, COOs, mayors, educators, physicians and public safety officials – are turning to technology as the key to innovating their...
From IBM - Mon, 17 Apr 2017 15:56:03 GMT - View all United States jobs
          Harddisk Definition   


Hard disk drive (HDD)
A computer hard disk drive (HDD) is the mechanism that controls the positioning, reading and writing of the hard disk, which furnishes data storage. A hard disk drive -- often shortened to hard drive -- and hard disk are not the same thing, but they are packaged as a unit and either term can refer to the whole unit. Hard disk drives can be found in desktop computers, mobile devices, consumer electronics and enterprise storage arrays in data centers.
5 Data Storage Technologies to Watch in 2016
For the past 13 years, the experts at SearchStorage.com have honored the best and brightest technologies for the upcoming year. As always, we're proud to present a batch of technologies we believe will make a big impact on the data storage market.

History of hard disk drives
The hard disk was created in 1953 by engineers at IBM who wanted to find a way to provide random access to high capacities of data at a low cost. The disk drives developed were the size of refrigerators, could store 3.75 megabytes of data and began shipping in 1956. Memorex, Seagate and Western Digital were other early vendors of hard disk drive technology.
Hard disk drive form-factor size has continued to decrease as the technology evolves. By the mid-1980s, 3.5-inch and 2.5-inch form factors were introduced, and it was at this time they first became a standard in personal computers (PCs).
Hard disk drive density has increased since the technology was first developed. The first hard disk drives were able to store megabytes of data, while today they are in the terabyte (TB) range. Hitachi released the first 1 TB hard drives in 2007. In 2015, HGST announced the first 10 TB hard drive.

The Voice Tracker II ™ Array Microphone


Speech Recognition
 Mobile With Devices


BAB 1

PENDAHULUAN

1.1 Latar Belakang

Enterprise Unified Process (EUP) adalah perpanjangan varian dari Rasional Unified Proses dan dikembangkan oleh Scott W. Ambler dan Larry Constantine pada tahun 2000, terakhir dikerjakan ulang pada tahun 2005 oleh Ambler, John Nalbone dan Michael Vizdos. EUP diperkenalkan untuk mengatasi beberapa kekurangan dari RUP, yaitu kurangnya dukungan sistem dan akhir penggunaan sistem software. Jadi dua fase dan beberapa disiplin ilmu baru ditambahkan ke RUP.

1.2 Tujuan

Tujuan pelaksanaan ini adalah untuk memberikan panduan pembelajaran bagaimana, EUP merupakan implementasikan dalam suatu pengembangan perangkat lunak

1.3 Ruang Lingkup

Pengembangan aplikasi intranet potal dilakukan menggunakan metodologi Enterprise Unified Process (EUP) dengan menggunakan perangkat lunak Rational Enterprise Suite. Perangkat bantu yang digunakan adlah Rational Requisite Pro untuk menemukan dan mendokumentasikan kebuuhan user terhadap aplikasi yang akan dikembangkan dan Rational Rose untuk melakukan pengembangan kerangka aplikasi
Dalam implementasi akan dikembangkan aplikasi intranet protal untuk fullright indonesia sebagai model dan studi kasus dengan menggunakan RUP dalam proses pengembangan aplikasi, Adapu ruang lingkup pengembang Aplikasi intranet portal mencakup hal-hal sebagai :
  • Pengembangan spesifikasi dan moldul aplikasi antar muka (interface) yang menjadi penghubung antar pengguna dengan infrastruktur dan sumber daya yang dimiliki Fulbright Indonesia.
  • Pengembangan spesifikasi dan modul aplikasi perangkat bantu (tools) yang dapat diintegrasikan ke sistem seperti yang diperlukan oleh sistem.
  • Pengembangan spesifikasi database yang diperlukan oleh sistem.

BAB 2

KONSEP

Enterprise Unified Process

2.1 Pengertian Enterprise Unified Process

Enterprise Unified Process (EUP) adalah perpanjangan varian dari Rasional Unified Proses dan dikembangkan oleh Scott W. Ambler dan Larry Constantine pada tahun 2000, terakhir dikerjakan ulang pada tahun 2005 oleh Ambler, John Nalbone dan Michael Vizdos.EUP diperkenalkan untuk mengatasi beberapa kekurangan dari RUP, yaitu kurangnya dukungan sistem dan akhir penggunaan sistem software. Jadi dua fase dan beberapa disiplin ilmu baru ditambahkan ke RUP. EUP melihat pengembangan perangkat lunak bukan sebagai kegiatan mandiri, tetapi tertanam dalam siklus hidup sistem (yang akan dibangun atau ditingkatkan atau diganti), Siklus hidup TI dari perusahaan dan organziation/bisnis adlah siklus hidup perusahaan itu sendiri. Ini berkaitan dengan pengembangan perangkat lunak dilihat dari sudut pandang pelanggan.

2.2 Penurunan pada Enterprise Unified Process

2.2.1 Pengertian Rational Unified Process

Rational Unified Process (RUP) merupakan suatu metode rekayasa perangkat lunak yang dikembangkan dengan mengumpulkan berbagai best practises yang terdapat dalam industri pengembangan perangkat lunak. Ciri utama metode ini adalah menggunakan use-case driven dan pendekatan iteratif untuk siklus pengembangan perankat lunak. Gambar dibawah menunjukkan secara keseluruhan arsitektur yang dimiliki RUP. RUP menggunakan konsep object oriented, dengan aktifitas yang berfokus pada pengembangan model dengan menggunakan Unified Model Language (UML). Melalui gambar dibawah dapat dilihat bahwa RUP memiliki, yaitu:
  • Dimensi pertama digambarkan secara horizontal. Dimensi ini mewakili aspek-aspek dinamis dari pengembangan perangkat lunak. Aspek ini dijabarkan dalam tahapan pengembangan atau fase. Setiap fase akan memiliki suatu major milestone yang menandakan akhir dari awal dari phase selanjutnya. Setiap phase dapat berdiri dari satu beberapa iterasi. Dimensi ini terdiri atas Inception, Elaboration, Construction, dan Transition.
  • Dimensi kedua digambarkan secara vertikal. Dimensi ini mewakili aspek-aspek statis dari proses pengembangan perangkat lunak yang dikelompokkan ke dalam beberapa disiplin. Proses pengembangan perangkat lunak yang dijelaskan kedalam beberapa disiplin terdiri dari empat elemen penting, yakni who is doing, what, how dan when. Dimensi ini terdiri atas
Business Modeling, Requirement, Analysis and Design, Implementation, Test, Deployment, Configuration dan Change Manegement, Project Management, Environtment. 
 

Enterprise Unified Process

Oleh:
Adhy Suryo Wicaksono
Bayu Akbar
Fachri Adityo
Fajar Hidayatullah




Depok
2013




BAGIAN I
 


Kata Pengantar



Puji dan syukur kami panjatkan ke Hadirat Tuhan Yang Maha Esa, karena berkat limpahan Rahmat dan Karunia-Nya sehingga kami dapat menyusun buku ini dengan baik, serta tepat pada waktunya. Dalam buku ini kami akan membahas mengenai “ENTERPRISE UNIFIED PROCESS”
Buku ini telah dibuat dengan berbagai observasi, pencarian materi dan beberapa bantuan dari berbagai pihak untuk membantu menyelesaikan buku ini. Oleh karena itu, kami mengucapkan terimak kasih kepada semua pihak yang telah membantu dalam penyusunan buku ini.
Kami menyadari bahwa masih banyak kekurangan yang mendasar pada buku ini. Oleh karena itu kami mengundang pembaca untuk memberikan saran serta kritik yang dapat membangun kami. Kritik konstruktif dari pembaca sangat kami harapkan untuk penyempurnaan buku selanjutnya.
Akhir kata semoga buku ini dapat memberikan manfaat terhadap kita semua.
   
Daftar Isi 


BAGIAN I
Kata Pengantar
Bab 1. Pendahuluan
       1.1   Latar Belakang
       1.2   Tujuan
       1.3   Ruang Lingkup
Bagian II
Bab 2. Konsep Enterprise Unified Process
       2.1    Pengertian Enterprise Unified Process
       2.2    Penurunan pada Enterprise Unified Process
       2.2.1 Pengertian Rational Unified Process
       2.2.2 Sejarah Rational Unified Process
       2.2.3 Keuntungan Rational Unified Process
Bagian III
Bab 3
       3.1    Fase-fase Enterprise Unified Process 
       3.1.1 Inception
       3.1.2 Elaboration
       3.1.3 Construction
       3.1.4 Transition
       3.1.5 Production
       3.1.6 Retirement
       3.2    Praktik-praktik Enterprise Unified Process
Bagian IV
Bab 4 Contoh kasus fase-fase Enterprise Unified Process SMS Gateway
       4.1    Inception
       4.2    Elaboration
       4.3    Construction
       4.4    Transition
       4.5    Production
       4.6    Retirement
Bab 5 Penutup 
       5.1    Kesimpulan
DAFTAR PUSTAKA
 

BAB 1

PENDAHULUAN


1.1 Latar Belakang
 Enterprise Unified Process (EUP) adalah perpanjangan varian dari Rasional Unified Proses dan dikembangkan oleh Scott W. Ambler dan Larry Constantine pada tahun 2000, terakhir dikerjakan ulang pada tahun 2005 oleh Ambler, John Nalbone dan Michael Vizdos. EUP diperkenalkan untuk mengatasi beberapa kekurangan dari RUP, yaitu kurangnya dukungan sistem dan akhir penggunaan sistem software. Jadi dua fase dan beberapa disiplin ilmu baru ditambahkan ke RUP.


1.2 Tujuan
Tujuan pelaksanaan ini adalah untuk memberikan panduan pembelajaran bagaimana, EUP merupakan implementasikan dalam suatu pengembangan perangkat lunak


1.3 Ruang Lingkup
Pengembangan aplikasi intranet potal dilakukan menggunakan metodologi Enterprise Unified Process (EUP) dengan menggunakan perangkat lunak Rational Enterprise Suite. Perangkat bantu yang digunakan adlah Rational Requisite Pro untuk menemukan dan mendokumentasikan kebuuhan user terhadap aplikasi yang akan dikembangkan dan Rational Rose untuk melakukan pengembangan kerangka aplikasi
Dalam implementasi akan dikembangkan aplikasi intranet protal untuk fullright indonesia sebagai model dan studi kasus dengan menggunakan RUP dalam proses pengembangan aplikasi, Adapu ruang lingkup pengembang Aplikasi intranet portal mencakup hal-hal sebagai :
  • Pengembangan spesifikasi dan moldul aplikasi antar muka (interface) yang menjadi penghubung antar pengguna dengan infrastruktur dan sumber daya yang dimiliki Fulbright Indonesia.
  • Pengembangan spesifikasi dan modul aplikasi perangkat bantu (tools) yang dapat diintegrasikan ke sistem seperti yang diperlukan oleh sistem.
  • Pengembangan spesifikasi database yang diperlukan oleh sistem.


BAB 2 

Konsep

Enterprise Unified Process


2.1 Pengertian Enterprise Unified Process
Enterprise Unified Process (EUP) adalah perpanjangan varian dari Rasional Unified Proses dan dikembangkan oleh Scott W. Ambler dan Larry Constantine pada tahun 2000, terakhir dikerjakan ulang pada tahun 2005 oleh Ambler, John Nalbone dan Michael Vizdos.EUP diperkenalkan untuk mengatasi beberapa kekurangan dari RUP, yaitu kurangnya dukungan sistem dan akhir penggunaan sistem software. Jadi dua fase dan beberapa disiplin ilmu baru ditambahkan ke RUP. EUP melihat pengembangan perangkat lunak bukan sebagai kegiatan mandiri, tetapi tertanam dalam siklus hidup sistem (yang akan dibangun atau ditingkatkan atau diganti), Siklus hidup TI dari perusahaan dan organziation/bisnis adlah siklus hidup perusahaan itu sendiri. Ini berkaitan dengan pengembangan perangkat lunak dilihat dari sudut pandang pelanggan.
2.2 Penurunan pada Enterprise Unified Process

2.2.1 Pengertian Rational Unified Process
Rational Unified Process (RUP) merupakan suatu metode rekayasa perangkat lunak yang dikembangkan dengan mengumpulkan berbagai best practises yang terdapat dalam industri pengembangan perangkat lunak. Ciri utama metode ini adalah menggunakan use-case driven dan pendekatan iteratif untuk siklus pengembangan perankat lunak. Gambar dibawah menunjukkan secara keseluruhan arsitektur yang dimiliki RUP. RUP menggunakan konsep object oriented, dengan aktifitas yang berfokus pada pengembangan model dengan menggunakan Unified Model Language (UML). Melalui gambar dibawah dapat dilihat bahwa RUP memiliki, yaitu:
  • Dimensi pertama digambarkan secara horizontal. Dimensi ini mewakili aspek-aspek dinamis dari pengembangan perangkat lunak. Aspek ini dijabarkan dalam tahapan pengembangan atau fase. Setiap fase akan memiliki suatu major milestone yang menandakan akhir dari awal dari phase selanjutnya. Setiap phase dapat berdiri dari satu beberapa iterasi. Dimensi ini terdiri atas Inception, Elaboration, Construction, dan Transition.
  • Dimensi kedua digambarkan secara vertikal. Dimensi ini mewakili aspek-aspek statis dari proses pengembangan perangkat lunak yang dikelompokkan ke dalam beberapa disiplin. Proses pengembangan perangkat lunak yang dijelaskan kedalam beberapa disiplin terdiri dari empat elemen penting, yakni who is doing, what, how dan when. Dimensi ini terdiri atas
Business Modeling, Requirement, Analysis and Design, Implementation, Test, Deployment, Configuration dan Change Manegement, Project Management, Environtment.



Pada penggunaan kedua standard tersebut diatas yang berorientasi obyek (object orinted) memiliki manfaat yakni:
  • Improve productivity Standard ini dapat memanfaatkan kembali komponen-komponen yang telah tersedia/dibuat sehingga dapat meningkatkan produktifitas
  • Deliver high quality system Kualitas sistem informasi dapat ditingkatkan sebagai sistem yang dibuat pada komponen¬komponen yang telah teruji (well-tested dan well-proven) sehingga dapat mempercepat delivery sistem informasi yang dibuat dengan kualitas yang tinggi.
  • Lower maintenance cost Standard ini dapat membantu untuk menyakinkan dampak perubahan yang terlokalisasi dan masalah dapat dengan mudah terdeteksi sehingga hasilnya biaya pemeliharaan dapat dioptimalkan atau lebih rendah dengan pengembangan informasi tanpa standard yang jelas.
  • Facilitate reuse Standard ini memiliki kemampuan yang mengembangkan komponen-komponen yang dapat digunakan kembali untuk pengembangan aplikasi yang lainnya.
  • Manage complexity Standard ini mudah untuk mengatur dan memonitor semua proses dari semua tahapan yang ada sehingga suatu pengembangan sistem informasi yang amat kompleks dapat dilakukan dengan aman dan sesuai dengan harapan semua manajer proyek IT/IS yakni deliver good quality software within cost and schedule time and the users accepted.
Dari gambar diatas, terlihat ada sembilan core process workflow dalam RUP. Semuanya merepresentasikan pembagian worker dan activities ke dalam logical grouping. Ada dua bagian utama yaitu process workflows dan supporting workflows. Dalam process workflows terdapat Bussiness modeling yang didalamnya dibuat dokumen bussiness process yang dipakai disebut bussiness use cases. Dokumen ini menjamin stakeholder memahami kebutuhan bisnis proses yang diperlukan.
Tujuan dari requirement workflow adalah mendeskripsikan ‘what’/apa yang harus dikerjakan oleh sistem serta membolehkan developer dan costumer untuk menyetujui deskripsi itu. Analysis&Design workflows bertujuan untuk menunjukkan ‘how/bagaimana merealisasikan sistem dalam tahap implementasi. Didalamnya kita akan menemukan problem domain juga solusi dari problem yang mungkin akan muncul dalam sistem. Hasil yang diberikan pada tahapan ini adalah design model sebagai ‘blueprint’ dari source code yang akan dibuat dan juga analysis model (optional). Implementation workflow bertujuan untuk mengimplementasikan classes dan objects dalam hubungannya dengan component, mengetest component yang dihasilkan sebagai unit, dan untuk mengintegrasikan hasil yang dibuat oleh masing-masing implementer/teams ke dalam executable system. RUP menjelaskan bagaimana kita me-reuse exiting complements atau me-implement new component sehingga membuat sistem mudah dibangun dan meningkatkan kemungkinan untuk me-reusenya. Test workflow bertujuan untuk memeriksa interaksi antar objek, penggabungan component dari software dengan tepat, dan memeriksa apakah semua kebutuhan sudah dipenuhi dengan tepat. Selain itu, test bertujuan untuk mengidentifikasikan dan meyakinkan bahwa kerusakan yang ada telah diatasi sebelum men-deploy software.
RUP menawarkan pendekatan iterative yang memungkinkan kita mengetest keseluruhan project dengan menemukan kerusakan sejak dini sehingga mengurangi cost untuk memperbaikinya. Test menghasilkan tiga macam ukuran qualitas yaitu reliability, functionality, application dan system performance. Deployment workflow dilakukan untuk menghasilkan product release dengan sukses dan aktifitas mengantar software kepada end user seperti membuat external releases dari software ,packing software, distributing software, installing software, serta membantu user memahami sistem. Aktifitas ini dilakukan pada fase transition. Dalam RUP, deployment workflow berisi paling sedikit detailnya daripada workflow yang lain. Project management menyediakan framework untuk mengatur software-intensive projects, panduan untuk planning, staffing, executing, dan monitoring projects, dan framework untuk mengatur resiko yang ada. Dikatakan sukses apabila produk tersebut dapat memenuhi kebutuhan user dan kebanyakan customer.
Configuration and change management menyediakan panduan untuk mengatur penyusunan software systems, mengatasi perubahan request management, dan dapat menjadi salah satu cara untuk melaporkan suatu kerusakan. Environment bertujuan menyediakan software development organization beserta software development environment, yang dibutuhkan untuk mendukung development team. Seperti yang kita tahu dalam software development, tujuan yang akan diraih adalah membangun/meningkatkan sebuah software sesuai dengan kebutuhan (Bussiness Process). Sedangkan sebuah proses disebut efektif jika menetapkan sebuah garis pedoman yang menjamin kualitas software yang dibangun, mengurangi resiko dan meningkatkan perkiraan kepada masalah yang mungkin muncul, serta menggunakan best practise. Rational Unified Process menawarkan dan menjelaskan penerapan six best practise yang efektif pada software development, diantaranya adalah :
  • Develop Software Iteratively Pendekatan secara iterative digunakan untuk mengurangi resiko yang dapat terjadi selama lifecycle. Setiap akhir iterasi akan diperoleh executable release yang memungkinkan keterlibatan end user dan feedback yang diberikan secara terus-menerus. Pendekatan ini juga mepermudahkan penyesuaian perubahan kebutuhan, features, maupun jadwalnya.
  • Manage Requirements Rational Unified Process mendeskripsikan bagaimana mendapatkan, mengorganisasikan, dan mendokumentasikan fungsionalitas dan batasan yang dibutuhkan. Sehingga akan memudahkan dalam memahami dan mengkomunikasikan kebutuhan bisnis.
  • Use Component-based Architecture RUP menggunakan pendekatan sistematis dalam mendefinisikan arsitektur yang menggunakan component. Karena memang proses yang dilakukan difokuskan pada awal pembangunan sebuah software. Dalam proses ini akan mendeskripsikan bagaimana menyusun arsitektur yang fleksibel, mudah dipahami, dan mengembangkan efektif software reuse.
  • Visually Model Software Proses yang dilakukan menunjukkan bagaimana memvisualisasikan model yang mencakup struktur dan kelakuan dari arsitektur dan komponen.
  • Verify Software Quality Application perfoemance dan kemampuan tahan uji yang buruk dapat menghalangi diterimanya sebuah aplikasi software. Sehingga diperlukan penelaahan lebih lanjut tentang kualitas software dengan mematuhi kebutuhan aplikasi berdasarkan kemampuan tahan uji, fungsionalitas, application performance, dan system performance.
  • Control Changes to Software Proses akan mendeskripsikan bagaimana mengontrol dan memonitor perubahan untuk kesuksesan iterative development. Selain itu, proses juga akan memandu kita bagaimana menyusun workspace yang aman bagi para developer dengan mengisolasi perubahan yang dilakukan di workspace lain dan dengan mengontrol perubahan pada seluruh software artifact. Sehingga membuat team bekerja sebagai unit tersendiri dengan mendeskripsikan bagaimana mengintegrasikan dan membangun management secara otomatis.
RUP sebagai architecture-centric. Architeture ini merupakan fokus yang dibahas pada fase elaboration yang akan dibahas pada bagian lain makalah ini. Software architecture design merupakan artifact dasar yang diperoleh dari sebuah architecture. Artifact lain yang diperoleh dari sebuah architecture ini diantaranya dapat membuat garis pedoman desain yang dipakai, struktur produk, dan team structure. Dalam merepresentasikan sebuah architecture pada software development kita menggunakan yang disebut The 4+1 view model yang telah kita kenal saat mempelajari UML. View model itu terdiri dari : logical view (dipakai oleh analyst/designer), implementation view (dipakai oleh progammer), process view (dipakai oleh system integrator), dan deployment view (dipakai oleh system engineering), serta ditambah dengan use case view (dipakai oleh end user). Keuntungan dari architecture centric process diantaranya memperbolehkan kita untuk menambah dan menambah intellectual control sebuah proyek untuk mengatur kompleksitas dan membangun system integrity. Proses arsitektur ini memiliki lifecycle phase, yang terdiri dari inception phase, elaboration phase, construction phase, dan transition phase. Setiap fase yang ada dihubungkan dengan milestone, yaitu suatu point evaluasi dari suatu tahap fase yang sudah selesai dibuat,
2.2.2 Sejarah Rational Unified Process
RUP merupakan produk proses perangkat lunak yang awalnya dikembangkan oleh Rational Software. Rational Software diakuisisi oleh IBM pada Februari 2003. Produk ini memuat basis-pengetahuan yang bertautan dengan artefak sederhana disertai deskripsi detail dari beragam aktivitas. RUP dimasukkan dalam produk IBM Rational Method Composer (RM C) yang memungkinkan untuk kustomisasi proses. Dengan mengombinasikan pengalaman dari banyak perusahaan, dihasilkan enam praktik terbaik untuk rekayasa perangkat lunak modern: Pengembangan iteratif, dengan risiko sebagai pemicu iterasi primer Kelola persyaratan Terapkan arsitektur yang berbasis komponen Visualisasikan model perangkat lunak Secara kontinyu, verifikasi kualitas Kendalikan perubahan.
2.2.3 Keuntungan RUP
Keuntungan yang didapat dengan menggunakan pendekatan iterasi diantaranya adalah : mengurangi resiko lebih awal, perubahan yang dilakukan lebih mudah diatur, higher level of reuse, project team memiliki waktu lama untuk memahami sistem yang akan dibangun, dan menghasilkan kualitas yang lebih baik di segala aspek.
RUP menawarkan berbagai kemudahan dalam membangun sebuah sotfware, ada yang disebut Six Best Practices yang terdiri dari :
  • Develop Iteratively
  • Manage Requirement
  • Use Component-based Architecture
  • Model Visually
  • Verify Quality
  • Control Changes to software
Semua proses yang dilakukan oleh RUP akan memberikan keuntungan pada tahapan membangun sebuah software. Saat melakukan perancangan sebuah perangkat lunak, tentunya setiap tahapan akan mendapatkan masalah. Biasanya gejala/symptom yang menunjukkan ada masalah dalam proses perancangan software seperti berikut :
  • Ketidak akuratan dalam memahami kebutuhan end-user.
  • Ketidakmampuan untuk menyetujui perubahan kebutuhan yang diajukan.
  • Modul-modul yang dibutuhkan tidak dapat dihubungkan.
  • Software yang sulit untuk dibangun atau diperluas.
  • Terlambat menemukan kerusakan project yang serius.
  • Kualitas software yang buruk.
  • Kemampuan software yang tidak dapat diterima.
Team members yang bekerja sendiri-sendiri sulit untuk mengetahui perubahan yang telah dilakukan karena ada perbedaan dalam membangun software tersebut. Ada ketidakpercayaan dalam membangun dan me-release proses. Usaha untuk menghilangkan symptom ini tidak akan menyelesaikan masalah yang dihadapi software developer karena gejala ini dapat terjadi oleh adanya penyebab utama masalah yang timbul saat membangun sebuah sistem, yaitu :
  • Requirement management yang tidak mencukupi
  • Komunikasi yang ambigu dan tidak tepat
  • Arsitektur yang rapuh
  • Kompleksitas yang sangat besar
  • Tidak terdeteksinya ketidakkonsistenan antara requirement,desain, dan implementasi
Pengetesan yang tidak mencukupi
  • Penilaian status project yang subjektif
  • Keterlambatan pengurangan resiko yang disebabkan waterfall development
  • Perkembangan yang tidak terkontrol
  • Otomatisasi yang kurang
Semua hambatan yang ditemui saat membangun software akan dapat diatasi dengan menggunakan best practise yang telah disebutkan di awal pembahasan. Dengan menggunakan best practise yang diterapkan oleh Rational Unified Process, akar masalah yang menyebabkan timbulnya symptom dalam software developer akan teratasi dengan baik.
Sebelum kita membahas lebih dalam mengenai Rational Unified Process, kita perlu untuk mengetahui terlebih dahulu apa maksud dari proses itu sendiri. Proses merupakan suatu tahapan yang mendefinisikan siapa yang mengerjakan apa, kapan dan bagaimana meraih suatu tujuan yang pasti. RUP merepresentasikan empat elemen dasar untuk memodelkan pertanyaan yang muncul dari sebuah proses, yaitu workers, activities, artifacts, dan workflows.
Worker mendefinisikan behavior/kelakuan dan responsibilities dari seseorang atau sebuah team. Dalam Unified Process, worker lebih diartikan sebagai bagaimana team/individual seharusnya bekerja. Sedangkan tanggungjawab bagi worker adalah melakukan serangkaian aktifitas sebagai pemilik dari sekumpulan artifact.
Activity dari spesific worker adalah sebuah unit kerja yang dilakukan seorang individu. Tujuannya cukup jelas,yaitu membuat/meng-update artifact. Setiap activity diberikan kepada spesific worker dan harus dapat digunakan sebagai elemen dalam planning dan progress software development. Contoh activity diantaranya : merencanakan sebuah iteration untuk worker Project Manager, menemukan use case dan aktor untuk worker System Analyst, dan sebagainya.
Artifact merupakan sekumpulan informasi yang dihasilkan, diubah, dan dipakai dalam sebuah proses. Artifact digunakan sebagai input bagi worker untuk melakukan activity dan juga sebagai output dari activity. Dalam object-oriented design, activities adalah operasi yang dilakukan aktif object(worker) sedangkan artifact sebagai parameter dari activities tersebut. Contoh artifact yaitu: model (uses case model), document,source code,dan lain-lain.
Workflow adalah serangkaian activities yang menghasilkan nilai hasil yang dapat terlihat. Dalam UML, workflow digambarkan dengan sequence diagram, collaboration diagram, atau activity diagram. Workflow tidak selalu dapat dipakai untuk merepresentasikan semua ketergantungan yang ada diantara activities. Karena,terkadang dua buah activities yang digambarkan dalam workflow sebenarnya sangat rapat jalinannya yang melibatkan worker yang sama padahal mungkin penggambarannya tidak terlalu tepat.

BAB 3

3.1 Fase-Fase Enterprise Unified Process


3.1.1 Inception
Tahap inception fokus pada penentuan manfaat perangkat lunak yang harus dihasilkan, penetapan proses-proses bisnis (business case), dan perencanaan proyek.
  • Menentukan Ruang lingkup proyek
  • Membuat ‘Business Case’
  • Menjawab pertanyaan “apakah yang dikerjakan dapat menciptakan ‘good business sense’ sehingga proyek dapat dilanjutkan

3.1.2 Elaboration
Tahap untuk menentukan use case (set of activities) dari perangkat lunak berikut rancangan arsitekturnya.
  • Menganalisa berbagai persyaratan dan resiko
  • Menetapkan ‘base line’
  • Merencanakan fase berikutnya yaitu construction

3.1.3 Construction

Membangun produk perangkat lunak secara lengkap yang siap diserahkan kepada pemakai.
  • Melakukan sederetan iterasi
  • Pada setiap iterasi akan melibatkan proses berikut: analisa desain, implementasi dan testing

3.1.4 Transition
Menyerahkan perangkat lunak kepada pengguna, mengujinya ditempat pengguna, dan memperbaiki masalah-masalah yang muncul saat dan setelah pengujian.
  • Membuat apa yang sudah dimodelkan menjadi suatu produk jadi
  • Dalam fase ini dilakukan: Beta dan performance testing; Membuat dokumentasi tambahan seperti training, user guides, dan sales kit; Membuat rencana peluncuran produk ke komunitas pengguna

3.1.5 Production

Selama fase ini, anda akan mempertahankan proyek, artinya dengan menjalankan usaha komunikasi, kemudian melanjutkan pelatihan dan pengjaran, dan melanjutkan pengaturan dari proses yang akan anda pelajari.


3.1.6 Retirement
Dalam fase ini terdapat pemindahan data dan sistem integrasi yang baik

3.2 Praktik Praktik Enterprise Unified Process

  • Mengembangkan iteratif
  • Mengelola persyaratan
  • Arsitektur Pembtuktian
  • Modeling/Perancangan
  • Memverifikasi kualitas secara terus-menerus
  • Mengelola perubahan
  • Pembangunan Berkolaborasi
  • Melihatlah pencapaian pembangunan
  • Memberikan perangkat lunak bekerja secara teratur
  • Mengelola risiko



BAB 4

Contoh kasus fase-fase Enterprise Unified Process SMS Gateway

4.1 Inception
Mendefinisikan Ruang Lingkup
Even though we officially finished up our schoolwork by the first Friday in June, my boys have still been reading just about every day.  Alec, in particular, has been reading up a storm and they have all picked some really great books to read lately!



The Wolf Keepers


The White Wolf


Miles Taylor and the Golden Cape


Splat the Cat; The Rain is a Pain


The X-ed Out X-ray

I have had so much fun reading this month!  With our school year ending and spending more of our days relaxing I have had a lot of time to read... and I found so many wonderful books to indulge with.


1.  All Dressed In White by Mary Higgins Clark & Alafair Burke--  I love mystery novels and this book was fantastic!  5 years after Amanda mysteriously disappears from a seaside resort just days before her wedding her family asks the show Under Suspicion to do an expose on what really happened; hoping beyond hope to finally find out what happened to Amanda on that fateful night and answer once and for all the question of whether or not she's still alive.


2.  Irresistible by Susan Mallery--Elissa is a struggling single mom who has sworn off men until her daughter is old enough to leave home.... then her new neighbor, an ex- marine, and all around helpful guy begins to lend her a hand.  Will he prove to irresistible to ignore?


3.  Distant Shores by Kristin Hannah-- When Birdie and her husband Jack Shore find themselves with an empty house and unfulfilled dreams they are left wondering how life passed them by. As they drift apart they decide to purposely spend time apart and end up on opposites sides of the United States with Jack in New York and Birdie enjoying the pacific northwest.  As they both struggle to hold onto their dreams they are unsure if they should let one another go too.


4.  Still Alice by Lisa Genova-- I watched the movie when it first came out on DVD and just loved it but I had put off reading the book; mostly because I found the movie so moving and emotional I had no idea how I would survive the book.  It was fabulous!  When Alice first begins forgetting simple everyday things she chalks it up to the onset of menopause but soon realizes that these are not run of the mill memory lapses.  The book shows her and her family's struggle to cope with early onset Alzheimer's.


5.  Delicious by Susan Mallery -- In this prequel to Irresistible I got to read all about how Penny and her ex- husband Cal reconnected and fell madly in love with one another.  Even though they both had lots of issue, secrets, and misunderstandings.


6.  Sizzling by Susan Mallery-- After reading the first two books in the series, I just knew I had to keep going!  In sizzling Reid meets his match with feisty home nurse Lori.


7.  Tempting by Susan Mallery-- I just had to finish up the series and learn what happened with black sheep of the family; Dani Buchanan.  When she discovers who her real father is, Dani must decide what to do about him and his adopted son, Alex.


8.  We Are All Made of Stars by Rowan Coleman-- Stella, a hospice nurse, finds solace writing last letters for her patients making sure that their last words and thoughts are preserved for their families.  With her husband returned from Afghanistan a totally different man, she find escape and meaning in her work.  One night while writing a letter, Stella is faced with a dilemma.  The letters are always delivered after the patients' death but just this one time Stella feels that there could be a very different ending if she delivers it before...



9.  Beach Town by Mary Kay Andrews-- Greer is thrilled when she finds a small town Florida town that fits the exact specifications of her bosses list.  As a location scout for a movie company, Greer is used to paving the way for the film crew and all that shooting a movie on location entails but she meets her match in Cypress Keys when mayor Eb takes objection to their plans.  Will they find a way to make their movie in this beach town?



Linking Up With:

Beverly's PINK SATURDAY




Strawberry Butterscotch

Amanda’s Books and More


My Pinterventures



lmml-button-2




          Project #92- Ice cube Tie Dye    
When I saw a tutorial on tie dying shirts using ice cubes I just knew we had to try it out!  We had lots of dye left from when we made our traditional tie dyed t- shirts and I figured this would be a fun way to use it all up.  I knew this was one project that none of the boys would complain about and a fun way to add to our 100 Days of Art Challenge.



We've been waiting for a sunny day for weeks just so we could try out this fun craft!  So, of course on the first sunny day we had we realized that the leftover dye was nowhere to be found.  We ran out and bought some more dye so we wouldn't be caught unprepared again.

Friday dawned sunny and bright so the younger boys and I headed outside as soon as we finished breakfast.  I read so many posts on ice dying and no two people had the same instructions.  Some people used dry shirts and some used wet.  Some people folded up their shirts in traditional tie dying ways while others laid out their shirts flat.  Some people put the shirts in a bowl, some used a rack suspended over a tray and others laid their shirts right out on the lawn.

It seemed like it was a pretty fool- proof craft so we decided to just do it our way and hope for the best.

We gathered our supplies and headed outside:

  • wet, clean, white t-shirts
  • packets of powdered Rit dye
  • bowls of ice
  • latex gloves to protect our hands 
  • tray 


I gave the boys their pick of how they wanted to do this project.

We used wet shirts laid out flat.  Alec chose to lay his shirt out on the lawn while Evan wanted to have his lying in a tray.  Since we use very old cookie sheets for all of our crafting these sheets were pretty rusty.  Not wanting any rust to rub off on the shirts we placed a plastic bag between the cookie sheet and Evan's shirt.




We cut open the powdered dye boxes and the boys sprinkled the dye directly onto their shirts.  Some websites showed the powder being sprinkled on AFTER the ice and others sprinkled it on before.... Evan sprinkled all the powder he wanted (using about a 1/2 box each of two different colors) and then covered his shirt with ice.


Alec wanted to put a bit of powder under the ice and then sprinkle one final cover over the top of the ice.  Unfortunately, we ran out of ice and I had to run to the store to buy some.  We then covered his entire shirt with ice.



We left the shirts outside for a good 5-6 hours in the sun.

Alec's shirt was dried by the time we checked on it but since Evan's shirt was in a pan and sitting in watery dye his was not dry.  That was OK though, all we needed was for the ice to have melted and the dye to have been absorbed by the shirt.




We brought them inside and ran water over them until the water was running clear. I used a big bowl we bought at the dollar store just for crafting to carry them inside (individually).  We then washed them individually in the washing machine and ran them through the dryer.


The boys loved their new shirts and we really enjoyed looking at all the unique patters and color marking that the ice made in the shirts.






Our other art projects:
Project 3: Star Wars Crafts
Project 5: Floral pens
Project 13: Water gun art
Project 14: Watercolor Kits
Project 15: Dragonfly Silhouettes 
Project 17: Spray Paint Resist
Project 20: Tin can windsock 
Project 21: Firework glue art
Project 22: Qixel art kit
Project 28: Tin Foil Art
Project 32: Drip Painted Pots
Project 33: Sun Art 
Project 36: Art Museum field trip. 
Project 39: Painting Pikachu 
Project 40: How to Draw Books
Project 50: Drawing Cat Faces 
Project 53: 3-D printing 
Project 54: Gingerbread Train
Project 57: Candy trees 
Project 67: Learning Origami
Project 68: Artist Study
Project 69: Playing an Art Game
Project 74: Qixels 3-D Maker




This Is How We Roll Thursday Party

CCBG-PartyLogo


          Custom findbugs detectors and maven   
Iv been writing a custom find bugs detector during the weekend, the bug that this detector has to detect is String.getBytes() usages, default system encoding is used when converting the char sequence into bytes which can make it work on one machine and fail on another (use String.getBytes(charsetName) instead).
The writing of the detector was not straight forward but im not going to focus on this issue (see this and this), instead id like to focus on how to create a findbugs plugin by using maven and running it with maven findbugs plugin.
First here is the detector code:

package com.jdftm;

import java.text.DateFormat;
import java.util.Calendar;

import org.apache.bcel.generic.ObjectType;

import edu.umd.cs.findbugs.BugInstance;
import edu.umd.cs.findbugs.BugReporter;
import edu.umd.cs.findbugs.ba.*;
import edu.umd.cs.findbugs.bcel.OpcodeStackDetector;

public class StringGetBytesDetector extends OpcodeStackDetector {

private BugReporter reporter;
private final ObjectType stringType = ObjectTypeFactory.getInstance("java.lang.String");
private final static String tBugType = "SGB_STRING_GET_BYTES";

public StringGetBytesDetector(BugReporter aReporter) {
reporter = aReporter;
new String("").getBytes();
}

@Override
public void sawOpcode(int seen) {
if (seen != INVOKEVIRTUAL) {// we are only interested in method calls
return;
}

try {
ObjectType tType = ObjectTypeFactory.getInstance(getClassConstantOperand());
if (!tType.subclassOf(stringType) ||
!getClassConstantOperand().equals("java/lang/String") ||
!getNameConstantOperand().equals("getBytes")) {
return;
}

reporter.reportBug(new BugInstance(this,tBugType, NORMAL_PRIORITY).addClassAndMethod(this).addCalledMethod(this).addSourceLine(this));
} catch (ClassNotFoundException e) {
AnalysisContext.reportMissingClass(e);
}
}
}

This class should reside in the src/main/java path of your maven module, findbugs requires another two files to be present in the plugin jar, findbugs.xml (contains bugs and detectors meta data):

<FindbugsPlugin>
<Detector class="com.jdftm.StringGetBytesDetector" speed="fast"/>
<BugPattern abbrev="SGB" type="SGB_STRING_GET_BYTES" category="CORRECTNESS"/>
</FindbugsPlugin>

And messages.xml (contains bug messages and detector description):

<MessageCollection>
<Detector class="com.jdftm.StringGetBytesDetector">
<Details>
<p>This detector warns about String.getBytes uages.</p>
</Details>
</Detector>
<BugPattern type="SGB_STRING_GET_BYTES">
<ShortDescription>Call getBytes on String instance</ShortDescription>
<LongDescription>Call getBytes on String instance</LongDescription>
<Details>Using String.getBytes is bad!</Details>
</BugPattern>
</MessageCollection>

Both files should reside in the src/main/resources path, the plugin also has the following dependencies:

<dependency>
<groupId>findbugs</groupId>
<artifactId>findbugs</artifactId>
<version>1.3.5</version>
</dependency>
<dependency>
<groupId>org.apache</groupId>
<artifactId>bcel</artifactId>
<version>5.2</version>
</dependency>
<dependency>
<groupId>asm</groupId>
<artifactId>asm</artifactId>
<version>3.1>/version>
</dependency>
<dependency>
<groupId>asm</groupId>
<artifactId>asm-tree</artifactId>
<version>3.</version>
</dependency>

The easiest way of getting them is by downloading findbugs distribution and deploying them from the lib folder into your favorite maven proxy (artifactory in my case).
All that is left is to deploy the plugin and to add it to your maven findbugs plugin configuration:

<reporting>
<plugins>
<plugin>
<groupId>org.codehaus.mojo</groupId>
<artifactId>findbugs-maven-plugin</artifactId>
<version>2.0</version>
<configuration>
<effort>Max</effort>
<threshold>Low</threshold>
<xmlOutput>true</xmlOutput>
<debug>true</debug>
<pluginList>{artifact_path}/findstringtobyte-1.0.jar</pluginList>
</configuration>
</plugin>
</plugins>
</reporting>

Thats about all :)

* A small note:
The findbugs maven plugin has a bug in the 1.2.0 release that was fixed for the 1.2.1 & 2.0 snapshot versions, it prevent the use of custom detector which means that youll need to use one of the snapshots versions.
          Road Trip Snacks/Foods   

We are getting excited about an upcoming vacation to Lake George.  I've been starting to prepare a bit of snacks for our trip.  While I have every intention of enjoying delicious and maybe not so nutritious meals out from time to time, I know our bodies and they crave good for us foods.

First up?  These bad boys!  I remember years ago Joe meeting a guy who had his hands in on the actual making of these.  We had a taste and they were SO good.  Had to grab them when I saw them!


I'm in an amazing accountability group where the girls share food and recipe ideas. I totally hit up Amazon for these!  Brooke likes the fruit bars and Bradley loves the sqaure bars.  I haven't tried the power snacks yet, but I love me some Justin's maple almond butter!


I'm on that mom who believes in eating as healthy as possible, but real life and simple snacks that kids will eat happen too.  Bradley loves these tomato basil lentil bean snacks, the mac and cheese is an SOS meal if the kids don't eat their dinner or are starving.  Quick oatmeal in case of breakfast meltdowns before we leave the hotel.  Brooke loves the chocolate organic pop tarts.  PBJ --because, peanut butter and jelly is always an easy go to.   Rice cakes and quest bars for me.


Apples, mint milanos & graham crackers.


My friend Ann told me about these delicious waters!


We are bringing our Ninja and going to make these happen and sip them by the pool one day. #vacay


Can't leave without this yummy drink!


My sweet friend Shelby gifted me this adorable cooler bag with my monogram.


It will be perfect to keep my cans of rose cold!


I'll also throw in deli meat, cheese sticks & yogurt tubes.  I may be overpacking but I'd rather have too much than not enough.  Been there done that before and it's no fun!!  

Bring on the loose schedule, family time, beach and poolside fun!

What healthy-ish snacks do you bring on road trips?

          Sal con una chica que lee....   
¡¡Hola!!

Hace tiempo que tengo guardado este artículo de la escritora Rosemary Urquico, que lleva por título "Sal con una chica que lee", no recuerdo donde lo encontré, pero lo guardé porque me gusto muchísimo y me encantaría compartirlo con vosotros. Merece la pena perder unos minutos en leerlo..¡es sensacional!

Sal con una chica que lee...por Rosemary Urquico

“Sal con alguien que se gasta todo su dinero en libros y no en ropa, y que tiene problemas de espacio en el clóset porque ha comprado demasiados. Invita a salir a una chica que tiene una lista de libros por leer y que desde los doce años ha tenido una tarjeta de suscripción a una biblioteca.
Encuentra una chica que lee. Sabrás que es una ávida lectora porque en su maleta siempre llevará un libro que aún no ha comenzado a leer. Es la que siempre mira amorosamente los estantes de las librerías, la que grita en silencio cuando encuentra el libro que quería. ¿Ves a esa chica un tanto extraña oliendo las páginas de un libro viejo en una librería de segunda mano? Es la lectora. Nunca puede resistirse a oler las páginas de un libro, y más si están amarillas.
Es la chica que está sentada en el café del final de la calle, leyendo mientras espera. Si le echas una mirada a su taza, la crema deslactosada ha adquirido una textura un tanto natosa y flota encima del café porque ella está absorta en la lectura, perdida en el mundo que el autor ha creado. Siéntate a su lado. Es posible que te eche una mirada llena de indignación porque la mayoría de las lectoras odian ser interrumpidas. Pregúntale si le ha gustado el libro que tiene entre las manos.

tumblr_mf73k8c6On1qcwugjo1_500_largeInvítala a otra taza de café y dile qué opinas de Murakami. Averigua si fue capaz de terminar el primer capítulo de Fellowship y sé consciente de que si te dice que entendió el Ulises de Joyce lo hace solo para parecer inteligente. Pregúntale si le encanta Alicia o si quisiera ser ella.
Es fácil salir con una chica que lee. Regálale libros en su cumpleaños, de Navidad y en cada aniversario. Dale un regalo de palabras, bien sea en poesía o en una canción. Dale a Neruda, a Pound, a Sexton, a Cummings y hazle saber que entiendes que las palabras son amor. Comprende que ella es consciente de la diferencia entre realidad y ficción pero que de todas maneras va a buscar que su vida se asemeje a su libro favorito. No será culpa tuya si lo hace.
Por lo menos tiene que intentarlo.
Miéntele entiende de sintaxis también comprenderá tu necesidad de mentirle. Detrás de las palabras hay otras cosas: motivación, valor, matiz, diálogo; no será el fin del mundo.
Fállale. La lectora sabe que el fracaso lleva al clímax y que todo tiene un final, pero también entiende que siempre existe la posibilidad de escribirle una segunda parte a la historia y que se puede volver a empezar una y otra vez y aun así seguir siendo el héroe. También es consciente de que durante la vida habrá que toparse con uno o dos villanos.
¿Por qué tener miedo de lo que no eres? Las chicas que leen saben que las personas maduran, lo mismo que los personajes de un cuento o una novela, excepción hecha de los protagonistas de la saga Crepúsculo.
Si te llegas a encontrar una chica que lee mantenla cerca, y cuando a las dos de la mañana la pilles llorando y abrazando el libro contra su pecho, prepárale una taza de té y consiéntela. Es probable que la pierdas durante un par de horas pero siempre va a regresar a ti. Hablará de los protagonistas del libro como si fueran reales y es que, por un tiempo, siempre lo son.
Le propondrás matrimonio durante un viaje en globo o en medio de un concierto de rock, o quizás formularás la pregunta por absoluta casualidad la próxima vez que se enferme; puede que hasta sea por Skype.
Sonreirás con tal fuerza que te preguntarás por qué tu corazón no ha estallado todavía haciendo que la sangre ruede por tu pecho. Escribirás la historia de ustedes, tendrán hijos con nombres extraños y gustos aún más raros. Ella les leerá a tus hijos The Cat in the Hat y Aslan, e incluso puede que lo haga el mismo día. Caminarán juntos los inviernos de la vejez y ella recitará los poemas de Keats en un susurro mientras tú sacudes la nieve de tus botas.
Sal con una chica que lee porque te lo mereces. Te mereces una mujer capaz de darte la vida más colorida que puedas imaginar. Si solo tienes para darle monotonía, horas trilladas y propuestas a medio cocinar, te vendrá mejor estar solo. Pero si quieres el mundo y los mundos que hay más allá, invita a salir a una chica que lee.
O mejor aún, a una que escriba.”
¡¡Espero que os haya gustado tanto como a mí!! Un beso...¡¡Nos leemos!!

          Tips y consejos para pintar un dormitorio pequeño   






Mostrando Habitación matrimonial - SW6204 Sea Salt.jpg
Pintando las paredes con los tonos y las combinaciones correctos podés hacer maravillas
Habitualmente, toda casa tiene un dormitorio que nos parece demasiado pequeño y probamos sacando muebles, quitando cortinas, reemplazando lámparas grandes por otras más chicas pero ni aún logramos generar sensación de amplitud. Sin embargo, es posible recurrir a trucos visuales para cumplir con nuestro objetivo. Todo depende de tomar en cuenta algunos consejos a la hora de pintar y elegir los colores apropiados.
Elegí colores claros, especialmente el blanco
Un dormitorio pequeño debe ser luminoso y una buena forma de lograrlo es con el uso de los colores suaves y del blanco. Todos estos tonos ayudan a la luminosidad y permiten que los espacios se vean más despejados y menos agobiantes.
Algunas opciones para crear el efecto de amplitud son los colores beige como Intricate Ivory (SW 6350) o el Crisp Linen (SW 6378) de la paleta de Sherwin Williams. Este tipo de tonos pasteles ayudan a agrandar las habitaciones porque reflejan la luz y dan claridad. Asimismo, hacen ver los dormitorios más acogedores y cálidos.
Para magnificar los espacios, utilizá parte del mobiliario y elementos de decoración del mismo color que las paredes, así como cortinas livianas y blancas o de tonos neutros suaves.
Los colores azules y verdes pueden ser una buena elección
Los colores fríos pueden hacer que un espacio se perciba un poco más amplio de lo que realmente es. No necesariamente hay que pintar todas las paredes iguales, ni tampoco utilizar variantes muy oscuras. Lo mejor es decantarse por las tonalidades medias y suaves como el verde Sea Salt (SW 6204) utilizado en la fotografía de la habitación matrimonial que acompaña este artículo. Este color es uno de los aliados a la hora de generar lejanía entre los objetos y aumentar las proporciones reales del dormitorio.
Por otra parte, la gama de los azules como el Byte Blue (SW 6498) es ideal para transmitir amplitud y tranquilidad. Además, estos colores combinan perfectamente con el blanco creando espacios frescos y luminosos.
Alejate de los grandes contrastes
Un ambiente pequeño puede lucir amplio si se unifica el color, pintando todas las paredes iguales, incluso el techo puede ir en el mismo tono. Si el resultado te parece un poco aburrido, destacá una pared en un color de la misma gama un poco más oscuro.
Los colores neutros son siempre recomendados
Los neutros son bienvenidos siempre en ambientes pequeños. Un color neutro crea un clima relajado y armoniza con casi cualquier otro, por lo que podés pintar las paredes de arena Popular Gray (SW 6071), o probar con un gris suave como el Repose Gray(SW 7015) que está presente en la fotografía del cuarto infantil.
Acerca de Sherwin-Williams Argentina
Sherwin-Williams es una compañía multinacional dedicada al desarrollo, fabricación y comercialización de pinturas y recubrimientos. En 1926 se instala en Argentina por primera vez y, desde entonces, mantiene su posición de liderazgo e innovación. Sherwin-Williams es percibida como una compañía de altos estándares de calidad que marca tendencia en cada temporada con sus lanzamientos y nuevas paletas de colores. En la actualidad, Sherwin-Williams Argentina comercializa productos para los segmentos arquitectónico, industrial y automotor. Las marcas de su línea Hogar y Obra están compuestas por Sherwin-Williams, Loxon Larga Duración, Z-10, Kem, Shertex, Rexpar, XR y Krylon, entre otras.
Desde hace 150 años, Sherwin-Williams se sustenta en los mismos valores que la mantienen a la vanguardia: calidad, innovación y servicio, posicionándose como el experto en pinturas y recubrimientos.
sherwin.com.ar
preguntaleasherwin.com.ar
facebook.com/SherwinArgentina
instagram.com/sherwinarg
twitter.com/sherwinarg
pinterest.com/sherwinarg
youtube.com/SherwinWilliamsTV




          EL SOL: ENEMIGO SILENCIOSO DEL ACNÉ   

La Roche- Posay lanza Effaclar Dúo (+) FPS 30, un producto capaz de tratar y corregir las marcas del acné y protege de la radiación UV, el factor más agravante de esta problemática.
“El acné es una enfermedad genético-hormonal de la glándula sebácea, que puede afectar a cualquier persona y estar presente durante distintas etapas de su vida, no solo en la adolescencia”, explica el Dr. Lucas Ponti, médico dermatólogo (M.N: 130. 388) asesor para La Roche-Posay. “El primer factor agravante del acné es el sol y esto se debe a dos motivos: la piel se deshidrata y aumenta su espesor, obstruyendo los poros; mientras que a la vez favorece la aparición de marcas y manchas pigmentarias. Es un mito que los rayos del sol pueden tener un efecto positivo o embellecedor porque secan los granitos”,desarrolla el Dr. Ponti.
La Roche – Posay suma un nuevo producto a su línea Effaclar, la más recomendada por dermatólogos para tratar el acné, una enfermedad que se ha convertido en el primer motivo de consulta al dermatólogo en Argentina. Este producto, Effaclar Dúo (+) FPS 30 es un tratamiento 4 en 1 para el acné, ya que corrige y desincrusta los poros, reduce las imperfecciones del acné y corrige y previene las marcas mientras que protege diariamente la piel de la radiación UV, el factor agravante #1 del acné.Además, es hipoalergénico, no contiene parabenos y es libre de aceite, lo que permite mejorar la calidad de vida de las pieles sensibles.
En envase de 40 ml, Effaclar Dúo (+) FPS 30 tiene la misma tecnología que Anthelios FPS 30: protege frente a los rayos UVA cortos y largos, UVB, infrarrojos y también de la contaminación. Se aplica durante la mañana en todo el rostro, luego de una adecuada higiene
La fórmula de este nuevo producto de La Roche-Posay contiene activos anti- imperfecciones y anti- marcas con el objetivo de ofrecer la protección adecuada y aumentar la eficacia del tratamiento:
Best practices for internal podcasting appeared first on Trafcom News Blog.


          Ghost In The Shell Stand Alone Complex 1st GIG E16-20 BDRip 1080p Ita Jap x265-NAHOM [BDRiP] [Seed (1)/Leech (0)]   









Titolo: Ghost In The Shell Stand Alone Complex 1st GIG
Anno: 2002
Genere: Fantascienza
Produzione: I.G. Production
Distribuzione: Panini Video 2006
Numero episodi: 26
Durata approssimativa episodi: 24'





Ambientato nel XXI secolo Ghost in the Shell è in superficie un thriller di spionaggio futuristico che segue le imprese del maggiore Motoko Kusanagi, membro della Nona Sezione, una squadra speciale di operazioni in incognito della Commissione nazionale di pubblica sicurezza giapponese specializzata nel combattere crimini legati alla tecnologia. Sebbene tecnicamente sia pari grado agli altri membri, Kusanagi ricopre il ruolo di leader della squadra e viene solitatamente chiamata maggiore a causa del suo passato rango nelle forze armate. È in gran parte robotizzata, un cervello umano in un corpo artificiale capace di imprese sovrumane e specializzata per il suo lavoro.

L'ambientazione di Ghost in the Shell è distintivamente cyberpunk o postcyberpunk, simile a quelle della Trilogia dello sprawl dello scrittore di fantascienza William Gibson, sebbene l'opera di Shirow sia maggiormente focalizzata sulle ramificazioni etiche e filosofiche della fusione tra l'umanità e la tecnologia. Gran parte degli uomini sono collegati alla rete, a cui possono accedere non soltanto mediante terminali fisici, ma soprattutto attraverso impianti situati nel loro stesso cervello. Diversi uomini sono diventati cyborg, ovvero esseri in parte organici in parte robotici. Quello che differenzia un cyborg integrale da un robot è la presenza di un cervello umano e del Ghost, ovvero dell'anima, qualcosa di intrinseco e inspiegabile che permette agli uomini di "sentire" sensazioni particolari. Il Ghost è l'istinto non mediato dai calcoli. Lo sviluppo dell'intelligenza artificiale ed un'onnipresente rete computerizzata sono il palcoscenico per la rivoluzione dell'identità umana e della unicità di sé stessi. In particolare il manga affronta direttamente queste problematiche: Kusanagi ed i suoi colleghi devono affrontare minacce esterne così come soffrire conflitti interni dovuti alle loro proprie nature.















[ Info sul file ]

Nome: Ghost In The Shell Stand Alone Complex 1st GIG E16 BDRip 1080p Ita Jap x265-NAHOM.mkv
Data: Wed, 28 Jun 2017 23:26:33 +0200
Dimensione: 224,396,762 bytes (214.001429 MiB)

[ Magic ]

Tipo file: data

[ Info generiche ]

Durata: 00:25:18 (1518.186 s)
Contenitore: matroska
Production date: Wed, 28 Jun 2017 23:26:17 +0200
Totale tracce: 5
Traccia n. 1: video (V_MPEGH/ISO/HEVC) {und}
Traccia n. 2: audio (A_AAC) {jpn}
Traccia n. 3: subtitle (S_TEXT/ASS) {eng}
Traccia n. 4: subtitle (S_TEXT/ASS) {eng}
Traccia n. 5: audio (A_AAC) {ita}
Muxing library: libebml v1.3.4 + libmatroska v1.4.5
Writing application: mkvmerge v13.0.0 ('The Juggler') 32bit

[ Traccia video ]

Codec ID: V_MPEGH/ISO/HEVC
Risoluzione: 1920 x 1080
Frame aspect ratio: 16:9 = 1.777778
Pixel aspect ratio: 1:1 = 1
Display aspect ratio: 16:9 = 1.777778
Framerate: 24.000001 fps
Dimensione stream: 169,486,725 bytes (161.635137 MiB)
Durata: 00:24:51 (1491.24994 s)
Bitrate (bs): 909.233096 kbps
Qf: 0.01827

[ Traccia audio nr. 1 ]

Codec ID: A_AAC
Freq. campionamento: 24000 Hz
Freq. campionamento output: 48000 Hz
Canali: 6
Dimensione stream: 29,403,307 bytes (28.041179 MiB)
Tipo di bitstream (bs): AAC SBR (Spectral Band Replication)
Frames (bs): 34,457
Durata: 00:24:30 (1470.165333 s)
Chunk-aligned (bs): Sì
Bitrate (bs): 160.000002 kbps VBR
Freq. campionamento (bs): 24000 Hz
Modo (bs): 6: front-center, front-left, front-right, back-left, back-right, LFE-channel

[ Traccia audio nr. 2 ]

Codec ID: A_AAC
Freq. campionamento: 48000 Hz
Canali: 2
Dimensione stream: 24,485,748 bytes (23.351429 MiB)
Tipo di bitstream (bs): AAC Main
Frames (bs): 71,165
Durata: 00:25:18 (1518.186667 s)
Chunk-aligned (bs): Sì
Bitrate (bs): 129.026284 kbps VBR
Freq. campionamento (bs): 48000 Hz
Modo (bs): 2: front-left, front-right




Rapporto creato da AVInaptic (18-12-2011) in data 28-06-2017 23:50:08
















          ps4プロよやくじょうきょうはどう   
ps4プロよやくじょうきょうはどうなの?

今のps4プロは品薄でどの通販も価格が高騰中です。
なので一番安いか調べてました。

アマゾン  55,940円
⇒アマゾンの予約はこちら


楽天 56,999円
⇒楽天の予約はこちら

これで結果ははっきりしましたね。
予約は早いほうがいいです。

PlayStation 4 Pro ジェット・ブラック 1TB (CUH-7000BB01)




          ps4プロよやくじょうきょうはどう   
ps4プロよやくじょうきょうはどうなの?

今のps4プロは品薄でどの通販も価格が高騰中です。
なので一番安いか調べてました。

アマゾン  55,940円
⇒アマゾンの予約はこちら


楽天 56,999円
⇒楽天の予約はこちら

これで結果ははっきりしましたね。
予約は早いほうがいいです。

PlayStation 4 Pro ジェット・ブラック 1TB (CUH-7000BB01)




          どこが安いの?ps4プロの販売店は   


どこが安いの?ps4プロの販売店は
というわけでどこが最安値の販売店か調べました。

アマゾン  55,940円

⇒アマゾンの予約はこちら


楽天 56,999円

⇒楽天の予約はこちら

最安値はアマゾンです!
ps4プロは人気なので予約はお早めに。

PlayStation 4 Pro ジェット・ブラック 1TB (CUH-7000BB01)




          ps4 proの予約ってアマゾンは高い?   
ps4 proの予約ってアマゾンだと高いの?答えます!

むしろ最安値です!
楽天とかの通販は6万円台ですがアマゾンは5万円台です。

もっとお得なポイントに・到着がはやい
・全国送料無料


予約するならはやいほうがいいですよ

→playstation 4 proの予約アマゾンはこちら

新品☆2016年11月10日発売予定!PlayStation 4 Pro ジェット・ブラック 1TB (CUH-7000BB01)



          playstation 4 pro の予約で在庫できる販売店は?   
playstation 4 proの予約で在庫の販売店きになりますよね?
お勧めの通販はアマゾンです。

・他の通販サイトの中で最安値
・全国送料無料

以上2点から。
playstation 4 proは売り切れる可能性が高いほど人気があるので
早めに予約がおすすめ!

→playstation 4 proの予約アマゾンはこちら

新品☆2016年11月10日発売予定!PlayStation 4 Pro ジェット・ブラック 1TB (CUH-7000BB01)



          ps4 proの定価はいくらなの?気になる予約はどこが最安値?   
ps4 proの定価は税抜きで44,980円。ただ、現在ps4 proは予約段階品薄で
どこも低下よりだいぶ高い。

そこでps4 proを予約はどこが最安値か調べました。

アマゾン 54,550円
楽天 62,639円
ヤフーショッピング 59,800円

以上の結果でした。
アマゾンがいいですね。

→ps4 proのアマゾン予約はこちら

新品☆2016年11月10日発売予定!PlayStation 4 Pro ジェット・ブラック 1TB (CUH-7000BB01)




          ps4 pro 予約状況がやばい!!!   
ps4 proの予約状況ですがやばいです!!!
なんと大変人気なのでどこも価格高騰なうなんです!!!!!!!

そんな中で最安値はどこなんか?
しょうかいします

【大手通販サイト比較】
アマゾン 54,550円
楽天 62,639円
ヤフーショッピング 59,800円

アマゾンですね===
在庫切れの前に予約することが賢明です

→ps4 proのアマゾン予約はこちら

新品☆2016年11月10日発売予定!PlayStation 4 Pro ジェット・ブラック 1TB (CUH-7000BB01)




          プレステ4プロの予約するならアマゾンが最強だ!   
プレステ4プロの発売がそろそろで待ち遠しいですね
プレステ4プロは人気です。なので高騰中です。

そこでプレステ4プロの予約をするならアマゾンが最強です!

最安値かつ全て送料無料だから!!
配達が早いのもいい!!!!

→ps4 proのアマゾン予約はこちら

新品☆2016年11月10日発売予定!PlayStation 4 Pro ジェット・ブラック 1TB (CUH-7000BB01)




             

WEEKEND RUNAROUND

On Your Bike

Instead of the usual long run for some next Saturday morning the 17th of June we will be doing a Leisure Cycle instead. The plan is Midleton to Youghal and onto Tallow. Coffee stop there and then back to Midleton via Dungourney. All welcome. Any one looking to know more just ask Edwin at training Monday night.

EAST FERRY 5Mile

On a very wet and miserable evening a reasonable crowd turned out for the East Ferry 5Mile organised by Aghada RC. Our club had a very good crew out especially as some of them ran last night. We would have had several prize winners in the various categories but there were only prizes for the first three ladies and gents in the race. But its not all about prizes it was well organised and a great spread after. On a very bright note it was wonderful to see Rod Scanlan back in action after a long absence and to see Kevin Moran getting a PB of one and a half minutes after doing the marathon last Sunday.
































Apology for missing this on Sunday but Mark Walsh was 1st O/55 in the Half Marathon. Well done once again Mark.

Mersk 6Km Carrigtwohill

Fine crowd from the club out here on Thursday evening and luckily the rain stayed. Not too tough a course but different in that it is a 6Km and is marked in Km's. Some great results with Helen Gilroy 3rd Lady home, Mick Murphy 3rd O/45, Edmond O'Sullivan 1st O/55, Neilus Aherne 1st O/60.















          Machine learning for the masses: How one company achieved ROI in just one month   

Presented by IBM Nobel Prize-winning author Andre Gide once said, “Man cannot discover new oceans unless he has the courage to lose sight of the shore.” The typical organization has done much to empower its employees. Most progressive firms allow employees to drive basic decision-making, make financial and purchasing decisions, and freely allocate how they […]


          Restauración de la Parroquia   
El 21 de Mayo la Parroquia Sagrado Corazón de Jesús, de Claypole, BsAs, cumplio sus primeros 75 años de vida, fundada el 21-may-1936 por San Luis Orione.

Te pedimos tu ayuda, porque la estructura de nuestra Parroquia está muy deteriorada y según los estudios realizados, se plantea la necesidad colocar un nuevo tipo de techo, que proteja de los agentes climáticos y urbanos adecuadamente.

Por eso ofrecemos un bono contribución de $ 30 con dos números. Lo reacaudado estará destinado a cubrir parte del presupuesto de la reparación.

Die junge Generation installiert Apps, die ältere Generation wechselt das Farbband an der "Gabriele" (traditionsreiche Schreibmaschine). Die junge Generation skypt, die ältere Generation setzt die Buschtrommeln ein.
Lassen sich so einfach die Generationen segmentieren, ja, fast schon stigmatisieren? Heike Stiegler hat Recht, wenn sie mit ihrer Blogparade umfassend zu einem Meinungsbild zum Thema "Ist Social Media nur was für unter 30-jährige?" aufruft.
Wie war das noch - ich glaube  die Statistik ist immer noch aktuell - die Senioren sind die am stärksten wachsende Internet-Nutzergruppe. Die Lebensbereiche verschmelzen immer mehr: der Opa liest wie selbstverständlich Online-Zeitungen, bucht seinen Urlaub über HRS. Die Oma skypt derweil mit ihrem Enkel in Australien. Der neueste Smart-TV wurde von der Senioren-WG über Amazon bestellt. Und ich selbst - über 50 ;-) - blogge, tweede, facebooke, xinge und pintereste, immer wenn ich Zeit habe und das fast täglich.
Von daher macht eine scharfe Trennung von Digitalem Nutzerverhalten in Alt und Jung wenig Sinn. Allerhöchstens lässt sich ein Unterschied in der Art und Weise und der Intensität der Nutzung feststellen. Keine Frage ist aber das "ob überhaupt" über 30-jährige Social Media nutzen.

          Jenis-jenis Database dan Teknologinya    
Pada era komputer dan internet ini, peran database atau basis data sangat dominan. Hampir semua kegiatan administratif di perkantoran dan institusi kini diintegrasikan ke sistem komputasi dengan model database terpadu. Demikian juga, layanan-layanan online di internet juga tidak terlepas dari peran database. Lantas apakah jenis-jenis teknologi yang digunakan untuk mengelola database?



Database Server

Berikut ini adalah daftar jenis-jenis teknologi database, yang sebagian besar merupakan Relational Database Management System (RDBMS):
  • Apache Derby (sebelumnya dikenal sebagai IBM Cloudscape), merupakan aplikasi pengolah database yang bersifat open source, dikembangkan oleh Apache Software Foundation. Lazim digunakan di program Java dan untuk pemrosesan transaksi online.
  • IBM DB2, merupakan aplikasi pengolah database yang dikembangkan IBM secara proprietary (komersial). DB2 terbagi menjadi 3 varian, yaitu DB2 untuk Linux - Unix - Windows, DB2 untuk z/OS (mainframe), dan DB2 untuk iSeries (OS/400).
  • Firebird, merupakan aplikasi pengolah database yang bersifat open source, dikembangkan oleh Firebird Project. Lazim dijalankan di Linux, Windows dan berbagai varian Unix.
  • Microsoft SQL Server, merupakan aplikasi pengolah database yang dikembangkan oleh Microsoft dan bersifat proprietary (komersial),namun tersedia juga versi freeware-nya. Lazim digunakan di berbagai versi Microsoft Windows.
  • MySQL, merupakan aplikasi pengolah database yang bersifat open source, dikembangkan oleh Oracle (sebelumnya Sun dan MySQL AB). Merupakan pengolah database yang paling banyak digunakan di dunia dan lazim diterapkan untuk aplikasi web.
  • Oracle, merupakan aplikasi pengolah database yang bersifat proprietary (komersial), dikembangkan oleh Oracle Corporation. Pengolah database ini terbagi dalam beberapa varian dengan segmen dan tujuan penggunaan yang berbeda-beda.
  • PostgreSQL atau Postgres, merupakan aplikasi pengolah database yang bersifat open source, dikembangkan oleh PosgreSQL Global Development Group. Tersedia dalam berbagai platform sistem operasi seperti Linux, FreeBSD, Solaris, Windows, dan Mac OS.
  • SQLite, merupakan aplikasi pengolah database yang bersifat open source, dikembangkan oleh D. Richard Hipp. Dikenal sebagai pengolah database yang sangat kecil ukuran programnya, sehingga lazim ditanamkan di berbagai aplikasi komputer, misalnya di web browser.
  • Sybase, merupakan aplikasi pengolah database yang bersifat proprietary (komersial), dikembangkan oleh SAP. Ditargetkan untuk pengembangan aplikasi mobile.
  • WebDNA, merupakan aplikasi pengolah database yang bersifat freeware, dikembangkan oleh WebDNA Software Corporation. Didesain untuk digunakan di web.
  • Redis, merupakan aplikasi pengolah database yang bersifat open source, dikembangkan oleh Salvatore Sanfilippo (disponsori oleh VMware. Difungsikan untuk jaringan komputer.
  • MongoDB, merupakan aplikasi pengolah database yang bersifat open source, dikembangkan oleh 10gen. Tersedia untuk berbagai platform sistem operasi dan dikenal telah digunakan oleh situs Foursquare, MTV Networks, dan Craigslist.
  • CouchDB, merupakan aplikasi pengolah database yang bersifat open source, dikembangkan oleh Apache Software Foundation. Difokuskan untuk digunakan di server web.

          ANAKART ÇEŞİTLERİ   
ANAKART ÇEŞİTLERİ 1.XT Ana Kartlar İlk kişisel bilgisayarlarda kullanılan anakartlardır. 8086 veya 8088 mikroişlemcileri üzerinde sabit olarak taşıyan bu ana kartın ek donanım birimi sadece 8 bit olmalıdır. 2.AT ANAKARTLAR Anakart üreticileri yıllarca IBM uyumlu anakartlar ürettiler.Bu standartların başında gelen AT modeli 1982’den itibaren kullanılmaktadır.Günümüzde kullanımını ATX anakartlara bırakmış eski nesil anakart çeşitlerindendir. AT anakartlar çeşitli boyutlarda olabilmektedir. ...
          Tree Don't Care What A Little Bird Sings   


I have not read much of Robert Fogel's work, not much at all, but I may need to read more of it. A Fine Theorem, one of the more under-appreciated blogs, has a summary of Fogel's Without Consent or Contract. Here's part of it:
... the paradox rests on the widely held assumption that technological efficiency is inherently good. It is this beguiling assumption that is false and, when applied to [American] slavery, insidious.”  

Roughly, it was political change alone, not economic change, which could have led to the end of slavery in America. The plantation system was, in fact, a fairly efficient system in the economic sense, and was not in danger of petering out on its own accord.
Here's the rest.

There are multiple views of the politics of technology. (Technology is, at its core, information aggregation.) One says that technology is liberating. Another says that technology is enslaving. Another says that technology is fueled by the state for purposes of control. (Oddly, skeptics of markets often make the first point of that point without understanding that the second point is the corollary.) Technology can destabilize the political equilibrium (but does that only apply if it goes in one direction? I doubt it). It's worth googling a bit for the views of Farrell, Drezner, and Lynch on this. It's worth noting that modern authoritarian regimes try to get to the technological frontier as rapidly as possible but they tend to have a tough time managing it. Francis Spufford's Red Plenty is on sale at Amazon right now, if you don't mind probably giving some of your metadata to the NSA.

Sarah Jaffe (on Twitter) asked for a political economy of the surveillance state. (Here's a short take, not very good.) I haven't got the time or background knowledge to build a real model, but if I was going to I'd start with Tilly and Scott and Weber at the foundation and ask what purpose this really serves. Knowledge is power, is it not? Power is needed for protection (in the Tillian sense), is it not? After that I'd go to Orwell like everyone already is, but not the dystopian cliches. Remember in 1984 that Winston Smith was pretty much the only one in society bothered by Big Brother. (Probably not, if you've read your Timur Kuran, but as far as Smith could tell he nearly enough was.) Everybody else just got on with it. The proles sang their songs and read their magazines. Sure, Julia was a bit inconvenienced by the whole thing, but it's not like she really had principles.

Now think about Havel. Now think about samizdat. Is information so easily controllable? Can the state not oppress on the basis of allegation, innuendo, or missing data? Can the citizenry not resist simply by living? Does the state need all information to "keep the locals in line" or just a vague threat -- the vaguer the better? Corey Robin addresses this and gives a precis of his book on the politics of fear. Stalin didn't have Bukharin's metadata... just the ability to credibly say "we know where your kids are". That hasn't changed. Yglesias is right: the biggest thing to fear from the surveillance state isn't the state, per se. But that's a micro story, and micro stories can dictate macro policies.

The U.S. public is not concerned about this. To the extent they are it's for partisan reasons, not out of principle. Note that this is not new. Note that, so far, it appears that these programs are legal at least in broad terms. Intellectuals are more concerned that the median pollee, as they should be, since they are much more likely to be targeted than a randomly-selected person. (If I was Glenn Greenwald I'd go back to snail mail and pay phones for a good long while.) But so? Democratic politics does not guarantee puppies and roses. As we debate whether or not this is constitutional we should remember that James Buchanon's insights do not only apply to economic policy. We should also remember that politicians and celebrities have been subject to heavier levels of scrutiny than this for as long as there has been human society.

Data, even metadata, can be used for ill. (Or good, as the case may be, since the 21st century version of Paul Revere is probably someone Healy wouldn't meet for a beer at Ye Olde Tavern. Possibly this isn't what Healy's driving at.) But let's not get carried away. The U.S. government is sophisticated in many ways, but this program has only $20mn in funding. Let's say they spend $5mn of that on high-powered computers (that's probably less than what the supercomputer I ran a bunch of my dissertation on cost), and the rest on twenty-somethings making $200k/year each (as Snowden apparently did). That's 75 guys trying to make sense of the 2.5 quintillion bytes of data created each day. Good luck with that. (No I don't believe only $20mn was funneled into this. Not for a moment do I believe that. But I'm not sure how much $20bn could really do absent some good old fashioned police work.)

So after you've read the Spufford (or even before) you might want to read some of the discussion at Crooked Timber on the book. See especially this wonderclass by Shalizi which has as much to say about social science theory and methods as it does about historical political systems or the contemporary political economy of the surveillance state or novels. The key question is Shalizi's first one: what is being optimized?

Then recall that Hayek's slippery slope is a logical fallacy to which the historical record is not kind. Should we be less concerned? Probably depends on how concerned you were in the first place... anonymity is a myth.

Remember too that the government oppresses and kills and makes terrible decisions when it doesn't have good intelligence. Given that, is the expected utility of (American or other) society better or worse with PRISM or without it? Apparently this program stopped one or more attacks at the London Olympics. What would the cost of those attacks have been? Was preventing them worth $20mn dollars plus some false positives? (The TSA spends $6.5 billion a year and probably gets almost nothing for it.) Could PRISM have stopped Nidal Hasan had it been better-implemented? If it could have, would it be worth it? We are quite literally behind the veil of ignorance at the moment (just a bit less in the wake of Snowden's leaks), but if we take engaged citzenry to be a desirable normative end in itself we need to put our Bayesian caps on now and start updating our priors.

What tail event has a greater probability: that this program is abused in such a way that it devastates liberal society, or that it prevents a significant attack the fallout from which would devastate the same society?

In the end the biggest repercussions of NSA spying might be felt in the US-EU trade negotiations.

Nevertheless, I oppose PRISM and related programs very strongly. I do so because I am not risk-averse.

I believe this is the most Cowen-esque thing I've ever written. I also believe that every link in this post is worth clicking on.
          TEMA 3.-LA VIDA EN LA TIERRA   

TEMA 3.-LA VIDA EN LA TIERRA

ÍNDICE
1.- ASÍ SON LOS SERES VIVOS
2.- LAS CÉLULAS
3.- LA ORGANIZACIÓN DE LOS SERES VIVOS
4.- LA CLASIFICACIÓN DE LOS SERES VIVOS

Antes de empezar el tema:

BIOSFERA.- La biosfera es el conjunto de los seres vivos del planeta Tierra y el medio físico que los rodea. Es una capa irregular en espesor y diversidad que abarca la hidrosfera, la zona más superficial de la litosfera y la parte inferior de la troposfera.

La Tierra es singular en el universo porque es el único planeta,  que se sepa, donde hay vida. Los factores que hacen posible la vida sobre la Tierra  son los siguientes:
-Distancia óptima al Sol.
-Presencia de agua líquida.
-Presencia de una atmósfera protectora.
-Presencia de oxígeno en la atmósfera.

Los seres vivos, al igual que los seres inertes, poseemos masa y volumen, es decir, estamos constituidos por materia. Sin embargo todos los seres  vivos compartimos unas características comunes que nos diferencian de los seres inanimados.
*Estamos hechos de átomos y moléculas.
-         Al estudiar la materia que constituye los seres vivos se pueden distinguir en ellas varios niveles de complejidad estructural, que son los llamados niveles de organización.
-         1.- Nivel molecular: Es el nivel abiótico. Se distinguen cuatro subniveles:
-         - Subnivel subatómico: Lo constituyen las partículas subatómicas, es decir, los protones, electrones y neutrones.
-         - Subnivel atómico: Constituido por los átomos, que son la parte más pequeña de un elemento químico que puede intervenir en una reacción.
-         - Subnivel molecular: Constituido por las moléculas, es decir, por unidades materiales formadas por la agrupación de dos o más átomos mediante enlaces químicos. (ejs.: O2, H2O) y que son la mínima cantidad de una sustancia que mantiene sus propiedades químicas. Distinguimos dos tipos de moléculas: inorgánicas y orgánicas.
-         - Subnivel macromolecular: Está constituido por los polímeros que son el resultado de la unión de varias moléculas (ejs.: proteínas, ácidos nucleicos). La unión de varias macromoléculas da lugar a asociaciones macromoleculares (ejs: glucoproteínas, cromatina). Por último, las asociaciones moleculares pueden unirse y formar orgánulos celulares (ejs.: mitocondrias y cloroplastos). Las asociaciones moleculares constituyen el límite entre el mundo biótico y el abiótico. Por ejemplo, los ácidos nucleicos poseen la capacidad de autorreplicación.

*Estamos formados por células.
2.- Nivel celular: Incluye a la célula, unidad anatómica y funcional de los seres vivos. Los seres unicelulares son los seres de organización más sencilla. Están formados por una sola célula. Son microscópicos y pueden ser procariotas (bacterias) o eucariotas (algas, protozoos y algunos hongos).
Los seres unicelulares pueden agruparse para mejorar su eficacia formando agrupaciones más o menos grandes en las que cada célula es independiente de las demás y realiza por sí misma todas las funciones vitales, pero viven unidas en una entidad única: La colonia. Se originan a partir de una sola célula que se divide. Las células hijas quedan unidas entre sí formando la colonia. Existen en protozoos y algas. Es el paso transicional entre unicelular y pluricelular.
Los organismos unicelulares se caracterizan porque todas sus actividades vitales son desarrolladas por una única célula. Son unicelulares todos los organismos procariotas y algunos eucariotas del reino protoctista (protozoos) y reino hongos (levaduras). Cuando un organismo unicelular se reproduce, inmediatamente da lugar a dos células hijas independientes, que pueden permanecer juntas en una colonia.


3. Nivel pluricelular u orgánico: Incluye a todos los seres vivos constituidos por más de una célula.
Los organismos pluricelulares están formados por un conjunto de células originadas por la proliferación de una célula inicial, cigoto o célula huevo. Todas las células resultantes tienen la misma información genética, pero sufren un proceso de diferenciación celular que da lugar a distintos tipos celulares.
 Las células especializadas de los seres pluricelulares están organizadas en tejidos. Todos los tejidos tienen células especializadas en realizar una función determinada. Las distintas variedades de tejidos se asocian para realizar funciones aún más especializadas y complejas: los órganos. A su vez, los órganos, que facilitan una misma función, forman un aparato o sistema.
Los seres pluricelulares están formados por gran número de células. Comparten además características como:
-Los grupos de células diferentes realizan funciones diferentes.
-Existe diferenciación celular. Cada forma celular realiza una función específica.
-Las células no pueden separarse del organismo y vivir independientemente. Necesitan de las otras para vivir.
-Se forman a partir de una célula madre o cigoto.
 En los seres pluricelulares existe una división de trabajo y una diferenciación celular alcanzándose distintos grados de complejidad creciente:
- Tejidos: es un conjunto de células muy parecidas que realizan la misma función y tienen el mismo origen.
- Órganos: es la asociación de varios tejidos que realizan una función conjunta.
- Sistemas: es un conjunto de varios órganos parecidos que funcionan independientemente.
- Aparatos: Conjunto de órganos que pueden ser muy distintos entre sí, pero cuyos actos están coordinados para constituir una función.

4.- Nivel de población: abarca a las poblaciones, que son el conjunto de individuos de la misma especie que viven en una misma zona y en un momento determinado. Se considera a los organismos de la misma especie no como individuos concretos, sino desde el punto de vista de las relaciones que se establecen entre ellos en el espacio y en el tiempo.
5.- Nivel de ecosistema: se estudia tanto el conjunto de poblaciones de diferentes seres que viven interrelacionados, la llamada comunidad o biocenosis, como el lugar, con sus condiciones fisicoquímicas, en donde se encuentra el llamado biotopo. El conjunto de biocenosis y biotopo se llama ecosistema. El conjunto de ecosistemas de toda la Tierra o biosfera puede ser considerado como el nivel más complejo de organización de los seres vivos.
*Realizamos las funciones vitales.- Todos los seres vivos llevamos a cabo una serie de funciones que, aunque pueden manifestarse de forma muy distinta, tienen una misma utilidad. Las funciones de nutrición, relación y reproducción son comunes a todos los seres vivos, independientemente de su diversidad.

COMPOSICIÓN DE LOS SERES VIVOS:
Carbono C
Hidrógeno H
Oxígeno O
Nitrógeno N
Fósforo P
Azufre S
Reciben el nombre de bioelementos primarios.
BIOMOLÉCULAS INORGÁNICAS:
-Agua
-Sales minerales

BIOMOLÉCULAS ORGÁNICAS:
-         Glúcidos
-         Lípidos
-         Proteínas
-         Ácidos nucleicos


TEMA 3.-LA VIDA EN LA TIERRA

ÍNDICE
1.- ASÍ SON LOS SERES VIVOS
2.- LAS CÉLULAS
3.- LA ORGANIZACIÓN DE LOS SERES VIVOS
4.- LA CLASIFICACIÓN DE LOS SERES VIVOS

1.- ASÍ SON LOS SERES VIVOS
Todos los organismos de la biosfera comparten tres características que los diferencian de lo que no está vivo; realizan las tres funciones vitales, sus componentes son similares y están formados por células.

REALIZAN LAS TRES FUNCIONES VITALES
Todos los seres vivos son capaces de nutrirse, relacionarse y reproducirse, es decir de realizar las tres funciones vitales.
FUNCIÓN DE NUTRICIÓN
Nutrición. Es la capacidad de captar materia y energía del exterior para crecer, desarrollarse y realizar todas las otras funciones vitales.
Nutrición autótrofa. Es la nutrición en la que se incorpora materia inorgánica. Si para ello se utiliza energía luminosa se habla de fotosíntesis y si se utiliza la energía desprendida en reacciones químicas se denomina quimiosíntesis . Son organismos fotosintéticos las algas, las plantas y determinadas bacterias. Son organismos quimiosintéticos algunos pocos tipos de bacterias. En la fotosíntesis que hacen las algas y las plantas se desprende oxígeno. La reacción química de la fotosíntesis es:
Materia inorgánica
(dióxido de carbono + agua) + luz ······—> Materia orgánica+ oxígeno
• Nutrición heterótrofa. Es la nutrición en la que se capta materia orgánica. En la naturaleza esta materia solo la producen los seres vivos, por lo tanto alimentarse de materia orgánica quiere decir alimentarse de otros organismos, ya sean vivas o muertas. En una primera etapa se produce la digestión de los alimentos hasta llegar a unas moléculas pequeñas (nutrientes) capaces de entrar en las células. Dentro de ellas, en unos orgánulos denominados mitocondrias, reaccionan con el oxígeno (la denominada respiración celular), liberando la energía que precisa el ser vivo. El resto de las moléculas de nutrientes se utilizan para crear reservas de energía o para generar estructuras y así crecer. La reacción química de la respiración celular es:

Materia orgánica + oxígeno ·······—> Materia inorgánica
                                                           (Dióxido de carbono + agua) +Energía

Relación. Es la capacidad de captar las variaciones del medio externo, los llamados estímulos, y emitir respuestas adecuadas.
Los estímulos pueden ser químicos, táctiles, luminosos o acústicos.
Las respuestas pueden ser movimientos, secreciones o simplemente crecimientos direccionales, como sucede con las raíces de las plantas respeto al agua (quimiotropismo) o con las ramas respeto a la luz (fototropismo).
Reproducción. Es la capacidad de generar nuevos individuos. Como la duración de la vida de un organismo es limitada, sin la reproducción la vida se habría extinguido al morir el primer ser vivo.
Reproducción asexual. Es aquella en la que los descendentes son genéticamente idénticos al progenitor, es decir tienen la misma información en su ADN. Un ejemplo de reproducción asexual es el de una rama de geranio que se rompe y se planta en tierra. Al cabo de un tiempo la rama genera raíces y se forma un nuevo geranio. En la reproducción asexual sólo hay un progenitor y un proceso de multiplicación celular en el cual las células hijas son idénticas a la célula madre. Este tipo de división celular se denomina mitosis.
• Tipo de reproducción *asexual en los organismos unicelulares. Según la forma de dividirse la célula se distingue la bipartición, la gemación y la esporulación.


Bipartición
 

Gemación

Esporulación
• Tipo de reproducción asexual en los organismos pluricelulares. Básicamente consiste en un fragmento del progenitor que crece y da lugar a un nuevo individuo. Se distingue la reproducción por esquejes en el geranio, por tubérculos en la patata, por bulbos en la cebolla y por escisión o por gemación en los pólipos.






  Reproducción sexual. Es aquella en la que los descendentes son genéticamente diferentes de sus progenitores y diferente también entre los hermanos. Se realiza mediante células especiales denominadas células sexuales que sólo tienen la mitad de información genética y que es diferente en cada una de ellas. Las células sexuales se originan mediante una división celular especial denominada meiosis. Hay dos tipos de células sexuales: los gametos y las esporas sexuales.
Reproducción sexual por gametos. Se realiza mediante la unión (fecundación) de un gameto masculino con un gameto femenino. Esto da lugar a una célula (zigoto) que ya tiene la información genética completa. El zigoto por multiplicación da lugar a un embrión y después a todo un nuevo individuo. Los gametos masculinos de los animales se denominan espermatozoides y los de las plantas anterozoides. Los gametos femeninos de los animales se llaman óvulos y los de las plantas oosferas. La fecundación puede ser externa o interna gracias a órganos copuladores. En los animales el desarrollo embrionario se puede producir dentro de un huevo (ovíparos) o en el interior del cuerpo materno (vivíparos).




• Reproducción mediante esporas sexuales. En ella una sola espora ya genera todo un nuevo individuo. Se da en hongos y en plantas. En estas últimas se alterna una reproducción sexual mediante gametos con una reproducción sexual mediante esporas.
• Reproducción alternante. Se da por ejemplo en algunas especies de medusas En ella se alterna una reproducción sexual por gametos con una reproducción asexual mediante fragmentación.

SUS COMPONENTES SON SIMILARES
Todos los seres vivos están formados por los mismos tipos de sustancias: por gran cantidad de agua, por compuestos que tienen mucho contenido en carbono (hidratos de carbono, proteínas, grasas y ADN), y por diversos compuestos minerales

ESTÁN FORMADOS POR CÉLULAS
Todos los seres vivos están formados por células.
La célula es la unidad más pequeña de un ser vivo capaz de realiza las tres funciones vitales: 
      Nutrición. 
     Relación y 
  Reproducción.











          9 Cells IBM Lenovo Thinkpad T430 T430I T530 T530I W530 W530I L430 L530 Series Replacement Laptop Notebook Battery 11.1V 7800mAh   
9 Cells IBM Lenovo Thinkpad T430 T430I T530 T530I W530 W530I L430 L530 Series Replacement Laptop Notebook Battery 11.1V 7800mAh

Type: Li-Ion
Voltage: 11.1V
Cells: 9-Cell
Capacity: 7800mah
Dimension:
Color: Black
Net Weight: 600g

Replaces Part Numbers:
51J0499 ASM 42T4796 FRU 42T4793 FRU 42T4817 42T4731 ASM 42T4752 FRU 42T4702 FRU 42T4819 42T4757 ASM 42T4703 FRU 42T475142T4235 42T4733 42T4737 42T4753 45N1001 70++ 57Y4185 57Y4186 ASM 42T4756 ASM 45N1000 FRU 42T4755 FRU 42T4791 FRU 42T4795 FRU 42T4797 FRU 45N1001

Fits Laptop Models:
Lenovo Thinkpad W530 W530I L430 L530 T430 T430I T530 T530I


          6 Cells IBM Lenovo Thinkpad T440P T540P L440 L540 W540 Series Replacement Laptop Notebook Battery 11.1V 5200mAh   
6 Cells IBM Lenovo Thinkpad T440P T540P L440 L540 W540 Series Replacement Laptop Notebook Battery 11.1V 5200mAh

Type: Li-Ion
Voltage: 11.1V
Cells: 6-Cell
Capacity: 5200mah
Dimension:
Color: Black
Net Weight: 400g

Replaces Part Numbers:

45N1149 45N1158 45N1144 45N1150
45N1151 45N1159 45N1148 45N1779
45N1769 45N1153 45N1147 45N1145
45N1160 45N1161 45N1146

Fits Laptop Models:

ThinkPad W540 ThinkPad L540 ThinkPad L440 20AT004QGE
ThinkPad T540p(20BF002VCD) ThinkPad T540p(20BF002FCD) ThinkPad T540p(20BFS02MCD)
ThinkPad T540p(20BFA0Y300) ThinkPad T540p(20BFA0Y400) ThinkPad T540p(20BFS01M00)
ThinkPad T540p(20BFS0B800) ThinkPad T540p(20BFS03F00) ThinkPad T540p(20BFS01C00)
ThinkPad T540p(20BFS02N00) ThinkPad T540p(20BFS01L00) ThinkPad T540p(20BFS03H00)
ThinkPad T540p(20BFS02J00) ThinkPad T540p(20BFS0BA00) ThinkPad T540p(20BFA0Y200)
ThinkPad T540p(20BFA0Y500) ThinkPad T540p(20BFA1AR00) ThinkPad T540p(20BFS0BT00)
ThinkPad T540p(20BFS0BV00) ThinkPad T540p(20BFA0YX00) ThinkPad T540p(20BFS07000)
ThinkPad T540p(20BFS06X00) ThinkPad T440(20B7S0PM0A) ThinkPad T440(20B7S1AA0H)
ThinkPad T440(20B7S0NT0E) ThinkPad T440(20B6S01Y00) ThinkPad T440(20B6A050CD)
ThinkPad T440(20B6A06PCD) ThinkPad T440(20B6A06TCD) ThinkPad T440(20B6A0BCCD)
ThinkPad T440(20B6A03KCD) ThinkPad T440(20B6S00U00) ThinkPad T440(20B6S02100)

          6 Cells IBM Lenovo Thinkpad T440 T440S T440I X240 X240S Series Replacement Laptop Notebook Battery 11.1V 4400mAh   
6 Cells IBM Lenovo Thinkpad T440 T440S T440I X240 X240S Series Replacement Laptop Notebook Battery 11.1V 4400mAh

Type: Li-Ion
Voltage: 11.1V
Cells: 6-Cell
Capacity: 4400mah
Dimension:
Color: Black
Net Weight: 400g

Replaces Part Numbers:
121500146
121500147
121500148
45N1124
45N1125
45N1126
45N1127
45N1128
0C52861
45N1122
45N1123
45N1124
45N1135
45N1136
45N1738
45N1736
45N1160
45N1131
45N1130
45N1129

Fits Laptop Models:
Lenovo ThinkPad T440
Lenovo ThinkPad T440S
Lenovo ThinkPad X240 Series
Lenovo ThinkPad X240s K2450
Thinkpad X240
Thinkpad T440I


          6 Cells IBM Lenovo Thinkpad T430 T430I T530 T530I W530 W530I L430 L530 Series Replacement Laptop Notebook Battery 11.1V 5200mAh   
6 Cells IBM Lenovo Thinkpad T430 T430I T530 T530I W530 W530I L430 L530 Series Replacement Laptop Notebook Battery 11.1V 5200mAh

Type: Li-Ion
Voltage: 11.1V
Cells: 6-Cell
Capacity: 5200mah
Dimension:
Color: Black
Net Weight: 400g

Replaces Part Numbers:
42T4733 42T4235 42T4731 42T4757 42T4737 42T4753 51J0499 57Y4185 57Y4186 ASM 42T4703 ASM 42T4752 ASM 42T4756 ASM 42T4796 ASM 45N1000 FRU 42T4702 FRU 42T4751 FRU 42T4755 FRU 42T4791FRU 42T4793 FRU 42T4795 FRU 42T4797 FRU 42T4817 FRU 42T4819 FRU 45N1001

Fits Laptop Models:
Lenovo Thinkpad L430 L530 T430 T430I T530 T530I W530I W530


          Replacement 90W 19V 4.74A 5.5*2.5 3-Prong with Cord   
Replacement 90W 19V 4.74A 5.5*2.5 3-Prong with Cord

Replacement AC Adapter 90W 19V 4.74A 5.5*2.5 3-Prong

Input: AC100-240V (worldwide use)
Output: DC19V 4.74A
Power: 90W

Outlet: 3-prong
Connecter size:
Internal Diameter: 5.5mm
External Diameter: 2.5mm

Please double check before ordering.

Item Includes: AC Adapter and Power Cord.

Full 12 months warranty!



Fits Laptop Models:
FUJITSU
Fujitsu BIBLO NX90M/W,
Fujitsu FMV-BIBLO NB75MN/T,
Fujitsu FMV-BIBLO NX90MN/W,
Fujitsu FMV-BIBLO NX90R/W,
Fujitsu Lifebook BH531,
Fujitsu Lifebook NH751,
Fujitsu LifeBook SH530,
Fujitsu LifeBook SH560,
Fujitsu LifeBook SH760,
Fujitsu Lifebook SH771
Fujitsu FMV-BIBLO RS Series
FMV-BIBLO NB75J, FMV-BIBLO RS18D, FMV-BIBLO RS18D/D,
FMV-BIBLO RS18D/ST, FMV-BIBLO RS18D/T, FMV-BIBLO RS50E/T,
FMV-BIBLO RS50G/T, FMV-BIBLO RS55E/T
Fujitsu FMV Series
FMV-716NU3, FMV-716NU3/B, FMV-Lifebook C6210,
FMV-NB40M, FMV-NB60M/W, FMV-NB80M, FMV-NB90M/W
Fujitsu Lifebook Series
LifeBook A1010, LifeBook A3130, LifeBook A530,
LifeBook A531, LifeBook A6030, LifeBook A6110,
LifeBook A6120, LifeBook A6210, LifeBook AH530,
LifeBook AH531, LifeBook L1010, LifeBook LH531,
LifeBook LH700, LifeBook MH380, LifeBook P3010,
LifeBook P3110, LifeBook P770, LifeBook P8110,
LifeBook PH520, LifeBook PH530, LifeBook PH770,
LifeBook U772, LifeBook V1010, LifeBook V1020,
Lifebook 8010, Lifebook 8020, Lifebook A3110
Fujitsu Lifebook C Series
LifeBook C1211, LifeBook C1211D, LifeBook C1212,
Lifebook C1212D, LifeBook C1320, LifeBook C1320D,
LifeBook C1320DA, LifeBook C1320DB, Lifebook C1321,
LifeBook C1410, Lifebook C2010, Lifebook C2110,
Lifebook C2111, LifeBook C2210, LifeBook C2220,
LifeBook C2230, LifeBook C2240, LifeBook C2310,
Lifebook C2320, Lifebook C2330, LifeBook C2340
Fujitsu Lifebook E Series
LifeBook E2010, LifeBook E330, LifeBook E380,
LifeBook E4010, LifeBook E4010D, LifeBook E6624,
Lifebook E6634, Lifebook E6644, Lifebook E6654,
Lifebook E6664, LifeBook E6666, LifeBook E7010,
LifeBook E7110, LifeBook E8000, LifeBook E8000D,
LifeBook E8010, LifeBook E8010D, LifeBook E8020,
LifeBook E8020, LifeBook E8020C, LifeBook E8020D,
LifeBook E8110, LifeBook E8210
Fujitsu LifeBook M Series
LifeBook M1010, LifeBook M2011
Fujitsu Lifebook N Series
Lifebook N3400, Lifebook N3410, LifeBook N3500,
LifeBook N3510, LifeBook N3511, LifeBook N3520,
LifeBook N3530, Lifebook N6110, LifeBook N6210,
Lifebook N6220
Fujitsu Lifebook S Series
LifeBook S2210, LifeBook S6310, LifeBook S6311,
LifeBook S6410, LifeBook S6420, LifeBook S6510,
LifeBook S6520, LifeBook S7020, LifeBook S7020B,
LifeBook S7020D, LifeBook S7020E, LifeBook S7021,
LifeBook S7025, LifeBook S710, LifeBook S7110,
LifeBook S7111, LifeBook S760, LifeBook S761,
LifeBook SH761, Lifebook S7000, Lifebook S7000D,
Lifebook S7010, Lifebook S7010D, Lifebook S7011
Fujitsu Lifebook T Series
LifeBook T1010, LifeBook T4020A, LifeBook T4020B,
LifeBook T4020D, LifeBook T4210, LifeBook T4215,
LifeBook T4220, LifeBook T5010, LifeBook T900,
LifeBook T901, Lifebook T4010, Lifebook T4010D,
Lifebook T4020, Lifebook T4020
Fujitsu Lifebook UH Series
LifeBook UH552, LifeBook UH572, LifeBook UH900
Fujitsu Q Series
Q550, Q550LB
EVEREX
Everex StepNote MX Series
ACCEL
Accel AccelNote CY13
ACER
Acer Aspire 1360
ADVENT
Advent 6412,
Advent 7001,
Advent 7004,
Advent 7006,
Advent 7012
ALCAM
Alcam Designer 400
ALIENWARE
Alienware Area-51m 5500 (Model 259EN3, 259N1) Series
Alienware ENTHUSIAST,
Alienware EXTREME,
Alienware GF FX 5600,
Alienware PERFORMANCE,
Alienware SENTIA
AMI
AMI FT6T20,
AMI TF6760
AMS TECH
AMS Tech TECH MP-975AAMS,
AMS Tech Rodeo 7000,
AMS Tech Rodeo 7030,
AMS Tech Rodeo 7620
AMS Tech Rodeo 3500 Series,
AMS Tech Rodeo 7630 Series,
AMS Tech Travelpro 100 Series,
AMS Tech Travelpro 1950 Series,
AMS Tech Travelpro 2000 Series,
AMS Tech Travelpro 6000 Series
AMS Tech Rodeo 1000 Series
Rodeo 1000CT
AMS Tech Rodeo 1010 Series
Rodeo 1010CT
AMS Tech Rodeo 7640 Series
Rodeo 7640XL
AMS Tech Travelpro Series
Travelpro 12CT, Travelpro 180, Travelpro 1900,
Travelpro 1961CT, Travelpro 1965, Travelpro 1970CT
ARM
ARM ArmNote CQ12,
ARM ArmNote CY13,
ARM ArmNote N30N3,
ARM ArmNote PL11,
ARM Green 579,
ARM Green 759,
ARM TS795
ASUS
Asus Multi-Color,
Asus UX50V
Asus A Series
A42F, A42J, A42JA, A42JB, A42JC, A42JE, A42JK,
A42JV, A42JY, A42JZ, A42Jr, A42N, A52F,
A52F-EX1342V, A52JB, A52JC, A52JE, A52JK, A52JT,
A52JU, A52Jr, A52N, A53E, A6, A6JA, A6JC, A6Jm,
A6K, A6KM, A6KT, A6Km, A6M, A6R, A6T, A6Ta,
A6Tc, A6VA, A6VM, A72F, A72JK, A72Jr, A7C, A7Cc,
A7Cd, A7D, A7Db, A7Dc, A7F, A7G, A7Gb, A7Gc,
A7J, A7JC, A7Jb, A7Jc, A7K, A7Kc, A7M, A7Mb,
A7Mc, A7S, A7Sn, A7Sv, A7T, A7Tb, A7Tc, A7U,
A7V, A7Vb, A7Vc, A8Dc, A8E, A8F, A8Fm, A8H,
A8He, A8JC, A8Ja, A8Jc, A8Je, A8Jm, A8Jn, A8Jp,
A8Jr, A8Js, A8Jv, A8L, A8LE, A8LF, A8LH, A8Le,
A8M, A8N, A8Sc, A8Se, A8Sr, A8Tc, A8Tm, A8Z, A9
Asus B Series
B23E, B43J, B50, B51, B80, B80A