Custom Search

Selamat Datang

Friday, September 17, 2010

Nyekar dan Nyadran

Tradisi menjelang Bulan Romadhon, biasaya masyarakat melakukan tadisi Nyekar dan Nyadran. Tadisi tersebut sangat kental dilakukan oleh masyarakat Jawa. Banyak yang memperdebatkan mengenai hukum dari tradisi tersebut, namun yang hendak saya sampaikan melalui tulisan ini adalah bukan dari sisi pertentangannya, namun apa sih makna filosofis dari tradisi Nyekar dan Nyadran.
Nyekar ke makam leluluhur sebelum Bulan Romadhon adalah suatu aktivitas kirim doa ke arwah leluhur agar di ampunkan segala dosa semasa hidupnya oleh Sang Penguasa Alam.
Nah ubo rampe (perlengkapan) nyekar itu ya bunga, sesuai dengan namanya Nyekar. Nyekar berasal dari kata dasar (linggo) Sekar artinya kembang atau bunga. Yang namanya bunga biasanya harum baunya, apalagi kalo bunga yang digunakan untuk nyekar. Harapan dari hal tersebut adalah agar para generasi penerus baik anak, mantu, cucu, cicit mampu meneruskan yang segala yang baik-baik dari arwah leluhur.
Bunga yang biasa digunakan untuk nyekar yang paling umum adalah bunga kanthil, kenanga, dan mawar atau melati.
Bunga Kanthil
Dalam bahasa jawa di kenal dengan Jarwo dosok, Kanthil (Tansah Kumanthil), (Kanthi Laku), dilihat dari arti jarwo dosoknya bunga kanthil
Tansah Kumanthil merupakan pralambang dari arti selalu ingat/eling, apa yang harus diingat, tentunya kalau dikaitkan dengan tradisi nyekar ke makam leluhur ya semua tindak tanduk yang baik dari leluhur semasa hidup. AGar kita-kita yang masih hidup ini selalu berbuat kebajikan yang sesuai dengan tuntunan Agama, dan selalu ingat kalo nantinya semua manusia itu akan mati, mumpung masih hidup perbanyaklah Ibadah dan jauhi larangan-larangan dari-Nya.
Kanthi Laku merupakan pralambang kalau segala hal itu tidadak cukup hanya dengan berdoa saja tapi juga harus dengan lelaku atau usaha.
Bunga Kenanga
Jarwo dosok dari Kenanga adalah Keneng- A, bahasa Indonesianya Gapailah, raihlah. Atau bisa di jarwo dosoki dengan Kenang Ing Angga artinya mengenang segala hal yang baik dari warisan leluhur kita.
Keneng- A, kita mumpung masih hidup diminta untuk menggapai segala keluhuran yang dicapai dari para lelluhur. ya syukur-syukur kita mampu untuk berbuat yang lebih baik.
Kenang Ing Angga, artinya juga tidak terlalu jauh, kita diminta untuk melupakan segala hal yang baik dari para leluhur.
Bunga Mawar/Melati
Biasa kalo tidak ada mawar ya melathi yang digunakan untuk nyekar.
Nah mawar = Awar-awar= Tawar atau Mawi Arsa artinya dengan kehendak hati, Tawar atau  bisa diartikan dengan tulus. memahami nilai luhur dari para leluhur yang sesuai dengan panutan agama harus dengan niat yang tulus.
Melahi = Roso melat soko njero ati yang bisa diartikan dalam bertutur kata harus sesuai dengan hati nurari, jangan beda dimulut beda juga dihati atau munafik.
lha Nyadran ne kepriye ?
Tradisi Nyadran biasanya ada tiga ubo rampe yang selalu ada yaitu apem, kholak dan Ketan.
Apem berasal dari kata afu’an atau afwan yang artinya maaf (ngapuro)
kholak berasal dari kata kholado sebagai lambang kekal
dan ketan dari kata khoto’ atau khotan yang berarti kesalahan

Thursday, August 12, 2010

Best Charging Valets to Purchase By Tom Tessin Platinum Quality Author

A charging valet is a great item to consider when you're thinking about having something that is going to keep everything all in one place.  What I have found with my accessories is that I lose my chargers or it just looks tacky on my desk with 6 items sitting there that all need to be charged.
Whether you have an iPod, cell phone, or another accessory that needs to be charged, you may want to consider a valet for this sole reason.  What you're going to find out is that it will make your desk look a lot more organized and on top of it, you will also find that you can charge everything all in one spot, making it very easy for you to maintain.
When you're searching for a charging valet, there are a few things that you're going to want to consider.  The first thing is the price.  The price tag shouldn't really influence your purchase, as you will find that many of them are in the $20 to $40 range.  The second thing that you want to look into is the design.  Since they all do the same job, get something that is going to blend in with your office.
With that being said, there are some brands that you should look into, as when I did the research online, these are the ones that I found to be relatively reasonable in price, as well as offer a great selection.
  • DigiPower
  • Mark Feldstein
  • Belkin
  • Mele
  • ChargingOrganizer
  • Sharper Image
  • Brookstone
All of these offer some great charging stations that have not only a great look, but you're going to find that the price tag won't break the bank.If you want to get something that is going to organize your items, charge them at the same time and make your office look like a greater place, you will want to highly consider something like these.
When you're in the market to purchase charging valets for your office, check out my top 5 list where you can get prices, links, and more.

Top 5 Charging Pads By Tom Tessin Platinum Quality Author

Charging pads are the wave of the future. If you have any electronic device such as a cell phone, iPod, or anything else, you're going to find that you may want to get your hands on one and let me explain why.
First off, I will explain on how a charging pad works. What you're going to do is simply plug the charging pad into the wall as if you would with any other item. After you plug it in, your charging paid is now going to be "charged." After it is charged, you will now be able to lay electronics on the pad. Once they are sitting on this pad, your electronics are going to be charging.
The cool thing about this is that you're going to find that you don't need to plug in your items any more. Keep in mind that you will find that since these products are so new, you will notice that some get bad reviews. If you intend on purchasing one, you're going to notice that some have bad reviews. I would advise that you read into some of them, because you will notice that some people just don't have luck with them.
I checked online for some highly rated charging pads. Granted, they may not work for you, so you're going to want to get these 5 items a shot when you're considering making a purchase.
  1. Powermat Home and Office by Powermat - Around $100 and has reviews that are right in the middle. This works for some, while not for others.
  2. Equity by La Crosse - One of the cheaper ones on the market. Costs around $35.
  3. Powermat Mobile by Powermat USA - Another one that has mediocre reviews but tends to work great for others. Will cost you around $70.
  4. Duracell myGrid - Another one with reviews in the middle. Costs around $75. This is designed more for cell phones.
  5. Roll up pad by Turbo Charge - This is newer to the market. Costs around $30 and you're going to find that it may or may not work for you.
Since these charging pads are relatively new, I would advise that you purchase at your own risk. Make sure that you look into a few of them to see if it's going to work for you. You may find that it will work or it may be a complete bust.
When you're in the market for a charging pad, I created a top 5 list where you can browse links to the items, prices, and more.

Monday, August 9, 2010

1980s Computer Information Available on the Web By Jason MacOwen

While it may seem strange to talk about a 1980s computer being an 'antique', that's really what it is. Technology has changed so quickly that computers built just 25 years ago seem hopelessly outdated.
Yet for true computer geeks, 80s computers represent the start of the modern age of what has become an everyday part of our lives. These old machines are treasured by many who snap them up on eBay and the buyers who religiously purchase and collect them.
There are many sites online that contain a treasure trove of information about the1980s computer you might fondly remember from your college dorm or kitchen table.
The websites often offer quality and comprehensive articles on 80s computers like the Apple McIntosh, Lisa, Newton and other IBM and IBM compatible machines including how they were made and marketed. It's a history of computing, designed to be fun.
Many sites also provide links to the hottest auctions on eBay-those involving that 1980s computer you remember! Yes, there are still plenty of working models out there, waiting to be used and prepare to face competition for something you may have thought was junk. The laptop or smartphone you may carry around today got its start through the technology that debuted with that 80s computer you thought was so revolutionary at the time.
Those actively involved in collecting or maintaining a 1980s computer will appreciate having all of the information and buying opportunities in one central location. It is very important to have quality information that you can count on, available at your finger tips for any serious collector. If you're old enough to remember them, calling them computer antiques might be sort of a depressing name, but it's actually a nod to how far our technology has come in a very short period of time.
For information and everything you need to know before you buy an 80s computer visit the webs best resource for buying a 1980s computer

1980s Computer Information Available on the Web By Jason MacOwen Article Word Count:

While it may seem strange to talk about a 1980s computer being an 'antique', that's really what it is. Technology has changed so quickly that computers built just 25 years ago seem hopelessly outdated.
Yet for true computer geeks, 80s computers represent the start of the modern age of what has become an everyday part of our lives. These old machines are treasured by many who snap them up on eBay and the buyers who religiously purchase and collect them.
There are many sites online that contain a treasure trove of information about the1980s computer you might fondly remember from your college dorm or kitchen table.
The websites often offer quality and comprehensive articles on 80s computers like the Apple McIntosh, Lisa, Newton and other IBM and IBM compatible machines including how they were made and marketed. It's a history of computing, designed to be fun.
Many sites also provide links to the hottest auctions on eBay-those involving that 1980s computer you remember! Yes, there are still plenty of working models out there, waiting to be used and prepare to face competition for something you may have thought was junk. The laptop or smartphone you may carry around today got its start through the technology that debuted with that 80s computer you thought was so revolutionary at the time.
Those actively involved in collecting or maintaining a 1980s computer will appreciate having all of the information and buying opportunities in one central location. It is very important to have quality information that you can count on, available at your finger tips for any serious collector. If you're old enough to remember them, calling them computer antiques might be sort of a depressing name, but it's actually a nod to how far our technology has come in a very short period of time.
For information and everything you need to know before you buy an 80s computer visit the webs best resource for buying a 1980s computer

HOME :: Computers-and-Technology Why Even the Best VPN Services Have Problems Providing Real Online Privacy By Lana Holy

There are two aspects to server security and privacy for a good VPN service:
The first is whether the VPN provider's server network is secure and cannot be hacked into by criminals trying to sniff data and personal information or get information about the overall network configuration and principal server.
The second is the location of the servers. If all the servers AND the VPN provider's location are in cooperative regions such as the United States and Europe, the security is about as good as using your local ISP. If none of the servers are in non cooperative or off shore locations, then data retention laws apply to that VPN provider just as if they were your ISP.
A recent criminal investigation involving the encrypted email provider, Hushmail, which is based in Canada, is a case in point. Unbeknown to one of its users, Hushmail (against its stated privacy policy) logged and cached data about the user for months and delivered that information to government authorities in another country pursuant to court orders (this was a run of the mill criminal- not terrorism or human trafficking). Had Hushmail been located in Panama or some other off shore location, it is less likely that Hushmail would have acted on behalf of the police authorities.
If the VPN provider is physically located in a cooperative jurisdiction but has servers in non cooperative jurisdictions like Panama, Russia, China, then this is better privacy. But the highest privacy is if BOTH the physical location of the VPN provider and at least some of their servers are in non cooperative off shore locations. Then data retention laws cannot be enforced and the VPN provider is far less likely to breach its stated privacy policy to log, cache and hand over your data/information/IPs.
If you use internet and hot spots, learn how to protect yourself against online threats. Visit my Best VPN Reviews site to get free tips for ultimate online security and privacy.

Sunday, May 23, 2010

Stop Harassment of Cyber Stalkers With a Reverse Email Look-Up


As continuous changes occur to the devices of technology that many of us use on a daily basis, so do the problems that can occur with the use of high-tech devices such as browsing the Internet with a home or business computer. One growing problem that several individuals have faced is harassing emails that are received from cyber stalkers that resort to sending threatening messages to specific victims they have chosen. For the victim of continuous threats, this can be a very scary situation to endure. However, even though people are noticing more technical problems these days that include email stalking, the procedures that are used to catch these offenders has also changed with the times and become more technical.
The harassment, the threats, and the whole frightening experience of being stalked through your email address can be put to an end when you speak with an experienced professional that can perform an investigation that is known as a reverse email look-up. This unique and beneficial service gives individuals the ability to reveal the cyber stalkers identity. Through this type of trace you can also learn the telephone number, address, name, information of employment, ISP, links to sites showing the activity of the stalker, and various other forms of information that can reveal the type of person that you are dealing with. The evidence that is found through a reverse email look-up can also be very beneficial to any authorities that you have contacted to solve your case and catch the individual that is threatening you.
Requesting a reverse email trace of cyber stalkers is a process that takes very little of your time and it is certainly considered as an inexpensive service when victims of stalking take into consideration the benefits that are provided to them. All the expert will require to perform this helpful investigation is for you to provide an email address of the party that is sending threatening and harassing emails to you on your email account.
Many people often make the mistake of using purchased email look-ups that can be found on various sites online, only to find that they simply do not provide the information that has been promised. The only way that you can be sure to successfully gain the full identity of bullying cyber stalkers is by consulting with experts that have the tools to perform a profession reverse email look-up investigation.
Copyright (c) 2010 Ed Opperman
Ed Opperman is President of Opperman Investigations Inc.If you need help with a cyber stalking investigation visit http://www.emailrevealer.com

Technology Articles - How to Write Technology Articles Successfully


Technology articles (or technical articles are they are sometime known) are defined as articles that describe a procedure, give instructions or relay information about a technical product. This can include cell - phones, internet software, computers, mp3 players, DVDs, Blue ray and so on. Anyone who sells such devices online can benefit from posting technology articles to drive traffic to their website. Standard technology articles are available online for free or there are article- writing services available that will customise the technology article you require for your product. If you feel that you can write your own technology article then here are some tips to increase its quality-
1. Understand the technology. If you selling a cell-phone, for example- you need to know more than how to turn it on. You'll want to invest time in getting to know all the key benefits of this product, what it can do and why it's worth buying. The more information you know, the easier it will be to word it in your own unique writing style. Plus, when you know all your facts, the reader will trust that you genuinely know the product and assume that they finding out about something worthwhile.
2. Find out what's hot and what's not. People who are searching for technology articles or products online will mostly want information on the latest technologies. Talking about video players might not be the best idea in this respect. Keep yourself updated on what is newly available on the market and if possible give the reader new and exciting information on up and coming technology.
3. Use catchy titles. Technology can be boring to the average person plus there is so much technology available online now that it's hard for the reader to know what to click on first. You must grab their attention from the start using hook-lines such as - "Amazing new 3D screen about to be released." This creates a need within the reader to find out more and will give you an advantage over the more mundane technology articles out there.
4. Don't be afraid to use pictures. Where technology is concerned, people like to see visual evidence of what you are describing. Pictures are a great motivator for people to want the product or at least click on your link to find out more. It is just another way to engage the senses and prove to the reader that this product exists. You might also want to give them some links to relevant e-books or other products that you are selling, if they do not commit to one product, they might be more suited to something else.
5. Use relatively easy language in your technology article. There are few people that know the full depth of the technology you are describing so don't bore them with too much technical jargon. Allow them to feel like they understand what they are reading about, you don't want them to go away confused and irritated. If you keep it simple whilst showing them that you know what you are talking about, they will be more impressed. The result will be an entertaining and successful technology article to be proud of.
If you are looking for high quality articles to drive free traffic to your website or business.Just go to our website at http://www.20dollararticles.com where you will get the highest quality articles, written by U.K. writers at a very reasonable price or our sister site http://www.articleswrittenuk.com
Have A Wonderful Day
Cherie xx

Why Are Computers Important?


We live in a world of computers. Whether we like it or not, computers are here to stay and are going to be around long after you and I are long gone.
I remember when I first started playing on the computer. Do you? I didn't know anything about them. Computers are one of those things where the more you doodle with them, the more you learn. Granted they can be intimidating at first, but the longer that you plug away at them, the better you'll get. (Just like anything else I suppose.)
I started learning about computers late. My little cousins knew more about them than I did. What a shame. If I knew that computers would be that important as I grew older in life, I would of taken the time to learn more about them.
For anyone out there that doesn't know much about computers, I recommend trying to learn as much as you can. I'm not saying be a computer expert or anything like that. Just learn the basics, Like sending an e-mail, basic typing, copy and paste, etc. When ever you have time. It will help out a lot.
Better yet, If you know any older people in you life, then maybe you can pass on the message about computers and how important they will become.( I think about my mom as I write this article)
Almost everybody I know has a computer. It seems like it's soon going to become mandatory that every household in the world has one. You never know, maybe by the year 2015, they will. Who knows?
Just one piece of info. that I'd like to give you before I close this article. I Googled "How many internet users in the world" and according to World Internet Usage Statistics there are over 1,000,000,000 (one billion). My friends that is a lot!
So....The Computers age is only gonna get bigger and bigger as the years move on. I think this a very good reason to get some kind of computer skills under you belt. Both old and young.
Thank you for spending your time with me!

What is Personal Security Application?


Personal Security is a rogue antispyware program that has been challenging computer users for a while now and has recently become extremely active. So here is what you need to know about this malicious application.
Personal Security spreads on the Internet and its infiltration to computers is based on Trojan viruses. The installation of it doesn't require to be authorized by computer user and it doesn't ask your permission to be started. Actually the program is configured to start automatically as soon as computer is restarted after its infiltration.
Once started, the program uses its bogus scanner and pretends to look for infections. Right when it finishes, the program displays a list of files and reports them as infections. The truth is that these files are either your legitimate Windows programs or fake files that don't exist at all. That is the reason why you shouldn't do anything that this application tells you to do. It is simply trying to trick you.
Additionally, the program tricks you by displaying fake security alerts stating that it has detected numerous privacy violations, internal system conflict or similar. It is also highly possible to receive imitated Windows crash or Blue Screen of Death. You must be aware that these actions are not real and it's only a consequence of Personal Security running on your system.
Please get rid of Personal Security as soon as you notice it on your computer. Do not hesitate as you will experience more and more negative effects of this badware.

Alpha Testing and Beta Testing


Before any software product can be released it must be tested. Typically a formal test strategy is planned and executed on the software before it can be considered for release. Often after the formal phases of testing have been completed, additional testing is performed called Alpha and Beta testing.
Alpha testing is done before the software is made available to the general public. Typically, the developers will perform the Alpha testing using white box testing techniques. Subsequent black box and grey box techniques will be carried out afterwards. The focus is on simulating real users by using these techniques and carrying out tasks and operations that a typical user might perform. Normally, the actual Alpha testing itself will be carried out in a lab type environment and not in the usual workplaces. Once these techniques have been satisfactorily completed, the Alpha testing is considered to be complete.
The next phase of testing is known as Beta testing. Unlike Alpha testing, people outside of the company are included to perform the testing. As the aim is to perform a sanity check before the products release, there may be defects found during this stage, so the distribution of the software is limited to a selection of users outside of the company. Typically, outsourced testing companies are used as their feedback is independent and from a different perspective than that of the software development company employees. The feedback can be used to fix defects that were missed, assist in preparing support teams for expected issues or in some cases even enforce last minute changes to functionality.
In some cases, the Beta version of software will be made available to the general public. This can give vital 'real-world' information for software/systems that rely on acceptable performance and load to function correctly.
The types of techniques used during a public Beta test are typically restricted to Black box techniques. This is due to the fact that the general public does not have inside knowledge of the software code under test, and secondly the aim of the Beta test is often to gain a sanity check, and also to retrieve future customer feedback from how the product will be used in the real world.
Various sectors of the public are often eager to take part in Beta testing, as it can give them the opportunity to see and use products before their public release. Many companies use this phase of testing to assist with marketing their product. For example, Beta versions of a software application get people using the product and talking about it which (if the application is any good) builds hype and pre-orders before its public release.
http://www.testing4success.com is a professional software testing company providing highly cost-effective outsource software testing services to companies around the globe. We can provide QA - Quality Assurance services to supplement your existing project, or provide dedicated outsource software testing for entire projects, all delivered on-time and with outstanding results.

Friday, May 21, 2010

IT Services Companies - Switching From Uncle Bob to Full Service IT

Denver IT Services
When to upgrade from Uncle Bob.
Many small companies have an "Uncle Bob" who supports their IT Services. Uncle Bob is usually a family member or close friend of someone on staff. Uncle Bob comes in twice a month to fiddle with the server and answer any spare questions. No one is really sure what he does, but everything seems to work.
This arrangement fits the bill for many small businesses because their technology is simple and their expectations are low. Never mind that they can't share calendars, so long as their email comes, everything is fine. Never mind that they don't backup their files, at least the internet works most of the time.
Things can hum along for years this way until a new employee starts asking about the new functionality, the company grows to a point that Uncle Bob can't keep up, or Uncle Bob retires, quits, starts a formal job, or otherwise can no longer work on their IT Services.
The company is faced with a decision. Either poll the employees to see if anyone knows another Uncle Bob, or hire an IT Services company.
Why IT Services is important
There are many differences between one-man-show IT, and an IT services company, and not all companies are made alike. The following are some characteristics to consider in finding the right IT Services company.
  1. Depth of skill - IT services companies should have a variety of resources to meet every aspect of small business IT needs. Commonly, companies should have help desk, managed services, network engineer, virtual CIO, training, and applications employees.
  2. Management system - IT services companies use IT management systems to organize and structure the maintenance of clients' hardware and IT needs. These management systems provide transparency to the clients and easy access to key information.
  3. Diverse Experience - IT services companies support many different clients with disparate and similar IT needs. They are better suited to provide insight into your systems than an Uncle Bob because they have experience addressing problems with many different companies.
  4. There are several other considerations listed on this IT Vendor Questionnaire
Usually the decision to find an IT services business instead of an Uncle Bob is based on the size of the company. Businesses with more than 10 employees need IT Services. Technology for a business with fewer than 10 employees doesn't justify IT services, or even having a server for that matter.
Complexity of IT is also a factor. Some businesses with fewer than 10 employees have very complex infrastructure that justifies and requires all of the benefits of good IT Services.
Steven Nichols works with Mission Critical Systems, the Denver IT Services firm. We are a well established Denver IT Services Company. We sell peace of mind and transparency to help businesses better manage their IT.
For more information please visit http://www.mcstech.net/IT-management.cfm, or call 303.383.1627 x 1104.

Store and Play Any Formats Using iPod File Converter

iPod is specially been designed for music lovers. Most of the memory in an iPod is used for storage of music files. There are many types of iPod devices available in the market such as the iPod nano, iPod touch, iPod shuffle and all of these have unique features.
The iPod touch has a battery life of forty hours, while the iPod touch has a touch screen. Like this, all the iPod devices have some or the other unusual features in them.
Most of the iPod devices can play the audio formats that include WAV, MP3, AAC/M4A, AIFF, protected AAC and audible audio books. The iPod photo can display GIF, JPEG, TIFF, PNG and BMP image formats. In addition, iPod can play QuickTime video and MPEG-4 file formats. Having all these features, the iPod also has some limitations.
However, if you have a video or audio file that the iPod does not support, you can play these files by converting them into the desired format. You can convert these files by using a software program called as file converter.
The file converter software is an ultimate program for transforming the incompatible file formats into supporting file formats. This software of file converter has a user-friendly design and people can use it very conveniently.
The software is very useful to iPod users. You can now store all the audio and video file formats that are not compatible with the iPod with the help of file converter software. By using this software, you can also play flash videos on your iPod touch.
This is a useful software to listen and watch all the unsupported file formats on your iPods. In fact, the availability of this software is not a big deal, as there are plenty of websites on the Internet that offer file converter software programs.
For information on customizing your iPad, Game Console, or Motoral phone, visit Wrappz. Wrappz offers a variety of accessories including windows mobile skins and Motorola Skins.

Restoring an iPad

The Restore function is a usual procedure for troubleshooting any iPad. If you have any problems with the functioning of your iPad, the Restore function might help you to solve it.
Restoring an iPad will result in the deletion of all the previously saved data such as music, videos, calendar information, contacts and so on. In addition, it restores all the settings to factory condition. Before restoring your iPad, backup all your valuable information on iTunes.
Follow the following steps to restore your iPad:
1. Ensure that you have the latest version of iTunes installed on your iPad. In addition, make sure that an Internet connection is available.
2. Now, connect your iPad to your computer and select the device in iTunes.
3. Through the Summary tab, select the Restore option.
4. iTunes will prompt you to backup all the data and settings on your iPad before restoring. If you have just performed a backup prior to restoring, you will not need to backup again. If you do not wish to backup any information, you can proceed with the restoring process.
5. Now, iTunes will prompt you to restore the iPad. If you have already backed up all the valuable information, you can proceed without hesitation.
6. The restore process will take place, after which your iPad will restart. A message will ask you to keep the iPad connected to your computer while it restarts. Once it restarts, you can access it through iTunes once more.
7. Finally, iTunes will prompt you to restore backed up data onto your iPad. Depending on the number of backups you have performed previously, you will have to choose from a list of available backups. After choosing the appropriate backup, click on 'Continue' to complete restoration.
8. In case, you do not want to backup any information, you can select 'Set up as a new iPad'.
Follow these steps to perform a successful restoration of your iPad.
For information on customizing your iPad, Game Console, or Motoral phone, visit Wrappz. Wrappz offers a variety of accessories including windows mobile skins and Motorola Skins.

Protection of Your iPad

People buying new iPad devices need to learn the best ways to protect their devices. These devices are very expensive and can suffer damage if not protected properly. The screens of the iPads can be ruined and scratched.
iPad is a device that will enhance your life and make things very easy for you. However, you will have to ensure the safety of your iPad. Following are some things that will help you in protecting your iPad:
1. Case:
You need to purchase a protective case for your iPad. Many cases, such as laptop-type cases, small cases and silicone cases are available for iPads. The silicone cases have sleek and slim designs for comfortable usage, while the folder cases add a professional look to the iPad. In addition, they also provide some space for pens and paperwork. Laptop-type cases provide safer storage, as they have separate apparatus for carrying iPad and some additional necessities.
However, silicone cases provide better protection and easier access to the iPad.
2. Scratch Protector:
Next, you need a scratch protector to protect screen of your iPad. iPads have a beautiful, big screen and they need to be protected all the time. Screen protectors keep the screen safe from scratches. In addition, they also provide protection from jerks and sudden movement during transportation. For the best protection of your iPad screen, you need to purchase good quality screen protectors.
3. Protection from Theft:
You need to be careful while carrying iPads, as they are very lucrative items. Never make the mistake of leaving the iPad in your car, thinking that nobody will steal it. Thieves can break car windows and steal these devices. You always need to keep the iPad covered and protected.
By purchasing these things for protection of your iPad, you can be confident that your iPad will remain safe.
For information on customizing your iPad, Game Console, or Motoral phone, visit Wrappz. Wrappz offers a variety of accessories including windows mobile skins and Motorola Skins.

What is Phishing and How Can I Avoid It?

Phishing is a method that fraudsters use to trick victims into disclosing confidential information such as bank account details, credit card numbers, email account username and passwords. The means vary but generally the favored method is via an email asking the victim that they are required to urgently update their, for example, bank records or risk having their account closed. The email contains a disguised link which on the surface seems legitimate but instead directs the victim to a fraudulent website. The website is designed to look and feel like the banks website together with the company logos and colors to trick the unsuspecting victim into disclosing whatever the details it requests - in this case for example bank details and credit card numbers.
So how can I avoid them? Well, the short answer is that you can't, but most operating systems and internet browsers now contain methods to warn potential victims of the risk when visiting that site.
Even though there are safety features built into the modern Internet browser, the fact of the matter is that there are 1000's of new Phishing scams created EVERY day, so the likelihood of a new scam being missed is highly probable.
So is this is losing battle? No, of course not, as long as you are aware of the warning signs. The general rule of thumb is that the modern bank should NEVER send you an email requesting that you update your profile. But, if you are sent an email it should ask you to visit the banks website by entering the web address (URL) into the browser directly, instead of clicking on a link. In fact, that is the BEST and the MOST RELIABLE method to safe guard against Phishing websites, never click on a link in the email, always enter the company's URL directly.
Phishing emails are here to stay, hopefully over time people are educated enough of the warning signs and risks so that the time spent by the fraudsters is not profitable. But for now, be careful of any email sent to your inbox requesting you to update ANY details. This is not only limited to banks, but also email accounts, Facebook profiles - etc.
About me:
I have been working in the IT Industry for over 15years, specializing in Microsoft Security and Infrastructure. I have always been concerned about my elderly parents being caught by an online scam, so I have been keeping notes about all the scams that I have been exposed to. So over time, I thought it would be best to create a website to not only warn my parents, but others.
Visit me at: http://bescamaware.com.

Computer Maintenance - Computer Repair in Hawaii

Computer Repair Hawaii
Computer Repair Services in Hawaii is not so much different than the mainland, particularly on the island of Oahu, but there are a few challenges. Having lived on Oahu over 45 years ago in Ewa Beach, and returning just over 7 years ago, the scene has changed drastically. Things were more rural back then, and of course there was no internet.
In Oahu, people seem to work on one side of the island and work on the other. Since there are only 1 or 2 ways to get around, traffic can be extremely congested, and parking can be a challenge. So whether you are looking for a Computer Repair Shop to drop off your computer, or waiting for a Mobile Technician to drive out to you, timing can be a challenge. For some reason, even in Paradise, things can get pretty busy. With that said, I just wanted to put out my two-cents that affect both the customer and the service provider about computer repair in Oahu.
Traffic Challenges
If you live in Waianae, Waialua, Haliewa, or the North Shore, Windward and around Waimanalo, you will have to rely on Mobile Technicians willing to come out to your location, or to drive the distance yourself. The problem with dropping off a sick computer yourself is that most shops open about 9-10am and close at 6pm. You either have to take time off from work, hope traffic is light after getting off work, or just wait until a day off.
For some reason, there are no shops I am aware of in Waianae, Haliewa and all througout the North Shore. Shops on the Windward side are scarce as well, but I vaguely heard that there may be a shop out in Kaneohe, but they must not do much advertising. If you have a Macintosh, there is definitely a shop in Kailua, just be aware that not all shops repair both PCs and Macs, and neither do mobile technicians.
My Rant About Windward Computer Repair
Concerning computer repair for our valued Windward customers, I have to rant a little bit. Windward customers in Kaneohe and Kailua are fiercely loyal to their local businesses, which is a good thing. But when it comes to computer repair and they are looking for a mobile technician, they always want someone who seems closer to where they are, which at first, seems to make sense.
If they call you and you actually have a physical location and provide both in-shop and mobile services, they get hung-up on your shop's physical location even though they are calling for mobile service. The truth is, that they have no idea where the technician is coming from. The technician might already be scheduled to be out in that area for another customer and can easily set an appointment for you as well. They aren't necessarily just sitting around at home all day waiting for you to call, so you just can't assume where they will be dispatched from. That may sound harsh, but it always surprises me when we spend some valuable time over the phone with a prospective customer, trying to understand their computer problems and comfort them with our solution to their problem, and as soon as we mention that our shop is over the hill on the other side of H3, they start backing out of the conversation almost as if they thought they were doing "us" a favor and say thanks but no-thanks, we'll just call someone a little closer. I don't get it, and even when I can truthfully say that I have a tech in the area already, they don't care. I know other shop owners who get this same response about mobile repair on the Windward side. The fact is that we are happy to serve customers on the Windward side, and we appreciate their loyalty once they finally hire us to repair their computer. But it is a hurdle starting that relationship. I might add that it is a beautiful drive to the Windward side, especially if you get to drive back through the Northshore if you have the time. I always look forward to a good Shrimp Plate lunch from one of my favorite shrimp trucks along the way.
Parking for Mobile Computer Repair Technicians
If your business or home is located in a relatively populated area away from the areas I just mentioned, you'll have plenty of options for both in-shop and onsite computer repair in Oahu. But if you need service in the congested business areas of downtown or Waikiki, parking is a problem. My suggestion is that if you want prompt service, that you provide information to the technician about the most convenient place to park as well as any parking fees (which may be added to your bill). You might even be able to pre-arrange parking in a reserved area for vendors. And lastly, it even helps to know details such as any vehicle height restrictions for parking garages, or detours due to emergency or special events.
Giving Directions
When setting an appointment for mobile service, it is vital that you provide an accurate address and phone number. Many local Hawaii residents prefer to give directions and landmarks than actual addresses, but Mobile Technicians end up learning the island pretty well and even use GPS devices these days. Some even print out directions with Yahoo or Google before coming out. We would prefer that you just give us your complete address and then maybe a landmark if you live in an obscure hard to find location. We need the address for our invoice anyway. We appreciate the directions, but customers somehow assume we will be driving to their location the same way they do everyday, but the fact is that we might be coming from the other way, and then left become right, and right becomes left and it gets confusing while driving.
Be Sure to Give and Get Correct Phone Numbers
As for your phone number, things happen and we may need to call you. We also like to call before we come out to ensure you'll be home. Fortunately, we aren't like the cable companies that tell you they will arrive between 9-5. Mobile Technicians can usually provide you with a 30-60 minute window. But if you have something come up, we would appreciate if you could call us as soon as possible to postpone.
Also, be sure that you know which Computer Repair company you made the appointment with and have their correct number. Many customers call quite a few shops before they choose who they will make their appointment with and get phone numbers mixed up. Some even call us more than once because we have more than one phone number. It gets quite funny hearing the same person calling again, now using a better description of their problem because of talking to us earlier. The problem is that it might get confusing to remember who you chose in the end. Now and then I'll get a person calling us by mistake to cancel an appointment that we never made. Imagine the frustration of the technician when he drove out to your home or business just to find out that you said you called and cancelled already, why are you here?
In-Shop vs Onsite Computer Maintenance
This basically boils down to price, turn-around time and convenience. In-shop repair fees are usually flat rate fee based, and takes days to get back, but you will get more thorough service this way. Shops are also more prepared for the extremely difficult problems. With shops, you can just walk-in during normal business hours, although you should call first to get guidance on what to bring. For laptops, you should always bring the AC Adapter (battery charger). For desktops, we usually only need the computer itself (no cables or peripherals, although it wouldn't hurt if you brought your CDs).
Onsite service is usually hourly fee based, and may even have a trip charge. Onsite service by nature is by appointment only, but many problems can be diagnosed and repaired within an hour or two. With onsite service, it is crucial that you describe your computer problem as well as possible, because if it sounds obvious that it might be a hardware problem, your computer may be a better candidate for in-shop repair. It's already difficult enough to get certain types of parts on island such as motherboards and CPUs at a Computer Store, so you can expect that a Mobile Technician will not have every part needed to fix every computer in their vehicle. Some parts even have to be ordered online and can take a week or so to arrive. Hopefully you can see the complications this may cause with setting another appointment as well as how the technician will bill you for the first and second appointments. It would just be better to bring these problem computers to a shop.
Major Limitations for Mobile Only Technicians
I certainly do not want to knock mobile only technicians, because I got my start that way. But you have to know that these ones can only service a small finite number of customers in any given day. Many people get attached to their computer guy once trust is established, but it can get frustrating when your trusty Mobile PC Tech cannot make it out fast enough. They might even need to take a vacation and when you get a hold of them on their cell phone, you find out they are on the mainland for a week or two. If you can't wait, you have to find someone else.
Mobile repair is limited as well for reasons spelled out in the "In-Shop vs Onsite Computer Maintenance" section above. There are also certain types of maintenance that will never get done onsite due to how long it will take. If I think I have to perform a surface scan on a hard drive just for starters (which can take 2 hours or more in some cases), I almost immediately recommend I take the computer back to the shop to complete at the flat rate. Some computers develop multiple problems and can take 4-5 hours to repair. For one, it will save you on further hourly charges, but it will also help the technician to be on time for other appointments after you, since he probably only allotted 2 hours for your appointment. The complicated part is that a mobile technician may not have a shop to take your computer to, and may only be able to take it to their home. If you are okay with that, then fine, no problem.
I would add that a technician that has both in-shop and onsite experience are the best technicians. For mobile only technicians, it can be hard to get this experience because they will rarely get a customer that is willing to pay a technician to spend 4-5 hours onsite, not to mention having to dedicate their own personal time as well to be there. But if the technician doesn't ever get the chance to spend time on the real hard problems, it is unlikely that they will ever progress to become a master technician. If you were choosing a doctor for a complicated surgery, how concerned would you be about his or her experience? The answer is obvious.
Anyway, while our computers and online lives might not be life and death situations, we seem dependant on them nevertheless. So I hope this insight into both sides of Computer Maintenance and Repair in Hawaii help you make the right decisions when that inevitable computer problem occurs. That way, you can be armed with the insight to make the best choice available for your computer needs.
Dale Powell Jr invites everyday internet surfers to get more pro-actively involved in your online internet security and computer health. You can begin by reading my Free Report which you can sign-up for at: http://spywarepreventionguy.com
Dale Powell
http://gakidooscomputerrepair.com
Copyright © 2010, All Rights Reserved Worldwide

Using Solr Search With RDBMS

In many shops some of the most common queries used in large scale RDBMS systems such as Oracle are for pattern searches within ranges of criteria, typically targeted searches for data by users to answer and meet certain business needs. Writing standardized reports or simple relational queries can answer the questions, but such mechanisms can be inflexible and costly to maintain. One more efficient way to address these challenges is through the power of Solr.
Getting the Data
After installing Solr onto a standalone server outside of the production complex, the next step involved actually configuring Solr so that we could get the data we needed. A few decisions were made at this point. The first decision happened to be about the data itself. I decided to target many of the existing information structures within the application which had been simplified to meet other business reporting needs. Additionally by using these structures it would make configuration easier later on. The second decision involved whether to store the data values in the index itself. While ideally the data would have been accessed from the production database instance, I decided instead to store the data within the index for easier retrieval and to reduce the queries against the production database instance itself. The final decision involved how much of the data could be safely retrieved via the DataImportHandler and stored within Solr. This actually turned out to be pretty simple. The Oracle constructs only held a week work's of data, per an agreement with the business users. I would start with that amount and from there determine how much further could be held within the Solr instance.
Searching with Solr
The data once imported was not very large, only 50GB worth of data overall. This again could be managed by adjusting the field types, whether data had to be stored or not, and the amount of historical information to be imported. Now that the data was available, searches could be executed on the data.
I also found the packaged Schema Browser was very handy. Admittedly, the Schema Browser takes a while to process all the fields in the index so if you have a lot of data this can take a while. However the benefit is that it can provide answers to some of the more common questions that could be asked such as: the number of documents per value which can help for groups of items such as types of orders; how many documents actually have parent accounts; how orders are provided by various sending systems;how many orders are for a given state or postal code; etc. The data can also yield additional insights from more advanced searches such as faceted searches, such as what postal codes are responding to which advertising or product promotions; which areas have the most activity for certain types of orders; or, how many domains are covered per type of account. And the list goes on.
Operationally speaking, the Solr instances were managed in one of two ways: periodic updates from the main production instances or continual updates with application code not only adding data to the Oracle database but inserting them into the Solr index as well. Hence the operations against the existing production instances could be managed to minimize impacts and eliminate any unnecessary processing.
Conclusion
With these new capabilities, answers to key questions can be found in seconds. Data can be mined quickly, efficiently and flexibly without a lot of specialized training for business users. Additionally, the indexes could be managed in such a way such that additional data could be added for to increase the scope of analysis, or subsets of data could be indexed and searched for specific business reasons such as service outages or legal reasons.

An Interesting Computer Trick

There are lots of articles and posts available in the internet that describes how you make your computer fast. On of these is applying best performance option in the control panel. But enabling this option you have to compromise with best appearance which you don't want. But don't worry, I have a trick in which you will get best performance without compromising your best appearance settings. I already applied this trick with my PC for the past 10 years and it's working fine. Follow the Steps below.
step1: Right click on desktop and select properties;
step2: In the appearance tab, click on effects, tick the 2nd option(if not already selected) and in the drop down menu
select 'clear type'. Uncheck all the options, then click ok and apply.
step3: now in the theme tab save your settings say 'my theme' for example, then apply and ok;
step4: Now right click on my computer, go to advance-->performance settings and select adjust for best performance, then click apply then ok;
(Note: if you already performed this step before step 1&2, then you have to select for best appearance first before applying step 1)
step5: Right click on desktop and select properties;
step6: In the theme tab, in the drop down menu of 'save as' option select 'my current theme' and click on apply button. Again in the drop down menu select 'my theme' as you saved earlier and click on apply and then ok and you are done.
Don't forget to comment about this trick.
For more information visit my website: http://therealhacks.blogspot.com
Hi, I'm Sanjiv Sinha and I write Hacker's World Blog to help people make their pc error free and faster than ever before by applying some tweaks & hacks. If you have some tricks or articles related to computer, please email: airlines92@gmail.com.
For more information visit my website: http://therealhacks.blogspot.com

The Most Awesome Planes of All Time

We see planes nearly every day of our lives, passing through the sky taking passengers from point A to point B. But planes are so much more than this: they have expanded our world knowledge, taken a fundamental part in wars, and have pushed the bounds of technological advancement time and time again. So to honour these wonders of the sky, we have found the most awesome planes of all time.
Concorde
Sadly there are no Concorde's still in service; but these planes can be seen throughout the UK and abroad at museums [1]. In fact, people taking off from Manchester airport may have seen one there, or those passing through Heathrow. The Concorde is such a legendary plane due to its supersonic status, and its record flight from New York to London in 2h 52m. If you were wondering about the dipped nose on the plane, it is so pilots could have better visibility during takeoff and landing. The last of the transatlantic Concorde flights was on October 24th, 2003.
Harrier
The Harrier is one of the most prolific RAF planes of all time. It is models like this which inspire memorabilia like RAF watches, as well as drawing many guests to transport museums all over the world. The Harrier jump jet uses the force of jet engine thrust pointed downwards for a vertical liftoff. It can also hover for 90 seconds whilst being able to turn left, right, forwards or backwards [2].
Antonov
If you believe that size is impressive, you will surely agree that owning the title of the world's largest plane is enough to get it on to this list. The AN-225 is the biggest plane in the world, and even has the capacity to carry a space shuttle in between its wings [3]. There is only one of these planes in use, as its twin was never completed. However, the one that is in operation was used recently to get construction machinery to the Dominican Republic to assist in efforts to help Haiti get over the devastating earthquake.
Orlyonok WIG
This plane is something completely different to the others - as it appears to be sailing on water like a boat. WIG is an abbreviation of Wing In Ground-effect, and one of these planes looks like a hovercraft crossed with an aircraft. During design, the WIG was top secret, probably due to its unique abilities. Some of these planes are even amphibious, meaning they can work over land as well as over water.
[1] British Airways. (2010). About Concorde. http://www.britishairways.com/concorde/aboutconcorde.html
[2] RAF. (2010). Harrier GR7/7A. raf.mod.uk/equipment/harriergr7.cfm
[3] Antonov. (2010). AN-225. antonov.com/products/air/transport/AN-225/index.xml
Richard Nottingdon has an interest in the Royal Navy and collects Royal Navy memorabillia such as RAF watches.

An E-Greet - How to Use Video Greeting Cards

E-greeting cards, or video greeting cards, are a popular and easy-to-use tool for sending messages to family, friends, or business associates. An e-greet scheduler allows the user to send cards that are scheduled to arrive on a particular date, so you can be sure that you won't miss important birthdays, anniversaries or other events. It's also a great way to keep up light contact with business associates or clients, sending out a personalized greeting at Christmas or Easter, for example. This article explains how simple it is to use e-greeting tools. You can even host a video greeting card tool on your own website for your visitors to use, giving them another reason to return to your website again and again.
A flash video greeting card is an invitation or digital greeting which utilizes a video screen or multimedia player to convey light correspondence or relay a brief message. These flash email cards are typically facilitated by a video greeting card website, which allows a user to keep in touch with family, friends, or business associates by sending standard seasonal messages, inputting his or her own message or mixing a custom message with a standard "card" or video. You can also setup a free flash video greeting card page for clients to send them messages at no cost.
Since the video greeting card is hosted by a website, you can send one without installing or downloading any programs. All you have to do is choose from any of the provided e-card designs, record video straight from your webcam (if the site allows it), and then share the e-greeting card through a unique URL on the host site that others can access.
Before you start recording your video for the e-card, think about what message you would like to send. Your video could be as simple as saying "hi" to the recipient, involve a short message, or integrate some of your recent photos. You could also choose a song and play it on your MP3 or multimedia player as a background to your greeting. Keep in mind that there is absolutely no pressure involved -- if you make a mistake you can fine-tune or re-record the video. You will not waste any disk space as the recording is saved on the website itself.
To send a flash video greeting card you need an Internet connection, an e-card email website (which you can find through your browser's search engine), and your own webcam if you wish to send a personalized e-greeting. The site may prompt you via a window to inform you that the site wishes access to your web camera. If the site does not display a live image from your webcam, you may need to tweak your drivers or adjust your webcam. Make sure that there is enough available light to be able to record a clear video, and wait for a few seconds for the camera to automatically adjust its settings according to the ambient light. Press on the appropriate button to begin recording. Once you are done with your video message, press on the appropriate button to stop. View the video recording, and once satisfied, click on the link to send the e-greeting card. You may choose to send the video greeting card right then and there, or use the automatic scheduler, which allows you to save the flash greeting card and send it to the recipient at a prescheduled date that you have set.
You can find a simple, reliable script for Flash Video E-Cards that will allow you to integrate this service on your website, or create a dedicated webpage with it's own domain.
You might like to combine it with an Ez Scheduler that allows you to send e-greetings that you schedule in advance, which is a great way to keep light contact with clients.

Computer Has No Sound? - What Should You Do If Your Computer Has Lost Sound

Have you ever encountered the problem that the computer lost its sound? The following will provide you some methods to fix the problem.
(1) Check whether there is any problem on your hardware:
First, please check whether your sound card, speaker and connecting line work well. If those things are proved to work well on another computer, please go to the method (2).
(2) Check whether there is any problem on your audio driver:
In many cases, audio driver problem will also cause computer to lose its sound. You can check the case by performing the following steps:
A) Right-click My Computer;
B) Choose Properties;
C) Select hardware;
D) Click Device Manager;
E) Check whether there is a yellow question mark;
F) If you do find a question mark, you will need to reinstall your driver;
G) If you do not find any question mark, please refer to the next method.
(3) Check the settings on your computer:
If your sound driver has not problem, please operate the following steps:
A) Double-click the trumpet icon on the system tray
B) Check whether your Master Volume and Wave have been minimized or you have selected Mute all occasionally
C) If you do, please adjust the settings
D) Nowadays, there are some audio drivers which have the function of motion sensor and when you insert your headset, the system will pop up a window that requires you to choose what device you have inserted. If you choose the wrong option, that may cause the problem.
If you encounter any problem on installing audio driver, you can visit: Fix Audio Driver That is all. Hope the article will work for you.

Sunday, May 2, 2010

Rudal Supersonik untuk Indonesia

Rencana Indonesia untuk memperkuat jajaran angkatan perangnya nampaknya mendapat dukungan dari negara-negara sahabat. Setelah beberapa waktu mendatangkan pesawat tempur dari Brasil dan Sukhoi dari Rusia, kini India menawarkan alutsista untuk memperkuat pertahanan Indonesia. India menawarkan produk mereka berupa rudal jelajah supersonik yang disebut sebagai rudal tercepat di dunia di atas Tomahawk.
Rudal yang diberi nama BrahMos tersebut merupakan produksi bersama antara India dengan Rusia. Selain Indonesia, India juga menawarkan ke empat negara lain. Sesuai dengan perjanjian antara India dengan Rusia, rudal tersebut hanya boleh dijual ke negara-negara yang bersahabat.
BrahMos dibuat oleh BrahMos Aerospace perusahaan patungan India dan Rusia. Untuk menjual rudal tersebut, India membutuhkan persetujuan pemerintah Rusia.  Rudal yang diklaim sebagai rudal jelajah tercepat didunia tersebut dijual dengan harga tiga juta dolar AS.
spacer Rudal Supersonik 
untuk Indonesia

 
“Kami sedang dalam proses untuk mendapatkan izin (bagi penjualan) itu,” kata pejabat eksekutif BrahMos Aerospace, A. Sivathanu Pillai,  di sela pameran senjata di New Delhi.
Rudal tersebut, sudah digunakan untuk mendukung sistem pertahanan senjata India sejak 2007 baik di laut maupun di darat. Untuk Indonesia, rudal yang ditawarkan adalah rudal darat untuk pertahanan, sedangkan untuk negara lain yaitu Afrika Selatan, Brazil dan Chile ditawari rudal maritim yang bisaditembakkan dari kapal.
Menurut sang produsen, rudal tersebut mampu menembus kecepatan satu kilometer per detik. Rudal tersebut memiliki jangkauan serang hingga radius 280 kilometer. Soal daya rusak, rudal ini dilengkapi hulu ledak seberat 200 kilogram.
Selain merupakan rudal tercepat, rudal yang  namanya merupakan perpaduan antara Brahmaputra India dan Moscova Rusia itu  juga mengklaim bahwa dalam 10-15 tahun ke depan para produsen rudal jelajah negara-negara barat tidak dapat menyainginya karena perusahaan itu tidak hanya mampu meraih pertumbuhan tercepat tetapi juga biaya produksinya paling efisien.

Copyright, respective author or news agency

TNI AU Beli Pesawat Tempur Baru Untuk Jaga Perbatasan

Mulai hari ini 16 pesawat Super Tucano buatan Brasil akan menambah jajaran alat tempur TNI Angkatan Udara. Oleh TNI AU, pesawat-pesawat tersebut akan digunakan untuk patroli keamanan di wilayah-wilayah perbatasan Indonesia. Selain 16 Super Tucano, TNI AU juga akan membeli 3 pesawat Sukhoi untuk menambah kekuatan udara NKRI.

TNI AU melalui Kepala Staf TNI AU (KSAU) Marsekal Imam Sufaat, mengkonfirmasi hal tersebut. ”Dengan pengadaan alat utama sistem persenjataan (alutsista) tersebut diharapkan target zero accident bisa tercapai. Selama ini peralatan kami masih ada beberapa yang kurang layak sehingga perlu diganti,” demikian penjelasan KSAU seusai serah terima jabatan Gubernur Akademi Angkatan Udara di Yogyakarta, Sabtu (23/1/2010).

Mengenai pesawat buatan Brasil tersebut, Imam menjelaskan, Super Tucano telah dipakai sejumlah negara, seperti Kolombia, Guatemala, dan Republik Dominika. Sebagaimana halnya OV-10 Bronco, Super Tucano juga didesain untuk serangan udara ringan, antigerilya, pesawat latih, dan patroli perbatasan dengan sistem senjata dan avionik yang lebih canggih.
spacer TNI AU Beli Pesawat Tempur Baru Untuk Jaga Perbatasan

Super Tucano akan digunakan untuk menggantikan pesawat tempur taktis OV-10 Bronco North American Rockwell. TNI AU akan memanfaatkannya untuk pengamanan di daerah perbatasan. Pesawat juga dipakai untuk memantau penebangan liar, yang selama ini sulit terpantau. ”Di Brasil pesawat tersebut juga dipakai untuk pengamanan wilayah perbatasan,” tuturnya.

Alutsista China

Selain pesawat-pesawat tersebut, Indonesia juga akan menjajaki rencana pembelian alutsista asal China. Penjajakan itu disampaikan Menteri Koordinator Politik Hukum dan Keamanan (Menko Polhukam) Djoko Suyanto saat menjawab pers seusai mengikuti sidang kabinet paripurna di Istana Wakil Presiden, Jakarta, Jumat malam.

Sebelumnya, Djoko Suyanto bersama Menteri Luar Negeri Marty Natalegawa mendampingi State Councilor RRC (Menko Polhukam) Dai Bingguo menemui Presiden Susilo Bambang Yudhoyono di Kantor Presiden dan Wapres Boediono di Istana Wapres, Jakarta, Jumat.

Kunjungan Dai Bingguo beserta delegasi China ke Indonesia bertujuan untuk menindaklanjuti perjanjian kerja sama kemitraan antara Indonesia dan China yang sebelumnya ditandatangani Presiden Yudhoyono dan Presiden China Hu Jin Tao saat kunjungan kenegaraan Presiden di China.

”Kita memang pernah membeli alutsista China beberapa waktu lalu. Sekarang tidak lagi. Yang baru kita lakukan sekarang adalah penjajakan. Kita belum sampai kepada jenis alutsista seperti apa yang akan dibeli. Itu diserahkan kepada Kementerian Pertahanan dan TNI sendiri,” kata Djoko.

sumber : kompas

Deplu: Tidak ada Ormas RI Yang Akan Serang Malaysia

Isu mencuat keras. Kelompok BENDERA (Benteng Demokrasi Rakyat) akan ke Malaysia dan melakukan penyerangan. Disebutkan, serangan akan dilaksanakan serentak hari Kamis, 8 Oktober. Serangan itu akan dilakukan 1.500 pengikut Bendera bersenjatakan bambu runcing. Serangan dilakukan lewat udara, darat dan udara. Menanggapi hal itu, Departemen Luar Negeri (Deplu) Indonesia menyampaikan ke pihak Malaysia dan  memastikan tak ada kelompok di Indonesia yang akan menyerang Malaysia. Aparat keamanan Indonesia dan penegak hukum Indonesia, tidak akan membiarkan rakyat bergerak sendiri.
Juru bicara Deplu Teuku Faizasyah mengatakan bahwa isu tersebut hanya sekedar gossip, jangan ditanggapi serius. Pihak Malaysia dan sejumlah pejabat termasuk pejabat militer sudah mengatakan bahwa pihaknya akan mengantisipasi serangan ini.

Saturday, April 3, 2010

Want to Speed Up Your Computer? Get Rid of Your Corrupt Registry Files - Here's How

By Jeff Farley
When your computer starts to slow down, it is usually because of a corrupted registry file or files, or malware. If it is malware, then you can solve this by running a complete scan on your computer using a desktop security software. However, if the problem still persists, then you can more or less deduct that a problem with your Windows Registry is the culprit.
To solve this kind of glitch, you will need to fix your computer. Now, you can do this on your own by sifting through the registry files and deleted the files that have been corrupted; or you can get a Registry Repair software program. The reality is even the computer experts would not know which file should be deleted because it is the cause of the slow computer.
In other words, manually repairing your Windows registry is not a doable thing unless this is your niche, and you have been doing it for many years. The best is to first back up your system by using a Restore Point. This is part of your Windows set-up so you can do it immediately. Just click on Start/All Programs/Accessories/System Tools/Backup. It should be emphasized that you will be asked how far back you want to go. This date you will choose should be one when you know for sure that your PC was in perfect condition. What will happen is that once you do this, your computer will go back to the settings of that date, just like a virtual time machine.
After this, you should try to run the RegCure scanner to find the registry errors and fix them. Should there be no improvement even after this, then it only means that the date you provided was too late, and you will need to go further back. Try it. You will not have to worry about corrupted registry files again.
Click here for a FREE SCAN to see what deleted files are still lurking on your PC
Platinum Quality Author

Upgrading Your DC Electric Power Rectifiers Control

By Bernardo Sainz
TM Drive-DC FCR Product Guide
Increase your DC power rectifier system's life, and obtain a higher performance, friendly diagnostic tools and wide LAN communication options using digital control at low cost.>
Digital Controls
The FCR (Firing Circuit Replacement) is a TMEIC GE microprocessor-based process controller with dedicated I/O system, designed to be the controller of medium to large complexity SCR (Thyristor) bridges where the need for advanced control requirements, high speed response, expanded diagnostic capability and various interfaces are beyond the capability of conventional analog control.
Firing Commands, Fast As Light
The fiber optic technology is a great advantage of the FCR, where the gating commands do not have any lag on the sequence and response. Using Electric-Light conversion technology with FOT (Fiber Optic Transmission Board), the firings are sent to a Light-Electric inversion board.
The firing pulses are sent to the Light-Electric transmission board, which allows the FCR to control multiple bridge converters in 6 and 12 pulse configuration using 1 CPU and up to 24 pulse configuration using 2 CPU's.
Each fiber optic firing board has its healthy signals in benefit of maintenance and diagnose. Fiber optic is also immune to electromagnetic interference, a very important feature while working in high current applications.
Diagnostic Tools
The GE Control System Toolbox is a Windows®-based operator interface program used to configure, tune, and monitor FCRís. Its user-friendly interface by using diagrams to view signal flow, sequencing, and regulator control in the FCR, which helps the operator in all levels of setup and operation with password security levels for protecting the configuration.
Regulation and sequencing is driven by a set of parameters which can be edited/monitored using any of three operator-selected methods:
  • Functionally organized menus block diagrams that detail the regulators and sequencing function.
  • Wizards that guide the user through a complete drive configuration and tune-ups.
  • The drive control window which allows the user to control the system from the toolbox, having the look and feel of the drive diagnostic Interface.
Trend Recorder
The trend recorder monitors and graphs signal values from toolbox and graphs data collection analysis (.dca) files. Data can also be saved and exported for other applications, such as spreadsheets like Microsoft Excel.
This application is configured using drag-and-drop to move a variable from the block diagram view to the trend recorder window which has an intuitive VCR-style interface for data record and playback. Live data can be sampled and viewed as fast as 20 ms.
It uses three methods to collect data:
Real Time
Mode is for low-to-medium-data collection rates, typically used for live monitoring.
Capture Buffer
Using the trace back data feature which trends several preset variables at high speed, during fault events and save them on non volatile memory for its post-analysis.
Data Historian
mode for historical data contained *.Dca files. a given trend can display one or multiple data historian files using an innovation series controller, and a personal computer (pc). The program runs in the background as a service on the pc that is running the windows nt operating
system and records the values of any egd or srtp signal on any ethernet connected to the pc on which the program is running.
Trace Back Data
If you experience a fault on FCR equipment, Toolbox allows you to view Fault History and Traceback Data. This feature is capable to collect up to 8 events, and several selected variables at speeds up to 244 us storing the event on non volatile memory, remaining even while powering down the equipment. It also eliminates the need of using an oscilloscope during the failure solution, because it is able to display the information of these variables in a trend recorder window.
Remote Diagnostic Support
AMI GE offers the remote support option, where the distance monitoring is possible using either an internet connection, or telephone links to control the installed equipments through the maintenance pc and customers network. This feature reduces the time of diagnose and usually the equipments are put back in service faster.
Adaptability
FCR is 100% compatible with the Canadian General Electric Indoor DC rectifier, and matches with several DC power bridges where AMI GE offers different options of replacement depending on the application and customer needs. The FCR is provided with fast connectors (same as existing) to reduce transition time between existing and new system. Control/fiber optic transmission/fiber optic reception/ gating commands conditioning (partial or complete replacement of gate drive panel).
Instrumentation Interface
Standar Display
  • The digital display alternates between speed,current, and fault code in the event of an error
  • RJ-45 ethernet port for local/remote toolbox connection
  • Ready, run, and alarm/fault LED's
  • Interlock button disables drive
Optional Graphic Keypad
  • Four configurable variable bar graphs with descriptive legends
  • Status icons reflecting health of drive at a glance
  • Dedicated drive control keys for manual operation of the drive
  • Full access to all parameters and variables
Configuration
  • RJ-45 Ethernet interface
  • 10 Mbps maximum
  • Drive navigator option of TOSLINE-S20 to Ethernet connection using V-Series controller as gateway
  • Toolbox option of ISBus to Ethernet using Innovation Series ® Controller as gateway.
Meter Outputs
  • Armature and field current, ± 10V
  • Quantity 5 configurable,± 10 V
  • 8-bits resolution
I/O Interface
Digital Inputs
  • Opto-coupled 20 mA
  • Quantity 6 configurable mapping
Digital Inputs
  • Opto-coupled 10 mA
  • Quantity 1 configurable mapping
  • Quantity 1 dedicated mapping
Digital Outputs
  • Open collector 70 mA
  • Quantity 6 user defined
Analog Outputs
  • Quantity 2±10 V or 4-20mA
  • Differential 8, inputs impedance
  • 12-bits resolution
External Analog Outputs
  • Quantity 3±10 V, 10mA max
  • User defined
  • 8-bits resolution
Environmental
Operating Temperature
  • 0 to 40° C (32 to 104°F) at rated load at converter inlet.
  • -20 to 50°C (-4 to 122°F) with derating.
Altitude
  • 0 to 3500m (1148ft.) above sea level
  • Derate 2% per 200m above 1000m altitude.
Storage Temp.
  • -25 to 55°C (-13 To 131°F.
Humidity
  • 5 to 95% relative humidity, non-condensing
Installation Support
AMI GE used to provide all the necessary information to properly install the supplied equipment. This information includes, single-line diagrams, hardware prints, installation manuals, installation best practices and necessary environmental conditions to ensure trouble free operation for many years to come.
Besides, AMI GE offers different options of projects, including:
  • Power bridge audits. As an option, the cells verification is recommended to ensure the reliability and good conditions of the rectifier.
  • Snubbers and fuses status verification. The protection devices revision is an additionalservice to help preventing from future malfunctioning on the cells.
  • Complete start up and commissioning service with "turnkey" option*
*Terms and Conditions should be discussed in agreement.
FCR Upgrade for Electric Power Circuit
The rectifiers supplied before the 80's use old-fashion analog technology, which used to be reliable, but nowadays productivity and quality requirements on manufacturing processes require an urgent upgrade, to keep being competitive on the market
Upgrade could become expensive regarding equipment, and installation requirements, but the replacement can be selective, reusing the existing power rectifiers and devices in good conditions which most of the time, represents the biggest part of the investment cost.
Motors generally can also be reused, unless the new control scheme requires higher torque or speed.
The FCR is an AMI GE product, offered to solve the needs of upgrade, which otherwise, would represent a huge and sometimes, not really needed big investment. The FCR is designed to substitute analog gating control of SCR is with new digital circuitry, obtaining with it, ultimate generation diagnostic tools.
Depending on the system, the FCR can be complemented with a master control for processes, Interlocks and additional I/O either with a PLC or ISC (Innovation Series Controller) and user friendly HMI or COI (Control Operator Interface) screens.
Applications
Electric Arc Furnace (EAF)
An Electric Arc Furnace (EAF) is a furnace that heats charged material by means of an electric arc. EAF range in size from small units of approximately one ton capacity up to about 400 ton units. Electric arc furnace differs from induction furnaces in that the charge material is directly exposed to the electric arc, and the current in the furnace terminals passes through the charged material.
For steelmaking, direct current (DC) arc furnaces are used, with a single electrode in the roof and the current return through a conductive bottom lining or conductive pins in the base. The advantage of DC is lower electrode consumption per ton of steel produced, since only one electrode is used, as well as less electrical harmonics and other similar problems.
Ship Propulsion
DC Machines are still used nowadays on ship propulsion, where usually 3 or more diesel generators, are used to supply medium voltage power to Isolation transformers, which feed 12 pulses non-regenerative SCR power bridges.
Roller or Break Down Mill
A Rolling Mill is a machine or factory for shaping metal by passing it between a pair of work rolls. Rolling mills are often incorporated into integrated steelworks, but also exist as separate plants and can be used for other metals, and other materials. Depending on the temperature of the metal being rolled, rolling mills are typically hot or cold rolling mills.
For more information go to: http://www.firingcircuitreplacement.com
AMI GE International
Blvd. Diaz Ordaz #402
Col. Rincon de Santa Maria
Monterrey, N.L., México
P. + 52 (81) 1001-4050
F. + 52 (81) 1001-4051
AMI GE Argentina
Blvd. Alvarez #150
San Nicolas,
Buenos Aires, Argentina
+54 (93) 461-665-222
AMI GE Brasil
Av. das Naçones Unidas,
8501-2 andar,
Sao Paulo, Brazil
+55 (11) 461-665-222