The Gateway to Writing Off Bad Debt        

Best Ways of Writing Off Bad Debt They are the leading providers for valued advice on Writing Off Bad Debt completely.

Tags:


          EFTPOS Terminal Vendors Capitalize on Cashless Payment, Mobility and Security Trends to Drive Growth        
PRZOOM - Newswire (press release) - 2017/03/09, Santa Clara, CA United States - Increased interest among consumers for secure payment gateways and payment card industry (PCI) PIN entry devices will further bolster growth, finds Frost & Sullivan’s Digital Transformation team - Frost.com
          Braaaaaains        
"Animal brains have to be illegal, They're a gateway to human brains." - Those Below, short fiction by horror writer Jeremy C. Shipp.
          Offer - Payment gateway for tech support - INDIA        
KDS Card Pay is an Fastest growing Payment Gateway for the tech support in the market, with specialization in Online Payment Gateway for Tech Support process. KDS Card Pay give comprehensive high risk credit card and e-Check processing services to tech support merchants. KDS Card Pay processes thousand of transaction weekly for tech support companies. We offer a smooth, quick and frictionless purchasing knowledge. This component empowers clients to store their credit and debit card credentials.Get in Touch With Us:Email: support@kdscardpay.comMobile Number: +91-9718164449, +91-8800559281Address D 158 Noida Sector 10 Uttar pradeshhttp://www.kdscardpay.com/payment-gateway-for-tech-support.phphttps://www.facebook.com/KDScardpaypaymentgatewayfortechsupport/https://twitter.com/kdscardpay
          Regional Roundup 7/28: WEST SIDE STORY at the Lyric Theatre, MAMMA MIA! at The Gateway, and SOMETHING ROTTEN in Kansas City!        

BroadwayWorld presents a comprehensive weekly roundup of regional stories around our Broadway World, which include videos, editor spotlights, regional reviews and more. This week, we feature West Side Story, Mamma Mia!, Something Rotten, and More!

Check out our top features from around the BroadwayWorld below!


St. Louis: Check out video highlights from The Muny's production of UNSINKABLE Molly Brown! Hannibal Missouri's own brash and beguiling Molly Brown shines in this exhilarating adaptation of Meredith Willson's 1960 musical. Her rags-to-riches story sparkles with a new book by Dick Scanlan (Thoroughly Modern Millie), and new songs from the Meredith Willson songbook. The tempestuous can't-live-with-him/can't-live-without-him love story that survived the Silver Boom, Gold Rush and sinking of the Titanic returns to the stage with more fun and flair than ever. This is one of those classic musicals that will have your heart soaring! The show is directed and choreographed by Kathleen Marshall, with Michael Rafter as Music Adaptation, Music Director, Vocal and Incidental Arrangements.



Oklahoma: Contributor Ronn Burton reviews WEST SIDE STORY at the Lyric Theatre! He writes "Matthew Gardiner directs this show with conviction and authenticity. Placing the acting front-and-center (let's face it, acting is often the forgotten component in many musical productions) Gardiner carefully crafts the scenes for maximum emotional impact, building the symphony of Arthur Laurents' script as precisely as he does Leonard Bernstein's score. It's definitely worth noting how fabulous the orchestra sounds, led by the baton of music director Jan McDaniel. Choreographer Amy Reynolds-Reed recreates the critical and iconic moments of Jerome Robbins' original staging, but adds quite a few novel and contemporary surprises without ever taking us out of the world of the play."


Long Island: Contributor Melissa Giordano reviews MAMMA MIA at The Gateway! She writes "Briana Rapa is adorable as Sophie. An outstanding voice and a youthful quality make her a natural for the role. Donna is effortlessly and beautifully portrayed by Joan Hess. Indeed an audience favorite is Ms. Hess's lead on the iconic title song and a heart tugging rendition of "The Winner Takes It All". Also a treat is Patrick Cassidy who portrays Sam, one of the men believed to be Sophie's father. It is especially entertaining to see Mr. Cassidy share the stage with David Engel and Fred Inkley who portray Harry and Bill, respectively (the other men believed to be Sophie's father). They appear like old buddies rather than strangers."


Kansas City: Contributor Alan Portner reviews SOMETHING ROTTEN on tour! He writes "This is where the show really takes off and never lands. There are more funny allusions to musical shows of the next three hundred years than a retrospective at the Tony Awards. Some of them you get - Others fly on by. It is like watching an Elizabethan Henny Youngman throwing out one-liners. Their first idea for a show subject is the "Black Death." Close, but no cigar. Back to Shakespeare! The real man was a little pudgy and bald. This Shakespeare is a blond, nasty, literal rock star who presides over a rave. If this sounds a little bit like Mr. Peabody and his boy Sherman, you've got the idea. It is the kind of creative anachronism you enjoyed in "A Knight's Tale" with the late Heath Ledger."


Seattle: Contributor Jay Irwin reviews CURIOUS INCIDENT at the Paramount. He writes "Director Marianne Elliott took the genius tact of staging the entire show so the audience is forced to see the world the way Christopher does with intense lights, overlapping sounds, and stylized movement making the piece a fully immersive journey into an already emotional tale. And this is where we may lose some people. I find the world they've created fascinating and revel in the innovation of it all but it's not a comfortable show. This is certainly not a happy little jaunt where you can wander through the story, these folks make you work for it and even when you think you've finally got the rhythm of the show down they make a sharp left turn to throw you off again. But if you are up for the work, the payoff is immense."


Raleigh: Contributor Jeffrey Kare reviews BEAUTY AND THE BEAST at North Carolina Theatre. He writes "As for this production, it's got a very talented cast led by Catherine Charlebois, who perfectly captures all of the characteristics of Belle. She's spunky, funny, charismatic, and a woman who can easily stand up for herself. As the Beast (a role originated on Broadway by NCT alumni Terrence Mann), actor Ben Michael not only shows us the monster that character can be on the outside, but also the human he is on the inside. He very successfully sells the audience on the arc he goes on from selfish prince, to a real gentleman. Peter Saide steals the show as the narcissistic, yet villainous Gaston, who will stop at nothing to marry Belle. Heartfelt performances come from Ann Van Cleave as the maternal head of the castle's kitchen turned teapot, Mrs. Potts and Lamont Wade as Belle's loving, yet eccentric father, Maurice. Comedic highlights include Dirk Lumbard as the maitre turned candelabra, Lumiere; Michael Brian Dunn as the head of the castle turned mantle clock, Cogsworth; Matthew Simpkins as Gaston's bumbling sidekick, Lefou; Talia Robinson as the maid turned feather duster, Babette; and Aimee Henderson as the opera singer turned wardrobe, Madame de la Grande Bouche."


St. Louis: Contributor Chris Gibson reviews The Muny's THE UNSINKABLE Molly Brown. He writes "Beth Malone is a self assured wonder as Molly, engaging and full of life, she brings her knowledge of the role to the stage of the MUNY and completely captures your heart with her performance. Since we view every other character through her prism, it's essential that she stands out, and Malone definitely does. Mark Kudisch fights a tug of war with Molly as her beleaguered, but supportive husband, J.J. Brown. Molly isn't typical of the times by anyone's standards, so it's a true test of love that keeps them together when that bond is strained, and it is, often. Whitney Bashor is quite good as a recent widow (there's that miner superstition coming true) Molly encounters, and Justin Guarini (Vincenzo), David Abeles (Erich), and Paolo Montalban (Arthur) contribute nicely as miners. The ensemble also does splendid work."


Connecticut: Contributor Sherry Shameer Cohen reviews GROUNDED at Wesport Theatre. She writes "This portrait, flawlessly played by Stahlmann, is not unusual. Many soldiers suffer from PTST. The play evokes questions about that, especially since women are twice as likely to get it. How do women soldiers reconcile their ability to kill and their ability to give life? StahlmAnn Humanizes the pilot and her meltdown in a credible way. Riccardo Hernandez's simple military/industrial set design complements the dismal work conditions of the drone operators. Kate Marvin's sound design and Solomon Weisbard's lighting are perfect. But Yana Birÿkova's projections are spectacular. Kudos also to Liz Diamond for her excellent direction. This is a play that is especially timely because this year is the 100th anniversary of the U.S. military service's using clones (also referred to as unmanned aerial vehicles) and the fact that the U.S. is still at war in Afghanistan after nearly 16 years. The Air Force is training more pilots for drones than for conventional aircraft. As of mid-2016, there have been an estimated 4,189 militants and 479 civilians killed by drones."


Central NY: Contrinutor Natasha Ashley reviews AMERICAN IDIOT at the Centreal NY Playhouse. She writes "The set is not the only strong element though. Let's discuss the dancing and music. The production features high energy choreography by Sami Hoerner which consisted mostly of moshing, a type of dance that is commonly seen at punk rock live music show. It, along with the music performed by a talented orchestra under the direction of Abel Searor, helped fuel the electric atmosphere. Together, they offer a headbanging good time, but unfortunately, at times the sound design/mixing work by Robert Searle (Sound Designer) and Dusten Blake (Sound Mixer) made it hard to hear and/or understand the lyrics in various musical numbers.:


Baltimore: Contributor Charles Shubow reviews THE KING AND I on tour at the Kennedy Centre. He writes "The hit musical has been revived four times on Broadway. The latest incarnation was the Lincoln Center Theatre production in 1995 which garnered four Tony Awards starring Kelli O'Hara in the leading role of Anna and the DC production is based on that success with about 1/3 of the Lincoln Center cast still involved and has a total of 37 actors on stage. "Anna" is now played by lovely Laura Michele Kelly who I listen to almost every day on the CD of the hit musical FINDING NEVERLAND. Kelly is just plain marvelous."


Regional Editor Spotlight:

Ronn Burton
Oklahoma Contributing Editor

Ronn Burton splits his time between NYC and OKC working as an actor, filmmaker, and director. Selected credits... ACTOR: TV/Film: Celebrity Ghost Stories, Enchantments. Off-Broadway/New York Theatre: Carnegie Hall concerts with Kelli O'Hara and Stephen Sondheim, Iron Curtain, Wonderful Town, The House of Blue Leaves, Marat/Sade, Angelina Ballerina the Musical. Regional Theatre: Red, Dog Sees God, Twelfth Night, Taming of the Shrew, Little Women, The Last Five Years, Rent, You're A Good Man Charlie Brown, Chitty Chitty Bang Bang, Hello, Dolly! DIRECTOR: Stage: The Agony and The Agony, Beauty and the Beast, Grease, Hello Again; Film: Encounters, Abandon, and the firsr live webseries Watch Us Fail. Follow him @RonnBurton.


Join Team BroadwayWorld! Interested in joining our team, but not exactly sure what we do? All of your questions are answered, along with every open position from guest and student bloggers, Regional Editors, and more! Find out where we have open positions available here!


          Who would like some free cash?        

Shut-up-and-take-my-money

Any of you Brookline nonprofits taking part in #GivingTuesday this year? I know Gateway Arts is because they told us, but I haven’t found anyone else in my extensive research (O.K., fine, I googled “giving tuesday brookline”), and I don’t …


          Office 365 Migration Issues        
Please find a list of migration issues and resolutions that I captured during my last customers migration:- Flood mitigation on Threat Management Gateway (TMG) - http://community.office365.com/en-us/w/exchange/office-365-move-mailbox-fails-with-transient-exception.aspx     Issue Resolution The operation couldn't be performed because object couldn't be found on 'xxx.prod.outlook.com' The object has not been replicated to Office 365, check Dirsync error logs,...
          DataCite: Lessons Learned on Persistent Identifiers for Research Data        

Data are the infrastructure of science and they serve as the groundwork for scientific pursuits. Data publication has emerged as a game-changing breakthrough in scholarly communication. Data form the outputs of research but also are a gateway to new hypotheses, enabling new scientific insights and driving innovation. And yet stakeholders across the scholarly ecosystem, including practitioners, institutions, and funders of scientific research are increasingly concerned about the lack of sharing and reuse of research data. Across disciplines and countries, researchers, funders, and publishers are pushing for a more effective research environment, minimizing the duplication of work and maximizing the interaction between researchers. Availability, discoverability, and reproducibility of research outputs are key factors to support data reuse and make possible this new environment of highly collaborative research.

An interoperable e-infrastructure is imperative in order to develop new platforms and services for to data publication and reuse. DataCite has been working to establish and promote methods to locate, identify and share information about research data. Along with service development, DataCite supports and advocates for the standards behind persistent identifiers (in particular DOIs, Digital Object Identifiers) for data and other research outputs. Persistent identifiers allow different platforms to exchange information consistently and unambiguously and provide a reliable way to track citations and reuse. Because of this, data publication can become a reality from a technical standpoint, but the adoption of data publication and data citation as a practice by researchers is still in its early stages.

Since 2009, DataCite has been developing a series of tools and services to foster the adoption of data publication and citation among the research community. Through the years, DataCite has worked in a close collaboration with interdisciplinary partners on these issues and we have gained insight into the development of data publication workflows. This paper describes the types of different actions and the lessons learned by DataCite.

 


          Churchill Downs / 4th St. & Central Avenue Gateway        

The intersection of 4th Street and Central Avenue is a historically significant gateway into the city of Louisville and the 4th Street Corridor. Its location has been home to the Kentucky Derby at Churchill Downs since ...

          Maple Forest        




Character Level: 37
Profession Level: 36
Achievement: Zadorak, Hoadremlin and Dimension Ruler


Map Location:
--------------------------
Maple Forest

Quest List:
--------------------
Another Threat
Remove the Branches
Sleep Disturbing Fairies - [Reward: 2 Red Potion (IV) and 2 Blue Potion (IV)]
Too Sleepy to Talk Now, Talk Later
Guard Who Looks Nervous
Why You Did! - [Reward: 3 Wind Elixir]
Reliable Mate
My Old Friend Ralf
Whose Order?! - [Reward: 3 Fairy Stone]
The Diary of Investigators - [Reward: 4 Purple Potion (IV)]
The Thing I Watched That Night
Noisy Historic Site
A Being From Another World - [Reward: Yggdrasil Leaf]
A Hero of Justice Raindy
The Thing to Maintain Dimensional Crack
Save Time while Closing Dimensonal Crack - [Reward: Bear Embroidery IV and 4 Red Potion (IV)]
Finding Traces of the Freyjanity - [Reward: 2 Wind Elixir and 2 Blue Potion (IV)]
Time to Say Goodbye
Let's Go to the Hill of Deadly Poision
Evil Mandragora - [Reward: 2 Oridecon Powder]
The King of Mandragoras - [Reward: 2 Fairy Stone and 2 Red Potion (IV)]
Where is the Patient!
Is it the Poison of Mandragora?
Antidote Delivery
No Effect?
Is it You?
Professional Herb Digger Slag
Slag's Condition - [Reward: Screw Runehole Puncher and 4 Red Potion (IV)]
Natural Enemy of the Herb Digger
K.O. Grass Before Growing Flora
To Jacob
For the Poison, Use the Poison
The Reason Why Dr. Jacob is Back - [Reward: Fairy Stone and 2 Blue Potion (IV)]
The Person Who is Waiting in Maple Village - [Reward: 3 Wind Elixir]
Investigating the Village
Guard Commander Lance
Guard Commander is Not Pleasant
Traditonal Liquor Holic Lance
Broken Liquor Barrel
Chase Python - [Reward: Oridecon Powder and 4 Purple Potion (IV)]
Brewin's Love for Python
I Want to Eat Pumpkin Stew
We Can Make Stew But Have No Ingredient - [Reward: Refining Whetstone IV and 2 Yggdrasil Leas]
First Ingredients for Delicious Stew: Fresh Pumpkins
Steal Pumpkins with the Owner's Consent - [Reward: 2 Red Potion (IV) and 2 Blue Potion (IV)]
Pumpkins for Kate
Mouses Who Ruined the Fields
Mandragora's Needle
Second Ingredients for Delicious Stew: Fresh Cheese
Cheese Retake Operation
Cheese for Kate - [Reward: 2 Red Potion (IV) and 2 Blue Potion (IV)]
Kate's Special Pumkin Stew
The Process For Brewing the Traditional Liquor (1) - [2 Wind Elixir and 2 Blue Potion (IV)]
The Process For Brewing the Traditional Liquor (2) - [2 Wind Elixir and 2 Blue Potion (IV)]
Monster Fascinated in Sweet Scent - [Reward: Dim Dexterity Rune]
The Only Remaining Maple Extract - [Reward: Dragon Embroidery IV]
Extract Delivery
Got Traditional Liquor!
Lance's Wait
Alcohol Tells the Truth - [Reward: Convert Steel]
A Woman Lost Husband
Request from Sejanne
A Mastis Attacing Bordo - [Reward: Tiger Embroidery IV and 2 Red Potion (IV)]
Going to Historic Scene With Bordo
Greet Later
Help Via
Dimensional Crack in a Place Like This - [Reward: Plated Gauntlets of Fissure]
A Monster from Dimensional Crack - [Reward: Scaled Armguard of Fissure]
Where is Bordo?
Captured Villager
Young Witness
Looking for Trace
Duel with Lance - [Reward: Oridecon Powder or Ernium Powder]
Go to South Gateway!
The Reason Why She Stayed
Where is Freki? - [Reward: Dim Will Rune and 3 Blue Potion (IV)]
A Way to Rescue the Captured Freki?
Trainer Erine - [Reward: Plated Visor of Fissure]
Merchant Fruit
Attacked Carriage - [Reward: Scared Helm of Fissure]
Bring Back Meat Box
Thing That Reina Asked
What's This Thing For? - [Reward: Breastplate of Fissure]
Dr. Jacob's Elixir
Bring Agitated Freki - [Reward: Items of Fissure]
Blood Line of Freki
Prince of the Wild Cannot be Raise by Human
The Method to Awake Wild Instinct - [Reward: Tiger Embroidery IV or Dragon Embroidery IV]
Red Scar's Blood
Miss Lady! - [Reward: Refining Whetstone IV or Magic Oil IV]
Close Defense Line - [Reward: 3 Red Potion (IV) and 3 Blue Potion (IV)]
Final Resistance - [Reward: Screw Rune Hole Puncher]
Dimensional Crack Wide Open - [Reward: Farmer Hat]
Track Down Escaped Freyjanity
Reunion with Guile
Clearing Out the Vicinity of Laboratory - [Reward: Ernium Powder and 3 Blue Potion (IV)]
Unseen Freyjan - [Reward: Dim Strength Rune and 3 Red Potion (IV)]
Rackuf in Maple Village
Weak Rackuf - [Reward: Dim Dexterity Rune]
I'm Ashamed to Meet Master - [Reward: 2 Red Potion (IV) and 2 Blue Potion (IV)]
Coward Beast Master - [Reward: Dim Intelligence Rune]
Strong and Powerfull Heavy Grizzly
Heckler of Excavation
Man Who Can Cure a Poison
Sweeping Gremlins from the Santuary
Give My Hat Back
Materials for the Thesis
Capture Hostile Cockratice - [Reward: 3 Red Potion (IV) and 3 Blue Potion (IV)]
[Dungeon] True Criminal - [Reward: Maple Foreest Weapon Statue]
[Dungeon] Jacob's Research Log - [Reward: Maple Foreest Top Statue]
Request from Mildross (1)
Request from Mildross (2) - [Reward: 2 Yggdrasil Lead]
Request: Kate's Pride
Request: Carrots!
Request: The Red Shadow Crossing Maple Forest

Quest Starter Items Found:
-----------------------------------------------
None Yet

Items Found:
-----------------------
Split Piece 1 [Bring to Irmumoa Aro2] - Fai, Magical Fai, Wild Fai, Country Mouse, Needle Mandragora, Mantis, Imperfect Goblin Fighter, High Pagan, Wise Cockratice
Split Piece 2 [Bring to Irmumoa Aro2] - Fai, Magical Fai, Wild Fai, Flora
Split Piece 3 [Bring to Irmumoa Aro2] - Fai, Wild Fai, Mantis, Wise Cockratice

Materials Items:
Earthly Trace (I) - Country Mouse, Minor Gremlin, Mantis, Warlike Cockratice
Firmament Essence (I) - Flora, Emergency Ration, Needle Mandragora, Mantis
Root of Life (I) - Wild Fai, High Elite Researcher
Spirit of Ruin (I) - Flora, Raptured High Pagan
Monster Fragment (I) - High Adamant Researcher

Other Items:
Abandoned Hood - Freyjan Beast Master
Archaic Hood - Freyjan Venomer, Poisoner
Cloth Pocket - Country Mouse, Wild Country Mouse
Fire Ice - Vanaheim High Devil
Gooey Liquid - Minor Gremlin, Gremlin
Large Bear Paw - Little Grizzly, Grizzly, Heavy Grizzly
Leaf - Flora
Mastis Arm - Mantis, Giant Mantis
Old Cheese - Emergency Ration
Pesky Mask - Imperfect Goblin Fighter, Imperfect Goblin Warrior
Pixie Wing - Fai, Magical Fai, Wild Fai
Poison Fang - Python, Great Python, Critical Phyton
Researcher's Button - Researcher, Adamant Researcher, Shoot Researcher, High Adamant Researcher, High Shoot Researcher, High Elite Researcher, Elite Researcher, High Recovery Researcher
Ripped Scriptures - Raptures High Pagan, High Pagan
Stinky Petal - Needle Mandragora
Stone Powder - Cockratice, Wise Cockratice, Warlike Cockratice
Tufred Bee Wing - Killer Bee

Bags Found:
----------------------
Small Bag - None
Medium Bag - None Yet

Food and Drinks Found:
-------------------------------------------
Instant Lettuce Geotjeori - Imperfect Goblin Warrior
Instant Smoldering Heart Skewer - Gremlin, Shoot Researcher, Freyjan Beast Master
Instant Smoldering Heart Soup - Gremlin, Critical Python, Mantis, Wise Cockratice
Instant Smoldering Heart Steak - Fai, Country Mouse, Wild Country Mouse, Imperfect Goblin Warrior, Raptures High Pagan, High Recovery Researcher

Potions Found:
---------------------------
Red Potion (IV) - Researcher, High Adamant Researcher, Imperfect Goblin Fighter, High Pagan
Blue Potion (IV) - Magical Fai, Minor Gremlin, Needle Mandragoram, Imperfect Goblin Warrior, High Pagan
Purple Potion (IV) - Wild Fai, Needle Mandragora
Health Boost Potion (IV) - Needle Mandragora, High Shoot Researcher, High Pagan
Intelligence Boost Potion (IV) - Country Mouse
Will Potion (IV) - Heavy Grizzly

Cards Found:
------------------------
Fai
Gremlin
Cockatrice

Weapons and Armors Found:
----------------------------------------------------
Desperate Chain Gauntlets - Ruler of Fury
Desperate Plated Boots - Ruler of Fury
Desperate Sword - Ruler of Fury
Plated Boots of Silence - Magical Fai
Plated Gauntlets of Silence - Magical Fai
Scaled Chain Boots - High Shoot Researcher
Scaled Shield - High Shoot Researcher
Scout Dual Dagger - Minor Gremlin
Sunset Plated Boots - Mantis

Khara Quest:
------------------------
Poison Investigators
Destroyer of Maply Forest
Way to Strengthen Equipment
Two Bears in the House
Mantis Martial-Arts Expert
Go Crazy with Cheese
Good Taste and Healthy
Novice Weapon Smelter - [Reward: Title - Weapon Novice]
Novice Armor Smelter - [Reward: Title - Armor Novice]
Intermediate Weapon Smelter - [Reward: Title - Weapon Expert]
Intermediate Armor Smelter - [Reward: Title - Armor Expert]
Mass Production Fish Cake
Health Food of Payon Forest
Despisable Food of the Cracked Plain, Is it that Bad?
Principle of Gathering No One Knows About
Long Life Span Without Illness! Health is the Most Important
Finding the Taste of Midgard
Birth of a Great Table!
(Rare:B) Hoadremlin (Party Recommended) - [Reward: Title - Hoadremlin Hunter]
[Dungeon] Ruler of Vanaheim of Anger - [Reward: Title - Dimensional Ruler]
[Dungeon] The Truth of the Immortal Experiment
[Dungeon] Owner of the Secret Experiment at the Laboratory - [Reward: Title - Lab Professor]

Others:
-------------
Small Silver Ore
Medium Silver Ore
Large Silver Ore

Blacksmithing:
--------------------------
None Yet



          East Mt. Mjollnir        




Character Level: 13
Profession Level: 10
Achievement: GTB and Robberbug


Map Location:
--------------------------
East Mt. Mjollnir

Quest List:
--------------------
To the Bouquet Village!
Fly Ridden Gateway
Lord of the Flies - [Reward: Wind Elixir]
Please Fine My Violin - [Reward: 5 Red Potion (I)]
Please Fine My Mic - [Reward: 5 Blue Potion (I)]
Please Fine My Sunglasses - [Reward: 3 Purple Potion (I)]
Punishment of the King of Rockers, Vocal - [Reward: Bear Embroidery I]
There's Too Many!
Bell Patterned Butterfly
My Shoes! - [Reward: Guard Captain's Boots]
Escort of the Saintess
First Meeting
Summon of the Saintess
Where is Ballein?
The Dullard
Where is Lvia? - [Reward: Wind Elixir]
Puhol's Request
Present for My Brother - [Reward: 6 Red Potion (I)]
Vicious Flip
Not Enough Threads!
I Need Needles!
Slowpoke Oil - [Reward: Tiger Embroidery I and Dragon Embroidery I]
Ambushing Flips
How to Talk with Flips
Upset Flip King
Fake Flip King Hunt - [Reward: Mystical Flip Essence (Quest Starter Item) and 6 Blue Potion (I)]
The Secret Behind the Mustache
Mystical Flip Essence (Quest Starter Item)
Maybe Hans Knows?
The Saintess in Danger
Seek Out Ballein - [Reward: Guard Captain's Sword]
Ballein's Revenge (1) - [Reward: Ripped Upper Letter (Quest Starter Item)  and Wind Elixir]
Ballein's Revenge (2)
Aione's Bracelet
Torn Letter (1)  (Quest Starter Item)
Report to Hans - [Reward: 5 Purple Potion (I)]
To The Southern Cave~ - [Reward: Refining Whetstone I or Magic Oil I]
Entrance Clearance
The Search for Hans and Lvia
Antidote Required
Clear the Way! - [Reward: Guard Captain's Armor]
Rescue the Saintess
Eremes Guile
Evacuate the Saintess to a Safe Haven - [Reward: 5 Purple Potion (I)]
Return to the Bouquet Village - [Reward: Tiger Embroidery I or Dragon Embroidery I]
A Consolation Amidst Sadness
A Way to Cure the Wound
Madekara is All You Need
Flip King's Request (1)
Flip King's Request (2) - [Reware: Ripped Lower Letter (Quest Starter Item) and 5 Purple Potion (I)]
Torn Letter (2)
Madekara Delivery - [Reward: 6 Red Potion (I)]
Horrible Stench
Time to Part
Restored Letter
Thiefbug Extermination
[Dungeon] The Missing Examiner
Stinky Bugs
Sewage Sample - [Reward: 6 Purple Potion (I)]
Report Delivery
[Dungeon] Egg Cracker - [Reward: Refining Whetstone I or Magic Oil II]
[Dungeon] Culvert Monster - [Reward: Investigator's Sword]
A Traveller's Guide to Mjolnie Mountain (1)
A Traveller's Guide to Mjolnie Mountain (2)
A Traveller's Guide to Mjolnie Mountain (3)

Quest Starter Items Found:
-----------------------------------------------
Mystical Flip Essence - Fake Flip King
Ripped Upper Letter - Flip King

Items Found:
-----------------------
Split Piece 1 [Bring to Irmumoa Aro2] - ChonChon Brother, Romantic Rocker, Giant Flip, Great Flip, Giant Flip, Suspicious Man, Low Pagan Attacker, Low Zealot Warrior, Swamp Thiefbug, Reona, Familiar, Culvert Toad, Male Thiefbug
Split Piece 2 [Bring to Irmumoa Aro2] - ChonChon Brother, Rocker,  Lonely Rocker, Needle Fabre, Suspicious woman, Low Pagan Attacker, Low Zealot Warrior, Andanora, Swamp Thiefbug, Flood Tarou, Reona, Familiar, Female Thiefbug, Brownie
Split Piece 3 [Bring to Irmumoa Aro2] - ChonChon, Lonely Rocker, Creamy, Suspicious Man, Amethyst Andanora, Culvert Toad, Female Thiefbug, Weak Brownie

Materials Items:
Earthly Trace (I) - Giant Flip, Suspicious Man, Low Pagan Attacker, Low Pagan Illusionist, Male Thiefbug
Firmament Essence (I) - Suspicious woman, Low Pagan Attacker, Low Zealot Scout, Priest Reimond, Familiar, Brownie
Root of Life (I) - Creamy, Low Pagan Attacker, Low Zealot Warrior, Andanora, Amethyst Andanora, Reona, Familiar, Female Thiefbug
Spirit of Ruin (I) - ChonChon Brother, Giant Flip, Dark Acolyte, Swamp Thiefbug, Culverrt Mau, Female Thiefbug, Male Thiefbug
Monster Fragment (I) - ChonChon Brother, Romantic Rocker, Creamy, Sonic Creamy, Fabre, Suspicious Man, Suspicious woman, Low Zealot Warrior, Amethyst Andanora, Culvert Toad
Grasshopper Hindleg - Rocker, Romantic Rocker,  Lonely Rocker

Other Items:
Bat Fang - Familiar
Bug Antenna - Swamp Thiefbug, Smelly Swamp Thiefbug, Less Thiefbug, Female Thiefbug, Male Thiefbug
Butterfly Wing Powder - Fancy Creamy, Creamy, Sonic Creamy
ChonChon Doll - ChonChon, ChonChon Brother
Dowry Fur - Flood Tarou, Reona
Holed Tie - Brownie, Weak Brownie, Wise Brownie
Muddy Hood - Low Zealot Scout, Low Zealot Warrior, Priest Reimond
Pollen - Great Flip, Giant Flip, Great Flip
Plant Stem - Andanora, Amber Andanora, Amethyst Andanora
Rat Tooth - Culvert Mau
Ripped Fabric - Suspicious Man, Suspicious woman, Farshe Secher, Dark Acolyte, Dark Priest
Sharp Prick - Fabre, Needle Fabre
Toad Hindleg - Culvert Toad
Torn Robe Piece - Low Pagan Attacker, Low Pagan Illusionist

Bags Found:
-----------------------
Small Bag - Fabre, Giant Flip, Swamp Thiefbug, Culvert Mau, Culvert Toad, Less Thiefbug
Medium Bag - ChonChon Brother, Smelly Swamp Thiefbug, Wise Brownie

Food and Drinks Found:
-------------------------------------------
Instant Green Herb Salad - Swamp Thiefbug, Smelly Swamp Thiefbug
Instant Jellopy Pudding - Low Pagan Illusionist, Familiar
Instant Jellopy Salad - Creamy, Giant Flip, Suspicious Man, Low Pagan Attacker
Instant Pollen Cake - Giant Flip, Reona
Instant Refreshing Green Tea - Andanora, Flood Tarou, Culvert Mau, Male Thiefbug, Weak Brownie

Potions Found:
---------------------------
Red Potion (I) - Creamy, Needle Fabre
Blue Potion (I) - Creamy, Giant Flip
Purple Potion (I) -  Lonely Rocker, Dark Acolyte
Red Potion (II) - Swamp Thiefbug, Male Thiefbug
Blue Potion (II) - Andanora, Smelly Swamp Thiefbug, Culvert Toad
Purple Potion (II) - Culvert Toad, Wise Brownie
Dexterity Potion (I) - Andanora, ChonChon Brother
Health Potion (I) - Low Pagan Attacker, Amethyst Andanora, Swamp Thiefbug
Intelligence Boost Potion (I) - Amethyst Andanora

Cards Found:
------------------------
Andanora
Brownie
Dark Acolyte
Female Thiefbug
Giant Flip
Low Grade Zealot Card
Pagan
Tarou

Weapons and Armors Found:
----------------------------------------------------
Bilfrid's Gaiters - Rocker
Forest Boots - Amethyst Andanora
Forest Gaiters - Male Thiefbug
Guard's Bludgeon - Slowpoke
Guard's Gaiters - Giant Flip
Mountain Armor - Amethyst Andanora
Moutain Helm - Golden Thiefbug
Red Robber's Dagger - Red Robberbug
Red Robber's Staff - Red Robberbug

Khara Quest:
------------------------
(Selected) Pain Relieving Drink!
Preparation of Basic Supplies for Adventure (2)
Way To Boldy Run Away in Danger
Dirty ChonChon!
Level Achieved (1) - [Reward: Title - Beginner]
Profession That is Getting Used To - [Reward: Title - Amateur Crafter]
I Can't Live with a Title
Revenger Towards the Goddess Worshippers - [Reward: Title - Wrath of]
Existence of the Guardian
Smelly Thief-Couple!
(Dungeon) SesKois Need at Culvert
(Dungeon) Eliminate the Cause at Culvert's Stench - [Reward: Title - GTB Hunter]
(Dungeon) Culvert Bug Terminator Squad - [Reward: Title - Pest Killer]
(Rare) Red Rubberbug (Party Recommended) - [Reward: Title - Rubberbug Hunter]
Card Collector - [Reward: Title - Card Collector]

Others:
-------------
Small Rock
Medium Rock
Large Rock

Blacksmithing:
---------------
Guard Sword:
4 Ingot, 1 Spirit of Ruin, 6 Steel Anvil

High Riddle Gauntlets
2 Ingot, 1 Firmament Essence, 3 Steel Anvil
          ÐŸÑ€ÐµÐ¸Ð¼ÑƒÑ‰ÐµÑÑ‚ва использования BGP        
1. Использование BGP для подключения к провайдеру



Интернет - это набор автономных систем, которые соединены между собой для коммуникации. BGP обеспечивает маршрутизацию между этими автономными системами.
Предприятие, кjторое хочет подключиться к интернету, делает это через одного из провайдеров. Если предприятие имеет только одно подключение к интернету, возможно, ему не понадобится использовать BGP, вместо него можно использовать маршруты по умолчанию. Однако, если имеется несколько подключений к одному или нескольким провайдерам, BGP будет предпочтительным для использования, т.к. он позволяет манипулировать атрибутами маршрутов, чтобы был выбран оптимальный путь.
Чтобы понять BGP, надо понять, чем он отличается от других протоколов маршрутизации. Один путь, это разделить протоколы на внешние и внутренние протоколы маршрутизации, такие как:
- IGP (Interior gateway protocol), внутренний протокол маршрутизации - это протокол, который обменивается маршрутной информацией внутри автономной системы Примеры таких протоколов - RIP, OSPF, EIGRP. 
- EGP (Exterior gateway protocol), внешний протокол маршрутизации – протокол, который обменивается маршрутной информацией между разными автономными системами. BGP – пример внешнего протокола. BGP является внутридоменным протоколом маршрутизации (IDRP), также известным как EGP. Последней версией протокола является BGP версии 4, который описан в RFC 4271. Как сказано в RFC, классическое описание автономной системы – набор маршрутов под одним техническим администрированием, который маршрутизирует пакеты внутри автономной системы с помощью внутренних протоколов маршрутизации, а также с помощью внешних протоколов маршрутизации определяет, как маршрутизируются пакеты к другим автономным системам.
Автономная система может использовать больше, чем один внутренний протокол маршрутизации, возможно с несколькими наборами метрик. С точки зрения BGP, наиболее важной характеристикой автономной системы есть то, что она взаимодействует с другой автономной системой, чтобы иметь один ясный внутренний план маршрутизации и представлять полную картину доступных сетей назначения. Все части автономной системы должны соединяться друг с другом.
Когда BGP работает между маршрутизаторами в разных автономных системах, он называется внешним BGP (EBGP). Когда BGP работает между маршрутизаторами внутри одной автономной системы, он называется внутренним BGP (IBGP). BGP определяет путь для пакетов между автономными системами.  Ð’ажно понимать, как работает BGP для избежания создания проблем для автономной системы в результате работы BGP. 

2. Варианты использования BGP для нескольких подключений к провайдеру



Организация может иметь несколько подключений только к одному провайдеру или к нескольким провайдерам. Недостатком наличия нескольких подключений к одному провайдеру является то, что единственный провайдер может стать причиной отсутствия соединения с интернетом. Имея подключения к нескольким провайдерам, организация получает следующие преимущества:
- резервирование несколькими подключениями
- нет привязки к политике маршрутизации одного провайдера
- наличие многих путей к одним и тем же сетям для улучшения политики управления маршрутами
В автономной системе с несколькими подключениями будет работать EBGP для связи с соседними автономными системами, а также может работать IBGP внутри. 
Если организация решит, что будет иметь несколько подключений с использованием BGP, существует три пути, как этого достигнуть:
- каждый провайдер пропускает только один маршрут по умолчанию к автономной системе. Этот маршрут указывает на внутренние маршрутизаторы
- каждый провайдер пропускает  Ñ‚олько один маршрут по умолчанию и специфические маршруты провайдера к автономной системе. Эти маршруты могут пропускаться  Ð½Ð° внутренние маршрутизаторы или на всех внутренних маршрутизаторах может работать  BGP и пропускаться эти маршруты будут на них всех
- каждый провайдер пропускает все маршруты в автономную систему. На всех внутренних маршрутизаторах по пути транзита работает BGP и пропускает маршруты между маршрутизаторами. 


Первым вариантом маршрутизации при использовании нескольких подключений к провайдеру является получение только маршрутов по умолчанию от каждого провайдера. Эта конфигурация требует минимум ресурсов внутри автономной системы, так как маршрут по умолчанию используется для доступа к любому месту назначения. Автономная система отправляет все свои маршруты провайдерам, которые обрабатывают и пропускают маршруты в другие автономные системы.
Если маршрутизатор в автономной системе узнает о нескольких маршрутах по умолчанию, локальный внутренний протокол маршрутизации добавляет лучший маршрут по умолчанию в таблицу маршрутизации. С точки зрения этого маршрутизатора, он выбирает маршрут по умолчанию с наименьшей стоимостью в метрике внутреннего протокола маршрутизации. Этот маршрут по умолчанию будет отправлять пакеты, адресованные внешним сетям, на граничный маршрутизатор этой автономной системы, на котором работает внешний BGP. Граничный маршрутизатор будет использовать маршрут по умолчанию BGP для достижения всех внешних сетей.
Региональные провайдеры, которые имеют несколько подключений к национальным или международным провайдерам, обычно используют этот вариант. Региональные провайдеры не используют BGP для управления маршрутами, однако провайдерам необходима возможность добавления новых абонентов, а также сетей абонентов. Если региональный провайдер не использует BGP, каждый раз, когда региональный провайдер добавляет новый набор сетей , абонентам необходимо ждать, пока национальные провайдеры добавят новый набор сетей в свой процесс BGP и разместят статические маршруты, указывающие на региональных провайдеров. При работающем внешнем BGP у региональных провайдеров  ÑÐ¾Ð²Ð¼ÐµÑÑ‚Ð½Ð¾ с национальными и международными, региональному провайдеру достаточно будет добавить новые сети абонентов в свой процесс BGP. Эти новые сети автоматически проанонсируются через интернет с минимальной задержкой. 
Абоненты, которые выберут получение только маршрутов по умолчанию от всех провайдеров, должны понимать следующие ограничения этого варианта:
- управление маршрутами не может быть применено, так как от каждого провайдера принимается только один маршрут
- управление пропускной способностью очень сложное и может быть применено только манипулированием метрики маршрута по умолчанию внутреннего протокола маршрутизации
- перенос части трафика из одной точки выхода в другую очень сложен, так как все сети назначения используют одинаковый маршрут по умолчанию для выбора пути

Как видно на рисунке, автономные системы AS 65020 и AS 65030 отправляют маршруты по умолчанию в AS 65010, сеть абонента А. Из-за метрики внутреннего протокола маршрутизации сети абонента А, а также из-за настройки маршрутизаторов R1 и R2, граничный маршрутизатор провайдера PE1 выбран как маршрут по умолчанию для достижения любой внешней сети за пределами автономной системы абонента А. 

Эта процедура может привести к неоптимальной маршрутизации. Например, при задаче отправить пакет в сеть 172.17.0.0, пакет будет сначала отправлен провайдеру ISP1 на маршрутизатор РЕ1, так как маршрутизатор РЕ1 является предпочтительным путем для абонента А. А затем уже провайдер ISP1 отправит пакет в сеть назначения провайдеру ISP2.  



Вторым вариантом дизайна сети с несколькими подключениями к провайдерам является получение маршрутов по умолчанию и определенных выбранных маршрутов от провайдеров.
Предприятие работает с провайдером по EBGP и получает частичную таблицу маршрутизации о маршрутах к сетям других абонентов этого провайдера. Предприятие также получает маршруты от любых других автономных систем.
Основным провайдерам присваивается от 2000 до 10000 бесклассовых междоменных маршрутизируемых блоков IP адресов от IANA, которые провайдеры передают в пользование своим абонентам.  Ð•ÑÐ»Ð¸ провайдер пропустит эту информацию абоненту, который хочет получать только частичную BGP таблицу маршрутизации, абонент перераспределит эти маршруты во внутренний протокол маршрутизации. Внутренние маршрутизаторы абонента (на которых не работает BGP) могут получить эту информацию через перераспределение. Маршрутизаторы могут взять ближайшую точку выхода, основываясь на лучшей метрике специфической сети, вместо того, чтобы выбрать точку выхода, основываясь на маршруте по умолчанию.
Получение частичной BGP таблицы от каждого провайдера более выгодно, так как выбор пути будет более точным, чем при использовании маршрута по умолчанию.


На рисунке провайдеры в AS 65020 и AS 65030 отправляют маршруты по умолчанию и маршруты к своим абонентам абоненту А (AS 65010). 
Путем использования внутреннего BGP между внутренними маршрутизаторами R1 и R2 внутри AS 65010, AS 65010 может выбрать оптимальный путь к сетям провайдеров ISP1 и ISP2. Если сеть абонента А отправляет трафик к неизвестной сети, будет исполь
          Christmas Sale: Get 35% Off at Coron Gateway Hotel in Palawan Until December 22        
The month of merrymaking gets a little more exciting for those filled with wanderlust as Coron Gateway in Coron, Palawan, Philippines rolls out its Christmas promo. Valid until December 22, 2014, this deal offers 35% off.
          Signal 23: Threshold        
I'm Vaux, an Informed Jack who Tells Tales. This is my Signal.

If you can hear this broadcast, it is for Threshold, a border city that is gateway to the Amorphous Fields.

The Crafters are able to create art, tools, even clothing from the organic soup of the Fields - for a price. And many wonderous treasures can be found if you're brave enough to risk the biological chaos of the Amorphous Fields.

Listen to it. Remember it. Pass it along.

Iadace.

Episode 23: Threshold
          Regional Roundup 7/28: WEST SIDE STORY at the Lyric Theatre, MAMMA MIA! at The Gateway, and SOMETHING ROTTEN in Kansas City!        

BroadwayWorld presents a comprehensive weekly roundup of regional stories around our Broadway World, which include videos, editor spotlights, regional reviews and more. This week, we feature West Side Story, Mamma Mia!, Something Rotten, and More!

Check out our top features from around the BroadwayWorld below!


St. Louis: Check out video highlights from The Muny's production of UNSINKABLE Molly Brown! Hannibal Missouri's own brash and beguiling Molly Brown shines in this exhilarating adaptation of Meredith Willson's 1960 musical. Her rags-to-riches story sparkles with a new book by Dick Scanlan (Thoroughly Modern Millie), and new songs from the Meredith Willson songbook. The tempestuous can't-live-with-him/can't-live-without-him love story that survived the Silver Boom, Gold Rush and sinking of the Titanic returns to the stage with more fun and flair than ever. This is one of those classic musicals that will have your heart soaring! The show is directed and choreographed by Kathleen Marshall, with Michael Rafter as Music Adaptation, Music Director, Vocal and Incidental Arrangements.



Oklahoma: Contributor Ronn Burton reviews WEST SIDE STORY at the Lyric Theatre! He writes "Matthew Gardiner directs this show with conviction and authenticity. Placing the acting front-and-center (let's face it, acting is often the forgotten component in many musical productions) Gardiner carefully crafts the scenes for maximum emotional impact, building the symphony of Arthur Laurents' script as precisely as he does Leonard Bernstein's score. It's definitely worth noting how fabulous the orchestra sounds, led by the baton of music director Jan McDaniel. Choreographer Amy Reynolds-Reed recreates the critical and iconic moments of Jerome Robbins' original staging, but adds quite a few novel and contemporary surprises without ever taking us out of the world of the play."


Long Island: Contributor Melissa Giordano reviews MAMMA MIA at The Gateway! She writes "Briana Rapa is adorable as Sophie. An outstanding voice and a youthful quality make her a natural for the role. Donna is effortlessly and beautifully portrayed by Joan Hess. Indeed an audience favorite is Ms. Hess's lead on the iconic title song and a heart tugging rendition of "The Winner Takes It All". Also a treat is Patrick Cassidy who portrays Sam, one of the men believed to be Sophie's father. It is especially entertaining to see Mr. Cassidy share the stage with David Engel and Fred Inkley who portray Harry and Bill, respectively (the other men believed to be Sophie's father). They appear like old buddies rather than strangers."


Kansas City: Contributor Alan Portner reviews SOMETHING ROTTEN on tour! He writes "This is where the show really takes off and never lands. There are more funny allusions to musical shows of the next three hundred years than a retrospective at the Tony Awards. Some of them you get - Others fly on by. It is like watching an Elizabethan Henny Youngman throwing out one-liners. Their first idea for a show subject is the "Black Death." Close, but no cigar. Back to Shakespeare! The real man was a little pudgy and bald. This Shakespeare is a blond, nasty, literal rock star who presides over a rave. If this sounds a little bit like Mr. Peabody and his boy Sherman, you've got the idea. It is the kind of creative anachronism you enjoyed in "A Knight's Tale" with the late Heath Ledger."


Seattle: Contributor Jay Irwin reviews CURIOUS INCIDENT at the Paramount. He writes "Director Marianne Elliott took the genius tact of staging the entire show so the audience is forced to see the world the way Christopher does with intense lights, overlapping sounds, and stylized movement making the piece a fully immersive journey into an already emotional tale. And this is where we may lose some people. I find the world they've created fascinating and revel in the innovation of it all but it's not a comfortable show. This is certainly not a happy little jaunt where you can wander through the story, these folks make you work for it and even when you think you've finally got the rhythm of the show down they make a sharp left turn to throw you off again. But if you are up for the work, the payoff is immense."


Raleigh: Contributor Jeffrey Kare reviews BEAUTY AND THE BEAST at North Carolina Theatre. He writes "As for this production, it's got a very talented cast led by Catherine Charlebois, who perfectly captures all of the characteristics of Belle. She's spunky, funny, charismatic, and a woman who can easily stand up for herself. As the Beast (a role originated on Broadway by NCT alumni Terrence Mann), actor Ben Michael not only shows us the monster that character can be on the outside, but also the human he is on the inside. He very successfully sells the audience on the arc he goes on from selfish prince, to a real gentleman. Peter Saide steals the show as the narcissistic, yet villainous Gaston, who will stop at nothing to marry Belle. Heartfelt performances come from Ann Van Cleave as the maternal head of the castle's kitchen turned teapot, Mrs. Potts and Lamont Wade as Belle's loving, yet eccentric father, Maurice. Comedic highlights include Dirk Lumbard as the maitre turned candelabra, Lumiere; Michael Brian Dunn as the head of the castle turned mantle clock, Cogsworth; Matthew Simpkins as Gaston's bumbling sidekick, Lefou; Talia Robinson as the maid turned feather duster, Babette; and Aimee Henderson as the opera singer turned wardrobe, Madame de la Grande Bouche."


St. Louis: Contributor Chris Gibson reviews The Muny's THE UNSINKABLE Molly Brown. He writes "Beth Malone is a self assured wonder as Molly, engaging and full of life, she brings her knowledge of the role to the stage of the MUNY and completely captures your heart with her performance. Since we view every other character through her prism, it's essential that she stands out, and Malone definitely does. Mark Kudisch fights a tug of war with Molly as her beleaguered, but supportive husband, J.J. Brown. Molly isn't typical of the times by anyone's standards, so it's a true test of love that keeps them together when that bond is strained, and it is, often. Whitney Bashor is quite good as a recent widow (there's that miner superstition coming true) Molly encounters, and Justin Guarini (Vincenzo), David Abeles (Erich), and Paolo Montalban (Arthur) contribute nicely as miners. The ensemble also does splendid work."


Connecticut: Contributor Sherry Shameer Cohen reviews GROUNDED at Wesport Theatre. She writes "This portrait, flawlessly played by Stahlmann, is not unusual. Many soldiers suffer from PTST. The play evokes questions about that, especially since women are twice as likely to get it. How do women soldiers reconcile their ability to kill and their ability to give life? StahlmAnn Humanizes the pilot and her meltdown in a credible way. Riccardo Hernandez's simple military/industrial set design complements the dismal work conditions of the drone operators. Kate Marvin's sound design and Solomon Weisbard's lighting are perfect. But Yana Birÿkova's projections are spectacular. Kudos also to Liz Diamond for her excellent direction. This is a play that is especially timely because this year is the 100th anniversary of the U.S. military service's using clones (also referred to as unmanned aerial vehicles) and the fact that the U.S. is still at war in Afghanistan after nearly 16 years. The Air Force is training more pilots for drones than for conventional aircraft. As of mid-2016, there have been an estimated 4,189 militants and 479 civilians killed by drones."


Central NY: Contrinutor Natasha Ashley reviews AMERICAN IDIOT at the Centreal NY Playhouse. She writes "The set is not the only strong element though. Let's discuss the dancing and music. The production features high energy choreography by Sami Hoerner which consisted mostly of moshing, a type of dance that is commonly seen at punk rock live music show. It, along with the music performed by a talented orchestra under the direction of Abel Searor, helped fuel the electric atmosphere. Together, they offer a headbanging good time, but unfortunately, at times the sound design/mixing work by Robert Searle (Sound Designer) and Dusten Blake (Sound Mixer) made it hard to hear and/or understand the lyrics in various musical numbers.:


Baltimore: Contributor Charles Shubow reviews THE KING AND I on tour at the Kennedy Centre. He writes "The hit musical has been revived four times on Broadway. The latest incarnation was the Lincoln Center Theatre production in 1995 which garnered four Tony Awards starring Kelli O'Hara in the leading role of Anna and the DC production is based on that success with about 1/3 of the Lincoln Center cast still involved and has a total of 37 actors on stage. "Anna" is now played by lovely Laura Michele Kelly who I listen to almost every day on the CD of the hit musical FINDING NEVERLAND. Kelly is just plain marvelous."


Regional Editor Spotlight:

Ronn Burton
Oklahoma Contributing Editor

Ronn Burton splits his time between NYC and OKC working as an actor, filmmaker, and director. Selected credits... ACTOR: TV/Film: Celebrity Ghost Stories, Enchantments. Off-Broadway/New York Theatre: Carnegie Hall concerts with Kelli O'Hara and Stephen Sondheim, Iron Curtain, Wonderful Town, The House of Blue Leaves, Marat/Sade, Angelina Ballerina the Musical. Regional Theatre: Red, Dog Sees God, Twelfth Night, Taming of the Shrew, Little Women, The Last Five Years, Rent, You're A Good Man Charlie Brown, Chitty Chitty Bang Bang, Hello, Dolly! DIRECTOR: Stage: The Agony and The Agony, Beauty and the Beast, Grease, Hello Again; Film: Encounters, Abandon, and the firsr live webseries Watch Us Fail. Follow him @RonnBurton.


Join Team BroadwayWorld! Interested in joining our team, but not exactly sure what we do? All of your questions are answered, along with every open position from guest and student bloggers, Regional Editors, and more! Find out where we have open positions available here!


          Medan trip – Prologue        
After forfeiting the Central Europe trip, I was yearning for a break. I was glad that hubby suggested a short getaway as he's very busy nowadays and I have to accommodate to his schedules. 

Coincidentally, Silkair was offering 50% krisflyer mileage redemption for their flights. I decided on Medan as it's still in my bucket list. I have plan to travel on weekdays as hubby is busier on weekends but the weekdays morning flights are on waiting list. The earliest available flight departs on Friday so I proceed with the booking after hubby give the go ahead. The mileage required for a return economy flight is 7,500 miles plus $54.80 taxes. I did a quick calculation that the mile is worth $0.34, it's consider good for economy class mileage redemption as normal redemption is 15,000 miles which is only worth $0.17. After I have booked our tickets, hubby inform me that 2 of his friends will be joining us for this trip.

Medan is the capital of North Sumatra and is the fifth biggest city in Indonesia, behind Jakarta, Surabaya, Bandung and Bekasi. Medan is also the gateway to Lake Toba which is the largest volcanic lake in the world and 1,000 km² bigger than Singapore. The dry season is from May - September and the best month is May when the weather is a perfect degree of warmth. Lake Toba is extremely popular during the Chinese New Year and everything are marked up hence avoid it at all cost.
Map of Lake Toba (from Wikipedia)

Initially I planned to travel to Samosir island and stay there on the first night followed by 2 nights at Berastagi, I changed my plan after I saw the photos of Taman Simalem Resort. I decided to spend 4 days here as it offers a vintage view of Lake Toba. I shall leave Samosir island in the future as I read that the nearest Silangit Airport will be expanded and travelling time to Lake Toba will cut down to 1.5hr compared to the current 4hr from Medan Kualanamu International Airport.

Currently Taman Simalem Resort offer 3D/2N Pearl of Lake Toba package ~ S$270/ pax  which includes the following:
- return airport transfer
- 2 nights accommodation at Tongging Point Hotel or Waterfall Lodge
- Complimentary in-house Guest Activities
- Daily Breakfast & Dinner

In addition, the resort is able to offer 30% discount for the extension night ~ S$180/room/night which has the same inclusion as the 3D2N package.

Itinerary for this trip:
Day 1: Reach Medan @ 8am (GMT+7), Sipiso Piso
Day 2: R&R at Taman Simalem Resort
Day 3: R&R at Taman Simalem Resort
Day 4: Berastagi Fruit market, Taman Lumbini, Depart Medan @ 8pm (GMT+7)

Budget for this trip is S$560:
- S$360 for accommodation & transport
- S$100 for meals
- S$100 for massage & shopping


>>Day 1: 14 Jul 17

          Da Nang trip – Prologue        
Da Nang is the largest city in Central Vietnam and is the gateway to UNESCO sites: Hoi An, My Son and Hue. Silkair is the sole airline which flies direct from Singapore to Da Nang until Jetstar starts serving Da Nang in Nov 2015.
Map of Vietnam (extracted from Lonely Planet)

Jetstar was having the Fly and return for free promotion and return ticket without baggage cost S$122 which is very cheap. I asked my sis if she is interested and we booked the airtix without any hesitation. I chose the Singpost payment option which allows payment to be make within the next 48hrs. This option used to be free but there is a processing fee of $4 per pax now.

The best period to visit Da Nang is Feb and Mar as there is less rain and lower temperature compared to the other months. One of my colleague visited Da Nang in Aug and she told me that the weather is as hot as Bangkok.

Jetstar flies to Da Nang thrice a week i.e. Tue, Thu and Sun. We wanted to spend a week there but there was no promo fare for Tue return flight so we will be returning on Sun night. Technically, we have 5 full days as the arrival flight and departure flight are at night. We decided to drop Hue from the itinerary as we do not want a hectic trip and there is limited intercity bus timing per day by Sinh Tourist. As there are only 2 of us, we do not want to book private tour hence we will booking day tour and intercity bus with Sinh Tourist.

We will be staying at Happy Day Hotel Da Nang which is located along the Han's river. The standard double room cost S$24 per night without breakfast. I booked through Agoda as it slightly cheaper than booking directly from hotel website. In Hoi An, we will be staying at Vinh Hung Library Hotel which is within 10min walk from Hoi An Ancient town. The superior room with no windows cost VND678,000 ~ S$42 per night and is inclusive of breakfast. These 2 hotels are also within walking distance from Sinh Tourist.

Itinerary for this trip:

Day 1: Reach Da Nang at 8.05pm (GMT +7)
Day 2: Marble Mountain, Han Market, Da Nang Cathedral
Day 3: Hoi An ancient town
Day 4: My Son
Day 5: Ba Na Hill
Day 6: Linh Ung Pagoda Da Nang, Depart Da Nang at 8.20pm (GMT +7)

Budget for this trip is $400:
- S$80 for accommodation
- S$60 for transport
- S$60 for admission and tour 
- S$100 for meals
- S$100 for shopping

>>Day 1: 21 Mar 17

          Azure Application Gateway Anatomy        
Back in May, we talked about Azure Application Gateway. In this article, we’re going to look at its anatomy, i.e. its internal component as exposed in the Azure Resource Manager (ARM) model. A lot of Azure Resource has an internal structure.  For instance, a Virtual Network has a collection of subnets. Azure Application Gateway has […]
          URL Routing with Azure Application Gateway        
Update (13-06-2017):  The POC of this article is available on GitHub here. I have a scenario perfect for a Layer-7 Load Balancer / Reverse Proxy: Multiple web server clusters to be routed under one URL hierarchy (one domain name) Redirect HTTP traffic to the same URL on HTTPS Have reverse proxy performing SSL termination (or […]
          Cara Setting GPRS GSM        

Setting GPRS dan MMS Kartu XL


Setting XL Internet BroadBand
  • Profile Name: XLBroadband
  • APN: xlunlimited
  • User Name: dikosongkan
  • Password : dikosongkan
  • Dial Number : *99# (Khusus untuk Modem)
  • Proxy (Optional) : 202.152.240.050
  • Port (Optional) : 8080
Setting GPRS XL Internet Mobile
  • Profile Name : XLGPRS
  • APN  : www.xlgprs.net
  • User Name : xlgprs
  • Password : proxl
  • Dial Number  : *99# (Khusus untuk Modem)
  • Proxy    (Optional) : 202.152.240.050
  • Port (Optional) : 8080

Setting GPRS dan MMS Kartu IM3 dan Mentari


GPRS
  • APN: indosatgprs
  • User : indosat
  • Pass : indosat
  • Proxy : 10.19.19.19
  • Port : 8080
  • Homepage : http://wap.indosat.com
MMS
  • APN: indosatmms
  • User : indosat
  • Pass : indosat
  • Proxy : 10.19.19.19
  • Port : 8080
  • Homepage : http://mmsc.indosat.com


Setting GPRS / MMS Kartu Simpati dan AS


Sebelumnya lakukan aktivasi GPRS dan MMS. ada 2 cara aktivasi GPRS dan MMS

1. Aktivasi melalui SMS

  • Ketik GPRS kirim 6616
  • Ketik MMS kirim 6616
  • Tarif sms ke 6616 : Rp.350

2. Aktivasi melalui UMB

  • Tekan *116# dan ikuti petunjuk selanjutnya

Setting GPRS Manual :
  • Connection name : TSEL-DATA
  • Data bearer : Packet data
  • Access point name : telkomsel
  • User name : wap
  • Prompt password : No
  • Password  : wap123
  • Authentication  : Normal
  • Homepage : http://wap.telkomsel.com
  • Network type : IPv4
  • Phone IP Address  : Automatic
  • DNS Address  : Automatic
  • Proxy serv. Address : 10.1.89.130
  • Proxy port number :8000
Setting MMS Manual :
  • Connection name : TSEL-MMS
  • Data bearer : Packet data
  • Access point name  : mms
  • User name : wap
  • Prompt password : No
  • Password : wap123
  • Authentication : Normal
  • Homepage : http://mms.telkomsel.com
  • Network type : IPv4
  • Phone IP Address : Automatic
  • DNS Address : Automatic
  • Proxy serv. address : 10.1.89.150
  • Proxy port number: 8000

Setting GPRS / MMS Kartu 3 (three)


Setting GPRS
  • Data Bearer : GPRS
  • Access point name : 3gprs
  • User name : 3gprs
  • Password : 3gprs
  • Home : http://wap.three.co.id
  • Phone IP Address : Automatic
  • Proxy Server Address : 10.4.0.10
  • Proxy port number :3128
Setting MMS
  • Connection name : 3mms
  • Data bearer : GPRS
  • Access point name :3mms
  • User name: 3mms
  • Prompt Password  : No
  • Password  : 3mms
  • Authentication : Normal
  • Gateway IP address : 0.0.0.0
  • Homepage : http://mms.three.co.id
  • Phone IP address  : Automatic
  • Primary name server: 0.0.0.0
  • Secondary name server: 0.0.0.0
  • Proxy server address : 10.4.0.10
  • Proxy port number : 3128

Setting GPRS / MMS Kartu Axis


Setting GPRS
  • Connection Name : AXIS
  • Data Bearer :  GPRS atau PS
  • Access Point Name (APN) : AXIS
  • Username : axis
  • Prompt Password  : No
  • Password : 123456
  • Authentication  : Normal
  • Gateway/Proxy IP Address : 10.8.3.8
  • Gateway/Proxy Port : 9201 atau 8080
  • Homepage : http://wap.axisworld.co.id
  • Connection Security : Off
  • Session Mode: Permanent
Setting MMS
  • Connection Name :  AXISmms
  • Data Bearer :  GPRS atau PS
  • Access Point Name (APN) ; AXISmms
  • Username : axis
  • Prompt Password :  No
  • Password : 123456
  • Authentication ; Normal
  • Gateway/Proxy IP Address : 10.8.3.8
  • Gateway/Proxy Port : 9201 atau 8080
  • Homepage : http://mmsc.AXIS
  • Connection Security :  Off
  • Session Mode : Permanent

Sumber
          TECHNOMARINE 2016 TRADE-UP        
Getting a good reception with a record of 674 watches traded in last 2012, the TechnoMarine Trade Up is back for the second time!
DSCF3509

For the whole month of July, you can now own a new TechnoMarine watch at 40% off when you trade in your working or non-working TechnoMarine watches* at official stores.
DSCF3512
*With or without strap, but with complete case, bezel and mechanism.
So why trade up?
1. TechnoMarine's new collection showcases innovation and creativity. It also embodies casual luxury, a combination of class and style staying true to TechnoMarine's founding vision.
DSCF3514
Reef Sun, Php25,100
2. The watches have also been improved with the incorporation of new materials such as titanium and carbon fiber. Flame fused glass is also being used giving the watches a more sturdy and scratch resistant face.
DSCF3516

3. And finally, a chosen beneficiary will benefit from the watches that will be traded in. A recognition to those who risk their lives for the country.
DSCF3518

DSCF3520
Cruise Monogram, Php26,900
DSCF3521

If you want to make the most out of this awesome deal, get the watches that's in the high price range. I'm actually eyeing this UF6 which is priced at around Php60,000. Now, if I trade in my Cruise watch which I got some three years ago, that's up to Php24,000 worth of savings!
DSCF3522

You have the whole month of July to decide. Just in case, here are the list of official stores where you can do the Trade Up:
TechnoMarine Megamall, TechnoMarine Greenbelt, TechnoMarine TriNoma, TechnoMarine SM Cebu, TechnoMarine Robinson's Magnolia, TechnoMarine SM North EDSA, TechnoMarine Shangri-La Plaza, TechnoMarine Robinson's Galleria, My Tempo SM North EDSA, My Tempo Resorts World, My Diamond Glorietta, My Diamond Gateway Mall, My Diamond Festival Mall, My Diamond SM Mall of Asia, My Diamond Robinson's Ermita, My Diamond Lucky Chinatown Mall, My Diamond SM Lanang Premier and White Halo SM Aura Premier.

          Building and Managing Dynamic Multi-part Pages with WordPress        
Twenty Seventeen is the first bundled theme to provide a way to create multi-part pages with WordPress, via a front page sections option that features multiple pages on the front page. This is useful for largely single-page sites, but limits the functionality of a front page as a showcase for and gateway to content throughout […]
          Sabah in Borneo        
Where is Borneo and Where is Sabah?

Borneo is the third largest island in the world. It is owned Malaysia and Indonesia. Divided into three main parts  Sabah, Sarawak and Kalimantan. In this article we will focus on North Borneo, Sabah.

Sabah Borneo Malaysia
Located at the northern tip of Borneo, Sabah is the second largest state in Malaysia. Some 80% of its area is covered with virgin tropical jungle, and is home to some of the world rarest species of orchids and plants, such as the world’s largest flower Rafflesia, one of the world’s smallest orchid, podochilus and the world’s largest orchid, tiger orchid.  

Also known as “land below the wind”. Sabah has over 2,300 kilometers of coastline bounded by the South China Sea, Sulu sea and celebes sea.
The land rises from the low coastal hill and leads to highest mountain in Southeast Asia, Mount Kinabalu  (4101m).

Sabah is a truly plural society with more than 40 ethnics group living harmoniously together. Among the indigenous tribes are Kadazans, Bajaus, Rungus, Bisayas and Bruneis.
On the north eastern coast  of Sabah is Sandakan, the former capital. It remains a busy port with attraction such as the Sandakan Orchid House, Forestry Exhibition Centre and Goamantong Caves. These caves are known for its bird’s nest, a local delicacy.

The Orangutan Sanctuary at Sepilok is the only one of its kind in the world. Establish in 1964, this centre which  covers over 4,500 hectares offers tourist a class of view of the habitat of the orangutan. You may be lucky to catch a glimpse of these shy “wild men of Borneo”. It is located in a virgin jungle. A raised platform that has been specially built allows tourist to watch the habit of these magnificent creatures. The interesting eating behavior of the orangutan has generated a lot of interest among tourists and photographer. It has become the key attraction of the Sepilok  Centre. The feeding times are at 10am and 3pm everyday. Different species of wild mammals and more than 200 species  birds are also found here. if  you would like to stay overnight to observe these creatures  further, reasonably priced accommodation is available outside the sanctuary.
   

Poring Hot Spring is located in the district of Ranau 40 kilometers from Kinabalu Park. It was developed by Japanese during world war 11 which is situated in lowland rainforest. The springs are acknowledged for their curative properties and the waters contain sulphuric minerals are apparent to relieve pain muscles. The baths are favored by the climbers after climb Mount Kinabalu.

Poring Hot Spring resort also provides several facilities such as :

1.       Poring Orchid Conservation Centre
2.       Kipungit Waterfall
3.       Butterfly farm
4.       Poring Canopy Walkway
5.       Tropical Garden

Lahad Datu, 175 kilometers south of Sandakan, is gateway to the Danum Valley Conversation Area, an area where the Asian Rhinoceros still roam.

The jewel in crown of Sabah’s dive sites is Sipadan Island 30 kilometers south of Semporna in the Celebes sea. Sipadan is actually the crown of volcanic spire formed millions of years ago, and has been described by Jacques Cousteau as “An untouched piece of art ”.


If you are diver, never forget these underwater caves, Barracuda Point, turtle cavern, and Whitetip Avenue where is located at Sipadan island are fulfilled with wonderful exotic fishes and corals. There is habitat for flashlight fish, soldier fish and beautiful corals.

Teknologi Warung Internet harus di akui merupakan teknologi andalan dalam memberikan alternatif akses Internet yang murah bagi banyak orang. Secara umum ada dua (2) hal utama yang perlu diperhatikan dalam membangun Warung Internet, yaitu (1) sisi bisnis / manajemen WARNET dan (2) sisi teknologi WARNET. Saya sangat sarankan untuk ikut secara aktif monitoring mailing list yang berkaitan dengan per-warnet-an di Internet, seperti asosiasi-warnet@yahoogroups.com, asosiasi-warnet-broadband@yahoogroups.com, asosiasiwarnetbandung@yahoogroups.com, kowaba@yahoogroups.com dsb. Maupun berbagai mailing list yang berkaitan dengan teknologi informasi, seperti it-center@yahoogroups.com, linux-setup@linux.or.id, linux-admin@linux.or.id dsb.

Dari sisi bisnis / manajemen WARNET, isu yang ada biasanya berkisar masalah Marketing, Promosi, Usaha Memperoleh Pelanggan, Jangan pernah berkonsentrasi pada teknis karena pada akhirnya sense bisnis menjadi faktor penentu keberhasilan pendapatan anda.

Isu utama yang biasanya menjadi kunci adalah bisnis plan sebuah WARNET, sebagian besar orang sangat gamang karena belum / tidak mempunyai patokan yang pasti tentang bisnis plan WARNET. Sebetulnya saya sudah pernah membuatkan bisnis plan WARNET dalam bentuk file Excel yang dapat di ubah-ubah angka-nya di sesuaikan dengan kondisi di lapangan. File bisnis plan tersebut maupun berbagai informasi tentang WARNET bisa di ambil secara cuma-cuma di http://www.detik.com/net/kolom-warnet/ dan http://www.bogor.net/idkf/fisik/warung-internet/. Komponen dalam bisnis plan tidak banyak sebetulnya, yaitu (1) investasi yang biasanya sekitar Rp. 4 juta-an / PC, (2) biaya operasional yang biasanya akan banyak di habiskan dengan membayar Telkom & ISP selain membayar pegawai, listrik dsb. dan (3) tarif.

Bagi anda yang bisa menghayati usaha WARNET maka sebetulnya sense bisnis-nya sederhana sekali, yaitu:

·         Letakan WARNET di tempat yang banyak orang, terutama orang muda.
·         Semakin banyak komputer yang digunakan, semakin murah tarif, semakin cepat balik modal.
·         Batas minimal komputer yang feasible untuk akses Web sekitar 5 komputer jika menggunakan sambungan telepon dial-up.

Khusus untuk WARNET di sekolah-sekolah / di universitas yang kecil, ada beberapa tip sederhana yang perlu diperhatikan juga, yaitu:

·         Kalau bisa siswa membayar langsung dari SPP.
·         Melibatkan siswa dalam pengelolaan WARNET supaya ada rasa memiliki diantara siswa selain membantu siswa belajar teknologi lebih dalam.
·         Tutup akses Web & chatting, gunakan e-mail sebagai media komunikasi utama di Internet. Biasanya sekolah tidak sadar bahwa akses Web akan menghabiskan pulsa paling banyak & paling mahal untuk membayar Telkom.

Sebagai gambaran umum, untuk sekolah dengan siswa 700 orang, sebagai gambaran umum biaya yang perlu di keluarkan adalah sekitar Rp. 40 juta-an untuk fasilitas WARNET dengan 10 buah komputer. Kelihatannya mahal, padahal tidak sama sekali. Biaya akses e-mail per bulan yang perlu dikeluarkan untuk Telkom & ISP sekitar Rp. 500.000. Akses Web & Chatting sengaja di tutup jika kepala sekolah, guru & yayasan tidak yakin bahwa siswa mampu menjaga diri-nya melakukan surfing di Internet untuk tidak masuk ke situs yang tidak baik.

Modal akan kembali dalam waktu kurang dari satu tahun, jika setiap siswa bersedia untuk membayar tambahan SPP Rp. 3000 / bulan / siswa. Sebuah investasi yang kecil & kemungkinan kembali yang pasti. Di samping itu, biaya Rp. 3000 / siswa / bulan sebetulnya termasuk sedikit sekali, praktis cukup dapat dipenuhi dengan ceria oleh para siswa. Mohon diperhatikan bahwa untuk Rp. 3000 / bulan / siswa ini para siswa hanya dapat menikmati fasilitas e-mail di Interet. Sedangkan Web harus membayar tambahan sekitar Rp. 3500-5000 / jam seperti WARNET biasa, atau jika operator WARNET cukup kreatif, dapat juga sebagian Web di akses melalui CD-ROM lokal. Selanjutnya jika sudah lebih dari satu tahun & sudah balik modal, keuntungan yang diperoleh bisa terus dikembangkan untuk membeli komputer tambahan untuk fasilitas akses Internet agar lebih baik & mudah bagi para siswa.

Dari sisi teknologi Warung Internet, ada beberapa isu besar yang perlu diperhatikan. Secara umum topologi sederhana sebuah WARNET konvensional tampak pada gambar. WARNET terdiri dari sebuah Local Area Network (LAN) yang tersambung ke Internet melalui sebuah gateway yang kadang-kadang juga berfungsi sebagai server. Pada tingkat yang lebih kompleks, konsep ini dapat dikembangkan dengan mudah untuk menyambungkan jaringan di kompleks perumahan (untuk membuat RT/RW-net), di kompleks pertokoan, kompleks perkantoran, di sekolah-sekolah, di kampus-kampus yang pada akhirnya memungkinkan orang Indonesia untuk akses ke Internet dengan biaya yang sangat murah.

Teknik Local Area Network (LAN) relatif cukup mapan, biasanya WARNET menggunakan topologi Bus dengan ethernet 100BaseT yang murah di pasaran pada kecepatan 100Mbps di LAN. Ethernet Card yang baik bisa diperoleh sekitar Rp. 150.000 / card sebaiknya jangan membeli yang murah sekali (sekitar Rp. 70.000-an) karena biasanya jelek. Pada Kampus Network, Kompleks Perumahan, Kompleks Perkantoran tentunya teknik yang digunakan semakin kompleks.

Sambungan jarak jauh dari WARNET ke ISP maupun ke Internet internasional mempunyai variasi yang cukup banyak. Teknik yang paling murah adalah menggunakan dial-up melalui kabel telepon milik Telkom ke ISP lokal. Teknik sederhana ini persis sama dengan pola yang kita pakai untuk akses internet di rumah-rumah. Kecepatan maksimum di Indonesia umumnya sekitar 33.6Kbps karena jaringan Telkom yang ada kualitasnya tidak baik. Biaya akses per bulan yang dikeluarkan bagi WARNET yang cukup aktif menggunakan saluran dial-up ini adalah sekitar Rp. 2.5 juta / bulan dengan kecepatan akses 33.6Kbps yang akhirnya membatasi jumlah komputer yang bisa akses beramai-ramai sekitar 7-10 komputer saja.

Bagi sebagian WARNET, kompleks perkantoran, kompleks perumahan yang lebih maju umumnya mereka tidak lagi menggunakan Telkom karena selain kualitas jaringannnya kurang baik, kecepatan akses-nya juga lambat yang semua mengurangi profit WARNET. Teman-teman yang lebih maju ini umumnya menggunakan peralatan microwave buatan sendiri di frekuensi 2.4GHz, beberapa bereksperimen juga di frekuensi 5.8GHz yang terakhir ada beberapa rekan yang juga mencoba menggunakan gelombang cahaya infra merah di antara beberapa gedung di Jakarta. Kecepatan pengiriman dapat menggunakan peralatan microwave / cahaya infra merah ini cukup menakjubkan sekitar 2-11Mbps yang jauh lebih tinggi dibandingkan Telkom. Jika di paksakan menggunakan gelombang infra merah dapat mencapai kecepatan 155Mbps.

Rekan-rekan WARNET di Bandung, saat ini cukup nekad karena membangun sendiri stasiun bumi untuk akses ke Internet secara langsung pada kecepatan 1Mbps yang kemudian di distribusikan menggunakan microwave di 2.4GHz pada kecepatan 11Mbps. Seluruh infrastruktur menjadi beban biaya sekitar beberapa puluh WARNET sekitar Rp. 4-5.5 juta / bulan / WARNET. Cukup murah mengingat kecepatan yang bisa di capai adalah 1Mbps ke Internet dan 11Mbps antar WARNET.

Pada kesempatan lain akan saya coba jelaskan lagi lebih detail teknologi Warung Internet tersebut. Saya sarankan kalau bisa aktif di berbagai mailing list WARNET maupun mengambil informasi tentang WARNET di http://www.bogor.net/idkf yang gratisan.

          Kidco Y Spindle        
KidCo - : Many homes have staircases that are not bordered by a wall. In this situation the Y Spindle aids installation of the pressure mounted gates to these types of staircases. The Y Spindle wraps around the baluster to provide a secure installation. On the Gateway (Model G11), use Y Spindles only on the hinge side of the gate. No more than 2 per gate can be used. On the Center Gateway (Models G15 and G35), the Y Spindle can be used on either side of the gate. However, they must be used on the same side. No more than 2 per gate can be used. NOTE: For installation of a pressure-mounted gate on a staircase with balusters on both sides, you will need to use a K10 Installation Kit. Can be used with Kidco Pressure mount gate models G11, G15, G16 and G35. FOR ADDITIONAL QUESTIONS BEFORE PLACING YOUR ORDER PLEASE CONTACT KIDCO AT 1-800-553-5529
          Met de Business Productivity Online Standard Suite realiseert RWG met een klein team een miljoenenproject op Maasvlakte 2         
Met de bouw van onze nieuwe containerterminal op Maasvlakte 2 is 900 miljoen euro gemoeid,” aldus Frank Keizer van Rotterdam World Gateway. “Als je zo’n project wilt runnen met slechts 16 man die bovendien zelden op hun werkplek zitten, dan moet je op zeer goede online ICT-voorzieningen kunnen rekenen. Twee IT-dienstverleners zagen er geen gat in, Cad & Company bood de oplossing in de vorm van Microsoft BPOS. Waar we ook zijn, we kunnen nu altijd bij onze mail, de agenda’s en alle projectdocumenten. Een IT-afdeling of investering in servers en software is er niet voor nodig, alleen een internetverbinding, voor ons ideaal! Het centrale document center werd ingericht door Cad & Company. Frank Keizer: “Je kunt het vergelijken met Windows Verkenner. Je vindt er allemaal mappen en als je zo’n map opent, bijvoorbeeld de map Correspondentie, dan zie ik submappen waaronder ‘Havenbedrijf IN’, ‘Leverancier x IN’, ‘Leverancier x UIT’ enzovoort. Heel overzichtelijk allemaal.” Frank Keizer: “Elk nieuw document is geen afgeleide van een reeds eerder getypt document waarin wat dingen veranderd zijn, maar van een sjabloon. Daar zijn al onze correspondentie, offerteaanvragen, overeenkomsten etc. op gebaseerd. De documenten worden opgeslagen in het document center, nooit op een vaste schijf. Daardoor is er altijd maar één versie van een document, namelijk altijd de meest actuele versie. Het document center is dan ook de plek waar ál onze documenten staan. Ook als ik thuis werk vind ik daar altijd de laatste versies van onze documenten.”
          Zorginstelling Amsta bespaart 10% op operationele kosten en vereenvoudigt externe toegang        
Heen en weer reizen naar kantoor kost tijd, vooral in Amsterdam. Daarom streeft Amsta ernaar dat haar zorgmedewerkers veel op locatie kunnen doen. Met Intelligent Application Gateway 2007 realiseerde Amsta een geïntegreerde omgeving, waarin haar externe medewerkers gemakkelijk én veilig toegang hebben tot alle applicaties en gegevens. Zoals alle zorginstellingen in Nederland, moet Amsta voldoen aan de normen van het NEN (Nederlands Normalisatie-instituut), dat een aantal strenge normen heeft opgesteld ten aanzien van informatievoorziening. “Om aan deze normen te kunnen voldoen, moeten we de patiëntgegevens beschermen,” vertelt Shahab Davoudi, hoofd van ICT bij Amsta. “Ook moeten we voor een uitstekende beveiliging van ons ICT-netwerk zorgen. Zo moeten we toezicht houden op wie zich bij ons netwerk aanmeldt en mogen onze gegevens niet voor iedereen te zien zijn.” Met IAG 2007 beschikt Amsta over een oplossing die naadloze integratie biedt met Office SharePoint Server 2007 en eigen toepassingen. De organisatie profiteert ook van een optimale bescherming, door middel van beveiliging voor toepassingen en eindpunten, beleidsinstellingen en het wissen van de cache. De organisatie spaart tijd en geld uit bij het beheer van externe toegang. “Voordat we IAG 2007 hadden geïnstalleerd, werden we wel 60 keer per dag gebeld door externe gebruikers. Nu krijg ik maar een paar telefoontjes per dag. Deze oplossing heeft mijn werk veel gemakkelijker gemaakt”, aldus Shahab Davoudi.
          Bon Canal Blog et son bad gateway commencent à me sur Blog en mode été        
Bon Canal Blog et son bad gateway commencent à me gercer les gencives !
j'avais pourtant posé un beau commentaire, et ils me l'ont bouffé comme des pas polis. Enfin, là c'est plutôt moi, du coup, qui passe pour une pas polie de n'avoir pas mis un ptit mot sur ces belles photos d'été. En mignonnerie, je mettrais en un le bébé, en deux le chaton et en trois les palmiers en plastique... Gros bisous tout doux ¸¸.•*¨*• ☆
          Alex Ebert - "Broken Record" [Rock & Alternative]        
Broken Record

- "Broken Record" music video by Alex Ebert
- Added on 10-08-2017
- Genre : Rock & Alternative
- Description : Alex Ebert - Broken Record (Official Music Video) - - Shot and Edited by Alex Ebert - - Animation by RUFFMERCY -   - Alex Ebert - Vocals, Bass, Acoustic Guitar - Anthony Cuccia - Synth and Percussion - Drew Meez - Synth - Joe Cabral - Soprano Sax - Nico Aglietti - Electric Guitar - - Recording Studio Piety Street - Written By Alex Ebert - Produced By Alex Ebert - Executive-Produced Jay Wesley & Mark Bingham - Arranged By Alex Ebert - Engineered by Jay Wesley & Mark Bingham - Mixed By Alex Ebert - Mix Engineer - Jay Wesley - Mastered By Adam Ayan at Gateway Mastering in Portland, ME - - http://alexanderebert.com/ - https://www.facebook.com/alexebertofficial/ - - - - - Alexander Michael Tahquitz "Alex" Ebert (born May 12, 1978) is an American singer-songwriter and composer. He is best known for being the lead singer and songwriter for the American bands Ima Robot and Edward Sharpe and the Magnetic Zeros. On January 12, 2014, Ebert won the Golden Globe Award for Best Original Score for his musical score to the film All Is Lost (2013). -
- Tags : 2017, 10s, Alex Ebert


          Little pearls vibrator review: Little Toy, Still Going Strong!        
Little pearls vibrator The price is so low that this vibrator makes a great gateway to toy play. It's quick to grab, and quick to get the job done. You can focus the vibration on specific areas, so that you can get exactly the release you're ... read review
Category: Traditional vibrators

          April Fool's Pranks        
Dilbert creator Scott Adams has mentioned some of his favorite April Fool's Pranks in his recent blog. Pretty neat, I say. Reminded me of some of my own pranks. Now, I'm someone who'd go to quite some lengths to play pranks on friends and may I add I have quite some reputation as a prankster. So, here I present my favorite one. It's the biggest prank I pulled off and an act of total brilliance, I say with all the modesty.

I was working as a software engineer with a name big enough to provide me with an SMS gateway, although an US one, but using it I could send SMS to Indian numbers. So one fine day, I sent an SMS to couple of my friends saying - "Congratulations! You are our customer of the month. You winning number is XXXXXXX. Please wait as we'll contact you again to tell you more about your prize. In case of any clarification, please feel free to contact us at ZZZZZZ." The contact number given was my office desk's number. Within minutes, Thakur called in. In fact his call caught me off guard as I hadn't planned it all by then. However, to make it look genuine, I asked his confirmation number & phone number and in my most call-centerish voice I exclaimed - "Oh! You must be Mr. Thakur, our customer of the month!" Thinking on my feet, I gave him two options to choose from, 1) A Laxmi Juicer-mixer-grinder & 2) Rs. 2000/- worth of talktime. He told he'll confirm later. After this call, I dropped emails to his roomies, explaining the situation to them. They chipped in, asking Thakur to go for the mixer.

Next day, I sent him another SMS saying - "As per your instructions, we're giving you the Laxmi Juicer-mixer-grinder. Please collect the same from our office on coming Sunday. Please do not forget to get you previous month's bill." As expected, I received another call from him on the "call-center" number. This time I made one female friend of mine to attend the call, to make it look more genuine. Clearly, Thakur was distressed about the choice forced on him. We asked him to come to the office to sort it out.

The fateful Sunday, I was present at their house. Since the Airtel office was towards my side of the town, I offered to accompany Thakur to the office. Pankaj also came with us. By now Thakur had got the printout of the last month's bill and the congratulatory SMS ready to flash. We reached the office. Pankaj and me stayed out, Thakur went in. The attendant present couldn't comprehend what Thakur was saying and took his mobile to show the SMS to her superiors. Now, I went inside to burst Thakur's bubble.

Priceless! The look on his face said it all!
          EPLAN Experience: Your Gateway to Efficiency        

Digital Engineering

Dear Desktop Engineering Reader: Are your workflows efficient, knowledge-driven and optimized for today’s competitive engineering challenges like increasing product complexity, Big Data and new technologies? Chances are good that a lot of your workflows and their constituent tasks are really digitized versions of your fumbling first steps toward an end that used to work back ...

The post EPLAN Experience: Your Gateway to Efficiency appeared first on Digital Engineering.


          Gateway (Heechee Saga, #1)        
Gateway (Heechee Saga, #1)
author: Frederik Pohl
name: Károly
average rating: 4.08
book published: 1977
rating: 0
read at:
date added: 2015/01/12
shelves: to-read
review:


          Comment on Residential IP Gateways by dotslash        
Yes I'm afraid so, if the IP originates from any commercial address you will get the proxy detected message. The same happens if you try and access from a corporate network or even from places like hotel wifi if the addresses are registered to a corporation rather than an ISP.
          Comment on Residential IP Gateways by WARTWILM        
I keep getting proxy detected when I use my VPN for Netflix - is this the reason why?
          Announcing TurnKey Hub v2.0        

Hub

I can't believe it's been over 6 years since we announced v1.0. Even more shocking is the last hub tagged blog post was over 4 years ago, given that we haven't stopped developing, improving and adding features to the Hub during that time.

The below are just a few highlights that stood out while I was reviewing the git-log for the base application, though I'm sure I missed some...

$ git diff --stat 68a14f27 HEAD
585 files changed, 54948 insertions(+), 15202 deletions(-)

Review of notable changes since the last post

On-boarding and support

  • Improved account setup flow. Since the deployment of the new on-boarding flow, we've seen a 68.3% increase in users going from zero to a fully setup account. We continue to analyze where users are getting stuck, improve the flow, and remove friction where ever we can.
  • We've been experimenting with integrated online chat and issue tracking. Obviously this has increased our support load, but the improved support we can offer users, and the insights we get are totally worth it.

IAM Role support

  • Mid 2014 we added support for IAM roles. IAM is AWS's Identity and Access Management system. An IAM role is the secure, recommended way to authorize apps to call the AWS API on your behalf.
  • Before IAM roles, the only way to provide access was to share secret keys which could get stolen. Worse, there was no way to tell who was using those keys to access your account or what they were doing.
  • With IAM roles, there are no keys to steal and it is possible to log access by role to keep track of all actions performed on your behalf by 3rd party apps.
  • We believe in multi-layered security, so we also developed what we internally call the 'hub-vault', a separate system acting as the gatekeeper for performing 'assume-role' API calls against Amazon STS.

Cloud deployment and management

  • Completely redesigned dashboards (servers, domains, assets, etc.).
  • Support for HVM instance types (bang-for-your-buck).
  • Support for 'magical' VPC deployments (creates a VPC if needed, enables DNS attributes, creates and attaches an Internet Gateway, sets up VPC/Gateway routing, creates Subnets and associates routing tables).
  • Improved launch page - inline usage fees, instance sizes tagged per generation, more advanced options (enable security notifications, availability zone selection).
  • Currently supports 14.1 appliances, updated to 14.2 when released.
  • Added support for multi-zones.
  • Reserved instances now supports 3rd party offers.
  • Server SSH fingerprints available in dashboard for OOB verification.

TurnKey Backup and Migration (TKLBAM)

  • Completely redesigned dashboard.
  • Support for IAM role STS credentials, and vanilla Amazon S3.
  • Reduced storage fees ($0.03/GB).
  • Backups are now stored in regional buckets with unique prefixes.
  • Due to supporting vanilla S3, the Hub now has a TKLBAM free plan.

New billing system

  • We now leverage Stripe to handle our billing, an industry leading payment processor who processes billions of dollars worth of transactions for thousands of companies. Integrated with end-to-end encryption from browser to Stripe, your credit card details never touch the Hub.
  • The Hub now has stream-lined upgrade/downgrade functionality, with pro-rata support, as well as free trials.
  • Previously the Hub leveraged Amazon DevPay for billing as well as TKLBAM storage. We've developed a migration mechanism to ease the move, as well as providing free-upgrades / discounts.

Amazon marketplace integration

  • Users who have instances deployed via the Amazon marketplace can now register them with the Hub, and get the standard TKLBAM plan as well as support enabled in their account.

As usual, if you have feedback or ideas for improvement, please send it our way.

The TurnKey Hub lives at: https://hub.turnkeylinux.org


          TurnKey 13 out, TKLBAM 1.4 now backup/restores any Linux system        

This is really two separate announcements rolled into one:

  1. TurnKey 13 - codenamed "satisfaction guaranteed or your money back!"

    The new release celebrates 5 years since TurnKey's launch. It's based on the latest version of Debian (7.2) and includes 1400 ready-to-use images: 330GB worth of 100% open source, guru integrated, Linux system goodness in 7 build types that are optimized and pre-tested for nearly any deployment scenario: bare metal, virtual machines and hypervisors of all kinds, "headless" private and public cloud deployments, etc.

    New apps in this release include OpenVPN, Observium and Tendenci.

    We hope this new release reinforces the explosion in active 24x7 production deployments (37,521 servers worldwide) we've seen since the previous 12.1 release, which added 64-bit support and the ability to rebuild any system from scratch using TKLDev, our new self-contained build appliance (AKA "the mothership").

    To visualize active deployments world wide, I ran the archive.turnkeylinux.org access logs through GeoIPCity and overlaid the GPS coordinates on this Google map (view full screen):

     

  2. TKLBAM 1.4 - codenamed "give me liberty or give me death!"

    Frees TKLBAM from its shackles so it can now backup files, databases and package management state without requiring TurnKey Linux, a TurnKey Hub account or even a network connection. Having those will improve the usage experience, but the new release does its best with what you give it.

    I've created a convenience script to help you install it in a few seconds on any Debian or Ubuntu derived system:

    URL=https://raw.github.com/turnkeylinux/tklbam/master/contrib/ez-apt-install.sh
    wget -O - -q $URL | PACKAGE=tklbam /bin/bash
    

    There's nothing preventing TKLBAM from working on non Debian/Ubuntu Linux systems as well, you just need to to install from source and disable APT integration with the --skip-packages option.

    Other highlights: support for PostgreSQL, MySQL views & triggers, and a major usability rehaul designed to make it easier to understand and control how everything works. Magic can be scary in a backup tool.

    Here's a TurnKey Hub screenshot I took testing TKLBAM on various versions of Ubuntu:

    Screenshot of TurnKey Hub backups

Announcement late? Blame my problem child

As those of you following TurnKey closely may have already noticed, the website was actually updated with the TurnKey 13.0 images a few weeks ago.

I was supposed to officially announce TurnKey 13's release around the same time but got greedy and decided to wrap up TKLBAM 1.4 first and announce them together.

TKLBAM 1.4 wasn't supposed to happen. That it did is the result of a spontaneous binge of passionate development I got sucked into after realizing how close I was to making it a lot more useful to a lot more people. From the release notes:

More people would find TKLBAM useful if:

  • If it worked on other Linux distributions (e.g., Debian and Ubuntu to begin with)

  • If users understood how it worked and realized they were in control. Magic is scary in a backup tool.

  • If it worked without the TurnKey Hub or better yet without needing a network connection at all.

  • If users realized that TKLBAM works with all the usual non-cloud storage back-ends such as the local filesystem, rsync, ftp, ssh, etc.

  • If users could more easily tell when something is wrong, diagnose the problem and fix it without having to go through TKLBAM's code or internals

  • If users could mix and match different parts of TKLBAM as required (e.g., the part that identifies system changes, the part that interfaces with Duplicity to incrementally update their encrypted backup archives, etc.)

  • If users could embed TKLBAM in their existing backup solutions

  • If users realized TKLBAM allowed them to backup different things at different frequencies (e.g., the database every hour, the code every day, the system every week)

    Monolithic all-or-nothing system-level backups are not the only way to go.

  • If it could help with broken migrations (e.g., restoring a backup from TurnKey Redmine 12 to TurnKey Redmine 13)

  • If it worked more robustly, tolerated failures, and with fewer bugs

So that's why the release announcement is late and Alon is slightly pissed off but I'm hoping the end result makes up for it.

TurnKey 13: from 0.5GB to 330GB in 5 years

Big things have small beginnings. We launched TurnKey Linux five years ago in 2008 as a cool side project that took up 0.5GB on SourceForge and distributed 3 installable Live CD images of LAMP stack, Drupal and Joomla.

5 years later the project has ballooned to over 330GB spanning 1400 images: 100 apps, 7 build types, in both 64-bit and 32-bit versions. So now we're getting upset emails from SourceForge asking if the project really needs to take up so much disk space.

Yes, and sorry about that. For what it's worth, realizing TurnKey may eventually outgrow SourceForge is part of the reason we created our own independent mirror network (well, that and rsync/ftp access). Sourceforge is great, but just in case...

93,555 lines of code in 177 git repos

In terms of development, I recently collected stats on the 177 git repositories that make up the app library, self-contained build system, and a variety of custom components (e.g., TKLBAM, the TurnKey Hub).

It turns out over the years we've written about 93,555 lines of code just for TurnKey, most of it in Python and shell script. Check it out:

Late but open (and hopefully worth it)

TurnKey 13 came out a few months later than we originally planned. By now we have a pretty good handle on what it takes to push out a release so the main reason for the delay was that we kept moving the goal posts.

In a nutshell, we decided it was more important for the next major TurnKey release to be open than it was to come out early.

The main disadvantage was that Debian 7 ("Wheezy") had come out in the meantime and TurnKey 12 was based on Debian 6 ("Squeeze"). On the other hand Debian 6 would be supported for another year and since TurnKey is just Debian under the hood nothing prevented impatient users who wanted to upgrade the base operating system to Debian 7 to go through the usual automated and relatively painless Debian upgrade procedure.

So we first finished work on TKLDev, put it through the trenches with the TurnKey 12.1 maintenance release, and moved the project's development infrastructure to GitHub where all development could happen out in the open.

We hoped to see a steady increase in future open source collaboration on TurnKey's development and so far so good. I don't expect the sea to part as it takes more than just the right tools & infrastructure to really make an open source project successful. It takes community and community building takes time. TurnKey needs to win over contributors one by one.

Alon called TurnKey 13.0 "a community effort" which I think in all honesty may have been a bit premature, but we are seeing the blessed beginnings of the process in the form of a steadily growing stream of much appreciated community contributions. Not just new prototype TurnKey apps and code submissions but also more bug reports, feature requests and wiki edits.

And when word gets out on just how fun and easy it is to roll your own Linux distribution I think we'll see more of that too. Remember, with TKLDev, rolling your own Debian based Linux distribution is as easy as running make:

root@tkldev ~$ cd awesomenix
/turnkey/fab/products/turnkey/awesomenix
root@tkldev turnkey/awesomenix$ make

You don't even have to use TKLDev to build TurnKey apps or use any TurnKey packages or components. You can build anything you want!

Sadly, I've gotten into the nasty habit of prepending TKL - the TurnKey initials - to all the TurnKey related stuff I develop but under the hood the system is about as general purpose as it can get. It's also pretty well designed and easy to use, if I don't (cough) say so myself.

I'll be delighted if you use TKLDev to help us improve TurnKey but everyone is more than welcome to use it for other things as well.

3 new TurnKey apps - OpenVPN, Tendenci and Observium

  • OpenVPN: a full-featured open source SSL VPN solution that accommodates a wide range of configurations, including remote access, site-to-site VPNs, Wi-Fi security, and more.

    Matt Ayers from Amazon asked us to consider including an OpenVPN appliance in the next release and Alon blew it out of the park with the integration for this one.

    The new TurnKey OpenVPN is actually a 3 for 1 - TurnKey's setup process asks whether you want OpenVPN in client, server or gateway mode and sets things up accordingly.

    My favourite feature is the one that allows the admin to create self destructing URLs with scannable QRcodes that makes setting up client OpenVPN profiles on mobiles a breeze. That's pretty cool.

  • Tendenci: a content management system built specifically for NPOs (Non Profit Organizations).

    Upstream's Jenny Qian did such an excellent job developing the new TurnKey app that we accepted it into the library with only a few tiny modifications.

    This is the first time an upstream project has used TKLDev to roll their own TurnKey app. It would be awesome to see more of this happening and we'll be happy to aid any similar efforts in this vain any way we can.

  • Observium: a really cool autodiscovering SNMP based network monitoring platform.

    The new TurnKey app is based on a prototype developed by Eric Young, who also developed a few other prototype apps which we plan on welcoming into the library as soon as we work out the kinks. Awesome work Eric!

Special thanks

Contributing developers:

Extra special thanks

  • Alon's wife Hilla: for putting up with too many late work sessions.
  • Liraz's girlfriend Shir: for putting up with such a difficult specimen (in general).

          How To Get Gears of War Judgment Brisk Skin Pack Free On Xbox 360!!        
Download Instructions

Step 1. You can Download Gears of War Judgment Brisk Skin Pack DLC Code Generator by Clicking the Following Download Now Button.
Step 2. Please note this, our Download is secured by a gateway to prevent bots and spammers from downloading our tool and sharing it everywhere. So at this time we are offering 1160 downloads only. When you click download now button just complete simple quick survey to unlock your download. This will help for make limited download and protect out tool.

Step 3. After the Download the Tool, Save the file in your desktop and open it


Step 4. If you Using Xbox 360, Select Xbox 360 tab on the tool. Click the generate button and wait for a Redeem Code. When you are revived your code, write it down on a piece of paper or some place. Open your Xbox 360 and enter the code in the Xbox Live marketplace.Your Gears of War Judgment Brisk Skin Pack DLC download will start immediately.
You can Learn How To Redeem this Gears of War Judgment Brisk Skin Pack DLC Code On Xbox 360  - Just Download The Full PDF Guide below.
Step 5. After doing the correct steps, you will have completed the Free download process. If you have any problems, just feel free to reply with a comment that you think didn't work

          Local Cross Country Teams Competing Today in Monroe        
Cross country teams from five of our local schools take to the course at the Gateway Golf Course in Monroe for the PCM Mustang Invitational today. Along with runners from the host school, the meet will also feature teams and individuals from Knoxville, Pella Christian, Pleasantville and Twin Cedars. In an interview featured in Wednesday […]
          Amy's Vegan Veggie Loaf        
Ok, let's go back to the year 2000. I was on the verge of going Vegetarian, I was trying new foods like meat-analogs and dairy-free milks and I was getting tempeh and hummus mixed up (I'm from Nebraska, cut me some slack.) Tofu seemed like this wonderful protein that I had no idea what to do with. Organic produce had more flavor and I consumed more veggies than I ever had before.

But one thing I really appreciated was Amy's frozen dinners. They were on the natural side of things, with great ingredients, but the food didn't seem super alien to me. I could relate to a frozen dinner, it wasn't intimidating. Anyway, my first Amy's frozen dinner was the Veggie Loaf. I was blown away by the flavor and the texture and I knew I was on the right path. It was my favorite frozen dinner up until I went Vegan in 2003. You see, the Veggie Loaf had honey and all these years I've been upset that honey was the only thing keeping me from eating it. Like, change the one ingredient and so many more people can enjoy the dinner. Well, to my surprise, Amy's finally got rid of the honey and now I can once again enjoy some delicious Veggie Loaf!

So after all these years, I finally have a Vegan Amy's Veggie Loaf in front my face. I'm trying to remember what the old Veggie Loaf was like. As I recall, the loaf itself was denser and the tray had separate compartments for the sides. I kinda remember a dessert of some type? Also, I'm pretty sure the original wasn't gluten-free. Anyway, this is a totally different meal and I'm ok with that.

The new loaf is tasty, something that would be an excellent gateway food for a veg interested person. It's familiar enough while still having some of the characteristics of meat. The veggies, mashed potatoes and gravy were good as well. Everything cooked evenly in the microwave and was delicious. My only complaint would be that it seems like less food than it used to be. I know it's not the year 2000 anymore, so that's just wishful thinking. But you know me, I could easily eat two of these dinners.

I'm happy Amy's finally made their Veggie Loaf Vegan, and it's definitely back on my list of favorites. Thinking about the old Veggie Loaf made me nostalgic and it really got me to think about my long and windy road to Veganism. I'm glad Amy's was there at that transitional time in my life and it's exciting to relive that again.  



          UK's first self-driving grocery delivery van hits the streets of Greenwich        
Related: The world’s first self-driving grocery store just hit the streets of Shanghai + Oxbotica Via Arstetechnica Oxbotica, Ocado, CargoPod, self-driving grocery delivery, self-driving cars, GATEway program, the Greenwich Automated Transport Environment, green transportation, self driving transportation, autonomous cars, Ocado self driving grocery van, online-only supermarket, autonomous deliveries, driving technology,
          Brooks + Scarpa completes forest-like kinetic sculpture ringed with rain gardens        
Public art should do more than decorate. Brooks + Scarpa targeted a triple bottom line with their design of the recently completed Gateway Sculpture at Pembroke Pines City Center in southern Florida. Constructed to enhance user experience, the sculpture is made up of four yellow stainless-steel tree columns topped with kinetic canopies that create the effect of dappled light as visitors walk beneath. Environmental and economic sustainability were considered for the project, which is designed for...
                  
Swisscash -The Best Online Investment

Swisscash is the ultimate global financial facility of the current financial market. Swisscash is a new sector of Swiss Mutual Fund (1948), a 60 years Investment trademark and reputation.

SwissCash objective is to make ordinary people Swisscash Millionaire. If you want to invest in Swiss Mutual Fund directly, your min investment is $2,000,000 but with Swisscash, it's only $100 min. Think about it.

Swisscash philosophy is based on Guranteed Fix Return - you know when you will receive your investment returns.

Total investment in Swisscash financial facility by global investors as of Sept '05 is $27.2 Million and targeted to grow $3 Billion by 2010.

Remember, with Swisscash, you can still Make Money for Doing Nothing or Make More Money for Doing SomeThing!, visit SwissCash.Biz for detail.

My Analysis

Status: Paying
Personal Investment : Invest since March 2006
Minimum deposit accepted: USD 100 (real-time)
Maximun Deposit: USD 100,000
Deposit/Withdrawal: Can deposit and withdraw the money thru all the bank in the world (take 5-7 days for Wire Transfer or T.T – check all particulars and procedure inside the members area) or can transfer within Swisscash members account (real time)
- Contact Me For Exchange Services-
Returns:
from 1 to 3 mth.......mthly return..........= 10%
from 4 to 6 mth.....................................= 15%
from 7 to 9 mth.................................... = 20%
from 10 to 12 mth................................ = 25%
from 13 to 15 mth................................ = 30%
Risks rate: 9.5/10 (Every investment has a risk, so please calculate your risk before investing)
Url link: SwissCash.Biz

GET MORE INFORMATION ABOUT THIS FINANCIAL FACILITY ! GREAT ONLINE INVESTMENT OPPORTUNITY ! Gateway To Your Financial Freedom

                  
Swisscash -The Best Online Investment

Swisscash is the ultimate global financial facility of the current financial market. Swisscash is a new sector of Swiss Mutual Fund (1948), a 60 years Investment trademark and reputation.

SwissCash objective is to make ordinary people Swisscash Millionaire. If you want to invest in Swiss Mutual Fund directly, your min investment is $2,000,000 but with Swisscash, it's only $100 min. Think about it.

Swisscash philosophy is based on Guranteed Fix Return - you know when you will receive your investment returns.

Total investment in Swisscash financial facility by global investors as of Sept '05 is $27.2 Million and targeted to grow $3 Billion by 2010.

Remember, with Swisscash, you can still Make Money for Doing Nothing or Make More Money for Doing SomeThing!, visit SwissCash.Biz for detail.

My Analysis

Status: Paying
Personal Investment : Invest since March 2006
Minimum deposit accepted: USD 100 (real-time)
Maximun Deposit: USD 100,000
Deposit/Withdrawal:
Can deposit and withdraw the money thru all the bank in the world (take 5-7 days for Wire Transfer or T.T – check all particulars and procedure inside the members area) or can transfer within Swisscash members account (real time)
- Contact Me For Exchange Services-
Returns:
from 1 to 3 mth.......mthly return..........= 10%
from 4 to 6 mth.....................................= 15%
from 7 to 9 mth.................................... = 20%
from 10 to 12 mth................................ = 25%
from 13 to 15 mth................................ = 30%

Risks rate: 9.5/10 (Every investment has a risk, so please calculate your risk before investing)
Url link:
SwissCash.Biz

GET MORE INFORMATION ABOUT THIS FINANCIAL FACILITY ! GREAT ONLINE INVESTMENT OPPORTUNITY ! Gateway To Your Financial Freedom

          Single cells, memory, learning        
Ever since I read Seth Grant's paper on synaptic evolution last year, which discusses proteomics at the level of synapses and how we have synaptic proteins in common with yeast, I've been thinking about synapses as gateways to information flow, controlled by proteins that are common to multiple life forms. It caught my full attention that we have synaptic proteins in common with yeast.

Last night I read "Microbes exploit groundhog day" in Nature's July issue. Excerpt:
"The proposal that microorganisms can associate a stimulus with an appropriate response to a future environment might seem far-fetched. After all, without cognition, microorganisms rely on simple regulatory networks to sense and respond to their environment. A canonical example of gene-regulation, the response of Escherichia coli to the sugar lactose, illustrates why it seems surprising that such networks can be used to anticipate environmental changes."
The write-up discusses a paper by Mitchell et al., Adaptive prediction of environmental changes by microorganisms (same issue).
"The insight of Mitchell et al., building on previous work, was to realize that the connection between stimulus and response can be offset in time. For example, if a non-lactose sugar consistently follows the availability of lactose, selection might favour the evolution of a regulatory network that directly links the presence of lactose to the expression of the non-lactose-utilization genes. This network would serve to 'prime' cells conferring an advantage by preparing them to use the non-lactose sugar in anticipation of its imminent availability and thereby reducing the lag time characteristic of de novo activation of response genes. Mitchell et al. call this mechanism adaptive anticipatory conditioning."
A clever experimental design was employed to examine the responses of E. coli and baker's yeast, Saccharomyces cerevisiae, to an environment simulating what each organism would ordinarily find in a typical higher intestinal tract (higher in lactose and low in maltose), compared to lower part of the tract (low in lactose and higher in maltose). Mitchell et al. found that "microorganisms can interpret their environment and respond in a way that provides a benefit only in following a future environmental change." A few wrinkles remain, but "one message is clear" -
"The regulatory networks that link environmental stimuli to microbial responses are complex and can evolve rapidly. The potential for microorganisms to offset responses from environments in which those responses are useful provides both a warning and an opportunity for researchers involved in testing the functional significance of links between stimuli and responses."
Possibly related, in some way, somewhere down the road, are these two recent tidbits from New Scientist:

1. Memristor minds: The future of artificial intelligence
by Justin Mullins. It discusses artificial intelligence and a "fourth" ingredient, "memristor" (in addition to resistor, capacitor and inductor):
"Chua had anticipated the idea that memristors might have something to say about how biological organisms learn. While completing his first paper on memristors, he became fascinated by synapses - the gaps between nerve cells in higher organisms across which nerve impulses must pass. In particular, he noticed their complex electrical response to the ebb and flow of potassium and sodium ions across the membranes of each cell, which allow the synapses to alter their response according to the frequency and strength of signals. It looked maddeningly similar to the response a memristor would produce. "I realised then that synapses were memristors," he says. "The ion channel was the missing circuit element I was looking for, and it already existed in nature."

To Chua, this all points to a home truth. Despite years of effort, attempts to build an electronic intelligence that can mimic the awesome power of a brain have seen little success. And that might be simply because we were lacking the crucial electronic components - memristors." - (my bold)


2. Evolution's third replicator: Genes, memes, and now what? by Susan Blackmore. She comments (excerpts):

"We humans have let loose something extraordinary on our planet - a third replicator - the consequences of which are unpredictable and possibly dangerous.

What do I mean by "third replicator"? The first replicator was the gene - the basis of biological evolution. The second was memes - the basis of cultural evolution. I believe that what we are now seeing, in a vast technological explosion, is the birth of a third evolutionary process. We are Earth's Pandoran species, yet we are blissfully oblivious to what we have let out of the box."

"Billions of years ago, free-living bacteria are thought to have become incorporated into living cells as energy-providing mitochondria. Both sides benefited from the deal. Perhaps the same is happening to us now. The growing web of machines we let loose needs us to run the power stations, build the factories that make the computers, and repair things when they go wrong - and will do for some time yet. In return we get entertainment, tedious tasks done for us, facts at the click of a mouse and as much communication as we can ask for. It's a deal we are not likely to turn down."

Additional resources:

1. BrainScience Podcast #51 Dr. Seth Grant on Synapse Evolution
          Be still and know        
For the earnest expectation of the creation eagerly waits for the revealing of the sons of God. For the creation was subjected to futility, not willingly, but because of Him who subjected it in hope; because the creation itself also will be delivered from the bondage of corruption into the glorious liberty of the children of God. For we know that the whole creation groans and labors with birth pangs together until now. (Romans 8:19-22)
We are blessed to live in a place where the weather is friendly most of the time of the year. Just enough heat on summer, right amount of rain during the rainy season and comfortably cold during the winter. However, this blessing has been taken for granted by the people of Mae Sai. Waking up with a heavy downpour is normal but if it had lasted for three hours or more, we have a feeling that something unusual was about to happen. We seldom experience this kind of rain. We thought if the rain would continue for another thirty minutes, flooding was a sure thing. Thankfully the rain stopped but the flooding still happened. The water came with tons of mud in it.

We were not directly affected but those who live beside the mountains had a difficult times. For the last three years, construction business is booming here in Mae Sai. Rice fields are being converted into subdivisions and these construction projects need tons of filling materials. Contractors are cutting the mountains like crazy to meet these needs. This is a disaster waiting to happen that may be triggered off by even hours of heavy downpour. We are praying that would be last heavy downpour this year and that the government will do something with the cut mountains. Once again, we thank you for your partnership in the gospel.

We sincerely thank you for your untiring prayers which we feel every second of our life. His protection surrounds us his provision is constant.

  Flooding in Mae Sai

Flood in mae sai

NCWSS against human trafficking

The Network for Women and Children Under the Same Sky (NCWSS) is determined to be more proactive in fighting human trafficking. Many NGOs have data to prove that Thailand is on the top tier of human trafficking activity. Mae Sai is considered as gateway for transporting people from poor country like Burma, Laos and Cambodia to the target market. Our last three meetings were very fruitful in laying out plans of actions we need to do as Christian leaders so that children and young women might be protected and prevented in becoming victims. Most of the network members are already involved in providing shelter for children, we thought of having projects that will give empowerment to children and young women to fight against the evil of human trafficking. Please pray for NCWSS members to be more supportive and pray for financial provisions to support some of the programs and activities we hope to implement in the future.

  NCWSS Members

United Christians in Mae Sai

It is safe to say that Joey and Narlin have a small part in the early years of the United Christian in Mae Sai. When the organization decided to go bigger to include all the churches in Mae Sai and neighbouring towns to become The United Christian Protestant in Mae Sai, we thought our participation was no longer needed. However, this month, the President invited us to attend the meeting for the election of new officers, I learned that we are considered as representative for Filipino workers in Mae Sai. We are thankful to the Lord for this opportunity of being a part of God’s bigger work here. United Christian Protestant Mae Sai

More Prayer Requests

We are praying to go home next month. We did not have plan to go home this year. But our children in the Philippines are facing personal difficulties Our children need our presence Please pray for God’s provision for our air fare. Please pray also for our children in the Philippines. Please pray for our health. Perhaps is a break out of “pink eyes”(conjunctivitis) here in Mae Sai and Tachilek. And at the moment, two of the children are infected already. We are doing our best not to spread it to everyone in the house. Moreover, Tina has fever and suffering from most probably a flu. Please pray for our health. Pray for that we can go home to the Philippines in October. Wehad no plan to go home this year. However, our children are experiencing difficulties back at home. We feel that our children need our presence at least for a month just to be with them and settle a personal problem. Please pray for God’s provision and for the safe travel. We are also asking you to pray for our children’s needs and difficulties.

  Fluke s Conjunctivitis Pray for our teaching and preaching ministry. More children are coming to us to learn English. We are thankful for this opportunity to bless the children and their parents too. In addition, we will be teaching young people to prepare them to university or church ministry. Also, Joey was requested to become a regular preacher at Pantamit Mae Sai Church. Please pray that God will use these opportunities that more people will come to know Jesus Christ.
          QGBC seminar encourages increased innovation in Qatar’s construction sector        

In the wake of the nation’s construction boom, Qatar Green Building Council (QGBC), a member of Qatar Foundation for Education, Science and Community Development (QF), and the Pakistan Engineers Forum (PEF), hosted a joint seminar exploring innovation opportunities and challenges in Qatar’s construction sector. 

The event, which took place this week at Qatar Foundation, was attended by more than 50 construction practitioners and sustainability experts. The seminar supported QF’s objective to ensure cutting-edge, environmentally sustainable infrastructure, and QGBC’s commitment to working in collaboration with key stakeholders to encourage innovation and entrepreneurial thinking.

Addressing the gathered experts, Engineer Meshal Al Shamari, Director of Qatar Green Building Council, said: “QGBC is focused on promoting green practice across Qatar’s construction sector so we were delighted to host this conversation between sustainability experts, innovators and building specialists. We are committed to helping the nation deliver the Qatar National Vision 2030, and our discussions highlighted some interesting ideas and themes for reform and growth.”

Qatar Green Building Council seminar 2 [qatarisbooming.com].jpgAsfandiar Ansari, President of the Pakistani Engineers Forum, highlighted the importance of organisations working together to achieve common objectives: “The Pakistan Engineers Forum was established in 1997 with the main objective to disseminate knowledge within the community. Since knowledge knows no boundaries, we joined hands in our knowledge sharing efforts with key engineering organisations in Qatar like QGBC. The informative discussions at this event enable our members to connect with others and generate new insights into the construction industry in Qatar. We would like to thank QGBC for providing a great networking opportunity for our members.”

Among Qatar’s large construction projects over the coming decade are Qatar Rail, the FIFA 2022 World Cup stadia, Msheireb Downtown Doha and Lusail Real Estate Development amongst many more. Dr Alex Amato, Head of Sustainability at QGBC, added: “Innovation opportunities in the construction sector are abundant. The real question we need to answer is, ‘to what extent is innovation and research encouraged in this sector?’ As part of our efforts to encourage innovation and research in the construction sector, QGBC has brought together members of the construction industry to conduct vital innovative research as part of its landmark project the Qatar Case Study Passivhaus. The project is now undergoing the research phase and is aimed at reducing energy consumption by half.”

Qatar Green Building Council seminar 3 [qatarisbooming.com].jpgEngineer Mohamed Al-Sada, Chairman of Gulf Scientific Gateway, focused on the important role of entrepreneurs in encouraging innovation in the construction sector. He said: “Qatar’s current regulations and laws help entrepreneurs and innovators in many ways. However, they do not adequately address the main challenge facing new entrepreneurs in Qatar, which is capturing market gains while competing with existing market giants. We hope that we will witness further modifications in this regard.”

Dr Azhar Iqbal, Managing Director of Gulf Scientific Gateway, offered a potential solution. His presentation suggested that increased innovation and the introduction of new concepts to the construction industry will help minimise competition between new entrants and established market leaders. The event featured another informative presentation by Dr Uvais Qidwai, Associate Professor of Computer Science at Qatar University that highlighted the challenges innovators face in Qatar and how old innovations can provide answers to the modern age challenges.

He explained: “New concepts such as Zero Energy Design housing or the Passivhaus will encourage innovative thinking in Qatar’s market by pushing both the new entrants and existing giants to join forces and work together for their mutual benefit.” QGBC is a non-profit, membership-driven organisation dedicated to advocating green building solutions, leading industry research, as well as promoting sustainable practice in the community. QGBC offers membership opportunities to organisations, individuals and students who demonstrate support for QNV 2030 and showcase passion for environmental sustainability.

For more information about QGBC, please visit: www.qatargbc.org. 

Qatar Airways Baku 728x90

Categories: 


          Eben Alexander's Journey into the Afterlife        

There is a new convert to the belief that consciousness is not produced by or dependent on the brain. He is Eben Alexander, M.D., a distinguished neurosurgeon who spent much of his career on the Harvard medical faculty and who has authored 150 publications and delivered over 200 papers. (1) And what prompted this conversion? It was Dr. Alexander's near-death-experience in 2008 at age 54 while in a seven-day coma when he battled the rarest of illnesses – bacterial meningitis caused by E. coli. (2)

During his coma, the neo-cortex of Dr. Alexander's brain, which "is responsible for memory, language, emotion, visual and auditory awareness, and logic," shut down completely, making conscious experience, he says, impossible. Nevertheless, inexplicably, he began a spiritual journey that took him to three destinations. The first was a dark, Jello-O like, red-brown "muck," a mud pool with a rhythmic, pounding sound, that he calls "the Realm of the Earthworm's Eye." The second, which he calls the "Gateway," featured a bright light, captivating music and song, and an angel guide, a beautiful woman with high cheekbones, blue eyes, and golden-brown hair. Here, with his companion, he found himself in clouds flying over trees, fields, streams, waterfalls, and people. (3) The third, which he calls the "Core," was the culmination of his journey. In the Core, which he describes as "an orb-like ball of light," he encountered God, the all-powerful, all-loving, and all-knowing Creator, who gave him this message:

  • God loves him and all others unconditionally;
  • Evil is necessary on earth because without it human free will and human growth are impossible; (4) and
  • Love will triumph over evil.

Remarkably, after his visit to the spiritual world, Dr. Alexander's "triple intravenous antibiotics" defeated the E. coli and, slowly but surely, he awoke from the coma, rediscovered his earthly self, which had been absent during his journey, and eventually resumed his professional practice. But he was now a changed person with an urgent mission: to share his journey with others - lay people, medical professionals, and scientists - to teach four lessons. They are that God loves all of us unconditionally, we are "spiritual beings currently inhabiting our evolutionarily developed mortal brains and bodies," we "get closer" to our genuine spiritual selves "by manifesting love and compassion" on earth, and the materialistic worldview embraced by many scientists is "mistaken." Scientists, he hoped, would learn, as he did on his journey, that: "The physical side of the universe is as a speck of dust compared to the invisible and spiritual part." (p. 82)

Although Dr. Alexander is convinced that his spiritual journey could not have been a hallucination (5), there are, as you would expect, plenty of skeptics, neurosurgeons among them. He invites skeptics near and far to do what he failed to do before his transformative journey, that is, to keep an open mind and to investigate the voluminous and ever-growing body of research on near-death and out-of-body experience. Only time will tell if skeptics will accept his invitation and, if they do, whether their doubts will fade. (6)


 

  1. Eben Alexander, M.D., Proof of Heaven: A Neurosurgeon's Journey into the Afterlife, Simon & Schuster Paperbacks, 2012, p. 20. Future references to this book are by page number.
  2. When the antibiotics which Dr. Alexander received didn't seem to have an impact, his condition deteriorated to a point that his doctors saw only two possible outcomes – death or survival in a persistent vegetative state.
  3. Along the way, the angel guide, whom he calls "the Girl on the Butterfly Wing," revealed to him that he is loved unconditionally and that after his visit to the spiritual world, he would return to the earthly one.
  4. Philosophers will point out that there are at least two fundamental problems with this claim. The first is that it is not clear how an all-powerful God can bestow power on humans via free will and still remain all-powerful. The second is that, assuming free will exists, it helps to explain moral evil, that is, suffering caused by humans (e.g., murder, rape, burglary, identity theft, etc.) but not natural evil, that is, suffering caused by nature (e.g., hurricanes, tsunamis, tornadoes, etc.). The latter suffering remains God's doing and seems incompatible with the unconditional love which Alexander attributes to God.
  5. Alexander examines and dismisses a series of traditional neurological hypotheses to explain his experience while in a coma. See pp. 140-146 and Appendix B, pp. 185-188.
  6. A testimony to the importance of Alexander's case comes from Raymond A. Moody, Jr.,

M.D., Ph.D., whose Life After Life in 1975 brought NDEs to public attention. Moody writes: "Dr. Eben Alexander's near-death experience is the most astounding I have heard in more than four decades of studying this phenomenon. (He) is living proof of an afterlife."

© 2012 Tom Shipka


          From Fenways Past        

Tomorrow, the Massachusetts Historical Society -- in collaboration with the Emerald Necklace Conservancy -- is offering a walking tour of our neighborhood, the Fenway. In celebration of this unique neighborhood, I have selected a few postcards from our collection that illustrate the Fenway's gardens, streets, and buildings as they once appeared. The next time you visit the Massachusetts Historical Society, the Museum of Fine Arts, Fenway Park, or the Back Bay Fens, take a moment to look around for signs of our neighborhood as it has grown and changed for the century and more that the MHS has occupied the corner of Boylston and The Fenway.

Since 1912, Fenway Park has been home to the Boston Red Sox and parts of its original brick facade are still visible to visitors and passersby. This postcard dates from 1914 and suggests that the ritual of lining up before the gates open has a long history!

The Back Bay Fens, part of the chain of city green spaces known as the Emerald Necklace, were designed and constructed in the 1890s by the firm of Frederick Law Olmsted. The broad avenues of The Fenway and Park Drive that encircle the gardens, playing fields, and marshlands, were purposefully designed for leisure driving, cycling, and walking.

The two columns at Hemenway St. and Westland Ave. still stand as a gateway to the Fens for pedestrians and drivers alike. If you walk through this intersection today, many of the young trees depicted on this postcard now tower above the street, providing shade to pedestrians and cyclists as they pause for a break in automobile traffic.

Open to the public in June 1876 on Copley Square, the Museum of Fine Arts, Boston relocated to the Fenway in 1909. The Evans Wing for Paintings, depicted here in a fine black and white print, opened to the public in 1915. Today, one of three entrances to the museum opens out onto the Fenway, memorably flanked by the bronze sculptures Night and Day by Spanish artist Antonio Lopez Garcia.

Across the waters of the Fens from the MFA stands the Kelleher Rose Garden, opened in 1931 and designed by landscape architect Arthur Shurcliff, whose papers are held in the MHS collections.

Beyond the Museum of Fine Arts, along The Fenway, stand "Mrs. Jack Gardner's Palace" -- the Isabella Stewart Gardner Museum -- and Simmons College, founded in 1899 and opened to its first class of 142 students in the fall of 1902. They offered young women degrees in Home Economics, Library Studies, Secretarial Studies, Nursing, Teaching, and General Science.

At the opposite end of the Back Bay Fens from Simmons College stands the Somerset Hotel. Designed by Arthur Bowditch in the 1890s -- the same period during which the Massachusetts Historical Society's 1154 Boylston St. building was under construction -- Somerset Hotel still stands today along what remains of Charlesgate Park, the link between the Back Bay Fens and the Charles River Esplanade.

The Esplanade parkland was severed from the Emerald Necklace in the 1950s when Storrow Drive was constructed to ease the traffic congestion to and from downtown Boston. Our final postcard today shows the newly-minted roadway as it snakes passed the now-iconic Hatch Memorial Band Shell, from which the Boston Symphony Orchestra broadcasts its Boston Pops concert every 4th of July.

While the postcard collection at the Massachusetts Historical Society is uncataloged, it is available for research use in the Society's reading room. The postcards are arranged by geographic location and subject matter, covering Massachusetts, national, and foreign scenes. If you would be interested in accessing this collection please contact the library to arrange a visit.


          SOLUSI DAN MANAJEMEN DIEBETES FOOT        
Oleh Eka Widiati, SKp, WOCN
A. Abstrak
Pada pasien diabetes, 15 % mengalami foot ulcer, 14 – 24% Foot ulcer menyebabkan amputasi pada tungkai bawah di Amerika, Lokasi yang umumnya terjadi adalah telapak kaki bawah. Saat ini amputasi adalah tindakan yang dihindari karena menurunkan kualitas hidup pasien, untuk itu diperlukan perawatan yang baik sehingga luka dapat sembuh.
B. Etiologi
Neuropati sensorik, neropati motorik dan gannguan pembuluh darah serta adanya trauma yang berulang menyebabkan foot ulcer.
Foot ulcer pada diabetes berbeda dengan luka pada umumnya karena terjadi :
1. Gangguan proliferasi fibroblast dan sel endotelial
2. Epitelisasi yang tergangggu
3. Penurunan deposit kolagen
4. Penurunan kekuatan luka (Wound strength)
5. Abnormal phagosit dan migrasi sel pada inflamasi sehingga meningkatkan resiko infeksi
6. Neuropati dan penurunan vaskularisasi
Sehingga diperlukan perawatan yang tepat untuk mensupport terjadinya penyembuhan.
C. Masalah kaki pada diabet
Adapun masalah pada kaki diabet yang memeerlukan perawatan adalah :
1. Kallus & corn : sering disebut juga kapalan, adalah penebalan atau pengerasan pada lapisan epidermis. Hal ini disebabkan oleh adanya penekanan yang terus menerus dan berulang pada area kulit.
2. Fisura atau xerosis, kulit kaki cenderung kering dan mengelupas. Hal ini terjadi karena penurunan jumlah cairan dalam epidermis.
3. Blister atau bullae, sering disebut melepuh timbul karena adanya gesekan dan faktor tekanan yang dapat memisahkan epidermis dari dermis
D. Masalah pada kuku pada diabet .
Adapun masalah pada kuku pada diabet yang memerlukan perawatan adalah :
1. Cantengan/ kuku tumbuh/ radang jari kuku (onychocryptosis) sering timbul jika menggunting kuku sampai dalam (benruk bulat atau oval)
2. Jamur pada kuku (Oncychomycosis).
3. Blister yang tidak diketahui penyebabnya.

E. Manajemen pada masalah kaki dan kuku diabet.
Solusi dan manajemen terhadap permasalahan kaki dan diabet yang terbaik adalah tindakan pencegahan. Dimana tindakan tersebut dapat dilakukan oleh pasien diabet dan perawat, masing-masing mempunyai tugas yang berbeda dalam tindakan tersebut namun saling bersinergi. Jika sudah terjadi luka diabetes maka penatalaksanaannya adalah peawat harus melakukan perawatan yang tepat sesuai dengan tahapan luka yang terjadi.
Pencegahan yang dapat dilakukan oleh pasien diabetes :
Pencegahan adalah cara yang terbaik untuk mengatasi permasalahan kaki dan kuku pada diabet. Perawatan kaki yang baik, pengguntingan kuku dan membuang kallus
Pendidikan kesehatan untuk setiap pasien diabetes agar merawat kakinya adalah penting, adapun yang perlu diajarkan kepada pasien adalah perawatan dan latihan kaki
Perawatan kaki sehari-hari :
1. Dilarang merokok
2. Inspeksi kaki setiap hari, gunakan cermin jika kesulitan melihat telapak kakai secara langsung.
3. Rasakan adanya perubahan temperature atau adanya area yang tertekan
4. Bersihkan kaki setiap hari dengan air hangat dan keringkan kaki dengan handuk bersih.
5. Lembabkan kaki dengan pelembab. Tapi jangan gunakan pelembab untuk sela-sela jari kaki
6. Gunting kuku secara mendatar.
7. Selalu menggunakan alas kaki
8. Hindari kontak dengan benda yang panas atau terlalu dingin (Jika ada neuropati maka luka yang ditimbulkan tidak terasa)
9. Jangan menggunakan obat kimia atau plester
10. Lihat sepatu sebelum dan sesudah meggunakannnya, lihat apakah ada benda asing, darah atau nanah (mungkin kaki terluka setelah menggunakan sepatu, namun tidak dirasakan)
11. Gunakan sepatu dari bahan yang lembut, sesuai dengan ukuran kaki/ longgar, hindari kaos kaki ketat atau kasar
12. Beli sepatu baru pada sore hari
13. Temui ahli kesehatan bila terdapat blister (lepuhan yang berisi air) atau luka.

Latihan kaki.
Latihan kaki merupakan kegiatan peregangan dan relaksasi kaki dan dapat dilakukan siapapun, pada penderita diabetes diharapkan dilakukan secara rutin. Latihan ini merupakan kegiatan dari “Range Of Motion” atau terkenal dengan ROM dengan prinsip pergerakan dari sendi- sendi kaki :
Contoh latihan yang dapat dilakukan diantaranya :
1. Melakukan peregangan jari-jari kaki dengan :
 Jari ditekuk ke arah dalam dan keluar (samil jinjit) lakukan masing-masing sebanyak 10 kali.
 Angkat ke atas jari kaki dan rapatkan (sepert mencengkram) kearah dalam pada masing-masing kaki sebanyak 10 kali.
 Regangkan dan kendurkan jari kaki lakukan masing-masing kaki sebanyak 10 kali.
2. Melakukan peregangan tumit kaki dengan :
 Mengangkat tumit dan menaruhnya kembali lakukan pada kedua kaki sebanyak 10 kali
 Menggerakkan ke atas dan ke bawah kaki sambil menekuk tumit ke arah dalam dan ke luar secara bergantian pada kedua kaki sebanyak 10 kali.
 Memiringkan tumit ke kiri dan ke kanan bersamaan pada kedua kaki, lakukan sebanyak 10 kali.
3. Melakukan koordinasi pergerakan jari, telapak kaki dan tumit dengan cara :
 Pasien duduk di atas kursi
 Taruh selembar kertas koran di atas lantai
 Sobek-sobek kertas koran menjadi kecil-kecil oleh kaki pasien
 Setelah menjadi sobekan lalu dikumpulkan dan dibentuk seperti bola dengan menggunakan telapak, jari dan tumit kaki.
Prinsip latihan ROM adalah menggerakan seluruh bagian dari sendi. Untuk bentuk pergerakannya dapat diciptakan sesuai tingkat kemampuan individu.
Pencegahan yang dapat dilakukan perawat:
Setiap tenaga kesehatan memiliki kewajiban terhadap tindakan pencegahan yang dapat dilakukan bagi penderita diabetes.
Pemeriksaan kaki.
1. Diagnosis dan manajemen penyakit penyerta :
a. Evaluasi dibetes terhadap diet, olah raga dan penggunaan obat penurun gula darah
b. Pencegahan terhadap adanya tekanan, lipatan dan gesekan pada kaki.
2. Identifikasi perubahan iskemik :
a. Palpasi nadi pedis
b. Pemeriksaan dopller
c. Konsultasi pada dokter vaskuler bila diperlukan
3. Skrening kaki untuk identifikasi perubahan sensasi dengan cara :
a. 10 gram monofilament tes
b. Sensasi tumpul dan tajam
4. Inspeksi kulit :
a. Adakah area kulit yang kering
b. Perubahan temperatur area kaki
c. Perubahan warna dan tekstur kulit
d. Adanya kallus
e. Pre ulcer/hematoma
f. Luka/ulcer
5. Tes untuk identifikasi kelemahan otot :
a. Observasi keseimbangan dan kestabilan saat berjalan
b. Pemeriksaan refleks pada tendon Amer
6. Identifikasi deformitas kaki; Charcot Antrhropathy, Hammer/Claws toes, Bunions/Hallux Vagus, Flat Foot/Pes Covus, jika ada cek dengan rongten untuk pemeriksaan adanya fraktur atau ostomylitis.
7. Perawatan kaki reguler untuk pengangkatan kalus
8. Penggunaan alas kaki yang tepat dengan melakukan evaluasi kaki.

Manajemen foot ulcer
Jika sudah terjadi luka pada kaki diabet (foot ulcer), maka perawat perlu mengetahui stage (tahapan) dan bagaimana tindakan perawat dalam setiap tahapan tersebut. Menurut standar yang ditetapkan oleh The National Service Frame Work for Diabetes, stage (tahapan) luka diabetes terdiri dari lima dan bagaimana tindakan untuk setiap tahapan tersebut, yaitu :
Stage 1.
Pada tahap ini kaki belum terjadi kerusakan, namun informasi pentingnya perawatan kaki harus diberikan. Umumnya pasien diabetes muda yang sehat yang mempunyai resiko rendah. Mereka harus melihat kaki, apakah ada tanda bahwa kakinya bermasalah dan menemui ahli kesehatan.
Pada tahap ini pasien harus diberikan penjelasan tentang nerupati, vaskulopati, dan yang penting adalah regular skrenning.
Stage 2.
Pada tahap ini pasien sudah mempunyai resiko. Pendidikan kesehatan diperlukan. Pasien perlu diajarkan bagaimana meminimalkan masalah kesehatan pada kaki jika masalah tersebut datang.
Kontrol gula darah dan kardio vaskuler adalah bagian yang penting dalam pendidikan kesehatan yang diberikan.
Stage 3.
Pada tahap ini kaki mendapatkan masalah kesehatan akibat dari neuropati, iskemik dan infeksi.
Neuropati, iskemik dan infeksi adalah tiga penyebab utama pada diabetes foot ulcer. Tekanan yang abnormal disebabkan oleh neuropati membuat kallus pada kaki, dan jika tida ditangani menyebabkan nekrosis dan ulcer. Tekanan yang terus menerus akibat sepatu yang sempit atau benda asing dapat menyebabkan ulcer dan neuropati perifer membuat pasien tidak merasakan sakit pada kaki yang terluka.
Perawatan pada ulcer merupakan hal yang utama pada tahap ini. Perawatan yang dapat dilakukan adalah :
Luka kering : balutan hidrokoloid. Balutan ini berfungsi karena tahan terhadap oksigen, kelembaban dan bakteria; balutan jenis ini dapat mempertahankan kelembaban dan mensupport autolitik debridement.
Luka dengan eksudat : calcium alginate dipergunakan untuk mengabsorb eksudat pada luka.
Luka dengan eksudat yang banyak : Hydrofiber seperti aquacel dapat dipergunakan untuk menarik eksudat yang banyak atau parcel dressing agar eksudat dapat dikeluarkan dengan mudah. Balutan jenis ini dapat memberikan kelembaban pada luka.
Luka yang ditutupi eskar : Perlindungan pada eskar sehingga eskar dapat mengelupas dengan sendirinya. Gunakan providine iodine untuk eskar sehingga mempertahankan kesterilan jika eskar mengelupas dengan sendirinya.
Manajemen untuk mengurangi tekanan sangat diperlukan untuk mempercepat penyembuhan, pasien diharuskan untuk bedrest, namun hal tersebut perlu diperhatikan meningkatnya resiko terjadinya DVT (deep vena trombosis), infeksi pada paru dan ulcer pada tumit. Untuk itu perlunya mobilasasi pada pasien sehingga pasien perlu dibuatkan sepatu khusus untuk menghindari tekanan pada area luka.
Stage 4.
Luka sudah terjadi infeksi, luka dapat beresiko tinggi ke tahap berikutnya. Infeksi tidak hanya menghambat penyembuhan luka tapi pasien dengan diabetes luka menjadi resisten terhadap infeksi, sehingga lebih beresiko terjadinya penyebaran infeksi, yang menyebabkan osteomylitis dan sepsis.
Kontrol infeksi sangat penting dalam manajemen luka pada tahap ini.
Pada pemeriksaan daerah luka dapat ditemui kemerahan atau edema pada kulit yang masih utuh. Dapat juga dilakukan pemeriksaan erirosit sedimentasi rate (ESR) jika tidak ada tanda yang jelas. Lakukan pemerikasaan kultur mikrobilogi untuk mengetahui kuman, sehingga kolaborasi dapat dilakukan untuk pemberian antibiotik yang tepat.
Perawatan luka yang dapat dilakukan :
Luka terinfeksi : Penggunaan balutan dengan siver atau antimikroba dressing, untuk membunuh kuman pada luka.

Stage 5
Ulcer seringkali terinfeksi oleh stapilokokus, streptokokus, atau kuman anaerob. Streptokokus dan stapilokokus berekasi sinergi, streptokokus memperoduksi hyaluronidase, yang dapat memfasilitasi penyebaran toksin nekrotik yang dilepaskan oleh stapilokokus. Jika terjadi hal tersebut, jari kaki menjadi berwarna hitam. Sirkulasi darah menjadi rendah sehingga jaringan menjadi tidak hidup (viable)
Penatalaksanaan pada tahap ini adalah konservatif, dengan autoamputasi, dimana jari kaki akan mengalami nekrosis dan terlepas dengan sendirinya.
Periode ini manajemen yang diperlukan adalah kontrol infeksi dengan kolaborasi untuk pemberian antibiotik sistemik dan obseravasi adanya tanda kerusakan vaskuler, jika perlu melakukan konsultasi dengan dokter vaskuler untuk tindakan selanjutnya. Jika infeksi tidak terkontrol maka nekrosis akan terus berlanjut, maka tindakan amputasi dilakukan untuk menghindari komplikasi lebih lanjut.
F. Kesimpulan
Permasalahan kaki dan kuku diabetes dapat diatasi dengan pencegahan yang dapat dilakukan oleh pasien maupun perawat, pencegahan adalah tindakan yang terbaik dalam manajemen permasalahan kaki dan kuku diabetes, sehingga pendidikan kesehatan sangat penting diberikan untuk pasien. Jika sudah terjadi luka pada kaki diabet maka peran perawat diperlukan untuk mengetahui tahapan luka, proses penyembuhan luka dan bagaimana tindakan di setiap tahapan tersebut. Semua tindakan dan pencegahan tersebut sangat penting untuk meningkatkan kualitas hidup penderita dabetes. STOP AMPUTASI dapat dilakukan jika tindakan dan pencegahan tersebut dilakukan secara bersama.
























DAFTAR PUSTAKA
1. Carville, K. Wound Care Manual. Edisi ke 3 . Australia: Silver Chain Foundation; 1998
2. Consensus Development Confrence On Dibetic Foot Wound Care. Dibetes Care. 1999 August ;22(8):1354
3. Shilling, F. Foot Care in Patients with Diabetes. Nursing Stand, 2003 Feb 19;17 (23): 61-62,64,66,68 from : http://gateway.ut.ovid.com
4. The American Podiatric Medical Association . Diabetic Foot Ulcer.Bushhnell Foot Clinic, 2003 from://http:// diabet internet.com
5. Gitarja, WS . Perawatan Luka Diabetes. Edisi ke 2. Indonesia: Wocare ; Juli 2008
          PayUPaisa Online Payment Gateway For Merchants Make It Easy Start and Sell Online        
PayU has which is another payment gateway company has launched PayUPaisa which is a web based product which helps the buyers to pay online safely. The process here is very simple for a seller as he do not need to pay any money to sign up with PayUPaisa and he/she can either integrate PayUPaisa on […]

Read More Here - PayUPaisa Online Payment Gateway For Merchants Make It Easy Start and Sell Online is a post from Technix Update


          (USA-CA-Merced) RN - Registered Nurse - Labor & Delivery        
TRAVEL REGISTERED NURSE (RN) – L&D CareerStaff Travel Nursing is looking for highly skilled L&D Nurses for travel RN contract opportunities in Merced, CA. Labor & delivery nurses are trained to provide care for pregnant women during the final stages of pregnancy, labor and delivery. The labor & delivery nurse is responsible for monitoring the pregnant woman's heart rate, fetal heart rate, time between contractions, woman's blood pressure and vital signs. During the final stages of pregnancy, labor & delivery nurses educate the patient on what to expect during labor and childbirth. This facility is a general medical and surgical hospital in Merced, CA, with 186 beds. In addition to being a acute care facility this hospital provides out patient services with their Cancer Center and Home Health. Merced’s Valley location southeast of San Francisco provides easy access to the central California coast, Sierra Nevada mountains and national parks, and major cities. Merced has historically been the “Gateway to Yosemite”, and residents also enjoy short drives to skiing, beaches, fishing, and other outdoor attractions.
          (USA-CA-Merced) Physician - Family Practice        
## Description **Specialty: Physician - Family Practice Location: Merced, CA** **TO APPLY**: Please contact Sam Cajudo at 707.398.6066 or SEND us your updated CV at: sam@nationwide-pr.com. We have many practice opportunities that go unadvertised. Please contact us directly at the number and email provided here for a personalized search! **H1B and J1 physicians are welcome to apply.** We are seeking multiple full-time Family Practice physician to join our group in Merced, CA. The ideal candidate should be Board Certified or Board Eligible, CA license or in the process of getting one. Flexible schedule of either 4 or 5 day work weeks. Direct primary outpatient care at least 40 hours per work, provide comprehensive, ongoing, and family oriented pediatric care, maintain active staff hospital privileges at local hospitals and share on call and hospitalization responsibilities with other physicians whenever feasible Market adjusted salary and an Incentive Program related to productivity and quality. Sign On bonus and relocation reimbursement. Payment of licensure, DEA and one professional society in your specialty, 403B matching program of 2% plus defined pension plan contribution. Loan Forgiveness Program Opportunities, CME reimbursements, dedicated time for CME and Administrative time. Medical, Dental and Vision Insurance with a small premium - in the top 2% in the nation for insurance benefits and benefits at start on the first day of the month following 30 days employment. Provides premium payment for Life, Accidental Death and Dismemberment insurance. Option to purchase short term disability insurance. Paid Vacation Days and Holidays, Paid Sick Leave. *Community information*: Merced is a unique city, filled with warm, friendly people that will instantly make visitors feel welcome. The city offers a wide variety of attractions, historical sites, accommodations and dining opportunities that are sure to please. Arts and Culture are thriving in this proud community. From the galleries at their Multicultural Center to the live performances at Playhouse Merced, there is sure to be something for everyone! Go see the world’s largest cheese factory, visit the best military air museum in the country or take your family to a space & science learning center. And who can for forget, Merced is the Gateway to Yosemite. Whether summer, fall, winter or spring…Yosemite is picture perfect anytime you visit Merced. *Job ID:* Job-6267 FP *Job Title:* Physician - Family Practice
          (USA-CA-Merced) Psychiatrist (General)        
## Description **Specialty: Psychiatrist (General) Location: Merced, CA** **TO APPLY**: Please contact Sam Cajudo at 707.398.6066 or SEND us your updated CV at: sam@nationwide-pr.com. We have many practice opportunities that go unadvertised. Please contact us directly at the number and email provided here for a personalized search! **H1B and J1 physicians are welcome to apply**. We are seeking multiple full-time Psychiatrist to join our group in Merced, CA. The ideal candidate should be Board Certified or Board Eligible, CA license or in the process of getting one. Market adjusted salary and an Incentive Program related to productivity and quality. Sign On bonus and relocation reimbursement. Payment of licensure, DEA and one professional society in your specialty, 403B matching program of 2% plus defined pension plan contribution. Loan Forgiveness Program Opportunities, CME reimbursements, dedicated time for CME and Administrative time. Medical, Dental and Vision Insurance with a small premium - in the top 2% in the nation for insurance benefits and benefits at start on the first day of the month following 30 days employment. Provides premium payment for Life, Accidental Death and Dismemberment insurance. Option to purchase short term disability insurance. Paid Vacation Days and Holidays, Paid Sick Leave. *Community information*: Merced is a unique city, filled with warm, friendly people that will instantly make visitors feel welcome. The city offers a wide variety of attractions, historical sites, accommodations and dining opportunities that are sure to please. Arts and Culture are thriving in this proud community. From the galleries at their Multicultural Center to the live performances at Playhouse Merced, there is sure to be something for everyone! Go see the world’s largest cheese factory, visit the best military air museum in the country or take your family to a space & science learning center. And who can for forget, Merced is the Gateway to Yosemite. Whether summer, fall, winter or spring…Yosemite is picture perfect anytime you visit Merced. *Job ID:* Job-6269 PSY *Job Title:* Psychiatrist (General)
          (USA-CA-Merced) Physician - Internal Medicine        
## Description **Specialty: Physician - Internal Medicine Location: Merced, CA** **TO APPLY**: Please contact Sam Cajudo at 707.398.6066 or SEND us your updated CV at: sam@nationwide-pr.com. We have many practice opportunities that go unadvertised. Please contact us directly at the number and email provided here for a personalized search! **H1B and J1 physicians are welcome to apply**. We are seeking multiple full-time Internal Medicine physician to join our group in Merced, CA. The ideal candidate should be Board Certified or Board Eligible, CA license or in the process of getting one. Flexible schedule of either 4 or 5 day work weeks. Direct primary outpatient care at least 40 hours per work, provide comprehensive, ongoing, and family oriented pediatric care, maintain active staff hospital privileges at local hospitals and share on call and hospitalization responsibilities with other physicians whenever feasible Market adjusted salary and an Incentive Program related to productivity and quality. Sign On bonus and relocation reimbursement. Payment of licensure, DEA and one professional society in your specialty, 403B matching program of 2% plus defined pension plan contribution. Loan Forgiveness Program Opportunities, CME reimbursements, dedicated time for CME and Administrative time. Medical, Dental and Vision Insurance with a small premium - in the top 2% in the nation for insurance benefits and benefits at start on the first day of the month following 30 days employment. Provides premium payment for Life, Accidental Death and Dismemberment insurance. Option to purchase short term disability insurance. Paid Vacation Days and Holidays, Paid Sick Leave. *Community information*: Merced is a unique city, filled with warm, friendly people that will instantly make visitors feel welcome. The city offers a wide variety of attractions, historical sites, accommodations and dining opportunities that are sure to please. Arts and Culture are thriving in this proud community. From the galleries at their Multicultural Center to the live performances at Playhouse Merced, there is sure to be something for everyone! Go see the world’s largest cheese factory, visit the best military air museum in the country or take your family to a space & science learning center. And who can for forget, Merced is the Gateway to Yosemite. Whether summer, fall, winter or spring…Yosemite is picture perfect anytime you visit Merced. *Job ID:* Job-6268 IM *Job Title:* Physician - Internal Medicine
          (USA-CA-Merced) Clinical Lab Scientist - Clinical Laboratory Services - Full Time Days        
*Position Summary* Provides laboratory testing to inpatients and outpatients, quality control, and instrument maintenance and related record keeping and result reporting. May be assigned to or rotate to various areas such as: Microbiology, Chemistry/Special Chemistry, Transfusion Services, Coagulation, Hematology, Urinalysis and Immunology. Patients served are neonatal, pediatric, adolescent, adults, and geriatric age groups. *Qualifications Minimum* 1. Education level necessary to obtain required licensure and certifications: · A doctor of medicine, osteopathy, or doctor of podiatric medicine licensed to practice, osteopathy, podiatry in the state in which the laboratory is located, or have earned a doctoral, masters or bachelor’s degree in a chemical, physical, biological, or clinical laboratory science or medical technology from an accredited institution; or An associate degree in a chemical, physical, or biological l science or medical laboratory technology from an accredited institution; or · High school diploma or equivalent and have successfully completed an official military medical laboratory procedures course of at least 50 weeks duration, and have held the military enlisted occupational specialty of Medical Laboratory Specialist (Medical Technician); or · High school diploma or equivalent, and have such documentation of training appropriate for the testing performed prior to analyzing patient specimens. Such training must ensure that the individual has the skills required for the proper specimen collection, including patient preparation, if applicable, labeling handling, preservation or fixation, processing or preparation, transportation and storage of specimens etc., etc. 2. Must possess and maintain a current Clinical Laboratory Scientist (CLS) license within the state of California. 3. Computer literate *Desired* 1. One (1) year experience in an acute care facility. Mercy Medical Center , a Dignity Health member, has been building a rich history of care in our community for more than 100 years. We have grown from a small one-story wooden structure into a major healthcare provider with a new 186-bed main campus, offering the latest in facility design and technology. Mercy also operates Outpatient Centers, a Cancer Center and several rural clinics. Wherever you work throughout our system, you will find faces of experience with dedication to high quality, personalized care. Joining our 1,300 employees, 230 physicians and many volunteers, you can help carry out our commitment to providing our community with the excellence they have come to associate with Mercy Medical Center. Mercy Medical Center Laboratory offers the use of state-of-the art equipment in a fast-paced environment. You’ll enjoy working with laboratorians who care about their patients and the quality of their work. Merced is located in the San Joaquin Valley of California, and is home to the 10thand newest campus of the University of California. Considered the “Gateway to Yosemite”, Merced is the closest (just 69 miles away) large community to Yosemite National Park and its tremendous recreational opportunities. Other national parks, rivers and lakes are within close reach. Monterey, San Francisco, Sacramento are all within an easy two hour drive. On top of all that, Merced is a great place to raise your kids! **Job:** **Laboratory* **Organization:** **Mercy Medical Center Merced* **Title:** *Clinical Lab Scientist - Clinical Laboratory Services - Full Time Days* **Location:** *California-Central California Service Area-Merced-Mercy Merced Community* **Requisition ID:** *1700008446* **Equal Opportunity** Dignity Health is an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected Veteran status or any other characteristic protected by law.
          (USA-CA-Merced) Clinical Lab Scientist - Clinical Laboratory Services - Full Time Days        
*Qualifications Minimum* 1. Education level necessary to obtain required licensure and certifications: · A doctor of medicine, osteopathy, or doctor of podiatric medicine licensed to practice, osteopathy, podiatry in the state in which the laboratory is located, or have earned a doctoral, masters or bachelor’s degree in a chemical, physical, biological, or clinical laboratory science or medical technology from an accredited institution; or An associate degree in a chemical, physical, or biological l science or medical laboratory technology from an accredited institution; or · High school diploma or equivalent and have successfully completed an official military medical laboratory procedures course of at least 50 weeks duration, and have held the military enlisted occupational specialty of Medical Laboratory Specialist (Medical Technician); or · High school diploma or equivalent, and have such documentation of training appropriate for the testing performed prior to analyzing patient specimens. Such training must ensure that the individual has the skills required for the proper specimen collection, including patient preparation, if applicable, labeling handling, preservation or fixation, processing or preparation, transportation and storage of specimens etc., etc. 2. Must possess and maintain a current Clinical Laboratory Scientist (CLS) license within the state of California. 3. Computer literate *Desired* 1. One (1) year experience in an acute care facility. * * * * Mercy Medical Center, a Dignity Health member, has been building a rich history of care in our community for more than 100 years. We have grown from a small one-story wooden structure into a major healthcare provider with a new 186-bed main campus, offering the latest in facility design and technology. Mercy also operates Outpatient Centers, a Cancer Center and several rural clinics. Wherever you work throughout our system, you will find faces of experience with dedication to high quality, personalized care. Joining our 1,300 employees, 230 physicians and many volunteers, you can help carry out our commitment to providing our community with the excellence they have come to associate with Mercy Medical Center. Mercy Medical Center Laboratory offers the use of state-of-the art equipment in a fast-paced environment. You’ll enjoy working with laboratorians who care about their patients and the quality of their work. Merced is located in the San Joaquin Valley of California, and is home to the 10thand newest campus of the University of California. Considered the “Gateway to Yosemite”, Merced is the closest (just 69 miles away) large community to Yosemite National Park and its tremendous recreational opportunities. Other national parks, rivers and lakes are within close reach. Monterey, San Francisco, Sacramento are all within an easy two hour drive. On top of all that, Merced is a great place to raise your kids! **Job:** **Laboratory* **Organization:** **Mercy Medical Center Merced* **Title:** *Clinical Lab Scientist - Clinical Laboratory Services - Full Time Days* **Location:** *California-Central California Service Area-Merced-Mercy Merced Community* **Requisition ID:** *1700001154* **Equal Opportunity** Dignity Health is an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected Veteran status or any other characteristic protected by law.
          â€œShadow Six Samurai” Deck Experience Event Deck Recipes        

From the one regular store. The first Deck is of course the official Deck Recipe provided by Konami. True Draco-King

The post “Shadow Six Samurai” Deck Experience Event Deck Recipes appeared first on The Organization.


          [Deck Recipes] Shadow Six Samurai Event Deck Recipe        

The one being used at stores hosting the Shadow Six Samurai Deck Experience Event. “Shadow Six Samurai Deck” This “Shadow

The post [Deck Recipes] Shadow Six Samurai Event Deck Recipe appeared first on The Organization.


          Google Analytics Glossary        

A

A/B Testing - See Content (A/B) Testing.

Admin Level - Google Analytics has two basic levels of access - View Reports Only and Account Administrator. Users with View Reports Only access can view their Profiles' reports and view and edit their own language preferences. All Account Administrators have complete administrative control of the system.

Apache - Apache is a free, open-source web server software system that is pervasive on UNIX, Linux and similar operating system types. It is also available for Windows and other operating systems. Google Analytics' admin system is powered by a variant of Apache. For more information, see Apache.org.

Authentication - Technique by which access to Internet or intranet resources requires the user to enter a username and password.

Average Page Depth - The average number of pages on a site viewed by visitors during a single session.

Average Response Value - The average revenue value of each click, calculated as total revenue divided by total clicks.

B

Bandwidth - The amount of data that can be transmitted along a communications channel in a fixed amount of time. For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes per second, where 1 byte = 8 bits.

Browsers - A browser, or more accurately, user agent, is the software used to access a website. Examples of user agents are "Explorer" (for Microsoft Internet Explorer), "Netscape" (for Netscape Navigator) and "Googlebot" (an automated robot that scours the web for website content to include in its search engine).

Bytes - A byte is a unit of information transferred over a network (or stored on a hard drive or in memory). Every web page, image or other type of file is composed of some number of bytes. Large files, such as video clips, may be composed of millions of bytes ("megabytes"). It is very important for site owners to be aware and understand that website and server performance is heavily affected by the amount of bytes transferred and web hosting providers often charge according to this measure. One byte is equal to 8 bits where each bit is either one or zero. Common terms incorporating the word "byte" are:

  • Kilobytes - 1,024 bytes
  • Megabyte - 1,048,576 bytes
  • Gigabyte - 1,073,741,824 bytes

C

Cache - A temporary storage area that a web browser or service provider uses to store common pages and graphics that have been recently opened. The cache enables the browser to quickly reload pages and images that were recently viewed.

CGI Script - A CGI script is a programme written in one of several popular languages such as Perl, PHP, Python, etc., that can take input from a web page, do something with the data and produce a customised result (among many other possible uses). CGI scripts are widely used to add dynamic behaviour to websites and to process forms.

Click - In Google Analytics, a click refers to the process of moving from one page in a site to the next via clicking the mouse button on a hyperlink (a slightly narrower definition than what is normally used). In the Click Through report, the term Clicks is used to describe the movement from the "previous" page to the page being analysed and from there to the "next" page.

Click Through Rate (CTR) - The percentage of known impressions that result in clicks.

Click-Fraud - The act of repeated clicking on a pay-per-click referral, with the intention of depleting the advertiser's budget and/or lowering their rankings in the sponsored links listing.

Code - Anything written in a language intended for computers to interpret.

Contact Name - This is the real name (generally speaking) of the user to whom you have given access to a particular Google Analytics report. The contact name can contain spaces and is not case-sensitive.

Content (A/B) Testing - Testing the relative effectiveness of multiple versions of the same advertisement or other content in referring visitors to a site. Multiple versions of content can be uniquely identified by using a utm_content variable in the URL tag.

Content (Campaign Tracking) - Content is the label for each version of an advertisement. The UTM variable for content, utm_content, indicates the version of a link on which the visitor clicked to reach a website - for example, utm_content=graphic_version1a.

Content is one of the five dimensions of campaign tracking; the other four are source, medium, campaign and term.

Content-targeted advertising - An advertising model in which the publisher displays related advertising and content together.

Conversion - A conversion is said to occur when a visitor completes an activity that you have identified as important. This activity could be a purchase, an email list registration, a download or viewing an online presentation. When you sign up for Google Analytics, you have the opportunity to specify your goal pages -- pages that a visitor can only reach by completing a conversion activity. If you use Urchin Software, you set your goal pages within a profile.

Cookie - A small amount of text data given to a web browser by a web server. The data is stored and returned to the specific web server each time the browser requests a page from that server. The main purpose of cookies is to pass a unique identifier to the website so that the website can keep track of the user as he/she steps through a website. For example, a protected site may store a temporary identifier in a cookie after you successfully log in, indicating that you are an authorised user.

The name cookie derives from UNIX objects called magic cookies. These are tokens that are attached to a user or programme and change depending on the areas entered by the user or programme. Cookies are also sometimes called persistent cookies because they typically stay in the browser for long periods of time.

Cost-per-click (CPC) - An advertising model in which the advertiser (sponsor) pays the publisher a certain amount each time the sponsor's ad is clicked. Also sometimes referred to as PPC (pay-per-click).

Cron Job - A "cron job" is a scheduled task under a UNIX-type operating system. "cron" is a daemon or programme that is always running. Its function is similar to the Windows Scheduler.

D

Daemon - A daemon is any programme under a UNIX-type operating system that runs at all times. Common daemons are servers (such as Apache or an FTP server) and schedulers (such as "cron").

Date Range - Google Analytic's Date Range feature allows you to view report data by an arbitrary time frame, from one day up to more than a year. The Date Range feature is available in most reports.

Default Page -The default page setting should be set to whatever the default (or index) page is in your site's directories. Usually, this will be 'index.html' but on Windows IIS servers, it is often 'Default.htm' or 'index.htm'. This information allows Google Analytics to reconcile log entries such as 'http://www.example.com/' and 'http://www.example.com/index.html', which are in fact the same page. Without the Default Page information entered correctly, these would be reported as two distinct pages. Only a single default page should be specified.

Directory - A directory is a virtual container for holding computer files. It is not merely a list of items, as the name would imply, but rather a key building block of a computer's storage architecture that actually contains files or other directories.

DNS Lookup - (Reverse DNS Lookup) The process of converting a numeric IP address into a text name, for example, 63.212.171.4 is converted to www.Googleanalytics.com.

Domain - A domain is a specific virtual area within the Internet, defined by the "top level" of the address or URL (Uniform Resource Locator). The top level is the end of the address; example: "whitehouse.gov". In this example, the top-level part of the domain is ".gov", indicating a US government entity. The "whitehouse" part is the second-level domain, indicating where the information in question is to be found within the ".gov" domain. Other common top-level domains include ".com", ".net", ".uk", etc.

Domain Name System - (DNS) An Internet addressing system that uses a group of names that are listed with dots (.) between them, working from the most specific to the most general group. In the United States , the top (most general) domains are network categories such as edu (education), com (commercial) and gov (government). In other countries, a two-letter abbreviation for the country is used, such as ca ( Canada ) and au ( Australia ).

Download - To retrieve a file or files from a remote machine to your local machine.

E

E-commerce - The buying and selling of goods and services and the transfer of funds through digital communications. Buying and selling over the internet, etc.

Encryption - The process of encoding information so that other Internet users cannot access it.

End User - The final user of the computer software. The end user is the individual who uses the product after it has been fully developed and marketed.

Error - Errors are defined as pages that visitors attempted to view but returned an error message instead. These errors often occur because of broken links (links to pages that do not exist anymore) or when an unauthorised visitor attempts to access restricted pages (for example, if the visitor does not have a password to access the page).

Error Code - Please see the definition of Status Code.

Exclude - "Exclude" is a filter type available in the Google Analytics Filters configuration. If an Exclude filter is applied to a Profile, all log file lines (hits) that match the Exclude string will be discarded prior to the creation of the corresponding Google Analytics reports.

F

File Type - A File Type is a designation, usually in the form of an extension (such as .gif or .jpeg), given to a file to describe its function or the software that is required to act upon it. More generally, file types can be grouped into image file types (such as .gif, .png, .jpeg), text file types (such as .doc or .txt) and many others.

Filter - A filter is a text string or regular expression that is used to either exclude certain hits or only include certain hits from a Google Analytics report. Filters are commonly used to filter out certain content, such as internal company traffic or javascript libraries or to set up special reports for only certain types of content, like a subsection of a website.

Filter Field - A filter field is the number of the field on which to apply a filter. In a log file line or hit, there are several distinct fields, each one holding a different piece of data. To apply a filter to a log file, you must first identify which field you wish to apply the filter to. This is the filter field.

Filter Name - The Filter Name is intended to be a descriptive title for a filter. It is used only as an organisational aid and may contain spaces.

Filter Pattern - A Filter Pattern is the actual text string against which Google Analytics will attempt to match log file lines. If a match is found, the log line (or "hit") will be either excluded or included, depending on the Filter Type. Patterns can be specific text to match or use wildcards as part of a "regular expression". NOTE: Filter Patterns are case-sensitive, so to filter out the Googlebot spider, for instance, use "Googlebot", not "Googlebot" (do not use quotes).

Filter to Apply - The filter to apply is the actual text string to be used to either filter in or filter out content. The Filter to Apply can be either a plain text string or a regular expression.

Filter Type - A filter must be of one of two filter types, either an Include (filter in) or Exclude (filter out). If an inclusive filter (Include) is used, only hits containing the filter string will be represented in the Google Analytics report. If an exclusive filter (Exclude) is used, no hits containing the filter string will be represented in the Google Analytics report.

Firewall - A security device placed on a LAN (local area network) to protect it from Internet intruders. This can be a special kind of hardware router, a piece of software or both.

First Time Sessions - The number of times unique visitors came to your website during a specified time period, not having visited before that period. These visitors are identified by cookies.

First Time Unique Visitor - The number of Unique Visitors to your website that had not visited prior to the time frame being analysed.

Form - In the context of the web, a form is a data-entry mechanism generally created out of HTML in conjunction with a CGI script. A form is usually a static HTML page that presents the visitor with blanks or fields . Upon entering data into the fields, the form is submitted and a script of some sort performs some type of action on the data, such as writing it to a file.

Frame- A rectangular region within the browser window that displays a web page alongside other pages in other frames.

FTP - (File Transfer Protocol) The basic method for copying a file from one computer to another through the Internet.

G

GET Method - The GET method is a way of passing parameters of an HTTP request from the browser to the server. This method puts the parameters usually separated by special characters such as ampersands ("&") in the URL itself, which is viewable to the person using the browser. The other method is POST, which is used when the site does not want to pass the parameters in the URL. This is desirable when there is a large quantity of text to send to the server or when the information is sensitive.

GIF - A graphics file type -- Graphics Interchange Format -- a compressed, bitmapped format often used on the web because of its good quality/compression ratio when used on certain image types, particularly those with large flat areas of colour.

Goal Conversion Rate - In the context of Campaign Tracking, the percentage of sessions on a site that result in a conversion goal being reached on that site.

Graphic User Interface - (GUI) Pronounced "gooey". A method of controlling software using on-screen icons, menus, dialogue boxes and objects that can be moved or resized, usually with a pointing device such as a mouse.

H

Hardware - A computer and the associated physical equipment directly involved in the performance of data processing or communication functions.

Hit - A hit is simply any request to the web server for any type of file. This can be an HTML page, an image (jpeg, gif, png, etc.), a sound clip, a cgi script and many other file types. An HTML page can account for several hits: the page itself, each image on the page and any embedded sound or video clips. Therefore, the number of hits that a website receives is not a valid popularity gauge but rather an indication of server use and loading.

HTML - Hyper Text Markup Language is used to write documents for the World Wide Web and to specify hypertext links between related objects and documents.

HTTP - Hyper Text Transfer Protocol is a standard method of transferring data between a web server and a web browser.

I

IIS - Microsoft Internet Information Server or IIS as it is commonly called, is a popular web server software system for Windows operating systems. It is currently unavailable for other operating systems. For more information, see Microsoft.com.

Impression - A display, on a search engine or other source, of a referral link or advertisement.

Include - "Include" is a filter type available in the Google Analytics Filters configuration. If an Include filter is applied to a Profile, only the log file lines (hits) that match the Include will be used in the creation of the corresponding Google Analytics reports.

Initial Session - This is the first Session conducted by a trackable Unique Visitor during the current Date Range. This value is equal to the total number of Unique Visitors during the same Date Range (each Unique Visitor has at least one session). This value is provided in contrast to Repeat Sessions.

IP Address - An identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the IP address of the destination. The format of an IP address is a numeric address written as four numbers separated by periods. Each number ranges from 0 to 255.

ISP - Internet Service Provider. A company which provides other companies or individuals with access to, or presence on, the Internet. Most ISPs are also Internet Access Providers -- extra services include help with design, creation and administration of WWW sites, etc.

J

Java - An object-oriented programming language invented by Sun Microsystems. Java is designed to run on any type of computer hardware through an intermediary layer called a virtual machine, which translates Java instructions into native code for that particular computer.

JavaScript - Small element of code embedded on web pages and executed by the browser when the page is viewed by a visitor.

K

Keyword - A keyword is a database index entry that identifies a specific record or document. Keyword searching is the most common form of text search on the web. Most search engines do their text query and retrieval using keywords. Unless the author of the web document specifies the keywords for his/her document (this is possible by using meta tags), it is up to the search engine to determine them. Essentially, this means that search engines pull out and index words that are believed to be significant. Words that are mentioned towards the top of a document and words that are repeated several times throughout the document are more likely to be deemed important.

L

Last Run - This is the time the task in question last ran, whether successfully or not. As soon as the same task is run again, this value will change to the new start time.

Log file - A file created by a web or proxy server which contains all of the access information regarding the activity on that server. Each line in a log file generated by web server software is a hit or request for a file. Therefore, the number of lines in a log file will be equal to the number of hits in the file, not counting any field definitions line(s) that may be present.

M

Medium (Campaign Tracking) - In the context of campaign tracking, medium indicates the means by which a visitor to a site received the link to that site. Examples of mediums are "organic" and "cost-per-click" in the case of search engine links and "email" and "print" in the case of newsletters. The UTM variable for medium is utm_medium.

Medium is one of the five dimensions of campaign tracking; the other four dimensions are source, campaign, term and content.

Meta Tag - A special HTML tag that provides information about a web page. Unlike normal HTML tags, meta tags do not affect the way the page is displayed. Instead, they provide information such as who created the page, how often it is updated, what the page is about and which keywords represent the page's content. Many search engines use this information when building their indices.

Multihome - A multihome, or load balanced, network means distributing processing and communications activity evenly across a computer network so that no single device is overwhelmed. Load balancing is especially important for networks where it is difficult to predict the number of requests that will be issued to a server. Busy websites typically employ two or more web servers in a load-balancing scheme. If one server starts to get swamped, requests are forwarded to another server with more capacity.

N

Navigation - Describes the movement of a user through a website or other application interface. This term also indicates the system of available links and buttons that the user can use to navigate through the website.

NCSA - NCSA stands for the National Centre for Supercomputing Applications. The NCSA developed several important web protocols and software systems, including the standard logging type used by Apache -- NCSA Extended Combined.

Network - A set of computers connected so that they can communicate and share information. Most major networks are connected to the global network-of-networks, called the Internet.

No Referral - The "(no referral)" entry appears in various Referrals reports in the cases when the visitor to the site got there by typing the URL directly into the browser window or using a bookmark/favourite. In other words, the visitor did not click on a link to get to the site, so there was no referral, technically speaking.

O

Online - A general term referring to anything connected to or conveyed through a communication network.

Organisation - The classification to which a Domain Name belongs. Typical Suffixes are: .com = Commercial, .org = Organisation, .edu = Educational, .int = International, .gov = Government, .mil = Military, net = Network

OS - (Operating System) Software designed to control the hardware of a specific data-processing system in order to allow users and application programmes to employ it easily. (MacOS, Windows 95)

P

Page - Also known as a web page, a page is defined as a single file delivered by a web server that contains HTML or similar content. Any file that is not specifically a GIF, JPEG, PING, JS (javascript) or CSS (style sheet) is considered a page.

Page View - A page is defined as any file or content delivered by a web server that would generally be considered as a web document. This includes HTML pages (.html, .htm, .shtml), script-generated pages (.cgi, .asp, .cfm, etc.) and plain-text pages. It also includes sound files (.wav, .aiff, etc.), video files (.mov, etc.) and other non-document files. Only image files (.jpeg, .gif, .png), javascript (.js) and style sheets (.css) are excluded from this definition. Each time a file defined as a page is served, a page view is registered by Google Analytics.

Password - A password is the word or code used to authenticate a user on the Google Analytics administration or reporting system, or any other protected system. It is advisable to use passwords that are difficult to guess, such as those containing numbers or symbols.

Path - A Path is defined as a series of clicks resulting in distinct page views. A Path cannot contain non-pages, such as image files. Each step in a path will have a name, such as "index.html".

Pay-per-click - An advertising model in which the sponsor (advertiser) pays a certain amount to the publisher each time the sponsor's ad is clicked. Also referred to as cost-per-click.

PDF - Portable Document Format. File format developed by Adobe Systems to allow for display and printing of formatted documents across platforms and systems. PDF files can be read on any system equipped with the Acrobat Reader software, regardless of whether or not your computer has the software that the document was created in.

Platform - A platform is a specific computer hardware and software operating system combination that represents a specific user's configuration and method of accessing the Internet. Common platforms include Windows NT/x86 (Microsoft Windows NT on a standard Intel-type PC), Mac PPC (Macintosh with Power PC processor), Red Hat Linux 6.1 x86 (Linux on a standard Intel-type PC).

Post - There are two methods to send HTML form data to a server. GET, the default, will send the form input in an URL, whereas POST sends it in the body of the submission. The latter method means you can send larger amounts of data and that the URL of the form results does not show the encoded form.

Prior Unique Visitor - A Prior Unique Visitor is defined as a unique visitor to the website that returned during the specified Date Range after previously visiting your site, as identified by tracking devices such as cookies.

Profile - A Profile is a set of rules governing the production of a set of Google Analytics reports from log file data. Generally, there will be one Profile per domain/URL (e.g., www.Googleanalytics.com). However, there can be any number of Profiles for any one source, as each may have different rules for exclusion or inclusion of certain log data elements. Google Analytics provides up to 50 Profiles per account.

Protocol - An established method of exchanging data over the Internet.

Q

Query Token - A query token is a special character in URL that differentiates the main URL from the specific query. For example, in this URL:

http://www.Google.com/search?q=analytics

the query token is the question mark.

R

Referral Errors - A referral error occurs whenever someone clicks on a link that points to your site but that contains a reference to a non-existent page or file. This action usually results in a "404 Not Found"-type error.

Referrals - A referral occurs when any hyperlink is clicked on that takes a web surfer to any page or file in another website; it could be text, an image or any other type of link. When a web surfer arrives at your site from another site, the server records the referral information in the hit log for every file requested by that surfer. If a search engine was used to obtain the link, the name of the search engine and any keywords used are recorded as well.

Referrer - The URL of an HTML page that refers visitors to a site.

Regular Expressions - Regular Expressions are tools defined by the POSIX specification used to match text strings based on rules invoked by special characters, such as asterisks ("*"). Regular Expressions are powerful tools and should be fully understood before use. For more information, please see the IEEE Sites.

Repeat Session - This is a session for which the visitor could be tracked as unique and as having been to the site before this session during the current Date Range.

Report - A report set is a distinct Google Analytics report about one particular website, part of a website or content group. A report set will have all Google Analytics' reporting features dedicated to the analysis of itself only. Generally, one report set is defined for each website, though more than one can be configured.

Returning Sessions - Returning Sessions represent the number of times unique visitors returned to your website during a specified time period.

Revenue - In versions of Google Analytics that support e-commerce reporting, the term Revenue is used in place of whichever local currency is being used, since Google Analytics supports currencies other than the US dollar. Revenue tabs appear on several reports as a data display option when appropriate.

Reverse DNS It performs the opposite function of the DNS server, which turns names into IP addresses.

ROI (Return on Investment) - (Revenue - Cost)/ Cost, expressed as a percentage.

S

Scalable - Quality of an implementation that allows it to grow as the use of the service increases.

Script - A short computer programme written in a simplified programming language, such as JavaScript, VBScript or Perl.

Search Engine - A Search Engine is a programme that searches documents for specified keywords and returns a list of the documents where the keywords were found, ranked according to relevance (or at least that is the intent). Although a search engine is really a general class of programmes, the term is often used to specifically describe systems like Google and AltaVista that enable users to search for documents on the World Wide Web.

Session - A Session is a defined quantity of visitor interaction with a website. The definition will vary depending on how Visitors are tracked. Some common visitor tracking methods and corresponding Session definitions:

  • IP-based Visitor Tracking: A Session is a series of hits from one visitor (as defined by the visitor's IP address) wherein no two hits are separated by more than 30 minutes. If there is a gap of 30 minutes or more from this visitor, an additional Session is counted.
  • IP+User Agent Visitor Tracking: A Session is a series of hits from one visitor (as defined by the visitor's IP address and user-agent, such as Netscape 4.72) wherein no two hits are separated by more than 30 minutes. If there is a gap of 30 minutes or more from this visitor, an additional Session is counted.
  • Unique Visitor Tracking (cookie-based, such as Google Analytics' UTM): A Session is a period of interaction between a visitor's browser and a particular website, ending upon the closure of the browser window or shut down of the browser programme.

Shell Archive - A shell archive is a collection of files that can be unpacked by using the Unix Bourne shell command interpreter/bin/sh.

Site Domains - Site Domains are all the valid domains (URLs) that point to a given websites. For example, the Site Domains for Google.com are: www.Google.com and Google.com.

Software - The programmes, routines and symbolic languages that control the functioning of the hardware and direct its operation. Written programmes or procedures or rules and associated documentation pertaining to the operation of a computer system and that are stored in read/write memory.

Source (Campaign Tracking) - In the context of campaign tracking, a source is the origin of a referral. Examples of sources are the Google search engine, the AOL search engine, the name of a newsletter or the name of a referring website. The UTM variable for source is utm_source.

Source is one of the five dimensions of campaign tracking; the other four dimensions are campaign, medium, term and content.

Source - Also know as source code. The actual text and commands stored in an HTML file (including tags, comments and scripts) that may not be visible when the page is viewed with a web browser.

Status Code - A status code, also known as an error code, is a 3-digit code number assigned to every request (hit) received by the server. Most valid hits will have a status code of 200 ("ok"). "Page not found" errors will generate a 404 error. Some commonly seen codes are shown below in bold .

  • 100 Continue
  • 101 Switching Protocols
  • 200 OK
  • 201 Created
  • 202 Accepted
  • 203 Non-Authoritative Information
  • 204 No Content
  • 205 Reset Content
  • 206 Partial Content
  • 300 Multiple Choices
  • 301 Moved Permanently
  • 302 Moved Temporarily
  • 303 See Other
  • 304 Not Modified
  • 305 Use Proxy
  • 400 Bad Request
  • 401 Authorisation Required
  • 402 Payment Required
  • 403 Forbidden
  • 404 Not Found
  • 405 Method Not Allowed
  • 406 Not Acceptable
  • 407 Proxy Authentication Required
  • 408 Request Time-Out
  • 409 Conflict
  • 410 Gone
  • 411 Length Required
  • 412 Precondition Failed
  • 413 Request Entity Too Large
  • 414 Request-URL Too Large
  • 415 Unsupported Media Type
  • 500 Server Error
  • 501 Not Implemented
  • 502 Bad Gateway
  • 503 Out of Resources
  • 504 Gateway Time-Out
  • 505 HTTP Version not supported

T

Task - A Task is a log-processing event of any type programmed into the Scheduler. Tasks can be set to execute at virtually any frequency desired, but are generally set to run at a daily interval.

Term (Campaign Tracking) - In the context of campaign tracking, term refers to the keyword(s) that a visitor types into a search engine. The UTM variable for term is utm_term. Term is one of the five campaign dimensions; the other four are source, medium, content and campaign.

Top-Level Domain For instance, the TLD of Google.com is ".com" and the TLD of Google.co.uk is ".uk".

Total Unique Visitor Sessions - The total number of Sessions from identified Unique Visitors during the time period ( Date Range ) being analysed.

U

Unique Visitor Session - A Unique Visitor Session is a quantity of visitor interaction with a website for which the visitor can be tracked and declared with a high degree of confidence as being unique for the time period being analysed.

Unique Visitors - Unique Visitors represent the number of unduplicated (counted only once) visitors to your website over the course of a specified time period. A Unique Visitor is determined using cookies.

Untrackable Session - A period of visitor interaction with a website for which the visitor cannot necessarily be distinguished as unique or not.

URL - Uniform Resource Locator is a means of identifying an exact location on the Internet. For example, http://www.Googleanalytics.com/support/platforms.html is the URL that defines the use of HTTP to access the web page platforms.html in the /support/ directory on the Google Analytics website. URLs typically have four parts: protocol type (HTTP), host domain name (www.Googleanalytics.com), directory path (/support/) and file name (platforms.html).

User - As it pertains to Google Analytics, a user is defined as a person who has specific report set access, a username and password. To set up a user in Google Analytics' administrative system, click on the Access Manager tab at the top of the screen. Then click "Add" in the Existing Access table on the right.

User Agent - A user agent is a generic term for any programme used for accessing a website. This includes browsers (such as Internet Explorer or Netscape), robots and spiders and any other software programme that acts as an "agent" for a someone or something seeking information from a website.

Username - A Username is a name used to gain access to a computer system. Usernames and usually passwords are required in multi-user systems. In most such systems, users can choose their own usernames and passwords.

UTM - The UTM is the Google Analytics Traffic Monitor, a system whereby unique visitors can be accurately tracked using a combination of server and client-side technology including cookies. Please see the UTM white paper for more information.

V

View Total - The View Total is the tally of items currently shown in the report. This total does not include items that are not shown. For example, if the report in question is showing 10 items out of 45, the View Total number represents the total for only the 10 items shown. Below the View Total listing is the Total, which represents the tally of all items in this report for this Date Range.

Visit - See Session.

Visitor - A Visitor is a construct designed to come as close as possible to defining the number of actual, distinct people who visited a website. There is of course no way to know if two people are sharing a computer from the website's perspective, but a good visitor-tracking system can come close to the actual number. The most accurate visitor-tracking systems generally employ cookies to maintain tallies of distinct visitors.

Visitor Session - A Visitor Session is a defined period of interaction between a Visitor (both unique and untrackable visitor types) and a website. The definition of a Sessionvaries depending on the type of visitor tracking employed.

Visitor Sessions - Visitor Sessions represent the number of times individual users visited your website over the course of a specified time period. This is a sum of First-time, Returning and Unknown Sessions.

Visitors Total - Visitors is the number of Total Unique Visitors plus the number of Untrackable IP-based Visitors, which represents all individual visitors to your website over the course of a specified time period.

W

W3C - The W3C, or World Wide Web Consortium, is a standards body dedicated to ensuring interoperability between all the varied system and network types that comprise the World Wide Web part of the Internet. The W3C log format is commonly used by several web server software systems, such as Microsoft IIS. For more information.

Web Server - This is a vague term whose meaning must be determined by the context in which it is used. It will mean one of two things: The physical computer that acts as a server. This is a computer just like any other. It is called a server because its main function is to deliver web pages. There is often nothing particularly special about a server's hardware, it is only a server because of the software.



          Comment on KidLit TV by KidLit TV Live Stream Launch Party with MY FiOS Quantum Gateway | Katie Shea Design: Katie the Courier        
[…] Gribble is the president of New York Media Works, which creates and produces works for children and the children’s literature community, in both […]
          Late at Tate Britain: East is East – Part 1        
Resistance and Spatial Reformers: Refusing to Accept One's Place. This Is Not A Gateway's Deepa Naik and Trenton Oldfield facilitate a salon discussion. Curator Ele Carpenter talks to artist Oliver Ressler about his film What is Democracy?
          Linux UPnP Gateway        

Like many other folks out there, I have several computers in my house connected to the outside world via a Linux box acting as a NAT gateway. I often want to use application such as BitTorrent and Freenet, which require that a number of ports be forwarded from my external …


          Comment on Paywalled Microfinance Data: Is the global “Knowledge Bank” dead? by Ascanio Graziosi        
I do think it is restrict access to information. Some years ago I published "Suggestions for designing new credit models"; Microfinance Gateway put it in the library (06/2011) and then the article has been rated among the five most read documents of the year, Microfinance gateway http://www.microfinancegateway.org/p/site/m/template.rc/1.9.51017/. Soon, it disappeared from the shelves; I clicked and it appear " not found". I sent back an EDF copy and nothing happened. This years I published the e~book FINANCIAL INCLUSION, Give people a job not a loan, https://www.amazon.com/Financial-Inclusion-Give-people-loan-ebook/dp/B01ENJP37S/ref=sr_1_2?ie=UTF8&qid=1465837424&sr=8-2&keywords=financial+inclusion#nav-subnav. I sent to them for the Library, but I have been informed that it is not accepted because not in line with their policy. Being naive, I may say I don't know why, because the proposed paradigm of financial leverage to the economy is based on the most recent documents and papers released by the financial establishment: WB-CGAP. BIS and UN 2030 Agenda SDGs. Ascanio Graziosi Owner, 2030 FINANCIAL INCLUSION, Linkedin.
          Configuración VLAN        

Buen día a todos,

Tengo 2 Switches 6248p conectados a un router que me da la salida a internet.

En el Firewall he creado la sub-interfaz tipo 'vlan' vlan 100 con la ip 10.1.1.1 255.255.255.0

En el Switch he creado la vlan 100 y la he asignado a un puerto especifico, luego he configurado el trunk por la interfaz a la que llega al firewall

Mi problema es que el equipo que se conecta al puerto del switch de la vlan 100, tiene como gateway la misma subinterfaz del firewall 10.1.1.1 pero no reconoce el firewall y tampoco responde al ping.

Tengo algún problema de enrutamiento?, qué debo hacer para que funcione?

Adicionalmente, porqué cuando activo el modo trunk en la interfaz que va conectada al router, porqué pierdo la conexión en mi red normal?


          vlan en switch PowerConnect 6224        

Buenas tardes

Tengo un switch PowerConnect 6224 el cual necesito configurar con dos vlan, una de datos y una de voz.

con los datos hasta ahorita no tengo mucho problema, el detalle es con la vlan de voz, cuando conecto un telefono el equipo no encuentra la ruta o salida.

alguien me podria orienta que necesito hacer para que las vlan puedan trabajar??

vlan de datos 192.168.21.X

vlan de voz 192.168.41.X

Tengo la siguiente configuracion:


console#show running-config
!Current Configuration:
!System Description "Dell 24 Port Gigabit Ethernet, 2.2.0.3, VxWorks5.5.1"
!System Software Version 2.2.0.3
!
configure
vlan database
vlan  2
exit
stack
member 1 1
exit
ip address 192.168.21.16 255.255.255.0
ip default-gateway 192.168.21.1
ip routing
interface vlan 2
name "Phones"
routing
ip address  192.168.41.21  255.255.255.0
no ip proxy-arp
exit
username "admin" password 320eeb00c279bd9d69e4a980acf59bb8 level 15 encrypted


voice vlan
!
interface ethernet 1/g21
switchport mode general
no switchport general acceptable-frame-type tagged-only
switchport general allowed vlan add 2 tagged
mode dvlan-tunnel
voice vlan 2
exit
!
interface ethernet 1/g22
switchport mode general
no switchport general acceptable-frame-type tagged-only
switchport general allowed vlan add 2 tagged
mode dvlan-tunnel
voice vlan 2
exit
!
interface ethernet 1/g23
switchport mode general
no switchport general acceptable-frame-type tagged-only


switchport general allowed vlan add 2 tagged
switchport general allowed vlan remove 1
mode dvlan-tunnel
voice vlan 1
exit
!
interface ethernet 1/g24
switchport mode trunk
switchport trunk allowed vlan add 2
switchport trunk allowed vlan remove 1
exit
exit

console#


          Stuff The Internet Says On Scalability For July 14th, 2017        

Hey, it's HighScalability time:

 

 

We've seen algorithms expressed in seeds. Here's an algorithm for taking birth control pills expressed as packaging. Awesome history on 99% Invisible.

If you like this sort of Stuff then please support me on Patreon.

 

  • 2 trillion: web requests served daily by Akamai; 9 billion: farthest star ever seen in light-years; 10^31: bacteriophages on earth; 7: peers needed to repair ransomware damage; $30,000: threshold of when to leave AWS; $300K-$400K: beginning cost of running Azure Stack on HPE ProLiant; 3.5M: files in the Microsoft's git repository; 300M: Google's internal image data training set size; 7.2 Mbps: global average connection speed; 85 million: Amazon Prime members; 35%: Germany generated its electricity from renewables;

  • Quotable Quotes:
    • Jessica Flack: I believe that science sits at the intersection of these three things — the data, the discussions and the math. It is that triangulation — that’s what science is. And true understanding, if there is such a thing, comes only when we can do the translation between these three ways of representing the world.
    • gonchs: “If your whole business relies on us [Medium], you might want to pick a different one”
    • @AaronBBrown777: Hey @kelseyhightower, if you're surfing GitHub today, you might find it interesting that all your web bits come thru Kubernetes as of today.
    • Psyblog: The researchers were surprised to find that a more rebellious childhood nature was associated with a higher adult income.
    • Antoine de Saint-Exupéry: If you want to build a ship, don't drum up people to collect wood and don't assign them tasks and work, but rather teach them to long for the endless immensity of the sea.
    • Marek Kirejczyk: In general I would say: if you need to debug — you’ve already lost your way.
    • jasondc: To put it another way, RethinkDB did extremely well on Hacker News. Twitter didn't, if you remember all the negative posts (and still went public). There is little relation between success on Hacker News and company success.
    • Rory Sutherland: What intrigues me about human decision making is that there seems to be a path-dependence involved - to which we are completely blind.
    • joeblau: That experience taught me that you really need to understand what you're trying to solve before picking a database. Mongo is great for some things and terrible for others. Knowing what I know now, I would have probably chosen Kafka.
    • 0xbear: cloud "cores" are actually hyperthreads. Cloud GPUs are single dies on multi-die card. If you use GPUs 24x7, just buy a few 1080 Ti cards and forego the cloud entirely. If you must use TF in cloud with CPU, compile it yourself with AVX2 and FMA support. Stock TF is compiled for the lowest common denominator
    • Dissolving the Fermi Paradox: Doing a distribution model shows that even existing literature allows for a substantial probability of very little life, and a more cautious prior gives a significant probability for rare life
    • Peter Stark: Crews with clique structures report significantly more depression, anxiety, anger, fatigue and confusion than crews with core-periphery structures.
    • Patrick Marshall: Gu said that the team expects to have a prototype [S2OS’s software-defined hypervisor is being designed to centrally manage networking, storage and computing resources] ready in about three years that will be available as open-source software.
    • cobookman: I've been amazed that more people don't make use of googles preemtibles. Not only are they great for background batch compute. You can also use them for cutting your stateless webserver compute costs down. I've seen some people use k8s with a cluster of preemtibles and non preemtibles. 
    • @jeffsussna: Complex systems can’t be fully modeled. Failure becomes the only way to fully discover requirements. Thus the need to embrace it.
    • Jennifer Doudna: a genome’s size is not an accurate predictor of an organism’s complexity; the human genome is roughly the same length as a mouse or frog genome, about ten times smaller than the salamander genome, and more than one hundred times smaller than some plant genomes.
    • Daniel C. Dennett: In Darwin’s Dangerous Idea (1995), I argued that natural selection is an algorithmic process, a collection of sorting algorithms that are themselves composed of generate-and-test algorithms that exploit randomness (pseudo-randomness, chaos) in the generation phase, and some sort of mindless quality-control testing phase, with the winners advancing in the tournament by having more offspring.
    • Almir Mustafic: My team learned the DynamoDB limitations before we went to production and we spent time calculating things to properly provision RCUs and WCUs. We are running fine in production now and I hear that there will be automatic DynamoDB scaling soon. In the meantime, we have a custom Python script that scales our DynamoDB.

  • I've written a novella: The Strange Trial of Ciri: The First Sentient AI. It explores the idea of how a sentient AI might arise as ripped from the headlines deep learning techniques are applied to large social networks. I try to be realistic with the technology. There's some hand waving, but I stay true to the programmers perspective on things. One of the big philosophical questions is how do you even know when an AI is sentient? What does sentience mean? So there's a trial to settle the matter. Maybe. The big question: would an AI accept the verdict of a human trial? Or would it fight for its life? When an AI becomes sentient what would it want to do with its life? Those are the tensions in the story. I consider it hard scifi, but if you like LitRPG there's a dash of that thrown in as well. Anyway, I like the story. If you do too please consider giving it a review on Amazon. Thanks for your support!

  • Serving 39 Million Requests for $370/Month, or: How We Reduced Our Hosting Costs by Two Orders of Magnitude. Step 1: Just Go Serverless: Simply moving to a serverless environment had the single greatest impact on reducing hosting costs. Our extremely expensive operating costs immediately shrunk by two orders of magnitude. Step 2: Lower Your Memory Allocation: Remember, each time you halve your function’s memory allocation, you’re roughly halving your Lambda costs. Step 3: Cache Your API Gateway Responses: We pay around $14 a month for a 0.5GB API Gateway cache with a 1 hour TTL. In the last month, 52% (20.3MM out of 39MM) of our API requests were served from the cache, meaning less than half (18.7MM requests) required invoking our Lambda function. That $14 saves us around $240 a month in Lambda costs.

Don't miss all that the Internet has to say on Scalability, click below and become eventually consistent with all scalability knowledge (which means this post has many more items to read so please keep on reading)...


          Love Your Enemies        
Love your enemies and pray for those who persecute you, so that you may be children of your Father in heaven; for he makes his sun rise on the evil and on the good, and sends rain on the righteous and on the unrighteous.

-Matthew 5:44-45 (NRSV)



I was reading the newspaper and an article caught my eye about strife in the world. In almost every country, nation of different ethnicities make use of violence to express hatred and fear of each other.

Yet Jesus Christ commands everybody to love our enemies. For me, Jesus is just telling us that we must show warm feelings for our enemies, but that we can demonstrate our enemies respect due to all human beings. Each of us is created in the image and likeness of God. Visualize how the world would change if everyone lived by Jesus’ teachings instead of considering it as a suggestion. No more child will be orphaned, no more bombs explosion, no more flying bullets, no more throwing of stones. Mankind would talk through each others differences and try to see each other’s point of view.

Do you think this could happen in our planet today? The answer is definitely yes. We can all pray to God to help us open our hearts and minds so that we will all become the type of humankind worthy of the name Christian. Let us have strong faith. We can also ask God for heart and mind opening of those who sinned against us and to turn their hatred to love and understanding.

source: biblegateway.com



          Let go and let GOD        
let go and let god
“Whoever wishes to save his life will lose it, but whoever loses his life…will save it”
-Mark 8:35
That absolutely sounds crazy. I mean how can you save your life by losing it, knowing you need to lose your life to save it?

In my opinion, this gospel reading is not necessarily discussing about life and death but more so about on how I’m living my life and what actions and decisions I make in my life. The gospel jogs my memory of the phrase “let go and let God.” I consider that denying ourselves, like the gospel reading says or letting go, is about bringing together ourselves towards to God.

What does this mean and how can we truly unite ourselves with God? The primary way I do to unite myself with God is through giving service, volunteering myself for the goodness of God. I find it the best to serve someone, by dedicating my time and to be in solidarity with them to allow myself to know their needs and by recognizing their struggles.

“Losing you life” – is about choosing the right path to go to, doing this means going against what most people would consider to be “the norm”. This is also how we contest ourselves, which sometimes choosing this could lead to our own death.

We reunite with God in different ways. It is through our own experiences and reflection that we come to discover to be closer to God and to work our way to the Kingdom of Heaven.

Bible verses here.

          Configuring multiple DHCP reservations [fixed IPs] for the same host with a Unifi Security Gateway        

I just picked up some new networking gear, so this will be the first of a multi-part blog post about my learnings configuring Unifi gear.

One issue I noticed right away was that it is not possible, via CLI nor GUI, to configure fixed IP address for a host that relies on more than 1 of the configured networks/VLANs. Since I have a home server (user VLAN) that is also hosting the controller softare (management VLAN) and also acts as a gateway for sending packets over its VPN interface (VPN VLAN), this was necessary for me.

It is possible but requires a bit of manual configuration using a config.gateway.json file. First, if you have configured a fixed IP for the host, unset it.

Then, merge in the DHCP mappings in your config.gateway.json file:

{
  "service":{
    "dhcp-server":{
      "shared-network-name":{
        "LAN_192.168.1.0-24":{
          "subnet":{
            "192.168.1.0/24":{
              "static-mapping":{
                "00-aa-22-bb-44-cc.mgmt":{
                  "ip-address":"192.168.1.5",
                  "mac-address":"00:aa:22:bb:44:cc"
                }
              }
            }
          }
        },
        "LAN_Users_192.168.10.0-24":{
          "subnet":{
            "192.168.10.0/24":{
              "static-mapping":{
                "00-aa-22-bb-44-cc.users":{
                  "ip-address":"192.168.10.5",
                  "mac-address":"00:aa:22:bb:44:cc"
                }
              }
            }
          }
        },
        "LAN_VPN_192.168.20.0-24":{
          "subnet":{
            "192.168.20.0/24":{
              "static-mapping":{
                "00-aa-22-bb-44-cc.vpn":{
                  "ip-address":"192.168.20.5",
                  "mac-address":"00:aa:22:bb:44:cc"
                }
              }
            }
          }
        }
      }
    }
  }
}

The key here is that the string child of the static-mapping node must be unique. Unifi will put in the MAC separated by dashes by default, so above I just tacked on the VLAN name to each name.

Re-provision your USG and you should be good to go. If you run into trouble an want to debug DHCP req/ack sequences, setup verbose logging:

configure
set service dhcp-server global-parameters 'log-facility local2;'
set system syslog file dhcpd facility local2 level debug
set system syslog file dhcpd archive files 5
set system syslog file dhcpd archive size 5000
commit

You'll find the DHCP log under /var/log/user/dhcpd. Simply reboot to go back to normal logging.


          Gateway to Health – From Pills to Plants        

The idea that Cannabis is a gateway drug is still very much ingrained in some of our minds.  I can’t help but agree. For me, this plant with my naturally occurring cannabinoid receptor system has been a gateway to many good things.  For people like myself, Cannabis is a gateway to sleep, smiles, sex, and […]

The post Gateway to Health – From Pills to Plants appeared first on Boveda® Official Site.


          Watch The Haunting in Connecticut movie free online        
The Haunting in Connecticut...Some things cannot be explained....Based on a true story, The Haunting in Connecticut charts one family's real-life encounter with the dark forces of the supernatural. When the Campbell family moves to upstate Connecticut, they soon learn that their charming Victorian home has a disturbing history: not only was the house a transformed funeral parlor where inconceivable acts occurred, but the owner's clairvoyant son Jonah served as a demonic messenger, providing a gateway for spiritual entities to crossover. Now unspeakable terror awaits when Jonah, the boy who communicated with the dead, returns to unleash horror on the innocent and unsuspecting family.

          VMware vCenter Log Insight Series Part2 - Installation and Configuration        
In this second post regarding VMware vCenter Log Insight I will explain how to deploy it and perform initial setup and configuration.
As first thing bookmark the VMware vCenter Log Insight documentation.

Log Insight installation is a quite straightforward process. Download the OVA file from VMware.com and deploy it in the classic way.
During deployment you will be prompted to choose your deployment size. As discussed in previous article deployment size is related to how much data Log Insight is capable to ingest in a certain amount time. This obviously directly influences the requested CPU number and RAM size to support this certain kind of workload. Please note that the Extra Small configuration option is not supported in production but is only suited for demonstrations only.



Configure IP address, proper subnet mask, gateway, DNS and appliance root password.



Before continuing let's have a brief look at how Log Insight stores data. Once OVF has been deployde if you edit Log Insight virtual machine you will see something similar to this:



Three hard disks are used to store operating system data, application logs and, finally, logs and indexes received by Log Insight. By default, if Small configuration is used, application logs and data are stored in an LVM formatted 120GB disk.



/storage/core is where logs and indexes are stored. This volume can be increased by simply editing the virtual appliance hard disk size. When Log Insight is powered back on LVM will be automatically expanded and will reflect the new size.





Once Log Insight has booted completely point to it using a web browser and you can perform the initial configuration.



Here you can choose either to start a new deployment either to join an existing one. The latter option is used when adding worker nodes to an existing Log Insight cluster and we will see this in detail in another post so at this time I choose the former one.



Insert admin credentials.



Insert license key. You can skip this step at this time and insert the license later but a valid license key must inserted in order to access to collected logs and analytics.



Time configuration is an optional step but I suggest you to configure it to work properly since timestamps in log analysis can be a lifesaver.



SMTP is used by Log Insight to send alerts via email



When setup is complete you will be redirected to the main page of VMware vCenter Log Insight.





In order to get log data from vCenter Server and ESXi hosts connected to it you need to go to Administration -> vSphere and properly fill in the fields pointing to you vCenter Server then check both options in this page. This will automatically retrieve logs from vCenter and configure ESXi hosts to send logs to this instance of Log Insight.





NOTE: If you need to check if an ESXi host sends logs over to Log Insight just connect to it via SSH and run:

 esxcli system syslog config get  

To perform a manual configuration for sending logs from an ESXi host to Log Insight or to a generic syslog run the following command:

 esxcli system syslog config set --loghost='udp://<IP_OF_LOGINSIGHT:514>'  

That's all for now, in the next article we will start using vCenter Log Insight for analyzing logs.


Other articles in this series:
VMware vCenter Log Insight Series Part1 - Introduction
VMware vCenter Log Insight Series Part2 - Installation and Configuration
VMware vCenter Log Insight Series Part3 - Collecting Logs 
VMware vCenter Log Insight Series Part4 - Creating Analytics
          VMware: Automate OpenStack vApp deployment using PowerCLI        
For those who wants to try OpenStack on VMware vSphere without struggling with GIT pulls and manual file edit the OpenStack Team at VMware provides the VOVA, (Vsphere Openstack Virtual Appliance) an Ubuntu virtual machine which comes with OpenStack Havana pre-installed and pre-configured to run on vSphere. To be clear this is not the entire OpenStack's stack, this comprises Nova, Glance, Cinder, and Keystone but according to the official community on VMTN there's the possibility to bring in another stack component like Neutron. This one will  require VMware NSX though.

OpenStack on vSphere requires though some infrastructure configurations in order to work, this is not the simple deploy the ova file and everything works. An initial setup must be performed in order to successfully deploy the VOVA.

Let's start by linking the official OpenStack on vSphere documentation in which you will find all instructions for a correct deployment as well as the link for downloading the OpenStack virtual appliance.

As official documentation states we will work with two different clusters: a management cluster where the VOVA vApp will be deployed and one or more OpenStack clusters. These clusters will be managed by OpenStack to deploy instances in. As best practice DRS will be enabled in both clusters and will be set in fully automated mode.

At least two datastores are also required: one, presented only to ESXi hosts belonging to management cluster, in which VOVA will be deployed and one, or preferably more, presented to all ESXi hosts in the OpenStack clusters that will be used by instances.

Networking-side some changes must be implemented: a new vSwitch with a private br100 PortGroup will be created on hosts in both OpenStack and management cluster. This PortGroup will be used by all OpenStack instances as well as by VOVA that will have NICs associated to different PortGroups: one on the br100 PortGroup forwarding packets received on that interface towards the outside network and vice-versa while the other on classic VM Network PortGroup to communicate with the rest of the network.

This is a logical schema giving an idea on how the environment should be configured:



Since some work is required in order to successfully use OpenStack on vSphere why not to automate its deployment using PowerCLI?

The following script:

-Connects to a vCenter Server
-Creates a Datacenter
-Creates two clusters: a Management and an OpenStack one
-Adds ESXi hosts to both clusters
-Configures ESXi hosts networking creating a vSwitch1 and a br100 PortGroup
-Deploys the OpenStack virtual appliance in one host belonging to the management cluster
-Configures OpenStack virtual appliance editing OVF Environment
-Starts up OpenStack and points user's browser to starting page

Here's how the final result will look like from vCenter:



This is the PowerCLI code, as usual you can find it also in my GitHub repository. Automate OpenStack vApp Deployment.ps1



The code is pretty well commented but some parts requires a further clarification:

 Import-vApp -VMHost $MgmtHosts[0] -Source $SourceFilePath -Datastore $InstallDatastore -DiskStorageFormat $DiskFormat -Force:$true  

imports a vApp in ova or ovf format to a designated ESXi host and datastore. DiskStorageFormat parameter is used to select how the vApp will be deployed in the datastore (Thin, Thick Lazy or Thick Eager).

The following code is used to edit OVF environment properties for the vApp since once deployed it needs to be configured in order to work properly.

These are the properties defined in VOVA:

 <PropertySection>  
<Property oe:key="vami.DNS.VOVA" oe:value=""/>
<Property oe:key="vami.gateway.VOVA" oe:value=""/>
<Property oe:key="vami.ip0.VOVA" oe:value=""/>
<Property oe:key="vami.netmask0.VOVA" oe:value=""/>
<Property oe:key="vm.vmname" oe:value="VOVA"/>
<Property oe:key="vmware.cluster_name" oe:value=""/>
<Property oe:key="vmware.datacenter_name" oe:value=""/>
<Property oe:key="vmware.datastore_regex" oe:value=""/>
<Property oe:key="vmware.host_ip" oe:value=""/>
<Property oe:key="vmware.host_port" oe:value=""/>
<Property oe:key="vmware.password" oe:value=""/>
<Property oe:key="vmware.username" oe:value=""/>
</PropertySection>

Credit for the code snippet goes to Alan Renouf .In his article Alan explains how to automate LogInsight vApp deployment by changing OVF environment properties using PowerCLI.

 $VirtualMachineConfigSpec = New-Object VMware.Vim.VirtualMachineConfigSpec  
$VirtualMachineConfigSpec.vAppConfig = New-Object VMware.Vim.VmConfigSpec
$VirtualMachineConfigSpec.vAppConfig.property = New-Object VMware.Vim.VAppPropertySpec[] (x)
$VirtualMachineConfigSpec.vAppConfig.property[x] = New-Object VMware.Vim.VAppPropertySpec
$VirtualMachineConfigSpec.vAppConfig.property[x].operation = "edit"
$VirtualMachineConfigSpec.vAppConfig.property[x].info = New-Object VMware.Vim.VAppPropertyInfo
$VirtualMachineConfigSpec.vAppConfig.property[x].info.key = "Integer Key"
$VirtualMachineConfigSpec.vAppConfig.property[x].info.value = "Value"
$Reconfig = $appVOVA.ExtensionData
$Configtask = $Reconfig.ReconfigVM_Task($VirtualMachineConfigSpec)

After the deployment your browser will be pointed to OpenStack console and you should see something similar to this:



Username is demo while password is vmware.

To create a new instance go to Instances



Launch Instance, select availability zone, instance name, flavor i.e. the "size" of the instance, instance boot source and finally the image to deploy. By default VOVA comprises a Debian image ready to be deployed.



Instance should take a few minutes to start the first time because VOVA will copy Debian image in one OpenStack managed datastore, subsequent deployments will be faster since files are already there.





Root privileges on deployed instances as well as in VOVA console can be accessed using root as username and vmware as password.

That's all!!
           Trik Internet Gratis Indosat 23 September 2012        


 Trik Internet Gratis Indosat 23 September 2012 - Trik Internet Gratis Indosat . Pagi, semua... sekarang Riyal akan,, kasih Trik Internet Gratis Indosat ... nah ini dia, Trik Internet Indosat , Tersebut :

Trik Internet Gratis Indosat 22 September 2012 - Trik Internet Gratis Indosat . Trik Internet Gratis Indosat 12 September 2012 - Trik Internet Gratis Indosat
   
Set Konfigurasi:
Apn: indosatgprs
Proxy: 11.10.14.16
Port: 80
Set Opmin handler:
HTTP Server : http://blog.liputan6.co.id.opera-mini.net:80/
socket Server : socket://kamseupay.djuzz.com.opera-mini.net:1080
Remove port : centang
pt : HTTP
ps : m.facebook.com, mobile.twitter.com, gateway.mig33.com

Trik Internet Gratis Indosat 23 September 2012 , . O'ya jangan lupa Besok untuk liat Trik Internet Gratis Indosat 24 September 2012.

100out of 100 based on 10000 ratings. 1 user reviews.

          åœ¨RedHat 5下安装Oracle 10g详解(转)        
一、安装环境
我是在vmware里虚拟的RHEL5,分配的内存1G,SWAP分区1G,建议你最好把SWAP分区改成2G。否则安装时,到了测试的步骤会提示监测失败。(当然,如果你强行安装一样没问题)

二、安装Oracle 10g Release2 前的配置

1. 安装Oracle 10g R2所需的软件包

# cd /mnt/cdrom/Server/
# rpm -Uvh setarch-2*
# rpm -Uvh make-3*
# rpm -Uvh glibc-2*
# rpm -Uvh libaio-0*
# rpm -Uvh compat-libstdc++-33-3*
# rpm -Uvh compat-gcc-34-3*
# rpm -Uvh compat-gcc-34-c++-3*
# rpm -Uvh gcc-4*
# rpm -Uvh libXp-1*
# rpm -Uvh openmotif22-*
# rpm -Uvh compat-db-4*

其中除了openmotif22-2.2.3-18和compat-db-4.2.52-5.1在第三张盘上,其余的包都在第一张盘上。

2. 修改/etc/redhat-release文件

因为Oracle 10g官方只支持到RHEL4为止,所以需要更改版本说明,编辑/etc/redhat-release文件,删除Red Hat Enterprise Linux Server release 5 (Tikanga),改为redhat-4

3.修改内核参数

#vi /etc/sysctl.conf

kernel.shmmni = 4096
kernel.sem = 250 32000 100 128
fs.file-max = 65536
net.ipv4.ip_local_port_range = 1024 65000
net.core.rmem_default=262144
net.core.rmem_max=262144
net.core.wmem_default=262144
net.core.wmem_max=262144

使更改立即生效,使用下面的命令:

#sysctl -p

4.建立安装Oracle需要的用户,组,及目录

#groupadd oinstall
#groupadd dba
#groupadd oper
#useradd -g oinstall -G dba oracle
#passwd oracle

#mkdir /oracle
#chown -R oracle:oinstall /oracle
#chmod -R 775 /oracle

安装oracle的目录建议安装在一个单独的分区或者磁盘上。

5.设置oracle用户的shell limit

#vi /etc/security/limits.conf    

oracle soft nproc 2047
oracle hard nproc 16384
oracle soft nofile 1024
oracle hard nofile 65536

接下来更改/etc/pam.d/login文件,添加下面的内容,使shell limit生效:

#vi /etc/pam.d/login

session                  required                pam_limits.so

6.配置IP地址

安装RHEL的时候最好采用静态IP地址,如果当时选择的是DHCP,现在需要更改/etc/sysconfig/network-scripts/ifcfg-eth0文件

[root@TSM54-Test network-scripts]# cat ifcfg-eth0
# Advanced Micro Devices [AMD] 79c970 [PCnet32 LANCE]
DEVICE=eth0
BOOTPROTO=static
HWADDR=00:0C:29:4B:17:C4
ONBOOT=yes
IPADDR=192.168.68.98
NETMASK=255.255.255.0
GATEWAY=192.168.68.10

 

7.配置oracle用户的环境变量

下面的操作,该用oracle用户登陆执行了。

为了防止安装oracle时出现乱码,先把语言环境改为英文,在终端里输入:

[oracle@TSM54-TEST ~]$export LC_CTYPE=en_US.UTF-8

接下来,编辑/home/oracle目录下的.bash_profile文件,添加如下内容:

export ORACLE_BASE=/oracle
export ORACLE_HOME=$ORACLE_BASE/product/10.2.0/db_1
export ORACLE_SID=orcl
export PATH=$PATH:$ORACLE_HOME/bin
export LD_LIBRARY_PATH=$ORACLE_HOME/lib:/lib:/usr/lib
CLASSPATH=$ORACLE_HOME/JRE:$ORACLE_HOME/jlib:$ORACLE_HOME/rdbms/jlib
export CLASSPATH


if [ $USER = "oracle" ]; then
        if [ $SHELL = "/bin/ksh" ]; then
                ulimit -p 16384
                ulimit -n 65536
        else
                ulimit -u 16384 -n 65536
        fi
fi

三.安装Oracle 10g

我把10201_database_linux32.zip放在/opt目录下,并通过

#unzip 10201_database_linux32.zip解压,现在使用oracle用户到/opt/database目录下执行安装:

[oracle@TSM54-Test opt]$ cd /opt/database/
[oracle@TSM54-Test database]$ ls
doc install response runInstaller stage welcome.html
[oracle@TSM54-Test database]$ ./runInstaller

1.选择安装类型,这里我选择高级安装,如下图所示:

2.指定证书存放目录,如图所示:

3.选择安装的数据库类型及oracle所支持的语言,这里选择企业版,语言选择英文和简体中文,如下图所示:

4.指定oracle环境变量,安装路径。因为我们在.bash_profile中已经声明,所以这里会自动填充.如下图所示:

5.Oracle开始进行安装前的检查工作,如下图所示:

6.选择配置选项,如下图所示:
7.选择创建的数据库模式,如下图所示:
8.指定数据库配置的相关选项(SID、字符集等),如下图所示:
9.选择数据库管理选项,如下图所示:
10.指定数据库存储选项,如下图所示:
11.指定数据库备份回复选项,如下图所示:
12. 指定数据库相关用户密码,如下图所示:
13.显示安装概要,如下图所示:
14.开始安装,如下图所示:
15. 上面的窗口点击OK后,会出现下图显示的内容:
需要root权限执行
#/oracle/oraInventory/orainstRoot.sh
#/oracle/product/10.2.0/db_1/root.sh
16.安装结束,如下图所示:
17.安装完成后,恢复语言环境以及版本信息
#export LC_CTYPE=zh_CN.UTF-8
#vi /etc/redhat-release
Red Hat Enterprise Linux Server release 5 (Tikanga)
四、后续
1.安装完成后,首先应该启动监听器。
监听器接受客户端的连接请求,并在验证证书后创建数据库连接。要使用OEM或iSQL*PLUS,必须先启动监听器。

[oracle@TSM54-Test database]$ lsnrctl start
[oracle@TSM54-Test database]$ lsnrctl stop

2.使用Oracle Enterprise Manager 10g进行数据库控制

启动和停止OEM的命令为:

[oracle@TSM54-Test database]$emctl start dbconsole
[oracle@TSM54-Test database]$emctl stop dbconsole

 

在web浏览器中,输入:

http://192.168.68.98:1158/em (如果服务器没有进行DNS解析,则可以用IP地址)

用户名:SYS

口令:<安装过程中建立的口令>

连接为:SYSDBA

3.使用iSQL*Plus访问数据库

启动和停止iSQL*Plus命令:

[oracle@TSM54-Test database]$isqlplusctl start
[oracle@TSM54-Test database]$isqlplusctl stop

iSQL*Plus是历史悠久的SQL*Plus交互式工具的基于web的版本,用于访问数据库。要使用iSQL*Plus,请单击OEM控制台相关连接部分中的iSQL*Plus链接,或将浏览器指向安装过程中提供的iSQL*Plus URL。

在web浏览器中,输入:

http://192.168.68.98:5560/isqlplus

用户名:SYSTEM

口令:<安装过程中创建的口令>

连接标识:orcl

4.启动和停止数据库

启动和停止数据库的最简单方法是从 OEM 控制台启动和停止。要从命令行执行此操作,请在以 oracle 身份登录后使用 SQL*Plus,如下所示:

启动:

$ sqlplus

SQL*Plus:Release 10.1.0.2.0 - Production on Sun Jun 13 22:27:48 2004

Copyright (c) 1982, 2004, Oracle.All rights reserved.

Enter user-name:/ as sysdba
Connected to an idle instance.

SQL> startup
ORACLE instance started.

Total System Global Area  188743680 bytes
Fixed Size                   778036 bytes
Variable Size             162275532 bytes
Database Buffers           25165824 bytes

Redo Buffers                 524288 bytes
Database mounted.
Database opened.
SQL> exit

Shutdown:

$ sqlplus

SQL*Plus:Release 10.1.0.2.0 - Production on Sun Jun 13 22:25:55 2004

Copyright (c) 1982, 2004, Oracle.All rights reserved.

Enter user-name:/ as sysdba

Connected to:
Oracle Database 10g Enterprise Edition Release 10.1.0.2.0 - Production
With the Partitioning, OLAP and Data Mining options

SQL> shutdown immediate
Database closed.
Database dismounted.
ORACLE instance shut down.
SQL> exit
注:本文的图是借用了http://www.ouyaoxiazai.com/article/24/239.html里的图片。
五、卸载ORACLE
1. 运行 $ORACLE_HOME/bin/localconfig delete
2. rm -rf $ORACLE_BASE/*
3. rm -f /etc/oraInst.loc /etc/oratab
4. rm -rf /etc/oracle
5. rm -f /etc/inittab.cssd
6. rm -f /usr/local/bin/coraenv /usr/local/bin/dbhome /usr/local/bin/oraenv
7. 删除oracle用户和组。
注:卸载方法是来自google。我曾用此方法删除oracle 11g(安装11的时候选择的是ASM)。
六、关于Oracle 11g Release 1 的安装
Oracle 11gR1 已经支持RHEL5了,所以不用再更改redhat-release文件。
另外安装所依赖的包有如下:

      binutils-2.17.50.0.6-2.el5
      compat-libstdc++-33-3.2.3-61
      elfutils-libelf-0.125-3.el5
      elfutils-libelf-devel-0.125
      glibc-2.5-12
      glibc-common-2.5-12
      glibc-devel-2.5-12
      gcc-4.1.1-52
      gcc-c++-4.1.1-52
      libaio-0.3.106
      libaio-devel-0.3.106
      libgcc-4.1.1-52
      libstdc++-4.1.1
      libstdc++-devel-4.1.1-52.e15
      make-3.81-1.1
      sysstat-7.0.0
      unixODBC-2.2.11
      unixODBC-devel-2.2.11

其它的步骤就跟安装Oracle 10gR2 没有什么区别了。



疯狂 2012-09-14 13:26 发表评论

          Banderoles -25%. Coupon: BANDEROLE25        

Á l´intérieur comme à l´extérieur, faites la promotion de vos ventes spéciales, salons, fêtes et autres évènements.

The post Banderoles -25%. Coupon: BANDEROLE25 appeared first on Vistaprint Bon Réductions.


          100 cartes de visite standard pour 7,99 € (HT) . Coupon: CARTE50        

Créez des cartes de visite uniques. Personnalisez-les avec votre photo ou logo sur du papier haut de gamme et affichez votre professionnalisme.

The post 100 cartes de visite standard pour 7,99 € (HT) . Coupon: CARTE50 appeared first on Vistaprint Bon Réductions.


          Delta Kicks Off Seattle to Seoul-Incheon Flight        
Delta Air Lines launched a new flight from their new Seattle (SEA) Gateway bound for Seoul’s Incheon Airport (ICN). Today’s flight marks Delta’s fourth international route added from Seattle-Tacoma International Airport (SEA) in a year. Previous 2014 launches include London-Heathrow (LHR), Shanghai-Pudong (PVG), and Tokyo-Haneda (HND). The non-stop to Seoul is in addition to the […]
          Email to Fax Gateway        
email to FaxGateway
          Wellington Airport Runway Extension: Definition of a Cargo Cult: Part One        
For those unfamiliar with the term "cargo cult" it is a description of what might best be called as a naive practice of some cultures with low levels of scientific understanding and a high belief in animist religions that certain rituals will result in untold riches arriving from the skies.  Nowadays it is often shortened into "built it and they will come".

Such is the hype around the planned extension to the runway of Wellington Airport - a proposal that completely lacks pure commercial merit and has no net wider economic benefit - but is being promoted by the opportunistic, encouraged by the naive and to be paid for, largely, by those will get no benefit from it at all.



I say this as someone who grew up 1.5kms from the airport and knows a bit about the aviation sector, having recently been part of the team that reviewed over 50 proposals for expanding airport capacity in London.  I know Wellington Airport very well, and the likelihood that there will be long haul flights into that airport that will generate net benefits to Wellington ratepayers to recover the costs of subsidising the runway extension is very low indeed.

Let's remember the airport is a commercial concern, two-thirds owned by Infratil, which itself is not willing to contribute two-thirds of the capital costs of the project.  It's the owner of the other third - Wellington City Council - that is the problem, because it is willing to force ratepayers (along with other Wellington councils) to cough up half of the liability to boost the value of Infratil's investment. This in itself should cause both believers in the free market and socialists to baulk at public subsidy for a predominantly private entity, but no - they have cargo cult syndrome.

They believe that magically if an airport extension is built, there will be long haul flights from Wellington to Asia and the Middle East, making the city more attractive for business.  However, it is far from clear exactly:

- Why airlines will fly long haul to Wellington;
- Are the assumptions about the the benefits claimed valid?




Who would fly to Wellington?

Let's kill off one idea quickly.  

Air New Zealand will not fly long-haul from Wellington. Its international hub is Auckland, the reason being that it is the business hub for the country, and also enables it to attract traffic between Australian cities and the Americas/South Pacific (which it does rather successfully).   Given its location it can generate high yielding (i.e. not economy class travelling) passengers with enough of an economy of scale to be just profitable enough to sustain a business, in a very volatile sector.  It once flew long-haul out of Christchurch (to LA, Singapore and Tokyo), but has recently dropped the last of these services.  Even the Trans Tasman services from Wellington are no great money spinners, as the decision about the Air NZ-Virgin Australia Alliance revealed.

Wellington Airport and two Wellington Councils (and associated bodies) all demanded that in exchange for approving the Alliance, Air NZ and Virgin Australia be forced to maintain a minimum flight frequency on their routes between Wellington and Australia.  This hardly indicates confidence in the commercial attractiveness of flying to Wellington Airport.  The Australian Competition and Consumer Commission in its approval of the Alliance required the two airlines to maintain a minimum level of service between Wellington and Brisbane.  

Hardly great confidence that Wellington is a lucrative destination.  Air NZ has made it clear it has no plans to fly long-haul from Wellington and that a runway extension would not change this.

Beyond that, there have been claims that the latest generation of longhaul aircraft - Boeing 787s and Airbus A350s - will suddenly make it viable to fly to Wellington.   However, a useful guide to who this might be is to look at Christchurch, which with both a wider pool of air cargo and as a gateway to the main tourism destinations of the country, has some long haul flights.

By some I mean actually 2 non-stop from Christchurch.  One is Singapore Airlines and the other is China Southern to Guangzhou.  Singapore Airlines has been decidedly lukewarm on flying to Wellington, and China Southern is driven mostly by outbound Chinese tourism traffic, which has limited interest in visiting Wellington.  Emirates flies from Christchurch to Dubai via Sydney and Bangkok, which of course is not at all better than flying to Dubai via Sydney from Wellington, except it is a larger aircraft.  China Airlines flies from Taipei to Christchurch, but only via Australia.  Same issue again.  This isn't a long haul flight, and isn't substantially different from flying Air NZ or Qantas into Sydney or Melbourne to connect to a long haul flight to Asia or Europe.

If Christchurch can only attract one flight from Singapore and one from China, what's all the hype about Gulf airlines flying to Wellington (when the other two big Gulf airlines, Etihad and Qatar Airways don't even fly to Auckland)?  

China Southern (which is going through a rapid growth phase) has indicated it might consider Wellington, but given it is Chinese Government owned airline, it is operating not to grow profit but to find markets it can grow.  Quite how many business people or tourists wish to hub through Guangzhou to and from Europe or elsewhere in Asia, on an airline with a mixed reputation for service when things go wrong, is unclear.   I wouldn't want to base the decision to spend millions of taxpayers' dollars on giving one airline the chance to start a flight it might cancel a year later.   Neither does the major owner of the airport, who is happy to let taxpayers cough up the money to subsidise its ambitions (bear in mind Infratil recently offloaded completely failed airport investments in the UK for token amounts).

Why would there be benefits from long haul flights to Wellington?

The whole premise of the Wellington runway cargo cult is that Wellington is less attractive for business because it doesn't have long haul flights.  The same arguments are made for Canberra, which even struggles to get Trans-Tasman flights, because airlines simply aren't interested.  However, the benefits of direct flights come from reduced travel time and assumptions about lower airfares, yet these are wanting.

Ernst and Young authored the study into the benefits of the project, but some of its assumptions demonstrate a paucity of understanding of the airline industry and some heroic assumptions about benefits that airline passengers are willing to pay for.

In the next installment, I review the report and find it full of assumptions and assertions that don't bear close scrutiny.

          Setting Up OpenVPN on a SoftLayer Vyatta Device        

The following is a step-by-step guide on how to utilize your SoftLayer Vyatta gateway device as your own personal VPN to access any server behind the Vyatta device with even more freedom than the SoftLayer VPN. In the following example, we will be using the built-in OpenVPN daemon that comes installed with Vyatta. This means you can upload large files to your servers that are behind the Vyatta device using the speed of your public interface, rather than trying to depend on the SoftLayer VPN’s speeds—which are throttled for management, not file transfer.


          On Steinbeck's Road        

In one scenario of my life, I would have been retired by this week, taking my dream trip - a recreation of John Steinbeck's trip with Charley the poodle across America. I had already charted the journey in Google Maps (see http://goo.gl/maps/cnzb). Now I am here solving problems (and creating a few) for the Mendik Library, so the 50th anniversary launch of "Travels with Yuji" was put aside for all time. However, I got to do the next best thing - have a long talk with one of the people who did set out on that pilgrimage. Recently, I was contacted by John Woestendiek, a retired Pulitzer Prize winning journalist and author. He has already started the western swing, getting as far as Arizona, but he wanted to leave from Sag Harbor on the exact anniversary. He suggested that we get together on the 22nd, and also asked if I knew the specific address of Steinbeck's house. I didn't but it's dangerous to throw a question like that at a librarian, so I had it within an hour.

On Wednesday he showed up at our house with his dog Ace, a giant mixed breed with a heart of gold. Ace and Yuji hit it off instantly. Donna stayed with the pups while John and I headed to Potter's in East Meadow for Irish food and brew. I asked him about the prize, and he said that he was a reporter in Philadelphia who had been given the task of writing about prisons and asylums. One prisoner he got to know was an 18 year old accused of murder in a robbery, serving a life sentence. John spent 6 months getting together enough information to force a retrial and, eventually, acquital. Later, he got a job driving all over America and reporting on what he saw.

John hopes to turn this into a book, and I have no doubt that he will succeed. Meantime, his first book is coming out later this fall - Dog, Inc., about the cloning of man's best friend. I read in his blog www.ohmidog.com that he made it to Sag Harbor, found the Steinbeck house, and paid his respects to Charley before heading off on the ferry. At dinner, I'd mentioned that he might meet another pilgrim on the ferry on the same mission. This actually happened.

          Another One!        
I'm sad to say that another Hamilton Op Shop is just about to bite the dust.
Gateway Op Shop in the city is going the same way that the Presbytarian Support shop directly across the road went last year.. Boo hiss! 
It's the demise of the traditional op shop model. I'll be gutted when there are only 'vintage' stores left. (although they do have a place too)


As I mentioned in this post a slight silver lining is that the Closing Down Sales are usually pretty amazing. My sister-in-law, Stan and I went to Gateway this morning. It's had a good sift through but there are always treasure waiting to be found! Especially if you're not too proud to rummage ! Hahaha.

There is still plenty there, and at 5c for the clothing, 10c for nearly everything else in store, you'd be silly not to get down there Hamilton peeps!!

I DID NOT buy any linen, which is pretty miraculous. Plus I had my sister-in-law beside me saying "NO, Linda, you DON'T need any more sheets!!" Doh.

You can't get much cheaper than that!

My favourite clothing scores.. Nature baby clothes for Stan, retro PJs for small kids, red tank for me and an AWESOME GENUINE vintage Frankton tee. I love Frankton, which for non-Hamiltonians is the suburb in Hamilton that has LOADS of oppies, and continues to get more.. 

Made in Germany.
Cake Plate.



Happy (but sad) Days. 






          Key Factors In high risk merchant accounts - Updated        
He denies any knowledge of the charge and she calls up to dispute the charge. This method allows you to key in the consumers information, which is bundled with a payment gateway that enables you to process a credit card transactions over the internet. The other payment processing system is through the credit card interchange, which in essence is the clearing process of credit card transactions.
          Surin        
The province of Surin is 450 km from Bangkok and 200 km from Korat, the gateway to Issan. The Mun River borders to the North and the Dongrek Mountain Chain to the South on the border with Cambodia. The town of Surin is generally a quiet town and is said to represent an intersection of […]
          Comment on 「あれ?」と思ったら、確認する。【小さな成長177】 by k.sasaki        
読者に誤解を与えるような気がしたので、敢えて補足させて頂きます。 インターネットサービスを利用する側(一般ユーザー)の視点から 分散型サービス拒否(DDoS)攻撃とは、ウィルスに感染したパソコンや不正アクセスされたサーバーが攻撃者の言いなりの状態になり、踏み台として攻撃者の命令で送信元情報を改ざんして、特定のサーバーに対して大量にアクセスすることを指します。 自分が加害者にならないように気を付けるべきことはしまぷー様が書かれているように、こまめにパソコンのOSやインストールされているソフトをアップデートしたり、ウィルスチェックすることです。 ただ、「サーバーの管理をしっかりする」はあまりにも大雑把すぎますw サーバー管理者は自分のサーバーが不正アクセスされないよう、パソコンと同じようにアップデートを行うのももちろんですが、セキュリティを強化したり、不正アクセスの形跡がないかログをこまめにチェックしたりすることも必要です。 インターネットサービスを提供する側(ウェブサイトを提供、管理する人)の視点から 自分のサーバーが攻撃されないように、Googlebotの使用しうるIPアドレスを「ホワイトリスト化」することがいちばん手っ取り早いでしょう。 詳細は以下のブログに紹介されています。 http://www.gateway.co.jp/ja/2014/08/%E5%81%BD%E8%A3%85%E3%81%97%E3%81%9Fgoogle-bot%E3%81%AEddos%E6%94%BB%E6%92%83/ ただ、上記のブログには「TCP系のDDoSはほとんどのケースでソースIPを偽装するので、たとえGoogle自身が言うようにIPをhostで検索して「googlebot.comに入っている」と分かっても、そもそもそのIPが(本当にDDoS攻撃されているなら)fakeされているので、この方法では本当にgoogleのクローラーなのかどうか判断できません。」と書かれていますが、サービス拒否系の攻撃では通常送信元IPアドレスを存在しない(応答を返さない)IPアドレスに指定するのが常識です。 もし、GooglebotのIPアドレスを送信元として指定しているとしたら、TCPの3ハンドシェイクでGooglebotから応答が返され、攻撃は失敗するはずです。 なぜなら、応答がない場合、応答待ちのTCPセッションでサーバーのリソースが食いつぶされ、正常なウェブページのリクエストに応答する余力がなくなるからです。 応答が返ってくる場合、サーバーは直ちに対象のTCPセッションが確立が不能かを判断でき、本来の送信元でない場合はセッションを破棄してリソースが空くため、この方法だとサーバーのリソースを食いつぶすには効率が悪すぎるのです。
          Gimme 5 with Todd Haug of Surly Brewing        
I'm thinking Gimme 5 will be a once a month thing. September is compliments of master brewer and super shredder Todd Haug. Not only can he write great music, he also has Surly coiled like a snake and ready to strike. "Hell" is coming....

BT: Congrats, you have a new Brewery under construction. Tell us a bit how Surly has grown and how much more "Hell" you'll be able to brew.

TH: Thanks Dave! Can't wait to have one of your bands play there! Eight years in and we've been adding new production equipment and staff every year. In 2014 we are brewing at 42,000 BBLs annual production. With new brewery in addition to existing brewery, which we are keeping,we should be able to produce 65,000 BBLs in 2015. Regarding Hell production we can make 720 BBL batches at the new plant compared to our current 64 BBL (we are brewing about 90 BBLs/week of Hell currently). But,Hell takes longer to produce so until we get more fermenters at Surly MSP next spring we'll be limited to about 360 BBLs/wk of Hell production :-)

BT: Your gateway beer?
TH: Early teenage years-
PBR,MGD
17+...I blame my band mates in Powermad, especially Jeff Litke.
Anchor Liberty Ale
Sheaf Stout
Pete's Wicked Ale-when it had Pete the dog on the label
Summit Great Northern Porter
"Rare" keg of Samuel Adams Boston Lager at my 21st BDay party

BT: Brewing mentor?
Jon Lindberg-former Summit Brewing
Dick Cantwell-Elysian Brewing

BT: Preferred brewing soundtrack?
TH: METAL! GoatWhore, High on Fire, 1349, Amon Amarth, Municipal Waste, Opeth, Bloodbath, Cannibal Corpse, ETC! METAL and some EDM for a change.

BT: What's on deck for new beer styles/collaborations?
TH: EIGHT-Oat-Wine in Rye Whiskey Barrels out this fall
First ever Barrel Aged Darkness, 30K bottles going out end of October kicking it off with 2 big metal shows October 24 & 25th.
SOOO many ideas that I haven't been able to realize since being maxed out! Next year!
But a few.....
Draft only No Hop Saison brewed with Dandelion greens,on tap now
Draft only-Licorice Porter for Uncle Acid and the Dead Beats first show in  MSP, Oct.1st.
1349 Black Ale collab with 1349, Lervig and Surly out in bottles late this fall!
Stone Berlin 2016
More I can't discuss yet.......
ww.surlybrewing.com




          MEKONG        
I can't believe I haven't written about this Richmond, VA jewel already. Mekong has won best craft beer bar in the nation two years straight (www.craftbeer.com) and the vote is coming up again. I'm hoping for a Threepeat 'cause this place is so special. The sickest beer selection, great staff, great food and amazing patrons. An amazing spot to learn about new beer styles and meet new people who are very enthusiastic about beer without any type of attitude. 
An Bui, the Chief Beer Officer is one of the greatest hosts of all time, as his knowledge and passion for beer is conveyed through generosity, finding those gateway beers for countless people.  A truly one of a kind experience/must visit destination. 
Monday Night all 50 taps are only $5...even Abbaye De Saint Bon Chien, which is on tap all year long!
Here, Beer is truly The Answer and be sure the try the Mekong Chicken Wings ;)
www.mekongisforbeerlovers.com


          Tired Hands Brewing        
This small batch brewery in Ardmore, PA specializes in awesome. With a focus on farmhouse style, Saisons, Sours and a love for hops (think IPA Wrestlemania), all the beers here scream excellence. I have not had a bad beer from them. Tired Hands stands in a class of their own with all their beer having its own character among a sea of breweries who have similar idea. The pub itself has an ever changing beer and food menu to keep anyone coming back. TH is in my opinion, also a gateway for change, as I've seen many non beer folk converted within its halls. There is truly something here for everyone and if you haven't been already, pack your bags now. Cheers to TH for creating something simple, special and initiating change for beer drinkers. 
**A Tsunami of people flooded the pub upon the opening of their two year release party this past weekend, reaching capacity in just four minutes. 
www.tiredhands.com





          What Can You Do With a Healthcare Management Degree? The Business Behind the Medicine        
A degree in healthcare management could be your ticket to the career path of which you’ve always dreamed. But what can you do with a healthcare management degree? Plenty! A healthcare management degree is your gateway into the rewarding field of medical and health services management.
          The 29 Palms Inn        

 




The 29 Palms Inn on The Oasis of Mara surrounded by the vast Mojave Preserve is a special collection of guest rooms and desert bungalows that I'd highly recommend as your gateway to Joshua Tree National Park. We only spent one night here but I found myself longing for a little more time. A light breakfast is included, the pool bar serves fun cocktails as well as dinner every evening until 9pm, and they will even pack you a sandwich, fruit, chips + cookie lunch to take on your Joshua Tree adventures. This place felt incredibly sacred with a hint of mystery + magic, not unlike Joshua Tree itself. 

29 Palms Inn
73950 Inn Avenue
Twentynine Palms, CA 92277

          All the best mobile accessories, now for your Chromebook        

Chromebooks are blurring the line between desktop and mobile with the launch of Google Play store on Chromebooks. Our latest Chromebooks were built from the ground up with this technology. But until now, it wasn’t possible to appreciate the full range of experiences Android Apps can offer.

After extensive user research and market analysis, we’re excited to introduce a line of mobile accessories for Chromebooks. We’ve thoughtfully adapted your favorites to capitalize on larger screens and convertible form factors. Here’s a sneak peek at a few highlights:

1. Chromebook Groupie Stick

selfiestick.jpg

For mobile photography lovers, nothing beats a selfie stick for the perfect shot. But on a tiny phone display, it’s sometimes hard to fit the whole group. To take advantage of beautiful, high-resolution displays, as well as great photo editing apps, we’ve carefully engineered the first Chromebook-sized selfie stick. Never again will you miss the perfect groupie.

2. Chromebook Cardboard

cardboard.jpg

In collaboration with the Cardboard team, we’re bringing you a new, immersive VR accessory—Cardboard for Chromebooks. Just as affordable and just as mobile, this new version of Cardboard is your gateway to larger-than-life experiences wherever you go. Stay tuned for all the specs so you can turn any large appliance or pizza box into your own Cardboard device.

3. Chromebook Workout Armband

armband.jpg

For the dedicated athlete, we’re introducing the Chromebook Workout Armband for all your fitness needs. Giant media buttons make it easier than ever to skip songs without taking a pause, and music apps let you take your music offline wherever you go. Whether you’re out for a run or in the gym, this armband allows you to really go big with your workout.

Keep an eye on the Google Store for these products and more. The next generation of Chromebooks is here, and we can’t wait to bring you all the accessories to make them the ultimate mobile devices.

Update: April Fools! These accessories aren't real, although we're always working on new ways to make Chromebooks more useful on the go. 😉


          Free at last ... maybe not        

KDE Project:

Afer a few months of really bad working atmosphere (see blogs.kde.org/node/2523)
and some of legal stuff, I thought all of this was over until yesterday
when the fruitcase called me to ask me to join his new venture, offer
which I naturally refused. I just have to say he didn't liked this answer,
I have a few recorded voicemails as proof of this :(

On brighter side, since I didn't got fully paid for all the work I did
for him, the court decided that I was the owner of the code I wrote.
Now I'm currently reviewing all of it to see what could be reused if I decide
to start my own company (still a work in progress) and what can (this is a huge if)
be opensourced. One thing that come to mind is a CANOpen to jabber gateway and
a nice CANOpen ioslave. There a few other things that could be interesting but
they are incomplete and need specilized hardware ...

Slowly I think I will be able to be myself back on the track and start to have fun
again programming :D

And I must also add that the new theme of kdedevelopers is nice.


          Apologies for the site problems        
This is just a quick blog post to apologize for the current appearance of the NT Gateway. It looks like someone has been experimenting with the site over at Logos and I’m in touch with them to find out what is happening as a matter of urgency. Hope to have the normal service resumed as […]
          Ancient World Mapping Center        
I was about to show one of my favourite maps in class the other day, of the Expansion of the Empire in the Age of Augustus, and the link here on the NT Gateway returned an error. So when I got back to my office, I went in search of the page at the Ancient […]
          NT Greek Resources        
New on the Greek NT Gateway Computer Software page: NT Greek Resources By Danny Zacharias. New site (released 2012) providing multimedia resources for learning New Testament Greek including the ParseGreek app for mobile platforms. Some free materials, some with small fees.
          Developing behavior extensions for InfoSphere MDM        
One of the most fundamental extension mechanisms of InfoSphere Master Data Management (MDM) allows for the modification of service behavior. These extensions are commonly referred to as behavior extensions, and the incredible flexibility they provide allows for organizations to implement their own "secret sauce" to the 700+ business services provided out of the box with InfoSphere MDM. The purpose of this tutorial is to introduce you to behavior extensions and guide you through the implementation, testing, packaging, and deployment of these extensions. You will be introduced to the Open Service Gateway initiative (OSGi)-based extension approach in InfoSphere MDM Workbench Version 11.
          HDR-1800T Smart 320GB Freeview+ HD Digital TV Recorder        
HDR-1800T Smart 320GB Freeview+ HD Digital TV Recorder

HDR-1800T Smart 320GB Freeview+ HD Digital TV Recorder

The Humax HDR-1800T is a set top box (STB) that receives all Free to Air HD digital TV channels via the Freeview service it is a DTR (digital television recorder), bursting with recording, multimedia, home-networking and on-demand services for the ultimate subscription-free TV experience. Simply plug the HDR-2000T into your HD-ready TV to enjoy ten high definition (HD) channels, as well as access to up to 50 Freeview standard definition TV channels and 24 radio channels. Freeview HDFreeview is a free television service that delivers over 50 TV Channels, and 24 digital radio channels via a terrestrial TV aerial. You receive these TV/radio signals from your aerial via equipment that has the Freeview digital tuners built inside like TV’s and set top boxes. The Freeview+HD service delivers 10 HD Channels including: BBC One HD, BBC Two HD, ITV 1HD and Channel 4. Hours of recordingWith the Humax Freeview HDR-1800T 320GB you can record up to 200 hours of standard definition (SD) TV programmes or up to 80 hours of high definition (HD) TV, which can be selected from an easy to view electronic programme guide (EPG). 8 day plannerThe 8 day EPG allows you to plan your future viewing, by using the remote control you can simply highlight the channel and show you wish to record and press the record button. Smart featuresThe Humax TV Portal is your gateway to BBC iPlayer and YouTube. Simply connect the HDR-1800T to your home broadband connection, either by Ethernet cable directly or via powerline adaptors or the optional Humax wireless dongle, additional services to be added in the future. More mediaThe HDR-1800T 320GB offers exciting multimedia and home networking capabilities when connected to the internet via the Ethernet, making it the hub of any home. Play media content including photos, videos and MP3s directly onto your TV using a memory device in the USB port, or connect it to PCs or laptops around the home through your home router. Easy setup Once you've removed the HDR-1800T 320GB from its box, set up is quick and very easy. Every box comes with an HDMI cable for perfect digital transmission of HD pictures and sound.


          Bastille Day Drinks        

July 14th is a very special day if you’re French (or have a taste for things like stinky cheese and black berets). It’s Bastille Day, the day that France celebrates its independence from the tyranny of monarchy. Kind of like our 4th of July, but with guillotines.

Most importantly of all, it’s a great excuse to bust out your favorite French liqueurs and spirits. Without a tipple or two, Bastille Day wouldn’t be very fun! Here are some of our favorite French drinks to enjoy -- as they say in Paris, chin chin!

Pastis de Marseilles

Marseilles is the belle of the South. Famous for being the gateway to the lavender fields and rugged mountains of Provence, its painted yellow houses and ancient port, this city on the glamorous Cote d’Azur is home to the legendary Pastis. This is an herbal spirit primarily derived from Anise seed. It has a gorgeous brown-amber color and is served in a tall, thin glass filled with ice. Once the liqueur makes contact with the ice it turns cloudy gray, and it makes for a refreshing, liquorice-flavored libation. For maximum Frenchness, we suggest you enjoy your Pastis de Marseilles while playing petanque, the French pastime equivalent to baseball. You can find Pastis at Liquor Barn.

Champagne

Surely you don’t need an introduction to the world’s most famous, most sought-after bubbly? Champagne hails from the region northeast of Paris, near the border with Belgium. The rolling chalk hills of the countryside here are perfect for growing the grapes that become the fizzy whitish-yellow wine most commonly associated with weddings, winning the World Series, and other major celebrations (like Bastille Day). You can find Champagne at Liquor Barn.

Elderflower Liqueur

If you want to make a cocktail that oozes sophistication, savoire faire, and other French terms for know-how and cool, you need Elderflower liqueur. A good one to start with is the French Blonde, a drink that is honeyed in its sweetness with just a spritz of citrus thanks to grapefruit juice and lemon bitters. Don’t forget a fancy stemmed glass to serve this one with. You can find St Germain and other Elderflower liqueur at Liquor Barn.

Chartreuse

There’s French, and then there’s made in a single monastery in the French Alps for the last 250 years French. Chartreuse is the namesake for that distinct color of green that you see on a lot of dresses in the summer. It’s also a name for a complex liqueur derived from 130 different herbs and plants, many of them unique species that grow only in the Alpine region of eastern France. It has a strong vegetal taste, so it’s generally not recommended you drink it straight. On the other hand, it makes a great complement to cocktails. The Beauty Spot, which combines gin, red vermouth, and green chartreuse, is a classic way to experience this uniquely French alcohol. You can find Green Chartreuse at Liquor Barn.


          Why China Matters for San Francisco’s Economy        
One of San Francisco’s strengths is that it is an international “gateway” City. The same ethnic and cultural diversity that we value so much as part an parcel of San Francisco’s urban fabric is also one of the City’s greatest economic assets. We live now in a truly global economy and those cities that help
          Sistema radiofrecuencia Bisecur        

¿Le gustaría controlar de forma centralizada la puerta de su garaje o cancela y otros dispositivos sin tener que moverse del sofá? En Chipdigitalsl le ofrecemos soluciones inteligentes para su máxima comodidad. Sistema de radiofrecuencia Bisecur. Con el sistema BiSecur Gateway podrá manejar sus automatismos, puertas de entrada y otros dispositivos en todo momento y […]

The post Sistema radiofrecuencia Bisecur appeared first on Chipdigital | Puertas Automaticas | Hormann.


          Asterisk 1.6.1 on openSUSE 11.1 (Part 5)        
I will explain a bit more deeper about Asterisk configuration in this post, some trick and useful configuration that I found really helpful in configuring asterisk instalation. Asterisk developer really did a good job to make a complete PBX, they give the best tools to us and now it is our job to configure it.

One thing I found really annoying is the echo if we connect asterisk to PSTN line. I use digium TDM 410P and leave the card without tune it will give annoying echo. In my earlier post (Part 2) I explain that by running /usr/sbin/dahdi_genconf dahdi will automatically create /etc/dahdi/system.conf file that already contain information about hardware echo canceller. First thing you should remember if you have the budget is buy a card with hardware echo canceller. It will let the card to manage the echo without give the processor too much task to reduce it. After that you should tune the card. Luckily Digium give the best tools to tune the card named fxotune. To tune your card first shutdown the asterisk service and then run:

# /usr/sbin/fxotune -i 0

I put 0 (zero) because to dial an outside line I set the asterisk configuration to use 0. You should change it to whatever number you use. fxotune will create /etc/fxotune.conf file to put all the configuration it creates to reduce the echo. Pleas read "man fxotune" for more explanation about the tools.

To enable Asterisk to use the card configuration every time we boot the server we need a slight modification of init script. We should call the fxotune before we call Asterisk, you can either modify the init script of Asterisk to call fxotune before it call the Asterisk or you can modify /etc/init.d/after.local (yes, I use openSUSE). I prefer to use after.local. Create /etc/init.d/after.local and fill the lines below:

# ! /bin/sh

/usr/sbin/fxotune -s
sleep 1
/etc/init.d/asterisk161 start

Also you need to remove asterisk service from init script

# insserv -r /etc/init.d/asterisk161

You can boot the server and hear the difference. If everything goes well you can hear no echo :-)

Now let's take a look back to our extension.conf that I already give in the part 3.

[recordings]
exten => 500,1,Answer
exten => 500,2,Playback(en/silakanrekamgreeting)
exten => 500,3,Record(en/mymessage:gsm)
exten => 500,4,Playback(en/pesananda)
exten => 500,5,Playback(en/mymessage)
exten => 500,6,Playback(en/tekan1)
exten => 500,7,WaitExten(3)
exten => t,1,Playback(en/maafmohonulangi)
exten => t,2,Goto(500,5)
exten => i,1,Playback(en/pesanandasalah)
exten => i,2,Goto(500,5)
exten => 1,1,System(/bin/mv /var/lib/asterisk/sounds/en/mymessage.gsm /var/lib/asterisk/sounds/en/autoattendant.gsm)
exten => 1,2,Playback(en/terimakasih)
exten => 1,3,Playback(en/tekan3)
exten => 2,1,Goto(500,1)
exten => 3,1,Goto(500,1)
exten => 4,1,Hangup
include => internal-sip

This is the context about recording that we put it in extensions.conf and also in sip.conf, that's why I put "include => internal-sip" in the bottom of the context. We create the special extension 500 to record the greeting for our system. We will put the record as greeting, when someone from outside call our lines, then Asterisk will play this greeting. I will explain it to you don't worry :-). Those lines means:

If dial 500 then answer.
Play the sound file /var/lib/asterisk/sounds/en/silakanrekamgreeting.gsm. You can record a custom sound file which contain something like "Please record your greeting after the beep", save it as gsm format and call it from here.
Record your message (say the greeting you want to record) and put it as /var/lib/asterisk/sounds/en/mymessage.gsm
Play the file /var/lib/asterisk/sounds/en/pesananda.gsm. You can record a custom sound file which contain something like "Your greeting is", save it as gsm format and call it from here.
Play your record greeting that just you record in step 3.
Play the sound file /var/lib/asterisk/sounds/en/tekan1.gsm. You can record a custom sound file which contain something like "Please press 1 to save your message", save it as gsm format and call it from here.
Wait 3 second for pressing 1
t,1 means that if 3 seconds already time-out then play the sound file /var/lib/asterisk/sounds/en/maafmohoulangi.gsm. You can record a custom sound file which contain something like "Please re-record your message", save it as gsm format and call it from here.
t,2 go to point 6 above and repeat the steps.
i,1 means if you press another number in step 7 (you don't record the message) then play the sound file /var/lib/asterisk/sounds/en/pesanandasalah.gsm. You can record a custom sound file which contain something like "Sorry I didn't get that", save it as gsm format and call it from here.
i,2 go to point 6 above and repeat the steps.
1,1 if you press 1 in step 7 then asterisk will move /bin/mv /var/lib/asterisk/sounds/en/mymessage.gsm to /var/lib/asterisk/sounds/en/autoattendant.gsm
1,2 means play the sound file /var/lib/asterisk/sounds/en/terimakasih.gsm. You can record a custom sound file which contain something like "thankyou", save it as gsm format and call it from here.
1,3 means play the sound file /var/lib/asterisk/sounds/en/tekan3.gsm. You can record a custom sound file which contain something like "press 3 to record another message", save it as gsm format and call it from here.
include => internal-sip, means that asterisk will see also [recording] context in [internal-sip] context, usually we manage [internal-sip] in sip.conf.
Now ti's time to configure /etc/asterisk/sip.conf. This file manage the sip for ip phone and other peripheral in our setup. I use several desk ip-phone, wireless ip-phone (Polycom Kirk DECT) and also GSM gateway (Zed, Musitel etc), all of it running well. My sip.conf looks something like:

[general]

port = 5060
bindaddr = 10.7.1.120
disallow=all
allow=all
allow=ulaw
allow=gsm
context=internal-sip

;--------------------xxxxx site ---------------------------

;Polycom IP330

[8001]
type=friend
host=dynamic
dtmfmode=rfc2833
language=en
context=internal-sip
nat=no
canreinvite=no
username=TELEPH01
userid=8001
callerid=TELEPH01 <8001>
mailbox=8001
allow=all
qualify=yes

[8002]
type=friend
host=dynamic
dtmfmode=rfc2833
language=en
context=internal-sip
nat=no
username=TELEPH02
userid=8002
callerid=TELEPH02 <8002>
mailbox=8002
allow=all
qualify=yes

[8006]
type=friend
host=dynamic
dtmfmode=rfc2833
language=en
;context=internal-sip
context=recordings
nat=no
canreinvite=no
username=TELEPH06
userid=8006
callerid=DPTELEPH06 <8006>
mailbox=8006
allow=all
qualify=yes

; KIRK DECT 3040 at site

[8020]
type=friend
host=dynamic
dtmfmode=rfc2833
language=en
context=internal-sip
nat=no
username=TELEPH20
userid=8020
callerid=TELEPH20 <8020>
mailbox=8020
allow=all
qualify=yes

;Zed GSM GATEWAY

[8031]
type=peer
insecure=very
disallow=all
allow=ulaw
allow=alaw
allow=gsm
context=internal-sip
host=10.7.1.31
username=GS8
permit=10.7.1.31/255.255.255.255
qualify=yes
canreinvite=no
call-limit=4
dtmfmode=rfc2833
nat=no

[8032]
type=peer
insecure=very
disallow=all
allow=ulaw
allow=alaw
allow=gsm
context=internal-sip
host=10.7.1.32
username=GS8
permit=10.7.1.32/255.255.255.255
qualify=yes
canreinvite=no
call-limit=4
dtmfmode=rfc2833
nat=no

[8001] and [8006] are the desk ip-phone, [8020] is wireless ip-phone, and [8031] and [8032] are Zed gsm gateway. Please pay attention to [8001] and [8006] almost all the configuration are same, except one line.context. For 8001 context=internal-sip but 8006 context=recording. This line tell us that for recording / greeting purpose we will use the phone with extension 8006. So we can only dial 500 and do the recording in that phone as we set it in /etc/asterisk/extension.conf. You cannot dial 500 and do recording in the phone with the sip configuration doesn't include the line context=recording. I hope you get it :-)

For gsm gateway, I set it up just like the other as internal-sip. But there are a lot of gsm gateways out there and every brand has their own configuration so please read the manual of your gsm gateway and set it up properly. You can use it in front of digium as fxo/fxs or you can also set it up as sip extension depend on you gsm gateway type.

Let's move to chan_dahdi.conf that I already attached several post earlier. Let me remind part of the file:

[channels]
language=en
context=internal-fxo
signalling=fxs_ks
rxwink=300
cidstart=polarity
answeronpolarityswitch=no
hanguponpolarityswitch=no
pulsedial=no
cidsignalling=dtmf
busydetect=yes
busycount=6

......

echocanceller=mg2,1-12
channel => 1-12

there is line with "context=internal-fxo". Basically it means that all the channels 1 through 12 are in the context of internal-fxo. By doing this all the lines will follow the setup we already done in extensions.conf under context [internal-fxo], please take a look extensions.conf in earlier part. You got it, don't you :-) ?

Let me finish this asterisk session, 5 part seem not enough but I'm afraid this will make my blog so bore :-). So final notes is about iax.conf. If you have several locations with asterisk server in every location you can connect the server and make conversation like you dial an extension. First of all you should setup a VPN between the site. I presume you already now how to set it up, there are a lot of howto in internet. Then you should configure the iax.conf. I already give the example in previous post, let me explain. Take attention in this part:

[general]

bindport=4569
bindaddr=10.8.1.120

.......................

register => ncpabxsv:0000@10.1.1.120:4569
register => dppabxsv:0000@10.7.1.120:4569
register => ygpabxsv:0000@10.8.1.120:4569

This server address is 10.8.1.120 and the port 4569 use for the iax. We should register all the server including this server in the 3 lines at the bottom.

Also we should make the setup for every server like below:

[ncpabxsv]
type=friend
auth=md5
secret=0000
context=local
host=dynamic
defaultip=10.1.1.120
qualify=yes
requirecalltoken=no

[dppabxsv]
type=friend
auth=md5
secret=0000
context=local
host=dynamic
defaultip=10.7.1.120
qualify=yes
requirecalltoken=no

[ygpabxsv]
type=friend
auth=md5
secret=0000
context=local
host=dynamic
defaultip=10.8.1.120
qualify=yes
requirecalltoken=no

In all site with the asterisk server we should configure iax.conf so every server can be registered with each other. By doing this you can call other site with extension. Now take a look again our extensions.conf in this section:

[internal-sip]
exten => _1.,1,Dial(IAX2/ygpabxsv:0000@10.1.1.120/${EXTEN:1}@local)
exten => _1.,2,Hangup()
exten => _2.,1,Dial(IAX2/ygpabxsv:0000@10.7.1.120/${EXTEN:1}@local)
exten => _2.,2,Hangup()

Above lines means:

_1. --> if you start a call with "pressing 1 then follow by extension then you connect to asterisk server in ip address 10.1.1.120". 10.1.1.120/${EXTEN:1} means the asterisk server in ip 10.1.1.120 will stripe the first digit.
_2. --> if you start a call with "pressing 2 then follow by extension then you connect to asterisk server in ip address 10.7.1.120". 10.7.1.120/${EXTEN:1} means the asterisk server in ip 10.7.1.120 will stripe the first digit.
I think I already explain everything that you should know about how to setup and configure an asterisk server, make a conference room, setting up extension, and even connecting between two or more asterisk server using iax. Now it is your turn :-) You can experiment with my setting until you get used to it and try another configuration that match with what you want.

Don't forget to have a lot of fun.
          Asterisk 1.6.1 on openSUSE 11.1 (Part 4)        
medwinz note:

I got a bunch of email from Indonesian gentle readers about this topic, so I decide to write in Bahasa Indonesia for the Part 4. But don't worry google translate is there. Happy reading :-)

Pertama-tama terima kasih atas antusiasme rekan-rekan yang sudah nge-japri dan memberi komentar. Saya mohon maaf karena bagian ke-4 ini agak telat, namanya kuli harus tour of duty dan ngejar setoran :-)
Pada part 3 saya telah memberikan contoh extensions.conf, saya perlu menyertakan beberapa contoh file konfigurasi lain yang dibutuhkan agar penjelasan extension.conf bisa dimengerti. File-file tersebut adalah:

/etc/asterisk/chan_dahdi.conf
/etc/asterisk/sip.conf
/etc/asterisk/iax.conf
/etc/asterisk/meetme.conf
/etc/asterisk/voicemail.conf
Contoh chan_dahdi.conf:

;                                                                                                              
; dahdi_channels.conf configuration of digium card                                                             
;                                                                                                              
; Configuration file                                                                                           

[channels]

language=en
context=internal-fxo
signalling=fxs_ks  
rxwink=300             
cidstart=polarity       ; jangan ada line yang ngutang akan mengacaukan DTMF dan cid signalling

answeronpolarityswitch=no                                        
hanguponpolarityswitch=no                                        
;cidstart=ring           ; ini test saja                     
pulsedial=no                                                     
;useincomingcalleridondahditransfer=yes
cidsignalling=dtmf
busydetect=yes
busycount=6

usecallerid=yes
callerid=asreceived
hidecallerid=no
callwaiting=yes
usecallingpres=yes
callwaitingcallerid=yes
threewaycalling=yes
transfer=yes
cancallforward=yes
callreturn=yes
echocancel=yes
echocancelwhenbridged=no
echotraining=800
rxgain=3.0
txgain=0.0
group=0
callgroup=1
pickupgroup=1
immediate=no
faxdetect=no
group=1
disallow=all
allow=all

echocanceller=mg2,1-12
channel => 1-12

Contoh sip.conf:

[general]
port = 5060
bindaddr = 10.8.1.120
disallow=all
allow=all
allow=ulaw
allow=gsm
context=internal-sip

[9001]
type=friend
host=dynamic       
dtmfmode=rfc2833         
language = en            
context=recordings       
nat=no                   
username=YGTELEPH01                                               
userid=9001                                                       
callerid=YGTELEPH01 <9001>                                        
mailbox=9001                                                      
allow=all                                                         
qualify=yes                                                       

[9002]
type=friend
host=dynamic       
dtmfmode=rfc2833         
language = en            
context=internal-sip     
nat=no                   
username=YGTELEPH02                                               
userid=9002                                                       
callerid=YGTELEPH02 <9002>                                        
mailbox=9002                                                      
allow=all                                                         
qualify=yes

;tambahkan sesuai extension yang anda miliki

[9031]
type=peer
insecure=very
disallow=all
allow=ulaw  
allow=alaw  
allow=gsm   
context=internal-sip
host=10.8.1.31     
username=GS8       
permit=10.8.1.31/255.255.255.255
qualify=yes                    
canreinvite=no                 
call-limit=4                   
dtmfmode=rfc2833               
nat=no                         

[9032]
type=peer
insecure=very
disallow=all
allow=ulaw  
allow=alaw  
allow=gsm   
context=internal-sip
host=10.8.1.32     
username=GS8       
permit=10.8.1.32/55.255.255.255
qualify=yes                   
canreinvite=no                
call-limit=4
dtmfmode=rfc2833
nat=no

Contoh iax.conf:

; Inter-Asterisk eXchange driver definition
;                                         
; This configuration is re-read at reload 
; or with the CLI command                 
;       reload chan_iax2.so               
;                                         
; General settings, like port number to bind to, and
; an option address (the default is to bind to all 
; local addresses).                                
;                                                  
[general]                                          
bindport=4569            
bindaddr=10.8.1.120     
delayreject=yes
language=en   
bandwidth=high
disallow=all  
allow=ulaw    
allow=alaw    
allow=gsm     
jittertargetextra=40
jitterbuffer=yes   
dropcount=3        
maxjitterbuffer=300
minjitterbuffer=300
minexcessbuffer=200
mailboxdetail=yes                                                         
autokill=yes                                                              

register => ncpabxsv:0000@10.1.1.120:4569
register => dppabxsv:0000@10.7.1.120:4569
register => jbpabxsv:0000@10.9.1.120:4569

tos=0x10

[guest]
type=user
context=default
callerid="Guest IAX User"

;
; Trust Caller*ID Coming from iaxtel.com
;                                      
[iaxtel]                               
type=user                              
context=default                        
auth=rsa                               
inkeys=iaxtel                          

;
; Trust Caller*ID Coming from iax.fwdnet.net
;                                          
[iaxfwd]                                   
type=user                                  
context=default                            
auth=rsa                                   
inkeys=freeworlddialup                     

[ncpabxsv]
type=friend
auth=md5  
secret=0000
context=local
host=dynamic    
defaultip=10.1.1.120
qualify=yes        
requirecalltoken=no

[dppabxsv]
type=friend
auth=md5  
secret=0000
context=local
host=dynamic
defaultip=10.7.1.120
qualify=yes
requirecalltoken=no

[ygpabxsv]
type=friend
auth=md5
secret=0000
context=local
host=dynamic
defaultip=10.8.1.120
qualify=yes
requirecalltoken=no

[jbpabxsv]
type=friend
auth=md5
secret=0000
context=local
host=dynamic
defaultip=10.9.1.120
qualify=yes
requirecalltoken=no

Contoh meetme.conf:

[rooms]
;#include meetme_additional.conf

conf => 5000
conf => 6000
conf => 7000

Contoh voicemail.conf:

;                                          
; Voicemail Configuration                  
;                                          

;
; NOTE: Asterisk has to edit this file to change a user's password.  This does
; not currently work with the "#include " directive for Asterisk       
; configuration files, nor when using realtime static configuration.         
; Do not use them with this configuration file.                              
;                                                                            

[general]
format=wav
serveremail=asterisk
fromstring=Asterisk PABX
sendvoicemail=yes      
language=en            
operator=no            
envelope=yes           
attach=yes             
maxmsg=20              
maxsecs=180            
minsecs=6              
maxgreet=60            
skipms=3000            
maxsilence=5           
silencethreshold=128   
maxlogins=3                                                                                                            

emailbody=Anda mempunyai pesan baru                                                     

emaildateformat=%A, %d %B %Y at %H:%M:%S
mailcmd=/usr/sbin/sendmail -t          

sendvoicemail=yes ; Allow the user to compose and send a voicemail while inside
                           ; VoiceMailMain() [option 5 from mailbox's advanced menu].   
                           ; If set to 'no', option 5 will not be listed.               

[default]
; isikan sebanyak extension yang anda miliki

9001 => 9001,medwinz,,,attach=no
9002 => 9002,medwinz,,,attach=no

[zonemessages]
yogyakarta=Asia/Jakarta|'vm-received' Q 'digits/at' R

Desain yang saya buat ini secara sederhana digambarkan dalam diagram dibawah
Ip phones mempunyai extension 9001 sampai dengan 9027. GSM gateway diperlakukan sebagai sip extension dengan nomer extension 9031 dan 9032. Lihat file sip.conf. Bagaimana membuat agar sebuah ip phone mempunyai nomor extensi? Ini tergantung dari ip phone yang anda gunakan, untuk langkah awal anda dapat menset sebuah dhcp untuk kemudian setiap ip-phone akan mengambil sebuah ip. Biasanya didalam sebuah ip-phone sudah ditanam sebuah webserver yang dapat diakses dari browser untuk selanjutnya kita beri nomor extensi. Proses ini sering dinamakan provision. Favorit saya untuk mem-provisi ip-phone adalah dengan menset sebuah ftp server yang kemudian setiap ip-phone akan mendownload konfigurasi dari ftp server tersebut. Lebih lengkapnya silakan baca manual ip-phone anda.

Sekarang mari kita mulai membahas file extensions.conf. Yang penting diketahui bahwa dialplan itu terdiri dari beberapa context. Context ditandai dengan [...], misalnya [incoming], [internal-fxo], [internal-sip] dsb. Context ini saling berhubungan antara extensions.conf dengan file-file yang lain. Context akan mengatur perlakuan terhadap suatu incoming atau outgoing call oleh asterisk. Asterisk mengenal beberapa standard extensi yaitu:

i  : invalid
s : start
h : hangup
t : timeout
T : absolute timeout
a : asterisk extension
o : operator
Yang biasanya sering digunakan adalah:

s : start : apa yang harus dilakukan oleh asterisk kalau ada incoming call
i : invalid entry : apa yang dilakukan kalau entry yang dimasukkan salah
t : time out : apa yang dilakukan kalau timeout sudah lewat
Sekarang coba kita perhatikan syntax extensions.conf berikut:

 [internal-fxo]
 exten => s,1,Answer
 exten => s,2,Wait(1)
 exten => s,3,Background(en/autoattendant)
 exten => s,4,WaitExten(2)      

Maka artinya kurang lebih adalah untuk context internal-fxo kalau ada telepon yang masuk maka yang harus dilakukan oleh asterisk adalah:

dijawab (diangkat) --> s,1,Answer
tunggu selama 1 detik --> s,2,Wait(1)
jalankan di latar belakang file /var/lib/asterisk/sound/en/autoattendant.gsm --> s,3,Background(en/autoattendant)
tunggu input keypad selama 2 detik --> s,4,WaitExten(2)
Mudahkan? ;)

Asterisk mempunyai beberapa aplikasi yang bisa dipanggil melalui extensions.conf yang saya gunakan di sini adalah VoiceMail yaitu aplikasi untuk meninggalkan pesan jika telepon tidak diangkat atau sibuk, meetme untuk melakukan conference call (percakapan dengan peserta lebih dari 2 orang), dan Monitor untuk merekam suatu percakapan ke dalam file. Mari kita lihat contoh extensions.conf:

[internal-fxo]

............

exten => 5000,1,MeetMe(5000)            
exten => 6000,1,MeetMe(6000)            
exten => 7000,1,MeetMe(7000)

Perhatikan juga contoh meetme.conf:

[rooms]
;#include meetme_additional.conf

conf => 5000
conf => 6000
conf => 7000

Kita telah mendefinisikan 3 ruangan untuk melakukan konferensi yaitu extensi 5000, 6000, dan 7000. Kemudian pada context [internal-fxo] di extensions.conf kita definisikan bahwa user yang mengakses extensi 5000, 6000 dan 7000 akan masuk ke ruangan konferensi. Mudahkan ;). Perlu diketahui bahwa ruangan konferensi ini tidak hanya bisa diakses oleh extensi lokal tetapi juga dari telepon di tempat lain, baik voip, GSM, atau PSTN. Misalnya kita ingin mengajak rekan kita yang kebetulan sedang diluar kantor untuk ikut meeting, maka kita dapat menghubungi handphonenya dan selanjutnya kita transfer ke 5000, 6000 atau 7000.

VoiceMail cukup mudah untuk dikonfigurasi jika kita menginginkannya. Ada beberapa flag yang digunakan untuk mengatur VoiceMail yaitu:

s : jika diberikan akan membuat pesan "Please leave your message after the tone. When done, hang up, or press the pound key" tidak dimainkan
u: jika diberikan akan memutar pesan "The person at extension ... 1234 ... is unavailable"
b: jika diberikan akan memutar pesan "The person at extension ... 1234 ... is busy"
Kita dapat mengkombinasikan flag tersebut misalnya:

su : pesan unavailable akan diputar tetapi pesan instruksi tidak
sb :  pesan busy akan diputar tetapi pesan instruksi tidak
u : pesan unavailable akan diputar dilanjutkan dengan pesan instruksi
b : pesan busy akan diputar dilanjutkan dengan pesan instruksi
Pada context [incoming] di extensions.conf saya mendefinisikan:

exten => _XXXX,1,Answer
exten => _XXXX,2,Dial(SIP/${EXTEN},${RINGDELAY},t)
exten => _XXXX,3,Voicemail(${EXTEN}@default,u)   
exten => _XXXX,4,Hangup()                        
exten => _XXXX,103,Voicemail(${EXTEN}@default,b) 
exten => _XXXX,104,Hangup
Maksudnya kurang lebih adalahkalau ada yang men-dial extensi XXXX (sesuai dengan yg telah didefinisikan di sip.conf) misalya 9001 maka:

jawab
dial extension selama 20 detik (ini ditentukan pada context [globals] RINGDELAY => 20), kalau sudah lewat 20 detik maka
putar pesan unavailable dilanjutkan dengan instruksi untuk menyimpan pesan.
hangup
jika nada sibuk, putar pesan sibuk dilanjutkan dengan instruksi untuk menyimpan pesan
hangup
Pesan yang masuk akan disimpan pada /var/spool/asterisk/voicemail/context/boxnumber/INBOX. Misalnya dalam kasus di atas maka :

context = default, sesuai  exten => _XXXX,3,Voicemail(${EXTEN}@default,u)
boxnumber adalah mailbox untuk nomer extensi tertentu, misalnya untuk extensi 9001 kebetulan saya set mailbox=9001 sama dengan nomor extensinya. Lihat file sip.conf di atas.
maka jika penelpon menelpon 9001 dan meninggalkan voicemail maka lokasi penyimpanannya pada /var/spool/asterisk/voicemail/default/9001/INBOX
Kita bisa menyimpan semua percakapan yang terjadi melalui asterisk dengan memanfaatkan aplikasi Monitor. Tentu saja untuk mengkonfigurasinya anda harus menanyakan policy mengenai hal ini kepada pemilik jaringan/asterisk di mana anda memasangnya. Karena hal ini berhubungan dengan privacy. Ada beberapa hal yang sebaiknya diperhatikan dalam mensetup Monitor, standar styntax adalah sebagai berikut: Monitor(ext,basename,flags). Penjelasan sederhananya adalah sebagai berikut:

ext : format sound file, defaultnya adalah .wav
basename : dalam contoh saya menggunakan Call-${CALLERID(num)}-${EXTEN}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S, ini akan mengakibatkan file disimpan dengan nama misalnya Call-8001-02125558785-20091222-161031.wav dimana 8001 adalah nomer extensi, 02125558785 adalah nomer yang dituju, 20091222 adalah tanggal-bulan-tahun, 161031 adalah jam-menit-detik. Demikian juga kalau incoming call, kalau anda berlangganan CID maka asterisk bisa membaca asterisk yang masuk, tetapi sekiranya anda tidak berlangganan CID maka incoming call akan disimpan dengan nama misalnya Call- -8019-20091222-122545.wav
m : adalah flag yang bila digunakan maka asterisk akan memanggil program diluar asterisk untuk mengkombinasikan dua buah sound file, in dan out, ke dalam sebuah file. Program yang dipanggil adalah sox. Kadang-kadang sox tidak bisa mengenali dan menggabungkan format sound (alaw) akibatnya seringkali kita menemukan untuk sebuah percakapan masih terdapat dua buah file, in dan out. Misalnya : Call-8019-723964-20091222-151827-in.wav dan Call-8019-723964-20091222-151827-out.wav
Untuk mengaktifkan Monitor tidaklah sulit, sebagai contoh perhatikan lagi file extensions.conf:

[internal-fxo]

.......

exten => _XXXX,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m) 
exten => _XXXX,2,Dial(SIP/${EXTEN},${RINGDELAY},t)                                                  
exten => _XXXX,3,Voicemail(su${EXTEN})                                                              
exten => _XXXX,4,Hangup()                                                                           
exten => _XXXX,103,Voicemail(sb${EXTEN})                                                            
exten => _XXXX,104,Hangup()

Maksud dari baris ini:

untuk extensi xxxx, rekam percakapan dengan format Call-no.extensi-tanggal-jam
dial extensi xxxx dan dering selama 20 detik (masih ingat ya, yang diatas)
kalau lewat 20 detik maka aktifkan voicemail
kala nada sibuk aktifkan voicemail
hangup
Hmm... banyak juga ya. Mudah-mudahan tidak memusingkan. Masih ada beberapa hal di dalam extensions.conf yang akan saya jelaskan misalnya bagaimana mengkoneksi asterisk server di lokasi lain, bagaimana merekam pesan (recording untuk greeting), dan terutama pengaturan context yang berkaitan dengan channel dahdi dan sip.conf. Ada baiknya kita sudahi dulu, silakan diendapkan dan dibawa mimpi :-). Kita lanjutkan di tulisan berikutnya.

Stay tuned and have a lot of fun :-)


          Asterisk 1.6.1 on openSUSE 11.1 (Part 3)        
To enable asterisk to communicate with PSTN lines we should have either a VOIP-PSTN gateway or FXO card. I will not explain about VOIP-PSTN gateway, there are some service providers out there who provides this service for their customers. In my work I use Digium TDM 410P with 4 FXO port per card. There are some alternatives in the market like Sangoma, Rhino, etc, the important is we should make sure that it works with Asterisk either with dahdi driver or zaptel/zapata driver. Also if possible select the card that already has hardware echo-canceler. Echo is a problem in voip communication, and if you have card with no echo-canceler than your server CPU will busy do the job.

Just remember that Digium cards are no longer use zapata driver, and some changes has been made to the configuration file name and location, /etc/zaptel.conf become /etc/dahdi/system.conf and /etc/asterisk/zapata.conf become /etc/asterisk/chan_dahdi.conf

In the client site you can use any SIP client hardwares or softwares. Ekiga and Emphaty are the good choice for you who prefer GTK libraries and KCall and KPhone are for you who prefer Qt libraries. IP phone hardware now widely available in the market from cheap to high price, you can select any brand as long as it compatibles with Asterisk. In this project I choose Polycom IP-330, I also used Grandstream and Aastra in other implementation. In this implementation the owner also ask me to use Polycom KIRK Wireless Server 600V3 with Polycom DECT Handset 3040.

Now the time for the dialplan, extensions.conf, which is the core of asterisk implementation, as an example let me introduce you with my configuration. It is a good habit to always backup default asterisk configuration, and start the new configuration from the scratch.

My extensions.conf is:

; extensions.conf - the Asterisk dial plan
; Created by M. Edwin Z for xxxxxxxxxxxxxxxx
; medwinz@gmail.com                        
;                                                           
; Static extension configuration file, used by              
; the pbx_config module. This is where you configure all your
; inbound and outbound calls in Asterisk.                    
;                                                            
; This configuration file is reloaded                        
; - With the "dialplan reload" command in the CLI            
; - With the "reload" command (that reloads everything) in the CLI
;                                                                

[general]
 static=yes
 writeprotect=yes
[globals]
 RINGDELAY => 20
 DYNAMIC_FEATURES => automon 
[incoming]
 exten => s,1,Answer
 exten => s,2,Background(en/greeting-indonesia)
 exten => s,3,Hangup()                    

 exten => h,1,Hangup()

 exten => 9999,1,VoiceMailMain()
 exten => asterisk,1,VoicemailMain()

 exten => 5000,1,Set(CHANNEL(language)=en) ; conference 1
 exten => 5000,2,Meetme(5000)                           
 exten => 5000,3,Hangup                                 

 exten => 6000,1,Set(CHANNEL(language)=en) ; conference 2
 exten => 6000,2,Meetme(6000)                           
 exten => 6000,3,Hangup                                 

 exten => 7000,1,Set(CHANNEL(language)=en) ; conference 3
 exten => 7000,2,Meetme(7000)                           
 exten => 7000,3,Hangup                                 

 exten => _XXXX,1,Answer
 exten => _XXXX,2,Dial(SIP/${EXTEN},${RINGDELAY},t)
 exten => _XXXX,3,Voicemail(${EXTEN}@default,u)   
 exten => _XXXX,4,Hangup()                        
 exten => _XXXX,103,Voicemail(${EXTEN}@default,b) 
 exten => _XXXX,104,Hangup

 [internal-fxo]
 exten => s,1,Answer
 exten => s,2,Wait(1)
 exten => s,3,Background(en/autoattendant)
 exten => s,4,WaitExten(2)               
 exten => 5000,1,MeetMe(5000)            
 exten => 6000,1,MeetMe(6000)            
 exten => 7000,1,MeetMe(7000)            
 exten => _XXXX,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m) 
 exten => _XXXX,2,Dial(SIP/${EXTEN},${RINGDELAY},t)                                                  
 exten => _XXXX,3,Voicemail(su${EXTEN})                                                              
 exten => _XXXX,4,Hangup()                                                                           
 exten => _XXXX,103,Voicemail(sb${EXTEN})                                                            
 exten => _XXXX,104,Hangup()                                                                         

 exten => h,1,Hangup()

 exten => t,1,Monitor(wav,Call-${CALLERID(num)}-9019-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m) 
 exten => t,2,Dial(SIP/9019&SIP/9006&SIP/9007&SIP/9001&SIP/9002&SIP/9015,${RINGDELAY},t)     
 exten => t,3,Hangup                                                                         
 exten => t,305,Dial(SIP/9001&SIP/9002&SIP/9003&SIP/9004&SIP/9005&SIP/9006&SIP/9007&SIP/9008&SIP/9009&SIP/9010&SIP/9011&SIP/9016&SIP/9017&SIP/9018&SIP/9019)                                                                                               
 exten => t,306,Hangup                                                                                                       

 include => incoming

[internal-fxs]
 include => incoming

[internal-sip]
 exten => _1.,1,Dial(IAX2/ygpabxsv:0000@10.1.1.120/${EXTEN:1}@local)
 exten => _1.,2,Hangup()                                           

 exten => _2.,1,Dial(IAX2/ygpabxsv:0000@10.7.1.120/${EXTEN:1}@local)
 exten => _2.,2,Hangup()                                           

;;GSM call to Telkomsel/HALO
 exten => _000811.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000811.,2,Dial(SIP/9031/${EXTEN:1})                                                                                     
 exten => _000811.,3,Hangup                                                                             

;;GSM call to Telkomsel/Simpati
 exten => _000812.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000812.,2,Dial(SIP/9031/${EXTEN:1})                                                          
 exten => _000812.,3,Hangup                                                                             

;;GSM call to Telkomsel/Simpati
 exten => _000813.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000813.,2,Dial(SIP/9031/${EXTEN:1})                                                          
 exten => _000813.,3,Hangup                                                                             

;GSM call to Telkomsel/As
 exten => _000852.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000852.,2,Dial(SIP/9031/${EXTEN:1})                                                          
 exten => _000852.,3,Hangup                                                                             

;;GSM call to Telkomsel/As
 exten => _000853.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000853.,2,Dial(SIP/9031/${EXTEN:1})                                                          
 exten => _000853.,3,Hangup                                                                             

;;GSM call to Indosat
 exten => _000814.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000814.,2,Dial(SIP/9031/${EXTEN:1})                                                          
 exten => _000814.,3,Hangup                                                                             

;;GSM call to Indosat
 exten => _000815.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000815.,2,Dial(SIP/9031/${EXTEN:1})                                                          
 exten => _000815.,3,Hangup                                                                             

;;GSM call to Indosat
 exten => _000816.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000816.,2,Dial(SIP/9031/${EXTEN:1})                                                          
 exten => _000816.,3,Hangup                                                                             

;;GSM call to Indosat
 exten => _000855.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000855.,2,Dial(SIP/9031/${EXTEN:1})                                                          
 exten => _000855.,3,Hangup                                                                             

;;GSM call to Indosat
 exten => _000856.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000856.,2,Dial(SIP/9031/${EXTEN:1})                                                          
 exten => _000856.,3,Hangup                                                                             

;;GSM call to Indosat
 exten => _000857.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000857.,2,Dial(SIP/9031/${EXTEN:1})                                                          
 exten => _000857.,3,Hangup                                                                             

;;GSM call to Indosat
 exten => _000858.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000858.,2,Dial(SIP/9031/${EXTEN:1})                                                          
 exten => _000858.,3,Hangup                                                                             

;;GSM call to XL
 exten => _000817.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000817.,2,Dial(SIP/9032/${EXTEN:1})                                                          
 exten => _000817.,3,Hangup                                                                             

;;GSM call to XL
 exten => _000818.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000818.,2,Dial(SIP/9032/${EXTEN:1})                                                          
 exten => _000818.,3,Hangup                                                                             

;;GSM call to XL
 exten => _000819.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000819.,2,Dial(SIP/9032/${EXTEN:1})                                                          
 exten => _000819.,3,Hangup                                                                             

;;GSM call to XL
 exten => _000859.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000859.,2,Dial(SIP/9032/${EXTEN:1})                                                          
 exten => _000859.,3,Hangup                                                                             

;GSM call to XL
 exten => _000878.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000878.,2,Dial(SIP/9032/${EXTEN:1})                                                          
 exten => _000878.,3,Hangup                                                                             

;GSM call to 3
 exten => _000898.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000898.,2,Dial(SIP/9032/${EXTEN:1})                                                          
 exten => _000898.,3,Hangup                                                                             

;GSM call to 3
 exten => _000899.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _000899.,2,Dial(SIP/9032/${EXTEN:1})                                                          
 exten => _000899.,3,Hangup                                                                             

;;GSM call to Axis
; exten => _000831.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
; exten => _000831.,2,Dial(SIP/9032/${EXTEN:1})                                                          
; exten => _000831.,3,Hangup                                                                             

;;GSM call to Axis
; exten => _000838.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:2}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
;exten => _000838.,2,Dial(SIP/9032/${EXTEN:1})                                                           
;exten => _000838.,3,Hangup                                                                              

 include => global
 include => incoming

[global]
 exten => _0.,1,Monitor(wav,Call-${CALLERID(num)}-${EXTEN:1}-${STRFTIME(${EPOCH},,%Y%m%d-%H%M%S)},m)
 exten => _0.,2,Dial(DAHDI/g1/${EXTEN:1})                                                          
 exten => _0.,3,Hangup                                                                             
 exten => _0.,103,Playback(en/tt-allbusy)                                                          
 exten => _0.,104,Hangup                                                                           

[recordings]
 exten => 500,1,Answer
 exten => 500,2,Playback(en/silakanrekamgreeting)
 exten => 500,3,Record(en/mymessage:gsm)        
 exten => 500,4,Playback(en/pesananda)          
 exten => 500,5,Playback(en/mymessage)          
 exten => 500,6,Playback(en/tekan1)
 exten => 500,7,WaitExten(3)

 exten => t,1,Playback(en/maafmohonulangi)
 exten => t,2,Goto(500,5)

 exten => i,1,Playback(en/pesanandasalah)
 exten => i,2,Goto(500,5)

 exten => 1,1,System(/bin/mv /var/lib/asterisk/sounds/en/mymessage.gsm  /var/lib/asterisk/sounds/en/autoattendant.gsm)
 exten => 1,2,Playback(en/terimakasih)
 exten => 1,3,Playback(en/tekan3)

 exten => 2,1,Goto(500,1)
 exten => 3,1,Goto(500,1)
 exten => 4,1,Hangup

 include => internal-sip

[local]
;
; Master context for local, toll-free, and iaxtel calls only
;
 ignorepat => 9
 include => default
 include => parkedcalls
 include => internal-sip

[default]
 include => internal-sip

I know it seems make pain in your head, so now take a cup of coffee, read the above configuration carefully until it comes up into your dream :-) . I will explain everything in the next post.

Have a lot of fun. 
          Asterisk 1.6.1 on openSUSE 11.1 (Part 1)        
In several articles from this one, I will share some of my experience in preparing emergency operation center for disaster management in Indonesia. One of the software we implement in this project is Asterisk. I use Asterisk 1.6.1.5 from openSUSE repository. Actually I built a custom 64 bit appliance using KDE 4.3 from factory repositories through SUSE Studio and took Asterisk from openSUSE Build Service repositories. Well, it was a couple years ago (by the time I submit this post), but I believe it still useful for anyone learning Asterisk :-) I also used DAHDI (Digium Asterisk Hardware Device Interface), but during the implementation I have a problem with Indonesia PSTN telephone signaling so I should download dahdi trunk version from digium subversion server to make the digium card works.

Here are the hardware I use:
  • 2 HP tower based server with 8 GB memory (it is overkill actually, but the owner insist it) running in high availability. See the pictures here and here.
  • 10 PSTN lines
  • RJ 12 cables
Well, Digium and Polycom price are expensive but the quality of the sound is very good. There are some alternatives for the IP Phone like Grandstream and Aastra that also can be used.
In this project, Asterisk will be use to setup the voip communication between this site in Denpasar/Bali with the headquarter (HQ) in Jakarta as well as with other regional center in Java and Sumatera. Also Asterisk will act as traditional PBX to connect this site to PSTN lines as well as to GSM/CDMA lines. Every conversation through the PABX will be recorded by monitor application in Asterisk.

Before we go any further lets discuss a logical design about our setup. There is one HQ and several remote site including this one in Bali. This site is special because it's also act as second node beside HQ that can receive and transmit voip traffic to other center. The setup of every site is similar like the diagram below.
All the digium card provide 12 lines of PSTN, in this case we only use 10 lines. We then use RJ 12 coupler so that every line goes to 2 PBX server, PABXSV1 and PABXSV2. The PABXSV2 will become the backup asterisk in case the PABXSV1 is downed. We can use vrrpd or heartbeat (with DRBD) to control the service so that PABXSV2 can take over all the service from PABXSV1. More on this later.

I use stock asterisk and dahdi from OBS. While the asterisk is ok, dahdi in the OBS is not sufficient for Indonesia telephone lines (at least at the time I made the appliance). The root cause of the problem is that Indonesia PSTN line provided by Telkom is already equipped with the CID (caller identifier) but the service is not open to the end customer until the customer pay the service charge. But actually the CID is there and asterisk knows it but cannot open it. So it can answer the ring but if another call comes, suddenly it get confuse how to handle it and hangup the line. Off course we should make a good configuration not just downloading the trunk version.

I should thanks some good people who currently help me maintain the server, I should mentioned here:

Pak Wayan Sudana, Ketua KPLI Bali
Mas Adhi Wus, linuxer dari Denpasar
Mas Yan Arief (dkk), openSUSE user dari Yogyakarta

In the next post I will explain some configuration that I used, till then keep safe and have a lot of fun.
          Bandwidth Shaper Script di openSUSE        


# Tulisan ini digunakan sebagai bahan dasar saja untuk memahami
# Dibuat sudah lama sekali dan mungkin ada yang deprecated
# Use at your own risk

Seorang rekan menanyakan kenapa mengkonfigurasi openSuSE koq susah sekali. Katanya untuk ngejalanin script sederhana membuat default route aja musti ngebuat script yang njlimet. He…he..he….
Dia bilang kalau di RedHat dan turunannya seperti Fedora dan Centos khan ada rc.local, terus kalau di openSUSE padanannya apa?

OK. Sebetulnya masalah ini sudah pernah saya bahas diblog saya yang dulu dan dibeberapa email saya tapi tak mengapa saya ulang lagi di sini dan saya tambahkan beberapa hal yang saya anggap relevan karena kebetulan ada juga yang nanya tentang load balancing trafik internet ke dua gateway dan implementasi htb (hierarchical tocken bucket) untuk traffic shaping.

Jadi saya akan menjelaskan implementasi load balancing, traffic shaping dan rc.local di openSuSE sekaligus, mumpung lagi ada kesempatan nulis.


LOAD BALANCING TRAFIK INTERNET

Di tempat saya koneksi internet terhubung ke dua ISP, LC 128 kbps ke ISP-A dan ADSL ke ISP-B. Singkat cerita saya menggunakan sebuah server dengan 3 ethernet card

eth0 ip address 202.158.xx.yyy netmask 255.255.255.240 gw 202.158.xx.yyy
eth1 ip address 10.0.50.5 netmask 255.255.255.248 gw 10.0.50.1
eth2 ip address 192.168.117.171 netmask 255.255.255.0 gw 192.168.117.171

Untuk load balancing trafik ini saya mengacu pada dokumen LARTC (Linux Advanced Routing & Traffic Control) How To yang disusun oleh Bert Hubert (thanks Om Bert). Syarat untuk load balancing adalah sudah terinstallnya paket iproute2, yang sudah terinstall saat saya menginstall openSUSE 10.3.

Selanjutnya

# pertama hapus semua default route dari ip route
#
ip route del default
ip route del 10.0.50.0/29
ip route del 202.158.xx.zzz/28
ip route del 169.254.0.0/16

# tambah ip route yang masuk akal
#

ip route add 10.0.50.0/29 dev eth1 proto kernel scope link src 10.0.50.5
ip route add 202.158.xx.zzz/28 dev eth0 proto kernel scope link src 202.158.xx.xxx

# tambah juga load balancing default route (ip router anda)
# weight menandakan mana yang lebih anda pilih, 2 > 1
ip route add default scope global \
nexthop via 202.158.xx.yyy dev eth0 weight 1 \
nexthop via 10.0.50.1 dev eth1 weight 2

# tambah table policy routing
#
ip route add via 202.158.xx.yyy dev eth0 src 202.158.xx.xxx table ISP-A
ip route add via 10.0.50.1 dev eth1 src 10.0.50.5 table ISP-B

# ini musti ditest sometimes we need this
ip route add 192.168.117.0/24 dev eth4 table ISP-A
ip route add 10.0.50.0/29 dev eth1 table ISP-A
ip route add 127.0.0.0/8 dev lo table ISP-A
ip route add 192.168.117.0/24 dev eth4 table ISP-B
ip route add 202.158.xx.yyy/28 dev eth0 table ISP-B
ip route add 127.0.0.0/8 dev lo table ISP-B

# jangan lupa setup dua ip rule agar sistem menggunakan policy routing diatas
#
ip rule add from 202.158.xx.xxx table ISP-A
ip rule add from 10.0.50.5 table ISP-B

# setting IP masquerade
#
iptables -t nat -A POSTROUTING -s 192.168.117.0/24 -d 0/0 -o eth0 -j MASQUERADE
iptables -t nat -A POSTROUTING -s 192.168.117.0/24 -d 0/0 -o eth1 -j MASQUERADE

# set TOS field agar router gak bingung, supaya ssh dan ftp bisa jalan

iptables -t mangle -A PREROUTING -j TOS –set-tos 0x00
iptables -t mangle -A OUTPUT -j TOS –set-tos 0x00

perlu diingat bahwa balancing disini tidak sempurna, karena route based, dan routes di-cache. Jadi route ke site yang sering dikunjungi akan selalu melaui provider yang sama.
Contoh di server ini kalau saya traceroute www.detik.com akan selalu lewat ISP-A dan traceroute www.republika.co.id akan selalu melalui ISP-B.


TRAFFIC SHAPING

Tujuan traffic shaping di sini adalah (tentu saja anda bisa melakukan shaping dengan tujuan lain he..he…he..):
- menjaga low latency untuk interactive trafic, jangan sampai upload atau download mengganggu ssh.
- menjaga agar browsing berjalan pada reasonable speeds sementara melalukan up atau downloading.
- menjaga agar upload tidak mengganggu download dan sebaliknya.
- menandakan port atau host yang sering memakan traffic sebagai low priority.

Ada banyak sumber di intenet misalnya tulisan ini dan favorit saya adalah sekali lagi om Bert dengan dokumen LARTC. Jangan lupa baca pre-requisites untuk menjalankan HTB dan pastikan kernel anda mendukungnya.

Implementasi di tempat saya sederhana saja seperti di bawah:

untuk eth0 dan eth1:

DOWNLINK=96 # untuk eth0, untuk eth1 –> DOWNLINK=288
UPLINK=80 # untuk eth0, untuk eth1 –> UPLINK=20
DEV=eth0 # ganti dengan eth1 untuk eth1

# low priority OUTGOING traffic - you can leave this blank if you want
# low priority source netmasks
NOPRIOHOSTSRC=

# low priority destination netmasks
NOPRIOHOSTDST=

# low priority source ports
NOPRIOPORTSRC=

# low priority destination ports
NOPRIOPORTDST=

if [ "$1" = "status" ]
then
tc -s qdisc ls dev $DEV
tc -s class ls dev $DEV
exit
fi

# clean existing down- and uplink qdiscs, hide errors
tc qdisc del dev $DEV root 2> /dev/null > /dev/null
tc qdisc del dev $DEV ingress 2> /dev/null > /dev/null

if [ "$1" = "stop" ]
then
exit
fi

###### uplink

# install root HTB, point default traffic to 1:20:

tc qdisc add dev $DEV root handle 1: htb default 20

# shape everything at $UPLINK speed - this prevents huge queues in your
# DSL modem which destroy latency:

tc class add dev $DEV parent 1: classid 1:1 htb rate ${UPLINK}kbit burst 6k

# high prio class 1:10:

tc class add dev $DEV parent 1:1 classid 1:10 htb rate ${UPLINK}kbit \
burst 6k prio 1

# bulk & default class 1:20 - gets slightly less traffic,
# and a lower priority:

tc class add dev $DEV parent 1:1 classid 1:20 htb rate $[9*$UPLINK/10]kbit \
burst 6k prio 2

tc class add dev $DEV parent 1:1 classid 1:30 htb rate $[8*$UPLINK/10]kbit \
burst 6k prio 2

# all get Stochastic Fairness:
tc qdisc add dev $DEV parent 1:10 handle 10: sfq perturb 10
tc qdisc add dev $DEV parent 1:20 handle 20: sfq perturb 10
tc qdisc add dev $DEV parent 1:30 handle 30: sfq perturb 10

# TOS Minimum Delay (ssh, NOT scp) in 1:10:

tc filter add dev $DEV parent 1:0 protocol ip prio 10 u32 \
match ip tos 0x10 0xff flowid 1:10

# ICMP (ip protocol 1) in the interactive class 1:10 so we
# can do measurements & impress our friends:
tc filter add dev $DEV parent 1:0 protocol ip prio 10 u32 \
match ip protocol 1 0xff flowid 1:10

# To speed up downloads while an upload is going on, put ACK packets in
# the interactive class:

tc filter add dev $DEV parent 1: protocol ip prio 10 u32 \
match ip protocol 6 0xff \
match u8 0x05 0x0f at 0 \
match u16 0x0000 0xffc0 at 2 \
match u8 0x10 0xff at 33 \
flowid 1:10

# rest is ‘non-interactive’ ie ‘bulk’ and ends up in 1:20

# some traffic however suffers a worse fate
for a in $NOPRIOPORTDST
do
tc filter add dev $DEV parent 1: protocol ip prio 14 u32 \
match ip dport $a 0xffff flowid 1:30
done

for a in $NOPRIOPORTSRC
do
tc filter add dev $DEV parent 1: protocol ip prio 15 u32 \
match ip sport $a 0xffff flowid 1:30
done

for a in $NOPRIOHOSTSRC
do
tc filter add dev $DEV parent 1: protocol ip prio 16 u32 \
match ip src $a flowid 1:30
done

for a in $NOPRIOHOSTDST
do
tc filter add dev $DEV parent 1: protocol ip prio 17 u32 \
match ip dst $a flowid 1:30
done

# rest is ‘non-interactive’ ie ‘bulk’ and ends up in 1:20

tc filter add dev $DEV parent 1: protocol ip prio 18 u32 \
match ip dst 0.0.0.0/0 flowid 1:20

########## downlink #############
# slow downloads down to somewhat less than the real speed to prevent
# queuing at our ISP. Tune to see how high you can set it.
# ISPs tend to have *huge* queues to make sure big downloads are fast
#
# attach ingress policer:

tc qdisc add dev $DEV handle ffff: ingress

# filter *everything* to it (0.0.0.0/0), drop everything that’s
# coming in too fast:

tc filter add dev $DEV parent ffff: protocol ip prio 50 u32 match ip src \
0.0.0.0/0 police rate ${DOWNLINK}kbit burst 10k drop flowid :1

Script ini bekerja cukup baik pada ADSL tapi harus dicoba-coba sampai didapat nilai optimum untuk nilai di DOWNLINK dan UPLINK. Masalah umum ADSL adalah kecepatan upload yang jauh dibawah kecepatan download, dan karena sifat TCP/IP yang terus mengirim paket sampai akhirnya tidak ada tempat lagi untuk paket, biasanya modem akan hang. Dengan kecepatan dowload yang kencang biasanya user terus mendownload beberapa sites sekaligus sehingga akumulasi upload menjadi besar. Bila traffic upload ini mencapai modem ADSL maka modem akan hang.

Karena itu harus diatur agar traffic upload kita kontrol dan tidak mencapai modem ADSL hal ini dilakukan dengan menurunkan nilai UPLOAD sampai nilai optimum. Hal ini tercapai jika network latency mencapai nilai terendah dan network tidak putus. Lebih jauh silakan baca pada dokumen LARTC Om Bert di atas.


rc.local di openSUSE

Tidak ada rc.local di openSUSE (he..he…he…)
Kalau kita lihat di RedHat (dan cloningnya) rc.local dijalankan setelah semua service selesai dijalankan di run level 5. Ini gak ada padanannya di openSUSE.

User biasanya mengira boot.local di /etc/init.d adalah padanan dari rc.local. Ini adalah perkiraan yang salah karena boot.local akan jalan paling awal sebelum service-service yang lain dijalankan. Sehingga seringkali user membuat script iptables dan disisipkan pada boot.local kemudian komplain karena scriptnya tidak jalan. Ini terjadi karena script iptables dipanggil sebelum service network dikonfigurasi di run level 3 sehingga sudah pasti tidak akan berfungsi.

Di openSUSE kita harus mengetahui pada saat mana script kita harus jalan apa saja syarat yang dibutuhkan, walaupun umumnya akan jalan di run level 3 dan 5. Misalnya kita ingin menjalankan script load balancing di atas, maka sebelum script ini jalan service network harus sudah jalan dulu.

Untuk dasar dari script tersebut kita dapat menggunakan file /etc/init.d/skeleton sebagai dasar, walaupun tidak tertutup kemungkinan menggunakan script lain seperti yang akan saya contohkan.

Script untuk traffic shapper:
#!/bin/sh
#
#
# /etc/init.d/bwshaper_eth0
#
### BEGIN INIT INFO
# Provides: bwshaper_eth0
# Required-Start: $network
# Should-Start:
# Required-Stop:
# Should-Stop:
# Default-Start: 3 5
# Default-Stop: 0 1 2 6
# Short-Description: Custom shapping using htb for eth0 to ISP-A
# Description: decreased the upload traffic on eth0 to ISP-A by doing queuing using htb,
# script by medwin@gmail.com
### END INIT INFO
#

test -s /etc/rc.status && . /etc/rc.status && rc_reset

case "$1" in
start )

## letakkan script and di sini

rc_status -v
;;
stop)
# ok kita test
;;

esac

rc_exit

# end of script

Script di atas hanya satu contoh sederhana saja. Perhatikan bagian:
### BEGIN INIT INFO
# Provides: bwshaper_eth0 —> ini nama service anda
# Required-Start: $network —> ini adalah service yang harus jalan sebelum script anda di jalankan
# Should-Start:
# Required-Stop:
# Should-Stop:
# Default-Start: 3 5 —> ini run level script anda bekerja
# Default-Stop: 0 1 2 6
# Short-Description: Custom shapping using htb for eth0 to ISP-A
# Description: decreased the upload traffic on eth0 to ISP-A by doing queuing using htb, script by medwin@gmail.com
### END INIT INFO
bagian ini akan dipelajari oleh insserv untuk menjalankan script anda pada run level berapa.
Copy script anda di /etc/init.d
Untuk memasukkan service anda ke service maka daftarkan dengan perintah

> insserv (nama service)

kemudian check dengan

> chkconfig –list

untuk mengetahui kalau service anda sudah masuk ke daftar service di run level tertentu.

Anda juga bisa berkreasi dengan membuat script service yang bisa dijalankan dan diberhentikan seperti misalnya dengan menyisipkan

case "$1" in

start)

echo -n "Starting bandwidth shaping on eth0: "
start
echo "done"
;;

stop)

echo -n "Stopping bandwidth shaping on eth0: "
stop
echo "done"
;;

restart)

echo -n "Restarting bandwidth shaping on eth0: "
restart
echo "done"
;;

status)

echo "Bandwidth shaping status for $IF:"
show
echo ""
;;

*)

pwd=$(pwd)
echo "Usage: tc.bash {start|stop|restart|status}"
;;

pada script anda. Kemudian melakukan symbolic link file tersebut ke /usr/sbin atau /sbin, misalnya dengan nama rcbwshaper_eth0

> ln-s /etc/init.d/bwshaper_eth0 /usr/sbin/rcbwshaper_eth0

sehingga anda bisa memanggilnya dengan perintah

> rcbwshaper_eth0 {start|stop|restart|status}

OK selamat mencoba.
Till then keep safe and stop global warming.
          Banana plantation threatens rainforest valley (video)        
Cambodia’s Cardamom Mountains were recently spared a titanium mine, however now the region faces a new peril: bananas. The Australian firm Indochina Gateway Capital Limited has proposed a banana plantation in the Southern Cardamom Mountains. The plantation would likely destroy an elephant corridor for one of Cambodia’s last wild elephant populations. In addition, pesticides used […]
          Arrowhead 2016        
It’s a monster drive for us to get to the AH135, just shy of 1200 miles from Victor, ID to International Falls, MN, a solid 19 hrs of time in the van, with anywhere from 6-8 hrs of sleep, that's around 27 hours of travel, one way.  drive.jpg
Photo courtesy of JayP


We reached our destination goal for Friday the AmericInn in Medora, ND which is in the Theodore Roosevelt National Park. We arrived 11pm and had eaten a pizza and several bags of chips all day. Straight to bed.


I am not a morning person. JayP sweetly woke me Saturday morning at 6 am, with coffee and a warmed up van. We arrived in International Falls, MN around 4pm, went to the hotel, checked in and grabbed our mandatory gear for check in. Being our fourth year, we had gear check down and were out of there within 10 mins. We met up with some racers and friends for dinner at the hotel, then to bed.

Sunday, JayP shuttled the van to Fortune Bay so he could give me a ride to the airport after the race. I did a shake down ride back over to gear check and dropped off my drop bag for Melgeorge. I fiddled with my bike and gear a bit, then took a nap before the pre-race meeting.

It was such a blast attending the pre-race meeting, and briefly catching up with friends I only see once a year.  
Svetababy.jpg
photo courtesy of Salsa Cycles/Mike “Kid” Riemer





Race day was finally here! I brought my own wraps, cuz I knew there would be eggs and cheese at the hotel, and I love to eat a burrito for race breakfast. I rode over to the start, checked in and “warmed up” for a few minutes. The temps were warm. Everyone was feeling each other's tires, and waiting to hurry up and GO!  

The pace line began, I settled in for the 1st ½ half hour, but was antsy and I wanted to see what I had, so I pushed myself and pulled ahead of a few people. I started training in late October, which was new for me. I have been getting up early (did I mention I’m not a morning person?), morning after morning telling myself, I want it, I want it more than anyone else. begin.jpg
Photo courtesy of Salsa Cycles/Scott Haraldson











My goals going into the AH135 this year were to be efficient at the checkpoints, race the race and to stay on top of my nutrition. The 1st CP at Gateway, I went in, grabbed hot water and was out of there in a minute. GWAH16.jpg
Photo courtesy of Tina Stiller

I focused on racing the race, pushing myself at all times. It was snowing in my face and the course became rudded. I was falling down a lot, it was draining, but I still felt good and I didn’t let it get me down.  Although my tire pressure was low at this point for better traction, my rear tubeless tire was being finicky and leaking a bit, it got too low a couple times, so I had to stop to pump it up. I really wanted to avoid putting in a tube.

About 12 miles out from Melgeorge's, my freakin’ chain broke! UGH! I had a tool but no extra link. I popped the pin almost through but couldn’t get the last bit, my hands got cold, so I put on my heavier gloves and started running to warm them up. I couldn’t bare the thought of running 12 miles to the CP. I stopped again to work the pin when another racer Dave, caught me. He stopped to help, we got the pin out, put the chain back together and I was rollin’ on my way.



My goal was to be in and out of Melgeorge's in under ½ hour, but I have yet to accomplish this. I think about what I am going to do when I get there and try to stick to that plan. I was soaking wet from snow and sweat. As soon as I got there, I grabbed my drop, had 2 grilled cheese, 2 bowls of soup, put all my clothes in the dryer, sorted my drop, filled my water, put my clothes back on, food on the bike and leave. This took me 49 mins, way too long. MEL16.jpg
Photo courtesy of Salsa Cycles/Scott Haraldson





The ruts and snow got deeper after Melgeorge's on the way to Ski Pulk. I let some air out of my tires and it helped, but then all the air came out of my rear tire. I stopped, pumped it up and it was fine until after Ski Pulk. There was a lot of on and off through this section for me, I wasn’t interested in eating my food and 20 miles into this section my garmin died. Rookie move on my part for not having the usual backup odometer. So I had no idea how far out I was or what my speed was.

Once I got to Ski Pulk, my intention was to just have a couple hot chocolates and be on my way, but that didn’t happen. Somehow I got sucked in and spent 45 mins there-WAY, WAY too long. Back on the trail at 4:22am, I knew there would be some sleep walking involved, around 5am it hit, but I was prepared with my can of Red Bull slushy which I mixed with some GU drink, some big chocolate sugar and some chanting, I was good to go. I don’t drink sugary drinks so I knew it would give me that pop that I was after, but it didn’t last long enough, 2 cans next time.





























The sun rose, and despite the lack of an odometer, I knew where I was. The struggle was real, and I was slowing down. The last 10 miles are filled with long straight aways, and twisty turns. You can see the tower, but still so far away. I crossed the final road to the trail that leads to the finish at Fortune Bay, I was sooo stoked. AHfinish16.jpg
Photo courtesy of Salsa Cycles/Scott Haraldson

The finish. Once there I saw my favorite person, JayP, finish line hugs are the BEST! hugs.jpg
photo courtesy of Salsa Cycles/Mike “Kid” Riemer

I was also greeted by Mike Reimer of Salsa Cycles happy face. We were chatting and I was saying how happy I was to be finished, how it it took longer than I expected and BAM there was my 45NRTH teammate, Jill Martindale, just 3 mins behind me. Whew! I had no idea she was that close and it was her 1st time racing the AH135. Great job Jill! Looks like I’m gonna have to do some more of this training stuff to keep up with the kids these days. AHfinish16Jill.jpg
Photo courtesy of Jill Martindale

I am proud and honored to be a part of the Arrowhead 135 race and for receiving the spirit award this year. I am also super stoked for the three peat and currently being the winningest bike racer of the Arrowhead 135, Female or Male.

Within 4 hours I was on a plane and back in Idaho that night at 11pm. As I was driving home I saw a few deer, a herd of Elk and 2 Moose all on the road. Ahhh, home sweet home. I got my furboys the next day and we snuggled happily ever after.

Next up, Iditarod Trail Invitational! See you out there!

T-Race
          Received a 5 star rating on the Simple Hyper-V Network Virtualization Script with Gateway contribution on the Technet Gallery.         
Received a 5 star rating on the Simple Hyper-V Network Virtualization Script with Gateway contribution on the Technet Gallery.
          Christmas Devotionals        

Welcome to Advent!

Advent starts on the fourth Sunday before Christmas Day, which is today, and continues through Christmas Eve.



“Advent” means "coming" or "arrival." The focus of the season is the celebration of the birth of Jesus in his First Advent, and the anticipation of his return in his Second Advent. Traditionally, Advent is marked by a spirit of anticipation, preparation and expectation.

Sounds like I’m describing the celebration of the holiday of Christmas, doesn’t it?

Anticipation. Preparation. Expectation. Sounds like we’re taking about shopping lists and wrapping, decorating and meal planning. And about wondering what might be under the tree.


But advent’s focus is different. It’s holy. It’s about celebrating the incarnation and presence of Christ. It includes an emphasis on His faithfulness to come and rescue us from sin, as well as His judgment of sin, and the hope He provides for eternal life through grace.

With a double focus on past and future, Advent also symbolizes the spiritual journey of each of us as we affirm that Christ has come, that He is present (if unseen) with us today, and that He will come again in power.

That truth should renew in us a motivation to live as grateful, responsible stewards of what God has entrusted to us in this time in between His Advents. It's meant to awaken in us a profound sense of thankfulness and charity.

One of the ways I try to remember advent is with Christmas-focused devotional readings. Here are some for you to check out – all are free.


CHRISTMAS DEVOTIONS:


Encouragement for Today – For women, by women. These devotions run year-round but focus on Christmas themes in the month of December.

Bible Gateway’s Christmas Devotionals – Choose from a focus on advent, joy, hymns, or the Christmas story. Or sign up for more than one. These devotions run through the Advent season only.

Christmas Devotionals from Crosswalk.com – Written by a variety of authors, pastors and leaders with a focus squarely on the Christmas season.

Billy Graham’s Advent Devotional – Download this free guide called “Arrival: Preparing to Celebrate Christ's Birth.”

Good Morning Girl’s Advent Devotional & Study - Download the free eBook which includes weekly devotions, scripture readings, suggested dally family activities, recipes and journal pages.


As the culture celebrates a year-end time of feasting and fun, the church celebrates God’s breaking into time, space and flesh. I’m aiming to celebrate both in the weeks to come.


Happy Advent!


          Street Cred        
I'm leaving town today to speak at a conference this weekend on "The Proverbs 31 Woman."



I have the main sessions, and I understand there will be break-out sessions on marriage, homemaking, frugality and parenting.

So you know that means I cannot leave here today without first driving my son to school rather than putting him on the bus, doing the dishes, cleaning the bathrooms, leaving my husband a love note, and stopping at the grocery store to bring food from afar (with coupons).

I mean, if you're going to speak on Proverbs 31:10-31, you need to feel like you have some degree of street cred. You know what I'm sayin'?

It's 9:45 AM and so far I've done the dishes, bathrooms, grocery store run, took Caleb to school and even brought the emptied recycling bins in from the curb. I've also cleaned my car top to bottom, inside and out.

Rick always cleans my car for me before I leave on a trip. Well 99% of the time. This week he's in the 1%. But he's got me spoiled... I feel like I can't enter a highway unless my car is clean. So I went out to the driveway this morning and washed and vacuumed it myself. (Using environment-friendly soap.)




Driving to a car wash might have be easier, but this was more frugal.  Plus, some nice man walking past my house decided to stop and talk to me. He is here from Lexington, NC to visit family. I was informed Lexington is the BBQ capital of NC. Apparently they have a BBQ festival there every October that attracts 250,000 people. Who knew?  I do now.

And now, he's going to bring us some BBQ when he comes back to visit at Thanksgiving.  Bonus!

Now that's how you bring food from a far. You stop your work to chat.

Unfortunately, it's time for me to stop chatting here and go print out my speaking notes. Pray with me that I speak with the law of kindness and that faithful instruction will be on my tongue tomorrow.

And also, that I don't forget to pack a razor since I'll be wearing a dress. A dress and heels = more street cred when speaking on Proverbs 31. Every little bit helps.



          GIGABYTE GA-MA790XT-UD4P AMD 790X AM3 Phenom II Socket AM3 5200 MT/s PC3-10600 (DDR3-1333) ATX Motherboard Retail        

Gigbayte Motherboards - A Quality Difference


The best course of action to take sometimes isn't clear until you've listed and considered your alternatives. The following paragraphs should help clue you in to what the experts think is significant.


If you are looking for a motherboard with an outstanding price, quality components, and a support team you can count on look no further than the motherboards from Gigabyte. I have used Gigabyte motherboards in a variety machines and have had great success with all of them. They have an over 20 year track record of high quality, top of the line motherboards. Recently they have begun to add more value driven products to their line card. These products have the same high quality of the top end motherboards, but come at a price that anyone can now afford.


Founded in 1986, Gigabyte has continued to grow year after year with sales topping 19 million products in 2008. Originally their major customers included Alienware and Falcon Northwest. Alienware is a premier gaming system manufacturer that was purchased by Dell in 2006. They now are the premier gaming brand for the largest computer manufacturer in the world. They still continue to use Gigabyte motherboards heavily and rely on them for their performance and dependability.


Knowledge can give you a real advantage. To make sure you're fully informed about amd 780g gigabyte, asus gigabyte motherboard, gigabyte sata raid, gigabyte micro atx, gigabyte am2 motherboard, gigabyte server motherboards, gigabyte mini itx, gigabyte ddr3 motherboard, keep reading.


Gigabyte motherboards can work with both Intel and AMD processor chips. While these chips are not interchangeable, there are comparable models that can mount either manufacturer's chips. They currently manufacture motherboards that support the Intel Socket 1366, 775, 479/437, 478 and M chipset configurations. For AMD Gigabyte motherboards can support Socket AM2, AM2+, and AM3. All of these range from the newest chipsets to chips far older. They also can support a wide range of RAM types from low end budget RAM to high end overclocked performance RAM DIMMS. Before you purchase make sure that your motherboard will support the RAM that you are getting. If the RAM does not appear on the approved list, contact Gigabyte to see if whether they intend to test with that type. Many of the motherboards also have extensive options as far as upgrade slots are concerned as well. This combination of options for their motherboards means that you can find the exact right fit for your needs.


One of the biggest things that separates Gigabyte motherboards from the competition is the quality of the components that they use. There most recent innovation is the use of 2oz copper PCBs in all of their motherboards. While this may not seem like a big deal, for those that are focused on the quality of their computer components it is. As computer processors and other components have become faster and faster, they also have become hotter and hotter. While heat sinks and other components have been designed to compensate for this heat, the actual PCB for the motherboard has not. Gigabyte is the first to introduce dual copper layers for the PCB on desktop machines. What this means to you is that the Gigabyte motherboards are much more capable of distributing this excess heat. Less heat into the components means a longer life span, better performance, and overall considerably less wear and tear on the products. These new motherboards promise to be more reliable, more stable, and have a longer shelf life than any other products on the market today. With their wide range of choices and dedication to quality it is easy to see why Gigabyte sold so many motherboards in 2008.


Take time to consider the points presented above. What you learn may help you overcome your hesitation to take action.



iskandarX is a computer hardware affiliates. For more information about gigabyte motherboards, please visit GIGABYTE Motherboard + AMD processor for more detail about the product




GIGABYTEMotherboardRetail

GIGABYTEMotherboardRetail



, , , , , , , , , , , , , , , , , , , , , , , , , , ,

Technorati Tags:
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,


          ARM Template – combining Application Gateway and enabling diagnostic logging into OMS        
Introduction Often times you are looking to go beyond the basic ARM template and as a Security/Infrastructure admin for the CORP’s Azure deployment, your objective is to make sure Applications being deployed are following best practices some of which are:- (a) Applications should be behind an Application Gateway (AppGW) combined/protected by a Web Application Firewall(WAF)....
          Migrating From a Monolith to APIs and Microservices        

Nearly every company must deal with legacy code. They can’t just start over with a green field project. So, how can teams dealing with one or more monolithic applications migrate to APIs and microservices? And, how can you make this transition without halting all new feature development while everything is transitioned? This was a recent […]

The post Migrating From a Monolith to APIs and Microservices appeared first on Tyk API Gateway and API Management.


          Exceptionalism is dangerous        

Warning – this is an Op-Ed, there are opinions here, you might not like them… The act of creation is exceptional, but are you? You’ll find a lot of navel-gazing in the startup scene: successful founders talking about their success, failed founders talking about their mistakes, embarrassed founders talking about their indiscretions… In fact – […]

The post Exceptionalism is dangerous appeared first on Tyk API Gateway and API Management.


          RISE & Shine: 5 reasons why RISE conference works for companies like Tyk        

Last week, 15,000 start-ups, tech influencers and entrepreneurs descended on Hong Kong for RISE Conference 2017. Here are 5 reasons why Tyk decided to join them. As any marketing team will know, every month we receive invitations to attend various tech conferences, each with a different theme, audience or location. Many of them sound like […]

The post RISE & Shine: 5 reasons why RISE conference works for companies like Tyk appeared first on Tyk API Gateway and API Management.


          Using Hugo to Open Source Tyk documentation        

Having explained why we have open sourced our documentation, we wanted to let you know a bit more about how we did it. History lesson Our docs were originally created within our WordPress powered website. This included the use of two plugins to get the content to display using a Table of Contents. It was […]

The post Using Hugo to Open Source Tyk documentation appeared first on Tyk API Gateway and API Management.


          Allez les Tyks: tales from an awesome Alpine adventure        

The Tyk team Last week, a 20-strong Tyk team downed tools and upped sticks to the French Alps for our first ever Tyk retreat. It was an opportunity for our global team to come together, collaborate on ideas for the year ahead, and eat a year’s worth of ham and cheese in 7 days. But […]

The post Allez les Tyks: tales from an awesome Alpine adventure appeared first on Tyk API Gateway and API Management.


          Great API documentation requires code examples        

Documentation is a very important element of the developer experience. Most API teams assume that the documentation of the API’s endpoints is enough. However, that is only the beginning of the API consumer journey. Code examples provide the important guidance necessary for developers to be able to apply the documentation in practice. They are the […]

The post Great API documentation requires code examples appeared first on Tyk API Gateway and API Management.


          Open all hours: Open Sourcing our Tyk documentation        

You might have noticed that we’ve spruced ourselves up lately. But as well as working on shiny new outsides, we also wanted to spend some time improving the nuts and bolts of the Tyk product itself. This came in the form of a full review of our documentation, both from a technical accuracy viewpoint (very […]

The post Open all hours: Open Sourcing our Tyk documentation appeared first on Tyk API Gateway and API Management.


          A shiny new look, improved (Open Source) docs, and touch down in Singapore        

Picture the scene. It’s late at night. You’re surrounded by takeout boxes and coffee cups. You’re not sure when it got dark and you really need the bathroom, but just… 10.. minutes… more… perfecting your distributed blockchain deep-learning-powered todo list app (that also controls the weather). Sound familiar? We get it: we’ve been there too. […]

The post A shiny new look, improved (Open Source) docs, and touch down in Singapore appeared first on Tyk API Gateway and API Management.


          When is Hypermedia and HATEOAS a Right Fit For Your API?        

Previously, we discussed the value of offering events from your API that can extend the conversation you have with your consumers. Another consideration for extending your API conversation is to add hypermedia and HATEOAS support. Let’s understand more about these concepts and understand the value they bring to our APIs. What is a Hypermedia API? […]

The post When is Hypermedia and HATEOAS a Right Fit For Your API? appeared first on Tyk API Gateway and API Management.


          5 Mistakes Your API Product Must Avoid        

Many of my consulting engagements involve helping teams improve their API products. Over the last decade, I have seen some strategies work better than others. While not every product and circumstance is the same, there are some common mistakes that prevent teams from delivering a great API product. I want to share with you the […]

The post 5 Mistakes Your API Product Must Avoid appeared first on Tyk API Gateway and API Management.


          Reply #6365        
Do you have a link? I can't find it. I found this page: https://www.flrules.org/gateway/ChapterHome.asp?Chapter=53ER17-

I know last time they put the new game emergency game rules in some other category. I think you're right that it is just a recoat. If the odds aren't different from FL Cash or $25 Misfortune, I won't be playing it at all. I'm wishful in hoping they got rid of two of the $10m prizes and decided to improve the odds of the $500 prize.
          You lose the Default Gateway on SBS 2008 Every Time You Reboot        

Just recently I encountered an issue with a brand new Dell T110 running SBS 2008. I thought it may be useful for others to know how this was resolved.

The issue I was experiencing was as follows:

When I restarted the Server it would remove the ‘Default Gateway’ settings in the network card and would then not [...]

          THE NINTH DOCTOR CHRONICLES        
How do you tell do you tell a Ninth Doctor story without the man that brought the Ninth Doctor to life? There are two possible answers to this question. the firs is “you don’t” the second is you get Nick Briggs to narrate the part, because Mr Briggs gives good Eccleston. Not an impersonation as such but a capturing of the essence of the character all his sadness his flashes of joy at the smallest things because this was a Doctor looking for a reason to carry on, for a meaning to make everything matter again – and he found it in one Rose Tyler.
2005 were heady times, Doctor Who was back, the same show we had always loved but a little bit more emotionally mature, with better characterisation and with the man himself Christopher Eccleston. It cannot be understated how much of a factor in the success of “Nu-Who” Eccleston was – he took the character of the Doctor, stripped away all the extraneous nonsense – the scarves, the question marks, the celery etc and played The Doctor, and what a tour de force performance. For thirteen short weeks he was the man, and this box set revisits those days of Nine and Rose and Jackie and Adam and celebrity historicals and Mickey and (well you get the drift).
So no Mr Eccleston reprising the role (boo!) but a “Fantastic” Mr Briggs capturing his very soul in the performance he gives (yay) and these four stories really do capture the spirit of 2005. Not conventional full cast pieces, more in the style of Companion Chronicles where Nick Briggs narrates with one other guest actor playing the part of a principal character in the proceedings each of them touch on a specific theme from the all too brief Ninth Doctor era, loss and regret for the Time War, Celebrity Historical, the Rose/Doctor relationship and contemporary earth on the Powell estate, so lets begin with the first story:
1. The Bleeding Heart by Cavan Scott
A reoccurring theme for the Ninth Doctor era was his quest for inner peace after the atrocities of the Time War and where better to begin his quest than Galen, the renowned “planet of peace”. This is a story set prior to the events of Rose with a battle scarred Doctor becoming involved in a peace initiative between two warring races, but unfortunately death is the Doctor’s constant companion and the delegates to the conference begin to be picked off, murdered horribly – Can the Doctor ever escape the horrors of the Time War and the weapons that were forged in that terrible conflict. We see a Doctor desperate to be good again, he even has a one off companion in the guise of journalist Adriana Jardsel (Claire Wyatt) who sees him for the man he is. Its a bleak beginning, or perhaps it is an ending and the gateway to a new future for Number Nine.
2. The Window on the Moor by Una McCormack
And now we are in the Eccleston era proper with an celebrity historical – the celebrity in this case is Emily Bronte (Laura Riseborough) who has viewed the “window on the moor” of the title since she was a child and helps those that pass through to find other windows. Set on two worlds on the other side of portals opened by a mad usurper – The Doctor and Rose become embroiled in a civil war set in a world of glass prisons  - the armies are using the windows as a short cut between different parts of the reality but could the story of a usurped leader and his fiancee be the inspiration for Emily Bronte’s Withering Heights? Rose has heard the song but not read the book – The Doctor is appalled :-)
Very “2005” in its sensibilities, the story is fast paced and has an emotional heart and has the “love conquers all” vibe that the new series was proud to wear as a badge of honour.
3. The Other Side by Scott Handcock
Adam is Davros! screamed the chatrooms and forums of 2005 (also Norman Lovett was playing Davros – he wasnt and he didn’t) But Adam Mitchell (Bruno Langley of Todd Grimshaw fame) was a second companion for a very short time of the Ninth Doctor and this story takes place right after “Dalek”. The Doctor is trying to get Adam home but ends up in an abandoned cinema. In Birmingham. A cinema that is host to a phenomenon that is slowly eating the cinema – a temporal tsunami is happening and with the Doctor trapped in late Victorian times and Rose Tyler trapped in the 1920’s it is up to Adam Mitchell to prove his worth as part of team TARDIS 2005! Fast paced, urgent and having all the things that the Eccleston era is remembered for – the bond between Nine and Rose, time war guilt, a contemporary setting – this story hits the ground running and doesn’t give up. There is a truly “cold shivers” moment when Nine & Rose finally meet up again in the 1920’s after a temporal phone call and Bruno Langley shows us what Adam might have been capable of if he had been allowed more screen time. Highlight of the set? I think so.
4. Retail Therapy by James Goss
How can you have a Ninth Doctor set without the unmissable Jackie Tyler. Short answer is “you can’t” even better when the wonderful Camille Coduri reprises her role in a tale of a pyramid scheme that is literally draining the life away from the residents of the Powell estate and other similar housing projects. You see Jackie Tyler has made a success of herself, she is one of the top seller of “Glubby Glubs” the latest craze (and a steal at only £19.99) pick one up and stroke it and all your troubles sort of fade away, they give you good nights sleep and are even making Jackie look younger. The Doctor isn’t impressed, he thinks Jackie has inadvertently launched an alien invasion from her living room, but Jackie is only interested in her profit and buying a villa in Spain….
Peel away the almost camp exterior and this is quite a nasty little thriller, a parable of capitalism draining the life from consumers, who then want to buy more which then drains them some more and so on and so on. You have to LOVE Camille Coduri who slips back in to the role of Jackie as if it was still 2005.
A lovely box set that makes me feel all nostalgic (cant believe the noughties arena nostalgia) and lovingly recreates and expands on the beginnings of the rebirth of a TV legend. Cant praise Nick Briggs enough both for his narrations and his extraordinary Eccleston and I really hope we get some more either in box sets like this or as Short Trips.
Not perfect, some of the stories are rather long, but a great listen and whilst not quite a Nine, a very good 8/10.


          Gateway Shirt from Ta'veren Tees        

Nynaeve and Lan can forever guard each other's backs - and yours - with the newest tee shirt design now available for preorder from Ta'veren Tees, www.TheWheelofTimeStore.com.

"The Gateway," illustrated by Ariel Burgess, shows Lan and Nynaeve Traveling via gateway, standing ready to fight and protect each other. The front features Lan coolly guarding Nynaeve's back, while the back of the shirt features Nynaeve ready to unleash her fury on any darkfriend foolish enough to attack.

"The Gateway" is available in an unisex tee and a ladies' style tee. Both are soft, comfortable 100% cotton shirts. Sizing information is available on the product pages.

Front Male2 nomargin

Back Female1 nomargin

Preorders receive a discount and will ship on February 10, as soon as the shirt is in stock. All items ordered alongside the new shirt will be held and shipped at the same time.

Unisex: TaverenTees.com/gateway
Ladies: TaverenTees.com/gatewayladies


          God and Chickens...        
I know, I know.  It has been nearly a year since I have blogged.  I'm sorry.  I am going to start up again and hopefully slowly catch everyone up.  But for now, I just wondered something and I'll share with you my results!

Are you aware of how many times chickens are referenced in the Bible?   I was wondering this, so I did a little study yesterday.  Not that God doesn't love all of His creation, but He certainly gives our feathered critters a lot of attention/reference in The Scriptures!


Here are all of the references to "Rooster" in the bible:
  • Proverbs 30:31 the strutting rooster, the he-goat, and a king whose army is with him.
  • Matthew 26:34  Jesus said to him, “Truly, I tell you, this very night, before the rooster crows, you will deny me three times.”
  • Matthew 26:74  Then he began to invoke a curse on himself and to swear, “I do not know the man.” And immediately the rooster crowed.
  • Matthew 26:75And Peter remembered the saying of Jesus, “Before the rooster crows, you will deny me three times.” And he went out and wept bitterly.
  • Mark 13:35  Therefore stay awake—for you do not know when the master of the house will come, in the evening, or at midnight, or when the rooster crows, or in the morning—
  • Mark 14:30  And Jesus said to him, “Truly, I tell you, this very night, before the rooster crows twice, you will deny me three times.”
  • Mark 14:68  But he denied it, saying, “I neither know nor understand what you mean.” And he went out into the gateway and the rooster crowed.
  • Mark 14:72  And immediately the rooster crowed a second time. And Peter remembered how Jesus had said to him, “Before the rooster crows twice, you will deny me three times.” And he broke down and wept.
  • Luke 22:34  Jesus said, “I tell you, Peter, the rooster will not crow this day, until you deny three times that you know me.”
  • Luke 22:60  But Peter said, “Man, I do not know what you are talking about.” And immediately, while he was still speaking, the rooster crowed.
  • Luke 22:61  And the Lord turned and looked at Peter. And Peter remembered the saying of the Lord, how he had said to him, “Before the rooster crows today, you will deny me three times.”
  • John 13:38  Jesus answered, “Will you lay down your life for me? Truly, truly, I say to you, the rooster will not crow till you have denied me three times.
  • John 18:27  Peter again denied it, and at once a rooster crowed.

Here are all the references to "Hen" In the bible:
  • Matthew 23:37  [ Lament over Jerusalem ] “O Jerusalem, Jerusalem, the city that kills the prophets and stones those who are sent to it! How often would I have gathered your children together as a hen gathers her brood under her wings, and you were not willing!
  • Luke 13:34  O Jerusalem, Jerusalem, the city that kills the prophets and stones those who are sent to it! How often would I have gathered your children together as a hen gathers her brood under her wings, and you were not willing!

And finally, here are all the references of "Fowl" in the bible:
  • Leviticus 7:26  Moreover, you shall eat no blood whatever, whether of fowl or of animal, in any of your dwelling places.
  • 1 Kings 4:23  ten fat oxen, and twenty pasture-fed cattle, a hundred sheep, besides deer, gazelles, roebucks, and fattened fowl.
That equates to 17 references in 7 books of the bible.
Now doesn't that just make you smile?  
Happy Valentine's Day!!!
Kelly


          Meteor, Comet or Asteroid: What's the Difference?        
What's the difference between a meteorite, meteoroid, a comet and an asteroid? We tell you how to find your own space rock here on Earth, and hear from a scientists tracking where space rocks come down in the Australian outback. Plus, why quinoa could feed the world in future, and is vaping safer than smoking, or a gateway for a fresh legion of teen smokers?
          Last Blog For 2009        
I can't believe it's been over a month since I posted a new blog. Life has been keeping me very busy, and has been very interesting to say the least. I've learned very recently that sometimes God will give you the same circumstances that you thought you had overcome, to see how well you handle them the next go round. As I've tried to become more spiritually mature, it still isn't as easy to do the right thing, or should I say what is best for me. I still find myself in daily struggles trying to find the peace that I want in my life. I am still trying to fix things that I have no business in fixing.

As I look forward to 2010, I am striving to make myself LET GO and LET GOD! If I want peace, I need to learn to look deep inside of myself to find it with God's help. He alone can truly grant me what I need. This past week the pastor quoted one of the scriptures that I really needed to hear:

28 Come to Me, all you who labor and are heavy laden, and I will give you rest. (Matthew 11:28, New King James Version)

I am leaving all of my burdens of 2009 with God! I am letting go and letting God! I will begin 2010 with a new outlook on life, and a new sense of purpose.

May God grant you peace and prosperity in the upcoming year. Happy New Year to All!

Much Love
Nay
          Blessed Assurance        
I haven't had a lot of time to blog lately, but wanted to post something today. As Thanksgiving approaches, it reminds me of how much I have to be thankful for. The most precious gift is my Lord and Savior, Jesus Christ. We are so blessed to have been "born of His Spirt, and washed in His blood."

   
19 Therefore, brethren, having boldness to enter the Holiest by the blood of Jesus, 20 by a new and living way which He consecrated for us, through the veil, that is, His flesh, 21 and having a High Priest over the house of God, 22 let us draw near with a true heart in full assurance of faith, having our hearts sprinkled from an evil conscience and our bodies washed with pure water. 23 Let us hold fast the confession of our hope without wavering, for He who promised is faithful. 24 And let us consider one another in order to stir up love and good works, 25 not forsaking the assembling of ourselves together, as is the manner of some, but exhorting one another, and so much the more as you see the Day approaching. (Hebrews 10:19-25, New King James Version)

Let's continue to be faithful! I posted a James Ingram song earlier this week and thought I would post his version of Blessed Assurance, which I love.



Everyone have a blessed weekend!

Nay
          His Everlasting Mercy!        
 1 Praise the LORD!
         
         Oh, give thanks to the LORD, for He is good!
         For His mercy endures forever.
          (Psalm 106:1, New King James Version)

I am so very thankful for God's mercy. God is always there for us despite our sins. He is always worthy to be praised. There is one song that I listen to over and over, that I love to sing when worshipping and thanking God. I hope you enjoy it as much as I do.

Great is Your Mercy by Donnie McClurkin


This song should help you get over the hump of Hump Day! Have a blessed rest of the week.

Nay
          I'm Available - Use Me Lord!        
 1 I beseech you therefore, brethren, by the mercies of God, that you present your bodies a living sacrifice, holy, acceptable to God, which is your reasonable service. 2 And do not be conformed to this world, but be transformed by the renewing of your mind, that you may prove what is that good and acceptable and perfect will of God.   
3 For I say, through the grace given to me, to everyone who is among you, not to think of himself more highly than he ought to think, but to think soberly, as God has dealt to each one a measure of faith. 4 For as we have many members in one body, but all the members do not have the same function, 5 so we, being many, are one body in Christ, and individually members of one another. 6 Having then gifts differing according to the grace that is given to us, let us use them: if prophecy, let us prophesy in proportion to our faith; 7 or ministry, let us use it in our ministering; he who teaches, in teaching; 8 he who exhorts, in exhortation; he who gives, with liberality; he who leads, with diligence; he who shows mercy, with cheerfulness. (Romans 12:1-8, New King James Version)

God has given us all gifts, and we should humbly use our spiritual gifts to glorify Him. These verses bring to mind one of my favorite songs. This is "Lord I'm Available To You" by Rev. Milton Brunson & The Thompson Community Choir.



I've also included the lyrics, if you would like to sing along.

Verse 1
You gave me my hands to reach out to man,
to show him Your love and Your perfect plan.
You gave me my ears, I can hear Your voice so clear;
I can hear the cries of sinners,
but can I wipe away their tears?

Verse 2
You gave me my voice to speak Your word,
to sing all Your praises to those who never heard;
but with my eyes I can see
a need for more availability,
I've seen hearts that have been broken,
so many people to be free.

Chorus
Lord, I'm available to You.
My will I give to You,

I'll do what You say do,
use me Lord to show someone the way
and enable me to say,
my storage is empty and I am available to You.

Verse 3
Now I'm giving back to You
all the tools You gave to me
my hands, my ears, my voice, my eyes,
so You can use them as You please.
I have emptied out my cup
so that you can fill me up.
Now I'm free, I just want to be more available to You.

Bridge
Ah

Vamp
Use me Lord to show someone the way
and enable me to say,
my storage is empty and I am available to You.


I hope enjoy the song as much as I do. Have a blessed weekend.

Nay
          Editor's Weekly: How the Arch reflects St. Louis, for better and worse        
Like all great art, the Gateway Arch commands attention for more than its striking beauty. It also beckons us to see ourselves and our place in the world with new perspective. Most St. Louisans have looked at the Arch thousands of times, yet each moment reveals a different face. Nature works its magic on the shiny steel with the changing seasons, the time of day, the glint of sun and the blur of clouds. The thoughts and feelings the Arch inspires change, too -- from day to day and era to era, following human cycles of aspiration and insight.
          10 Best PHP Tools of 2015         
PHP is server side scripting language which can be used with HTML code to write code for developing websites. It can also be used with various templating engines and web frameworks. PHP code is processed by a PHP interpreter and then executed as Common Gateway Interface. Once it is interpreted and executed it can generate a web page, image, code or some other useful data. There are many PHP tools released daily that are free of charge  and are useful...

Read More Read More


          IP Setup for Europe Server        
Correct setup of IPv4 addresses under CentOS/Fedora/RHEL A KiosDomain server (Europe Server) can only reach its gateway (and its locally configured) IP addresses directly. All other packets need to be routed via the default gateway. Consequently, a /32 network needs to be set up (for reasons of network security). A wrong configuration (no /32 network) often...
          Re:Politics - USA        
So, the long knives are out for Bernie. I was wondering when the Clinton political machine would shift into high gear.

http://www.thegatewaypundit.com/2016/05/senator-boxer-claims-bernie-supporters-made-fear-life-scary-video/

SENATOR BOXER Claims Bernie Supporters Made Her Fear for Her Life: “It Was Scary” (VIDEO)

Senator Barbara Boxer was booed off stage as all hell broke loose at the Nevada Democratic Convention last weekend. She also claims that Bernie Sanders supporters were so unhinged that she feared for her life.

CNN reports:
" Earlier Wednesday, California’s other Democratic senator, Barbara Boxer, said Sanders supporters should attempt “to change the primary process, but not to go out there and throw chairs and to put people’s lives in danger because the democratic process as put forward and ratified by the two parties is being carried out.”

Boxer said she felt threatened after outbursts and threats at the Nevada Democratic Convention from supporters of Sanders over the weekend.

“I feared for my safety and I had a lot of security around me,” she told CNN’s Kate Bolduan on “At This Hour.” “I’ve never had anything like this happen.”

After Sanders supporters thought the Nevada Democratic Convention was being shut down prematurely, shouting ensued and there were reports of chairs being thrown. The phone number and address of the chairwoman of the Nevada Democratic Party, Roberta Lange, was posted on social media — prompting a flood of more than 1,000 calls, angry voicemails, text messages and even death threats.

“It was a scary situation,” said Boxer, a Clinton supporter. “It was frightening. I was on the stage. People were six feet away from me. If I didn’t have a lot of security, I don’t know what would have happened.”



Democrats didn’t seem to mind when Bernie supporters showed up and caused trouble like this at Trump rallies. They didn’t mind it when Bernie supporters threw punches at Trump supporters. But, now that it’s happened to them, it’s a matter of national security.

https://twitter.com/JonFeere/status/733676315656781825



          Reply #4712        
https://www.flrules.org/gateway/ruleNo.asp?id=53ER16-51
                  

How To Download...?


Frequenlty Asked Question:


1. How to download files?

You just need to fill out a quick survey to download files on our website.
It's totally free to fill out a survey. If there is no survey available for your country, then we can do nothing (the only option is premium account for you)



2. The link for the survey page is not opening or working?


If you have AdBlock, or any other adblock software and you can’t download, please disable it and try to re-download, also check if you have any IDM, Internet Download Manager, disable it or uninstall it.


3. I completed the survey, but it doesn't unlock?


Try clearing all your cookies . Then create a new email address to use with GMail.com and try the survey again using the new email address. Also make sure you're not using fake information, as the surveys have ways to detect it. Also mobile/cellphones offers are the easiest to complete and goes through all the time.



4. Why do we need to complete a survey to get access of the downloads?


The download mirror allow us to save bandwidth and at the same time keep our files safe. Server costs is very high due to the high traffic we get. The revenue earned from the surveys allow us to pay for the cost and continue creating/updating hacking programs for you guys to use at free of cost.


5. Some of Email Servers or Social Networkings hack didnt worked. What should i do? 

You need to wait that we update the hack. But dont forget there are some difficulties to make this hack. We can’t hack in 1day or 1week. So please respect us before judgeing about non-working hacks. Its fully normal situation that our hacks can be dedected by (CIA) IT Security after thousands of people download and use them.


TUTORIAL – Unlock and download any files!

STEP 1
For complete a survey properly, you need an e-mail. Use a new and different Email that you have never used before with a Survey. Using the same email that you have used before can result in the download not unlocking.

Examples of good email providers are: Gmail, Yahoo and Hotmail. Remember not to use temporary email otherwise the download not unlocking!

STEP 2
The second step is to remember a basic rule: Clear cookies before starting survey!

A cookie is usually a small piece of data sent from a website and stored in a user’s web browser while a user is browsing a website.

Cookies can also be considered bad in that they can track the sites that you visit which is a main cause in Surveys Not Unlocking the Download.

I suggest you download Ccleaner, a freeware program that will allow you to do a complete cleaning of cookies presents in your computer. You can download the latest version of this program from this link: Click

STEP 3
Disabling Pop-up blockers: I suggest you to use FireFox because this browser is perfect for complete any type of survey! Click tools, option, content tab and make sure the first box is NOT checked.

STEP 4
Complete survey! After completing the Survey on that page SYSTEM should show the message "Download is Starting Now" in the download window.

Note: if your download file does not automatically unlock after a minute, please choose another survey (Sometime this happen due to Server problem) if this happen, Try to Select New Survey and Complete it, your download will be unlock instant. Thats it! File Downloaded!

We hope that this new gateway lock will limit the number of downloads to only people who really want to use it. 


To have more info about Download please refer HOW TO DOWNLOAD Section. Click Here.


          Dell s'unit à ceux de GE, Microsoft, SAP, OSlsoft, Software AG et d'autres pour faire évoluer l'Internet des objets        
Secuobs.com : 2016-04-20 13:35:15 - Global Security Mag Online - Dell inaugure son programme de partenariat autour des solutions IoT visant à aider les clients à trouver les meilleures technologies pour concrétiser leurs projets GE, Microsoft, OSISoft, SAP et Software AG rejoignent ce programme, aux côtés d'une vingtaine d'autres sociétés Dell poursuit son déploiement dans l'IoT avec la commercialisation du Dell Edge Gateway 5100 Model maintenant livrable avec Windows 10 IoT Enterprise et cinq nouveaux accessoires et le logiciel d'administration Edge Device - RESEAU SOCIAL ET SECURITE
          Affiliate Marketing Fanatics #59: A Gateway Conference        

Affiliate Marketing Fanatics – A couple of hyper-caffeinated affiliate marketers (Mike Buechele) and (Trisha Lyn Fawver) talk about all things Affiliate Marketing. From blogging to branding, social media to search, video and more! Mike and I jump back into the saddle with this whole podcasting thing.  We talk briefly about how great Affiliate Summit West […]

Affiliate Marketing Fanatics #59: A Gateway Conference appeared first on TrishaLyn.com.


          CARA MENGKONEKSI KAN DARI WINDOWS XP KE LINUX DEBIAN MENGGUNAKAN VMWARE        

1. SETTING IP WINDOWS XP
NB: settingan Ethernet di VMware harus Bridged
 
1. Buka Start => Control Panel => Network Connection=> lalu klik kanan Local Area Network => Properties => klik Internet protocol (IP) => lalu klik properties
2. Disini saya menggunakan IP address 192.168.10.1 ,subnet mask 255.255.255.0,default IP address 192.168.10.1

3. Setelah itu di OK dan beralih ke settingan linux debian


2. SETTING IP DI LINUX
NB: Settingan Ethernet di VMware harus Bridged dan jangan lupa menggunakan administrator
Dengan cara ketik sudo su lalu ketikan passwordnya sehingga muncul tanda # contoh

Vanie-root $ sudo su
Enter root password :
Debian:~#

Lalu ketikan
1. # nano /etc/network/interfaces
2. setting ip seperti ini disini saya menggunakan windows sebagai server

# The Primary network interface
auto eth0
iface eth0 inet static
address 192.168.10.3
netmask 255.255.255.0
network 192.168.10.0
broadcast 192.168.10.255
gateway 192.168.10.1

3. setelah itu tekan ctrl +x dan enter untuk save
NB: jika tidak menggunakan administrator maka file interfaces tersebut tidak dapat di simpan.
4. setelah selesai lalu ketikan /etc/rc.d/networking restart untuk merestart network linux
5. Ping keduanya jika ada reply maka kedua komputer tersebut terkoneksi jika tidak periksa kembali settingan dari awal.
NB : untuk windows dan linux gunakan perintah ping 

          Estes Park Film Festival Announces Official Selections        

World premieres, a tribute to three time Emmy nominated actor Barry Corbin and a pre-release sneak preview on tap for the sixth annual event.

Estes Park, CO — Showcasing thirty-five of the latest independent films from around the world, the 6th Annual Estes Park Film Festival (www.estesparkfilmfestival.com) will take place September 16-18 at the Historic Park Theatre in beautiful Estes Park, Colorado at the gateway to Rocky Mountain National Park. Built in 1913, the Park Theatre is the oldest operating movie theatre west of the Mississippi and is on the national register of historic places. This September filmmakers, festival attendees and industry professionals from around the world will travel to Estes Park to enjoy the diverse selection of independent feature-length films, documentaries and short films. The festival will also honor their featured guest, three time Emmy nominated actor Barry Corbin (Northern Exposure, WarGames, Urban Cowboy), with a lifetime achievement award for his contributions to cinema and television.

Featured at this year’s opening night party is a special pre-release screening of the Sundance Film Festival Award Winner 'Happy, Happy' from Norwegian director Anne Sewitsky. In 'Happy Happy', Kaja is the perfect housewife, but when an attractive family moves in next door she struggles to keep her emotions in check. A new friendship leads to changes Kaja cannot reverse, and as Christmas time approaches it is clear that nothing will be the same again. Other feature-length films include 'Serotonin Rising' from writer Darren Foster and director Tony Perri. Described by the filmmakers as the world’s first truly “Feel Good” movie, 'Serotonin Rising' combines the heart-warming and inspirational story of two TV reporters who discover the secret to a happy and healthy life through the "Words of Wisdom" from the world's leading scientists, spiritualists and philosophers. Closing out the film festival on September 18th is 'The River Why' starring Zach Gilford, Amber Heard, Kathleen Quinlan, Dallas Roberts, William Devane and William Hurt. A big hit at film festivals across the country, 'The River Why' is the story of 20 year old Gus Orviston, the Mozart of fly fishing, who leaves his big city home in rebellion from his family to live in a secluded cabin on the banks of a wild river. 'The River Why' is a love story about the love of a man for the wilderness, and for a beautiful woman who comes to share it with him.

Documentaries in the festival include the Colorado premiere of 'Bugeaters' from filmmaker and past EPFF award winner Jim Fields. Using tinted rotoscope animation and also staging historic recreations using actors, 'Bugeaters' reveals for the first time the untold story of the first decade of Nebraska football, from 1890-1900, when the first N.U. football players were known as 'Bugeaters’. Denver based filmmaker, Alan Dominguez, presents his haunting documentary 'Photos of Angie' about the brutal killing of Angie Zapata, a transgender teen from Greeley, Colorado who was murdered in July, 2008. Other documentaries include 'Bring the Riding to the People' about volunteers coming together to build municipal mountain bike parks in three very different communities, and the Duplass Brother’s (Baghead, Cyrus) musical hero Kevin Gant makes his triumphant return to the music scene in their debut documentary 'Kevin'.

Five diverse and very entertaining programs of short films round out the festival schedule and include the very popular Student Film Program which showcases films from undiscovered student filmmakers representing such schools as New York University, University of Denver, and Lora L. Batchelor Middle School in Bloomington, IN. Other short film programs include the animated comedy 'Gus' from Australian filmmaker Andrew Martin, and the terrifying 'Nobody But Her' about 8-year old Greta and the mystery surrounding her grandmother’s strange death.

Many of the filmmakers will be on hand to introduce their films and will be a part of a filmmaker panel discussion on the creative process of getting their films from script to screen. There will also be plenty of parties where attendees can mingle with the filmmakers and special guests. For a complete schedule of film screenings, parties and panel discussions visit www.estesparkfilmfestival.com or call 970-231-2580. Advance tickets and passes to the festival are available online or at the Park Theatre box office.


          5th Annual Estes Park Film Festival (Sept. 17-19)        
World premieres, special guests and a pre-release sneak preview on tap for the fifth annual event.

Estes Park, CO -- Showcasing 35 of the latest independent films from around the world, the 5th Annual Estes Park Film Festival will take place September 17-19 at the Historic Park Theatre in beautiful Estes Park, Colorado at the gateway to Rocky Mountain National Park. Built in 1913, the Park Theatre is the oldest operating movie theatre west of the Mississippi and is on the national register of historic places. This September filmmakers, festival attendees and industry professionals from around the world will travel to Estes Park to enjoy the diverse selection of independent feature-length films, documentaries and short films. The festival will also honor their featured guest, actor Art LaFleur (Field of Dreams, The Sandlot, Santa Clause 2 and 3), with a lifetime achievement award for his contributions to cinema and television.

Featured at this year’s opening night party is a special pre-release screening of the critically acclaimed comedy “Barry Munday” starring Patrick Wilson and Judy Greer. Filled with an ensemble of unusual characters including Cybill Shepherd and Chloe Sevigny, “Barry Munday” is the surprisingly heart-warming tale of a guy who finds it took losing his manhood to be a better man. Other feature-length films include “Earthwork”, based on the true story of a Kansas crop-artist (played by John Hawkes of ABC’s “Lost”) who risked it all to create a multi-acre piece of art in New York. “Earthwork” is directed by Chris Ordal and has already won several film festival awards across the country. The Colorado premiere of “Last Breath” might just be one of the most original films in this year’s line-up with its creative blending of horror, drama and romance. The film, directed by Kansas native Ty Jones, tells the story of a husband and wife who find themselves imprisoned by a sadistic killer - forced to make choices that will ultimately determine their family's survival or demise.

Documentaries in the festival include the world premiere of “The Great Mystery” from Boulder filmmaker Catherine Corona. In the film Corona explores the essence of Hinduism, Islam, Judaism, Tribal Spirituality, Christianity and Buddhism through the eyes of a salty old cowboy, a 5th grader, a Tibetan Monk, one of the first woman Rabbis, Muslim teens and many others. 2007 EPFF best documentary winner, Chris Metzler, premieres his latest documentary “Everyday Sunshine: The Story of Fishbone” about one of the most dynamic and shamefully over looked bands in rock music. The iconic Laurence Fishburne narrates “Everyday Sunshine”, which feature interviews with Gwen Stefani, Perry Farrell, Branford Marsalis, George Clinton and Tim Robbins. The most elaborate and scenic documentary ever produced about Rocky Mountain National Park will also make its world premiere at the festival. “Rivers of the Rockies” is about the watershed of Rocky Mountain National Park and the wildlife it supports. The film is written and produced by award winning Estes Park filmmaker, Nick Molle.

Four diverse and very entertaining programs of short films round out the festival schedule and include the student film “Breakaway” from up and coming Colorado filmmaker Clifton Archuleta, and the hilarious short comedy “The Armageddon Kitty” making its world premiere in Estes Park. Other short films include the international drama “Siren” from Hungarian filmmaker Andras Novak and “In Times of War: Stories of Colorado Veterans” - a moving and inspirational documentary highlighting the stories of five veterans who fought during World War II, Korea and Vietnam.

Many of the filmmakers will be on hand to introduce their films and will be a part of a filmmaker panel discussion on the creative process of getting their films from script to screen. There will also be plenty of parties where attendees can mingle with the filmmakers and special guests including actor Art LaFleur, and industry representatives from Universal Pictures and Fox Searchlight Pictures. For a complete schedule of film screenings, parties and panel discussions visit www.estesparkfilm.com or call 970-231-2580. Advance tickets and passes to the festival are available online or at the Park Theatre box office.

###

          Estes Park Film Festival Announces Official Selections         

World premieres, special guests and a pre-release sneak preview on tap for the fifth annual event.

Estes Park, CO August 24, 2010 -- Showcasing 35 of the latest independent films from around the world, the 5th Annual Estes Park Film Festival will take place September 17-19 at the Historic Park Theatre in beautiful Estes Park, Colorado at the gateway to Rocky Mountain National Park. Built in 1913, the Park Theatre is the oldest operating movie theatre west of the Mississippi and is on the national register of historic places. This September filmmakers, festival attendees and industry professionals from around the world will travel to Estes Park to enjoy the diverse selection of independent feature-length films, documentaries and short films. The festival will also honor their featured guest, actor Art LaFleur (Field of Dreams, The Sandlot, Santa Clause 2 and 3), with a lifetime achievement award for his contributions to cinema and television.

Featured at this year’s opening night party is a special pre-release screening of the critically acclaimed comedy “Barry Munday” starring Patrick Wilson and Judy Greer. Filled with an ensemble of unusual characters including Cybill Shepherd and Chloe Sevigny, “Barry Munday” is the surprisingly heart-warming tale of a guy who finds it took losing his manhood to be a better man. Other feature-length films include “Earthwork”, based on the true story of a Kansas crop-artist (played by John Hawkes of ABC’s “Lost”) who risked it all to create a multi-acre piece of art in New York. “Earthwork” is directed by Chris Ordal and has already won several film festival awards across the country. The Colorado premiere of “Last Breath” might just be one of the most original films in this year’s line-up with its creative blending of horror, drama and romance. The film, directed by Kansas native Ty Jones, tells the story of a husband and wife who find themselves imprisoned by a sadistic killer - forced to make choices that will ultimately determine their family's survival or demise.

Documentaries in the festival include the world premiere of “The Great Mystery” from Boulder filmmaker Catherine Corona. In the film Corona explores the essence of Hinduism, Islam, Judaism, Tribal Spirituality, Christianity and Buddhism through the eyes of a salty old cowboy, a 5th grader, a Tibetan Monk, one of the first woman Rabbis, Muslim teens and many others. 2007 EPFF best documentary winner, Chris Metzler, premieres his latest documentary “Everyday Sunshine: The Story of Fishbone” about one of the most dynamic and shamefully over looked bands in rock music. The iconic Laurence Fishburne narrates “Everyday Sunshine”, which feature interviews with Gwen Stefani, Perry Farrell, Branford Marsalis, George Clinton and Tim Robbins. The most elaborate and scenic documentary ever produced about Rocky Mountain National Park will also make its world premiere at the festival. “Rivers of the Rockies” is about the watershed of Rocky Mountain National Park and the wildlife it supports. The film is written and produced by award winning Estes Park filmmaker, Nick Molle.

Four diverse and very entertaining programs of short films round out the festival schedule and include the student film “Breakaway” from up and coming Colorado filmmaker Clifton Archuleta, and the hilarious short comedy “The Armageddon Kitty” making its world premiere in Estes Park. Other short films include the international drama “Siren” from Hungarian filmmaker Andras Novak and “In Times of War: Stories of Colorado Veterans” - a moving and inspirational documentary highlighting the stories of five veterans who fought during World War II, Korea and Vietnam.

Many of the filmmakers will be on hand to introduce their films and will be a part of a filmmaker panel discussion on the creative process of getting their films from script to screen. There will also be plenty of parties where attendees can mingle with the filmmakers and special guests including actor Art LaFleur, and industry representatives from Universal Pictures and Fox Searchlight Pictures. For a complete schedule of film screenings, parties and panel discussions visit www.estesparkfilm.com or call 970-231-2580. Advance tickets and passes to the festival are available online or at the Park Theatre box office. Those interested in volunteering at the festival can also attend a Volunteer Orientation Meeting at the Estes Park Library on August 28th at 3:00 PM.


          Reply #3644        
I didn't bother to look at the odds, but these do look noticeably better than past games. That said, these pages aren't actually live yet so there is the chance they could change. The FLRules (You'll see it pop up at the bottom of this page when it does: https://www.flrules.org/gateway/ChapterHome.asp?Chapter=53ER16) filing should be in by Friday I would expect, which will answer the question.
          Re: Cristol: Pedestrian-Only Street Can Help Make Rosslyn a Destination        

Should make a great gateway to the gondola station


          Tamil astrology 2011 predictions for simma rasi        
Can download telugu tula rashi pubba nakshatra free monthly horoscope predictions. January 2010 fixtures, tamil great king vikramaditya in hindu. Saturnsymbol a triumphal gateway decorated. This article gives you phalguni, uttaraphalguni 1st padainfo...
          SAÇ: Fırtına Cephesi & Kırağıateşi Golemi Paketi        
Sıcaklardan önce kış son bir kez Neverwinter 'a geldi. Silah Altına Çağrı! Buz Devi Kont Hrimnir, ordusunun üzerini örtmek için büyü yoluyla buzlu bir tipi çağırdı. İşgali kılıç ve büyüyle püskürtürken, Moradin'in sunaklarını yakarak tipiyi def et! Buz devleri Neverwinter'ı işgal edemeyecek. SAÇ: Fırtına Cephesi başlangıç zamanı: 7 Mayıs 2015 Perşembe TSİ 20:00 SAÇ: Fırtına Cephesi bitiş zamanı: 14 Mayıs 2015 Pazartesi TSİ 20:00 Silah Altına Çağrı Çarpışma müsabakası etkinliğinde yeniyseniz, bütün seviyelerden (6'dan 60'a) bütün oyuncular için mevcut. Ayrıca etkinlik etkinken bütün müsabakalar için istediğiniz zaman kuyruğa girebilirsiniz. Daha fazla bilgi için Koruyucu'nun Yerleşimi'ndeki Müsabaka Kürsüsü'nde bulunan Garora Oakhew ile konuşun. Tipiyi def etmek ve işgali püskürtmek için maceracılar aşağıdaki ödülleri sabırsızlıkla bekleyebilir: Kırağıateşi Golemi: Kırağıateşi yapıları inşa etmenin sırrı, kısa süre önce ortaya çıkarıldı ve artık maceracılar bu güçlü golemlere erişim kazanmaya başladı. Yeşil kalite yoldaş olarak, Kırağıateşi Golemi Maksimum Düzey 20'ye sahiptir. Kırağıateşi Golemi'nden gelen aktif bonus size ek 500 SP verir. Ek olarak aynı süre zarfında Kırağıateşi Golemi Paketi 'ni Zen Pazarı'nda  satıyoruz. Paket, Kırağıateşi Golemi, Yoldaş Teçhizatı, 12 adet Yoldaş Tecrübe Puanı El Yazması ve 3 adet Zayıf Bağlayıcı Rüntaşı içerir Yoldaş Teçhizatı – Yeni yoldaşını sadece bu paketten elde edilebilecek özel yoldaş teçhizatı kuşatın. Bu eşsiz eşyalar yoldaşını kuvvetlendirecek ve savaşlarda daha etkin kılacak. 12 Yoldaş Tecrübe Puanı El Yazması- Yoldaşını seviye 30 yapacak kadar vaktiniz yok mu? Bu el yazmaları arkana gücü ile titreşiyor ve çağrılmış yoldaşına 35,500 Tecrübe Puanı verecek. Artık yoldaşına dakikalar içinde seviye atlatabilirsin! Zayıf Bağlayıcı Rüntaşı – Bu Rüntaşı yoldaşına bonuslar ve ek istatistikler verir. Yoldaşın bir gücü etkinleştirdiğinde, size 20 saniyeliğine Yoldaşının istatistiklerinin %20'sini veren Yoldaş'ın Hediyesini verebilir. Saldırı yuvasına yerleştirilirse: +260 Güç Savunma yuvasına yerleştirilirse: +260 Savunma Yoldaş Seti tecrübeli maceracılar ve Neverwinter'da yeni olanlar için mükemmel. Kırağıateşi Golemi Yoldaş Setini Zen Pazarı'nı sonsuza kadar terk etmeden önce hemen alın! Yabani Efsunu: Oyuncular düşmanları katlederek Düzey 1 veya 2 efsunlar alacak ve her Silah Altına Çağrı çarpışması sonunda Düzey 5'e kadar Yabani Efsunu alabilecek! Üşüten Rüzgar Boya Paketi:  Bu yeni boya paketiyle havalı görünün. Kuzeyin karlı dağlarına uyum sağlamakta hiç sorun yaşamayın! Buzul Silah Dönüşüm Eşyaları:  Silahlarınızı canavarlaşmış bir buzuldan dövdükçe, silahınız Buzul Silah Dönüşüm Eşyalarıyla buzlu bir görünüm alacak. Garora Oakhew Çarpışması'ndan elde ettiğiniz Savaş Madolyonlarını bunları almak için verin. Kılıç Sahili Maceraları Oyuncular, web veya mobil tarayıcılarıyla ulaşabilecekleri Gateway üzerindeki Kılıç Sahili Maceraların'da özel bir zindan bulabilirler. Zindan'da Frastr (Buz Devi) ile savaşabilir ve bütün meydan okumalardan Savaş Madalyonları kazanabilirler. Unutulmuş Diyarlar'ı Frastr'dan korumaya hazır mısınız? Bizi resmi Neverwinter forumunda bilgilendirin. Daha fazla oyun detayları, ekran resimleri ve videolar mı istiyorsunuz?   Neverwinter 'ı Facebook'ta beğenin ve hayranlara özel daha fazla içerikten faydalanın. Bizi Twitter'da takip ederek  sorularınızı bize ulaştırın! Ve YouTube kanalımıza abone olarak en yeni Neverwinter videolarını izleyin.
          Yama Notları: NW.45.20150416c.4        
  Sınıflar ve Denge   Genel: Düzey 4 Paragon güçleri, artık oyuncu seviye 70'e ulaşıncaya ve 70 güç puanı harcayıncaya kadar olması gerektiği gibi kilitli. Yeni sınıf güçlerinin birçoğuna küçük efekt ve animasyon güncellemeleri eklendi.   Kontrol Büyücüsü Arkana Gücü Sahası: Artık yanlışlıkla art arda Seviye Atlama efektini oynatmıyor. Hapis: Artık Büyü Ustalığı Yuvası'na düzgünce yerleştirilebiliyor.   Sadık Ruhban Acelecilik Işığı'nın gerekenden daha fazla Eylem Puanı vermesi sorunu giderildi.   Kurnaz Düzenbaz Bıçak Sırtı: Kan Banyosu, artık bu beceriyi olması gerektiği gibi sadece bir kez tetikliyor. Baskıcı Karanlık: Artık düzey başına %5 değil %10. Bu güç, artık tüyo açıklamasıyla uyumlu.   İçerik ve Çevre   Boğulmuş Sahil Nefessiz: Hava Soluma Kolyesi'nin düşme oranı artırıldı. Boğulmuş Sahil'e artık "Sahil Koruma" görevini almadan da ulaşmak mümkün. Çaresiz Tüccarlar: Bu Kahramanca Karşılaşma'nın sayacı, 9 saniyeden 15 dakikaya çıkarıldı. Çalınan Hatıralar: Bekçi Andaçları'nın düşme oranı az miktarda artırıldı. Ateşten Çukur Kazılmış Mezar: Son odaya girişte gerekenden daha fazla oynatılan ara sahne bir defa oynatılacak şekilde düzeltildi. Bu bölgedeki görevlerde birçok hata düzeltmesi ve metin iyileştirmeleri yapıldı.   Islah Kayası Birçok göreve aralarında daha fazla Portal ve Kara Mantolar'ı çağırmak için daha fazla Tomarın da bulunduğu ilave hedef eklendi. Artık Helm'in Katedrali'nin içinden Yara Kalesi'nin dışına açılan bir tünel var. Sharandar: Yakarış alanındaki beyaz küre kaldırıldı. Döner Tümsek: Mitral Noktası Savaşı Kahramanca Karşılaşması, artık 15. dakika takılmıyor, 20 dakikayı tamamlıyor. Örümcek Tapınağı: Lord Jevan Halvar'ın önünde artık bir kamp ateşi var. Tiamat'ın İstifi Bağışı, artık her saat değil haftada bir sıfırlanıyor. Tiamat, halen her saatin sonunda dövüşe hazır. Eğitim: Oyuncuların takılan bir görev içinde sıkışıp kalmalarına ve ilerleyememelerine sebep olan bir sorun giderildi.   Tyranny of Dragons: Hayalet Hikayeleri: Hayalet Hikayeleri görevi içindeki tüm alanlar, artık seviye 70'e olması gerektiği gibi ölçeklendiriliyor ve böylece bölge biraz daha kolay yönetilir hale geliyor. Yüksek seviye "Mühür Tüccarları", mühür satmadıkları gerçeği göz önünde bulundurularak düşük seviye denkleri olan "Mühür Tacirleri" olarak güncellendi. Koruyucu'nun Yerleşimi'ndeki yüksek seviye mühür taciri için "Tekboynuz ve Drake" yerine daha genel bir isim belirlendi ve tacir haritada bir simgeyle belirtildi.   Düşmanlar   Ölüm Slaadı: Bulutölümü, artık %150 daha fazla hasar veriyor. Valindra: Dinsiz Ateş, artık efekt alanı dışındaki oyunculara etki etmiyor.   Eşyalar ve Ekonomi   Zırh Kitleri: Tüyo açıklaması, seviye değil eşya seviyesi gerektiğini daha açık ifade edecek şekilde değiştirildi. Eserler: Aurora'nın Tüm Diyarlar Kataloğu, Thaylı Ölü Kitabı ve Belial'ın Portal Taşı gibi bir dizi Mitik eserin geliştirilmiş hasara sahip olmaması sorunu giderildi. Depolama Çantaları: Eşyaların tümü, artık Kuşanıldığında Bağlanır cinsten. Yuvaya yerleştirilmiş mevcut tüm çantalar bağlanır hale gelecek. Kara Buz ekipmanı, yeniden sadece 1.000 Ham Astral Elmas karşılığında değil Kara Buz karşılığında kurtarılabiliyor. Kanhırsızlığı: Artık gerektiğinden fazla kez tetiklenmiyor. Çalısarılışı Efsunu: Düzey 11 ve 12 eşyaları artık mevcut ve yaratılabiliyor. Bulette: Animasyonlar ve efektler, az oranda değiştirilerek geliştirildi. Yoldaşlar Artırma yoldaşı istatistikleri, Efsanevi olduğunda artık azalmak yerine artıyor. Zihin Yutan etkin bonusu artık olması gerektiği gibi çalışıyor.   Arkonlar ve Kambion Magus gibi bazı yoldaşların Kılıç Sahili Maceraları'nda kullanılamaması sorunu giderildi.   Yoldaşların Efsanevi bonusunun 11 saniye sonra fayda sağlamaması sorunu giderildi. Günlük zindan bonus ödülleri, özellikle de uygun destansı zindanlar tamamlanarak elde edilen "Element Zulası" ve "Koruyucu Zulası" ödülleri, aşağıdaki değişikliklere tabi tutuldu: Bir günlük zula alındıktan sonra, oyuncu o zulayı bir kez daha almaya günlük sıfırlamadan sonra hak kazanacak. Bu sıfırlama, artık zula alındıktan 18 saat sonra değil TSİ 12.00'de yapılacak. Oyuncu, bir zindan tamamlayarak yeni bir zula alabilmek için önceki günden herhangi bir zula açmak zorunda. Bunun yapılamaması, zulanın kaybedilmesine yol açabilir ancak oyuncu eski zulasını uygun bir şefi yendikten hemen sonra açarsa, yeni günün zulasını hemen alabilecek.   Dehşet Yüzüğü: Dehşet Halkası'ndaki Ödülcü Başı, artık "Dehşet Halkası Hazine Zulası"nı sadece 40 oniks parçasına satacak. Zulanın içinde oyuncunun mevcut seviyesine uygun az bulunur veya ender kalitede bir yüzük, kolye veya bel eşyası bulunuyor.   Seviye 72 ve üzeri düşmanlar, artık oyuncu seviye 70'e çıkmamış olsa da eşyaları olması gerektiği gibi düşürüyor. Büyülenmiş Mulhorand Topuzu ve Kalkanı, artık seviye 60'tan sonra olması gerektiği gibi ölçekleniyor. Gond'un Demirci Çekici: Mitik kalite Gond'un Demirci Çekici, artık eşya kalitesini %55 artıran Mitik kalite bir araç sağlıyor.   Gateway: Günlük KSM ödüllerinin karakter seviye 60 ile 69 arasındayken %20 olasılıkla hiçbir şey vermemesi sorunu giderildi.   Seldarine'in Büyük Kemeri: Seldarine'in Büyük Kemeri'nin destansı ve efsanevi kalitelerde olması gerekenden daha az kabiliyet puanı vermesi sorunu giderildi. Ak Ejderha'nın Kalbi: Bu eser, artık oyuncu seviyesinde olması gerektiği gibi etkinleşiyor. Yaşamiçen Efsunu: Yaşamiçen efsununun açıklaması, davranışını daha iyi tarif edecek şekilde düzeltildi. Kil Örgüsü Efsunu: Bu efsunun sebep olduğu yere çivilenme, artık Kalabalık Kontrolü bağışıklığını bozmuyor. Lostmauth Eser Seti: Bu set bonusu, artık sıkça kullanılan güçlerde yanlışlıkla hemen tetiklenmiyor.   Meslekler: Adamantium mücevher işçiliği boyun eşyaları gibi birkaç meslek eşyasının ismi, birbiriyle tutarlı olacak şekilde düzeltildi. Saf Dehşet Efsunu: Bu efsunun sebep olduğu yere çivilenme, artık Kalabalık Kontrolü bağışıklığını bozmuyor. Sharandar Hazine Zulası'nın ve Icewind Dale Hazine Zulası'nın oyuncunun mevcut seviyesinden bağımsız olarak seviye 58 ile 60 arası ödüller vermesi sorunu giderildi. Zindan Efendisi Rehberi, zindan bonusu uygunluğunu artık "alınan bonuslar" olarak değil "günün mevcut bonusları" olarak gösteriyor. Paladin eser silahı "Elemental Ateş Uzunkılıcı", "Elemental Ateş Topuzu"na dönüştürüldü; buna uyumlu olarak eşyanın dış görünümü de değiştirildi. Aşağıdaki eşyaların simgeleri güncellendi: Element Mührü, Element Zulası, Koruyucu Mührü, Koruyucu Zulası. Element Çarkı: Eser tüyosunda, artık verdiği geçici sağlık ve zamanla aktarılan iyileşme etkisinin süresi belirtiliyor.   Performans ve Kararlılık Oyuna dışarıdan giriş yapıldığında gölgelendirmelerin ve malzemelerin yeniden oluşturulmasını gerektiren durum çözüldü. Harita değiştirirken meydana gelen çökme ve bağlantı kopmaları giderildi. Bir Foundry Görevi haritasına girilirken meydana gelen çökme ve bağlantı kopmaları giderildi.   Kullanıcı Arayüzü Eylem Puanı sayacı, artık Ant İçmiş Paladin'in Eylem Puanı'nı nasıl kazandığını açıklıyor. Koleksiyonlar: Bir dizi koleksiyon, eşyaların nerede ve nasıl bulunacağına açıklık kazandıracak şekilde güncellenerek geliştirildi. Geçmiş: Kökenler, artık seçilen tüm Kökenler için doğru versiyonu gösteriyor. Dükkanlardaki bazı eşyaların hatalı hizalanmış tüyoları düzeltildi. Seviye Atlama Sihirbazı: Bu arayüz, artık Sharandar ve Dehşet Halkası gibi zaten başlamış olduğunuz içeriğe gitmenizi önermiyor. İşleme: Tek eşyalar yerine artık eşya birikimleri yuvalara yerleştirilebiliyor. Tek seferde en fazla beş işleme eşyası birikimi kullanılabiliyor. Yuvaya yerleştirildiğinde birikimin tahmini toplam İşleme Puanı değeri, İşlendiğinde ise gerçek toplam değer (krit) görüntüleniyor. Zen Pazarı: Filtre açılır menüsü yerine alt kategoriler geri getirildi.    
          Etkinlik: Gond'un Harikaları        
  İcatların ilahı Gond, ölümlülere yaratmak için ilham verirken, bu icatların sonuçlarıyla ilgilenmez. Gond Neverwinter'ın teşvike gereksinimi olduğuna karar verdi, değerli ve yenilikçi eşyalar imal eden zanaatkârlar ve mühendislere ödüller sunmaları için Ruhbanlarını gönderdi.   16 Nisan 2015 tarihinden itibaren oyuncular Gond'un Harikaları Müsabakasına katılabilecekler. Maceracılar, muhteşem yeni eşyalar yaratırken zanaatkarlık ve mühendislik yetenekleriyle gösteriş yapacaklar!   Etkinlik Başlangıcı:16 Nisan 2015 Perşembe Saat: 20.00 Etkinlik Bitişi: 20 Nisan 2015 Pazartesi Saat: 20.00   Dahası, oyuncular Nevverwinter Gateway'ini kullanarak Kılıç Sahili Maceraları boyunca müsabaka eşyaları toplayabilecekleri gibi Müsabaka Meslek Görevlerini tamamlayarak işleme eşyaları da toplayabilecekler.   Müsabaka nasıl işliyor? Neverwinter boyunca tehlikelere atılırken oyuncular düşmanları öldürerek düşürülen Harika Lastik Rondelalar toplayabilecekler. Bu minik mekanik bileşen o kadar ilginçtir ki bunlardan daha fazlasının bir araya getirilmesiyle ne kadar olağanüstü aygıtların yaratılabileceğini keşfetmek için oyuncuları teşvik eder.   Aynen mevcut işleme sistemi gibi oyuncular Harika Lastik Rondelaları bir araya getirerek daha üst kademe eşyalar yaratabilirler. Oyuncular eşya düzeylerinde ilerledikçe daha fazla işleme puanına ihtiyaç duyarlar. İşleme puanları sadece Düzey 4 Harika Araç, Düzey 2 Harika Çark ve Düzey 3 Harika Dişli gibi Harika eşyalar kullanılarak kazanılabilir.     Neverwinter yaratıklarından Harika eşyalar bulunabileceği gibi, düzey 3 Dişli yaratabilen oyunculara düşük kademe Harika müsabaka eşyalarıyla birlikte sınırlı süreli bir meslek vazifesi sunulur.   Oyuncular ne ödüller kazanabilir? Oyuncular Zamazingo adındaki zirve aygıtını yaratabilene kadar Harika eşyaları geliştirmeye devam ederler. Bu aygıt mekanik ustalığının zirvesini sunar ve kaliteli zanaatkarlığı Gond'a hayranlık verir. Bu eşya sadece düşmanlarınıza hasar vermez, Gond Aygıtı Bineğini edinme fırsatı için de kullanılabilir!   Koruyucunun Yerleşkesi'ndeki Müsabaka Kürsüsü'ndeki tacire müsabaka eşyalarını vererek oyuncular ödüller kazanabilecekler.   Harika Yaratımları Paketi – Maliyet: Zamazingo (Düzey7)   Müsabaka sırasında zanaatkarlığın ve ustalığın en üst seviyesine ulaşmanın büyük bir ödülü. Bu paket eşsiz Gond'un Aygıtı bineği kazanma şansının yanı sıra Demirci yoldaşı (link ver) dahil diğer birçok eşyayı kazanma şansını içerir.     Demirci Kıyafet Seti – Maliyet: Zımbırtı (Düzey 6)   Koruyucunun Yerleşkesi'ndeki herkesin sizin Neverwinter'daki en iyi zanaatkârlardan biri olduğunu bilmesini ister misiniz? Bu kıyafet setiyle kimse yeteneklerinizden kuşku duymayacak. Bu kıyafet seti, Emniyet Gözlüğü, bir önlük ve Demirci Pantolonu sunar.     10x Mechanik Sunak – Maliyet: Alet (Düzey 5)   Tabi ki normal bir taşınabilir sunak kullanabilirsiniz ama Mekanik Sunaktaki yakarış, zanaat kaynakları ve mülkleri olarak ödüller bahşeder. Bu size sonraki müsabaka meslek vazifesini tamamlamak için gerekli desteği verebilir.     Harcanabilir Zamazingo – Maliyet: Araç (Düzey 4)   Müsabaka eşyalarını yarıya kadar geliştirmenin ödülü olarak bir Zamazingo alabilirsiniz; tek farkı düzey 7 olanından daha az güçlüdür ve harcanabilir.   Gond'un Oyuncak Aygıtı – Maliyet: Dişli (Düzey 3)   Bu tek kullanımlık eşya Gond'un Aparatı'nı bir süreliğine minyatür boyutuna küçültür. Hiç kuşku yok ki Kalite Kontrol departmanımızın oluşturması için yeni bir Lego Projesi olacak!     Yeni Eşya: Şablon   Zamanınız mı daralıyor ya da Gond'un Aparatını almak için son bir işleme desteğine mi ihtiyacınız var? Müsabaka boyunca oyuncular, 1800 işleme puanı almak için kullanılabilen Şablonu Zen Marketten satın alabilecekler. (Not: bu eşya sadece müsabaka eşyaları için işleme puanı kazanmada kullanılabilir) Gond'a maceracıların ne kadar özgün ve hünerli olabileceğini göstererek birçok eşsiz eşya ödülü aınl! Hangi ödül eşyaları sizi heyecanlandırıyor? Resmi Neverwinter forumlarında bize bildir!   Dungeons & Dragons MMORPG Neverwinter’a kayıt olmak için buraya tıklayın. Neverwinter’ın en iyi özelliği: Oynaması ücretsiz olması! Hemen Neverwinter Paketi alarak, Kuzey’in Kahramanı olun!     Oyunla ilgili daha fazla bilgi, ekran görüntüleri ve videolar için Neverwinter Facebook sayfamızı beğenmeyi unutmayın! Ayrıca Twitter sayfamızı takip edebilir ve youtube videolarına göz atabilirsiniz.
          [Rehber] Astral Elmas        
Yeni Neverwinter oyuncularının sıkça sorduğu sorulardan bazıları, "Astral Elmas nedir?", "Onları ne için kullanabilirim?" ve "Nasıl daha fazla elmas elde ederim?" şeklinde oluyor. Gelin, hep birlikte inceleyelim!   Astral Elmas nedir? Astral Elmas, oyundaki en faydalı para birimlerinden biridir ve Neverwinter'ın gerçek para birimi olan ZEN ile uyum içinde çalışır. Müzayede Evi ve oyundaki çeşitli zaman kazandırıcılar gibi birçok hizmet için temel para birimi olarak Astral Elmas kullanılır. Neverwinter'da yoldaşlara seviye kazandırma gibi bazı işlerin tamamlanması zaman alır fakat aceleniz varsa, bu süreci Astral Elmas kullanarak hızlandırabilirsiniz.  Ayrıca, Astral Elmas Takası'ndan faydalanarak Astral Elmaslar'ı ZEN'e dönüştürebilir, tersini de yapabilirsiniz!   Astral Elmas nasıl kazanılır? Neverwinter'da Astral Elmas kazanmanın birçok yolu vardır! Aşağıda, en etkili olanların ve en sık kullanılanların kısa bir listesini inceleyebilirsiniz. Müzayede Evi'nde Eşya Satışı: Bir zindana girip karakterinize faydası dokunmayan ganimet toplarsanız, bunu Müzayede Evi'nde satıp para kazanabilirsiniz. Önceden de belirttiğimiz gibi, Müzayede Evi'nde geçerli olan para birimi Astral Elmas'tır ve burada eşya satarak güzel bir kâr sağlayabilirsiniz. Günlük Görevler: Günlük Görevler, Astral Elmas sahibi olmanın en sık başvurulan yoludur. Tamamlandığında Astral Elmas kazandıran birçok farklı türde Günlük Görev (PvP, PvE Zindanları, PvE Çarpışmaları ve Foundry Görevleri) alabilirsiniz. Ödüller, bir Günlük Görevden diğerine farklılık gösterir. Günlük Görevleri başlatmak için Koruyucu'nun Yerleşimi'ndeki Rhix ile konuşun veya Çıkarma Sayfası'nda onları kendiniz etkinleştirin! Müsabakalara Katılım: Yarım saatte bir, bazı özel etkinlikler sayesinde bonus ödüller kazanma şansı yakalarsınız. Özel bir müsabaka olan Çarpışma gibi bazıları, size fazladan Astral Elmas kazandırır. Müsabakalar, varsayılan olarak ekranın sağ üst köşesinde veya Çıkarma Sayfası'nın alt kısmında görülür. Meslekler: Liderlik Mesleği sayesinde mülklerinizi Astral Elmas toplamaya gönderebilirsiniz. Liderlik Mesleğinde ne kadar ilerlerseniz, o kadar büyük ödüller kazanırsınız! Ayrıca, Gateway sayesinde bütün gün boyunca zanaatkarlık yapabilirsiniz: https://gateway.playneverwinter.com/ ZEN Satışı: Astral Elmas Takası'nı kullanarak ZEN'i Astral Elmas'a dönüştürebilirsiniz (bu konuda daha fazla bilgiyi bu yazının sonunda bulabilirsiniz). Yakarış: Neverwinter'da kamp ateşlerinde her saatte bir defa Yakarabilirsiniz. Yakarış, size aralarında Astral Elmasların da olduğu çeşitli bufflar ve bonuslar kazandırır! 24 saatlik bir süre zarfında Yakardığınız ilk üç sefer için Astral Elmas kazanırsınız. Bu, Astral Elmas kazanmanın hızlı, sürekli ve çok kolay bir yoludur. Kaçırmayın! Eşya Takası: Doğru NPC ile konuştuğunuz takdirde, bazı oyun içi eşyalarına karşılık doğrudan Astral Elmas alabilirsiniz. Örneğin; Rhix, kilitli kutulardan elde edilen Mücevherli İdol gibi eşyalara karşılık Astral Elmas vermeye hazırdır. Lord Neverember Astral Elmas Günlük Görevi: Tüm seviye 60 karakterler, mutlaka Çavuş Knox ile konuşarak kendisinden "Koruyucu'nun Huzuruna Çıkmak" görevini almalıdır. Bu görev, sizi bizzat Lord Neverember'a götürür. Danışmanları, size orada seviye 60 karakterleri ne gibi içeriklerin beklendiğini anlatır. Ardından, Neverember seviye 60 karakterlere ödül olarak okkalı miktarda Astral Elmas vadeden bir Günlük Görev sunar. Ona her gün uğradığınızdan emin olun zira kendisi Rhix'ten daha cömerttir! Kurtarma Sistemi: Koruyucu'nun Yerleşimi'ndeki Yedi Güneş Seyyar Pazarı'nın batı ucunda, bir Kurtarma Taciri ve istasyonu bulunur. Burada, Ham Astral Elmas karşılığında mor kalite teçhizat kurtarılabilir. Harika Foundry Görevleri Oluşturma: Bir Foundry yazarı iseniz, oyuncular görevlerinizi oynayıp değerlendirdikten sonra size ortaya koyduğunuz harika çalışma için Astral Elmas cinsinden "bahşiş bırakarak" teşekkür edebilir. Daha fazla bilgiye Neverwinter Wiki sayfalarından ulaşabilirsiniz!   Astral Elmasları oyunda nasıl kullanırım? Kazanılan Astral Elmaslar oyunda kullanılmadan önce işlenmelidir. Astral Elmas kazandığınızda, elinize geçen çoğu kez işlenmemiş Ham Astral Elmas olur. Bunlar envanterinizde saklanır ancak bu haliyle kullanılamaz. Oyunun bu elmasları otomatik olarak işlemesini bekleyebilir veya envanterinizdeki para birimi sekmesini açarak "İşle" düğmesine tıklayıp işlenmemiş Astral Elmasları işleyebilirsiniz (günde en fazla 24.000 elmas). Böylece, bu Astral Elmaslar toplam Astral Elmas havuzunuza eklenir. Bu noktadan sonra, Astral Elmaslarınızı nasıl kullanacağınız size kalmış! Meslek vazifelerini hızlandırmak, sevdiğiniz bir nesnenin görünümünün kopyasını yapmak, Müzayede Evi'nde yeni destansı teçhizat satın almak ve çok daha fazlası için Astral Elmaslarınızdan yararlanabilirsiniz. Koruyucu'nun Yerleşimi'ndeki Harikalar Çarşısı'nı da ziyaret etmeyi unutmayın. Burada da Tanımlama Tomarlarından Kilitli Kutulara kadar Astral Elmaslarla satın alınabilecek bir sürü çok faydalı eşya bulabilirsiniz. Aradığınız her şey Harikalar Çarşısı'nda! Buraya Koruyucu'nun Yerleşimi'ndeki Yedi Güneş Seyyar Pazarı'nda veya ekranınızın yukarısında yer alan Elmas simgesine tıklayarak göz atabilirsiniz.   Oyun içi Astral Elmas Takası'nı nasıl kullanırım? A: Bu, "ZEN Satın Al" sekmesi. B: Bu kısımda ZEN satışı ile en önemli teklifler görüntülenir. Örnek: 1. sırada ZEN başına 356 İşlenmiş Astral Elmas karşılığında 2.312 ZEN sunulduğunu görüyoruz. C: Bu kısımda, takasta bulunan tüm tekliflerinizi bulabilirsiniz. Bir teklifi iptal etmek isterseniz, üzerine tıklayarak onu vurguladıktan sonra "Teklifi İptal Et" düğmesine tıklayın. Teklif iptal edildiğinde, takasa çıkardığınız Astral Elmaslar "Takas Bakiyesi"ne geri gelir (F).   D: Bu kısımda, ZEN satın almak için ne kadar Astral Elmas sunmak istediğinize karar verebilirsiniz. Her iki alana da değer girildikten sonra, "Harcanacak miktar:" alanı bu değerlere göre otomatik olarak güncellenir. Örnek: 100 ZEN satın almak için bir teklif yapmak istiyorsanız, "Alınacak ZEN Miktarı" kısmına "100" girmeli, ZEN başına ödemeyi düşündüğünüz Astral Elmas miktarını da "Birim Fiyat" kısmında belirtmelisiniz. "Harcanacak miktar:" alanı güncellenerek bu birim fiyatla 100 ZEN satın alabilmeniz için ihtiyacınız olan toplam Astral Elmas miktarını gösterir. E: Yukarıdaki alanlara gerekli bilgileri girdikten sonra (D), "Yayınla" üzerine tıklayarak ZEN satın alma teklifinizi onaylayıp gönderin. Bir ZEN Satın Alma teklifi oluşturduğunuzda, bunun için yayınladığınız tüm Astral Elmaslar derhal alınır. ZEN'i daha ucuza alırsanız veya teklifinizi tamamen yerine getirilmeden iptal ederseniz, bu Astral Elmasları geri alırsınız. Dikkat: Astral Elmas Takası ile satın alınan ZEN'ler Neverwinter'a bağlanır. Miktarınıza ve fiyatınıza uygun bir satış teklifi bulunamadığı takdirde, siparişinizin bir kısmını alabilir veya hiçbir kısmını alamayabilirsiniz. Geri kalan kısım, uygun bir satış teklifi bulunduğunda yerine getirilir. F: Bu kısımda mevcut Takas Bakiyesi görülebilir. Teklif iptal edildiğinde, takasta yayınladığınız Astral Elmaslar bu bakiyeye geri gelir. Gelecek teklifler, önce bu bakiyelerden çekilir. Takas Bakiyesi'nde mevcut olan Astral Elmasları veya ZEN'leri istediğiniz zaman çekebilirsiniz. G: Bu kısımda mevcut karakterinizin Astral Elmas bakiyesi ve hesabınızın ZEN bakiyesi görülebilir. Neverwinter Zen Pazarı'ndan eşya veya özel hizmet satın almak isterseniz, Astral Elmas Takası'ndaki "Zen Sat" sekmesine tıklayarak ZEN karşılığında Astral Elmas da elde edebilirsiniz! Neverwinter için ZEN satın almanız gerekiyorsa buraya tıklayın. Satın alımınız tamamlandıktan sonra, ZEN'i Neverwinter'a bu sayfada aktarın. Burada üç kutu göreceksiniz: 1, 2 ve 3. 1. Kutuda Neverwinter'ı, 2. Kutuda karakterinizin bulunduğu sunucuyu ve 3. Kutuda da ZEN miktarını seçin. Bu bilgilerin Neverwinter'da Astral Elmas kazanma ve kullanma hakkında aklınızdaki soruları yanıtlamış olmasını umuyoruz!
          Åžimdi Oyunda: Neverwinter Kuşatması        
  Tiamat'ın yıkım hükümdarlığını ayağa kaldırma planları başarısız olduğu için umutsuzluğa kapılan Ejderha Tarikatı, Neverwinter'ı fethetmek için bir kez daha var gücüyle saldırıya geçmeye hazırlanıyor. Tarikat, Neverwinter'ın ejderhaların alevleri içinde boğulduğunu ve şehir sakinlerinin Drakonik müttefikleri tarafından çiğ çiğ yendiğini veya tutsak alındığını görmeden hiçbir engel karşısında duracağa benzemiyor. Hatırlatacak olursak, Tarikat'a karşı örgütlenen karşı taarruza cesur General Sabine önderlik ediyor. General, üstün liderlik becerileriyle maceracıları Neverwinter'ı Tarikat'ın önceki saldırısından kurtarmak için el ele vermeye ikna etmiş gözüküyor.   Neverwinter Kuşatması Başlangıcı: 15 Ocak TSİ 20.00 Neverwinter Kuşatması Bitişi: 22 Ocak TSİ 20.00   Tarikat İstilası Tarikat'ın şansı yaver gitti ve Neverwinter'ın savunmasında bir çatlak bulmayı başardı. Şimdi ellerinde ne varsa kullanarak saldırıyorlar! Neyse ki, Neverwinter zanaatkarları el ele vererek şehrin barikatlarını yeniden inşa etmeye koyuldular. İşlerini rahatsız edilmeden bitirebilmeleri için, Tarikat güçlerini geri püskürterek bu azimli işçileri koruyun! Karşı Taarruz Bazen en iyi savunma, iyi bir saldırıdır. Ejderha Tarikatı'na karşı savaşa koşun ve tüm saflarını kırıp geçirin! Ejderha Saldırısı Ejderha Tarikatı, elinde büyük ve gizli bir koz olduğuna inanıyor: ejderhalar. Onlar adına ne yazık ki, Neverwinter'ın da sizler gibi kahramanları var. Ejderhalarla şehir surlarının dışında çarpışarak kan ve ateşin içinde mirasınızı yaratın! Müsabaka Paraları Övgü Fermanları: Günlük görevlerin tamamlanmasıyla kazanılan günlük müsabaka parası. Ejderha Tarikatı Nişanı: Kahramanca Karşılaşmalara katılarak kazanılan, toplanarak artırılabilir müsabaka parası. Kahramanlık Madalyaları: Kahramanca Karşılaşmalara katılıp Savunmacı erzakları teslim ederek veya Zen Pazarı üzerinden kazanılan ek para. Neverwinter Savunmacı Paketi: Kahramanlık Madalyaları teslim edilerek alınan Savunmacı Paketi'nin içinde 1 Övgü Fermanı, Neverwinter Kuşatması'na dair 4 Boya Paketi ve Sıhhiye yoldaşı ile Kara At bineği gibi çok nadir eşyaları kazanma şansı var. Müsabaka Ödülleri Neverwinter şehrini azimle savunan maceracıları, şu ödüller bekliyor: Ejderha İstifi Sikkeleri: Tyranny of Dragons senaryosunda kullanılan bir para birimi. Bu, senaryo vazifelerini tamamlamakta ve Tiamat İstifi'ni ele geçirme çalışmalarına katkı için kullanılabilir. Ejderha İstifi Kasaları: Tyranny of Dragons senaryosunda kullanılan bir başka para birimi. Bu da, senaryo vazifelerini tamamlamakta ve Tiamat İstifi'ni ele geçirme çalışmalarına katkı için kullanılabilir. Toplayıcı Efsunu: Bu faydalı efsun, düşmanlardan zaman zaman toplama çantalarının düşmesini sağlar. Müsabaka Yoldaşları: Neverember Muhafız Okçusu ve Sıhhiye Müsabaka Kıyafetleri: Sıhhiye Takımı ve Yaralı Kurtulan Giysisi Müsabaka Boya Paketleri: Kıdemli ve Ejderkatili Boya Paketleri Kuşatma Savunması Çabası Mesleği Özel bir Kuşatma Savunması Çabası mesleği, müsabaka boyunca oyunculara açık olacak. Oyuncular, müsabakaya özgü özel meslek mülklerini toplayarak bunlardan Neverwinter'ın korunmasında kullanacak çeşitli eşyalar yapacaklar. Bu çeşit eşyaların arasında sakatlık kitleri ve Savunma Erzakları gibi meslek kaynakları bulunuyor. Bunlar, daha sonra teslim edilerek karşılığında Ejderha Tarikatı Nişanı veya Kahramanlık Madalyaları alınabilecek. Kılıç Sahili Maceraları Oyuncular, bilgisayarlarındaki veya mobil internet gezginini kullanarak eriştikleri Gateway'deki Kılıç Sahili Maceralarında özel bir "zindan" bulacaklar. Bu zindanda kendilerini türlü Ejderha Tarikatı rakipleri ve zindanın sonunda ise Tarikat Generali ile bir karşılaşma bekliyor olacak. Ejderha Tarikatı Nişanları, tüm karşılaşmalarda düşer. Ejderha Tarikatı, binalarımızı yakıp yıkabilir, duvarlarımızı çökertebilir fakat ruhumuzu asla pes ettiremez. Davranın silahlara, maceracılar! Neverwinter yenilmeyecek! Neverwinter Kuşatması müsabakasında sizi en çok hangi ödüller heyecanlandırıyor? Facebook veya Twitter üzerinden #DefendNW konu etiketini kullanarak bizimle paylaşın.
          Aurum Four Seasons - Rajanukunte, Bangalore        
www.propertywala.com
close to the city yet within greens
Aurum Four Seasons has over 40,000 Sq.Ft. of green belt and parks forming the gateway to the complex with the nature and modern amenities while staying in the houses.
more details..
          Sobha Gateway of Dreams - Varthur, Bangalore        
www.propertywala.com
A township which lets you 'live' your dreams
Sobha Gateway of Dreams is a new project by Sobha Developers. It is an addition to Sobha Dream Acres in Bangalore offering 1&2BHK Flats
more details..
          Runal Gateways - Ravet, Pune        
www.propertywala.com
The Gateway to lifestyle
Runal Gateways presents to you the new lifestyle of living in Ravet, Pune
more details..
          Public Wifi Gateway, splnenie podmienky na pristup k WIfi        
potreboval by som vytvorit takyto FLOW? 1. user sa prihlasi na WiFi 2. userovi sa zobrazi jednoducha Landing Page kde ak si stiahne Applikaciu tak mu ...
          Why Do You Have Such A Bad Trading Attitude?        

 The most important aspect of trading is the attitude of the trader. Should the trader be negative, there will be problems, trades will not go well.
We must observe and manage our attitude continually.
These authors share some excellent ideas for using attitude to succeed.

When Trading, Attitude is King



Shutterstock photo
Attitude is everything. Ask any motivational speaker or “life coach” and I am sure they will confirm that. I would say to ask a paid trader, but in my experience, many of them don’t understand the significance of attitude. I spent nearly twenty years getting to know and understand traders, and most of them genuinely believe that they get the majority of calls right and that this is due to some ill-defined innate ability to make great decisions. In reality, however, a large part of their success is due to an ability to shrug off and forget losing trades and approach each opportunity with fresh enthusiasm. I doubt that many of them get a greater percentage of calls right over their career than do most day traders who pay, rather than get paid, to trade. What separates them is their approach to each trade.
Read More:


ATTITUDE – A GATEWAY TO GETTING THE TRADING RESULTS YOU WANT



What is it that helps the market wizards maintain focus at these critical times in their trades? It is an unmitigated commitment to focus on their rules. These rules, along with other critical cogs in their trading machinery, are followed religiously. They are passionate first about doing what it takes to be consistently successful. They define success in the markets as a function of percentages over an extended period, not by how much money is made in any one trade. They develop and nurture a powerful desire to follow the successful protocol for getting the results that they want. When you want something with an intense desire, the true nature of your potential is realized through the fire in your passion. It is just a matter of finding and living the passion.
There is a myth associated with self-discipline which essentially states that self-discipline has to do with willpower while saying, “I’m gonna make myself do it,” or biting the bullet. Does this sound familiar? Well, the problem lies in the fact that this notion about self-discipline taxes the system enormously and often leads to stress, burnout or illness. Now, let me state that willpower can work; it’s just that it is not the most effective way to ensure that you do what you say you are going to do. Identifying and accessing passion
Read More


Why Your Trading Attitude Matters


Your attitude toward trading makes a huge difference in your success. Here's how to develop the right psychology to make the most money as a trader, says Marc Principato.
Today we're talking about the always important question of trade psychology with our guest, Mark Principato.  Mark, this is an area that I know you also view as very important.  Tell us your thoughts.
Trader psychology.  They say in this game it's 90% psychology, 10% everything else and in my experience, I've never found anything truer than something like that.  I mean it's a tough game, especially for short-term traders.  Psychology is most important because decisions have to be made quickly and on very limited information.
Read More

10 Tips on Attitudes Required for Successful Forex Trading Training


When you have been trading for years and have vast experience in all things concerning Forex, you can almost spot someone who will succeed and someone who won’t straight away. The reason why this is so is because there are only a few attitude traits that someone has to master and couple it with their skill in order to succeed. If those attitudes are missing, the road to success is very hard. If you decide to learn Forex trading, it isn’t something you can just do but rather something that you must conquer. As a result, below are 10 attitude traits you should adopt if you decide to learn Forex trading:
1. Document everything – this includes plans on how you are going to enter and exit a trade. For instance, use the rules you have been taught in your Forex trading training and only enter and exit trades that fit within those rules. Before entering, go through your checklist and tick off the rules one by one. If one rule is not apparent, do not trade.
2. Find a comfort spot – once you are frequently playing good and winning trades you automatically get a feeling of comfort. Next time you find an entry point the same feeling will come back and you can sleep comfortably knowing you have followed your rules. Even if the trade is not successful, you have not made a mistake.
3. Find a king strategy – there is no point going over 10 different strategies in your Forex trading training. Find one that suits your personality and only use that for a while or until you are making good returns from it. If you try and play 5 trades at the same time, your knowledge will sink as it is a lot more spread out.
Read More

Simplify Your Trading in 3 Easy Steps


If you’re reading this you’re probably struggling to make money in the markets and maybe you’ve even recently experienced a painful losing streak. Right now, trading seems “hard” to you, you doubt if anyone out there really makes consistent money from trading, and maybe you even feel like you want to give up. I know that you might be feeling this way right now because above all else, I’m a trader too, and I’ve felt what you’re feeling before. How did I move past all these negative feelings and finally attain success in my trading? To put it quite “simply” (pun intended), I simplified every aspect of my trading.
Before we proceed, I know you might be thinking the whole “simplify your trading” thing sounds cliché and that you’ve “heard it before” from me, and whilst that might be true, it does not change the significance of it. Most traders are their own worst enemy in the market, and no matter how many different ways I say that, it’s important to accept it and then to change it. Here are three very simple steps to simplify and improve your trading that you can begin implementing right now…

Step 1) Work on your attitude towards trading and life in general

One of my all-time favorite authors, Napoleon Hill, said that a “Positive mental attitude is the right mental attitude in all circumstances. Success attracts more success while failure attracts more failure.”
It’s one thing to hear the word “attitude”, people talk about it every day, but what does it really mean and how does it apply to your trading? A trader’s attitude refers to both his or her mental state of mind and the way he or she conducts their trading activities. It may sound slightly boring or even repetitive to hear someone say you need a “positive mental attitude”, but your attitude is probably one of the most important factors that determine your trading results (both profits and losses).

Read More

Top 4 Things Successful Forex Traders Do



Trading in the financial markets is surrounded by a certain amount of mystique because there is no single formula for trading successfully. Think of the markets as being like the ocean and the trader as a surfer. Surfing requires talent, balance, patience, proper equipment and being mindful of your surroundings. Would you go into water that had dangerous rip tides or was shark infested? Hopefully not.
The attitude to trading in the markets is no different than the attitude required for surfing. By blending good analysis with effective implementation, your success rate will improve dramatically and, like many skill sets, good trading comes from a combination of talent and hard work. Here are the four legs of the stool that you can build into a strategy to serve you well in all markets.
Leg No. 1 - Approach
Before you start to trade, recognize the value of proper preparation. The first step is to align your personal goals and temperament with the instruments and markets that you can comfortably relate to. For example, if you know something about retailing, then look to trade retail stocks rather than oil futures, about which you may know nothing. Begin by assessing the following three components.
Time Frame
The time frame indicates the type of trading that is appropriate for your temperament. Trading off a five-minute chart suggests that you are more comfortable being in a position without the exposure to overnight risk. On the other hand, choosing weekly charts indicates a comfort with overnight risk and a willingness to see some days go contrary to your position.
Read more:

3 Ways I Made a Winning Trading Attitude


Eleanor Roosevelt said 10 little words a very long time ago that can still have a big impact in people’s lives, and if it can impact other people, it can impact your life too. Those 10 words add up to a quote that reads, “No one can make you feel inferior without your consent.”  those 10 little words have impacted me in a special way and since I read those words I have been a better man on more occasions than I would have been without them.
I trust this post will have the same or even a better impact on your life, so I thank you for reading and trust you will thank me once you read this post.
Before I begin, I want you to know that there are only 2 things that all successful traders have in common, it is important to note that they all have very different trading styles but these two factors are the same for them all. The first is their attitude and the second is their losses. That means If you have ever traded the financial markets in the past. or are trading them now, you already have 50% of what it takes to be a winner in trading the markets (the losses).
creating-a-winning-trading-attitude
Right now it is time to do the hardest of all things, not only in trading but in life too and that is to create a good habit, which of course contradicts most of the other daily habits you have formed over the years. Make no mistake, this will be very hard to do but if you have the determination and add just enough action daily into your life it will be a piece of cake in no time and I promise you, it will definitely be worth it.
As I mention above attitude makes a BIG difference and it is probably the most important attribute all traders must learn if they want to succeed in the markets.
A trader with a positive attitude is more likely to make money in the markets than one with a negative attitude.
A trader with a negative attitude is more likely to give up hope and abandon a successful trading system and trade based on his emotions.  He is more likely to focus on bad trades rather than good ones.
He is more likely to think he is always right, rather than learn from the past and from others. He is more likely to lose money, given the same recommendations than someone who has a positive attitude. He is more likely to be mad or upset or stressed out at the end of the day and more likely to bring that back the next morning.
On the other hand, the trader with an optimistic attitude realizes that not all trades are winners, that over the long run, with patience and discipline, he will make money.
He sets aside his pride and lets himself learn valuable trading and investing lessons. He understands that everyone makes mistakes, including himself and realizes that if you learn from a mistake, it always is a good thing.
He is more likely to make money, given the same recommendations than someone who has a negative attitude. He is more likely to be happy at the end of each day, and more likely to start trading with a positive attitude the next day.
These cycles continue on and on and on …  That is why most successful people are optimists and most unsuccessful people are pessimists.
Traders and investors must learn the value of this attribute and always look on the bright side of life!
Thus the 1st way is, be and become an optimist but before we continue here is a disclaimer: If you want to live the life of your dreams, it starts with a decision. You have to decide that what you desire to achieve is greater than your desire to stay where you are. When you make a decision, it will create discomfort. No matter how discomforting it may feel you must remain dedicated to your choice. After all, if you aren’t at least a little afraid of your dreams, you’re not dreaming big enough.

1. Think like a winner, act like a winner, be a winner.
Read More

Traders Success and a Positive Mental Attitude

Successful futures traders have a positive mental attitude and maintain that positive attitude every single day they trade. It takes confidence in your abilities, confidence in your decisions, confidence in your charts and confidence in your system to succeed as a futures trader. Confidence hinges on your mental attitude.
If you think you can do it, you will.
"Your actions affect your attitude and your attitude drives your actions. It can indeed be powerful to get your actions and your attitude working consistently in the same direction."
I find these words from the Daily Motivator* of particular import to my life as a futures trader. More than anything else, your daily attitude affects your ability to perform successfully as a futures trader. If you stay positively focused, you will be able to assess your position with confidence and pull the trigger at the precise moment to ensure maximum profitability. If you allow negativity or self-doubt to eat away at your confidence, you will fail.
The Negativity Factor
Once negative thoughts creep into your thinking patterns, you start to second-guess your abilities, your decisions, and your system. Pretty soon, you're making bad trades, you can't pull the trigger and things start crumbling around you. Without a positive attitude, you cannot succeed as a futures trader. You will crash and burn before you complete the first lap.
Everyone has the occasional bad day. But whether it's a trading loss or a crisis in your personal life, you can't let feelings of negativity engulf you. You have to "shake it off," "get back on the horse, "get back in the game." Hackneyed though the sayings may be, they carry a large truth.
The only way to succeed is to refuse to allow yourself to be beaten down. You have to maintain faith in yourself and confidence in your ability to succeed. You have to stay positive.
Successful futures traders succeed because they have a positive mental attitude and believe in themselves and their system. It's not the other way around. We're not happy because we succeed. We succeed because we're happy. A positive attitude gets positive results.

Read More

3 Traders In Singapore Share With Us The Winning Attitude Behind Their Success

Trading can be described as the younger cousin of investing. Both trading and investing are vastly different ways of making money from the financial market.
While investors try to make profits over the long term by buying and holding an investment portfolio that they believe would do well, traders aim to make profits relatively quickly by using their skills to take advantage of the price volatility in financial instruments that they buy and sell.
These instruments could include stocks, foreign exchange (Forex), options and many others. When appropriate, traders will also leverage their positions to increase their exposure, and hence potential returns.
Read Also: What Is Leveraged Trading And How Does It Work In Singapore?
Because trading is generally considered riskier and requires more skills, returns for successful traders also tend to be higher than it is for investors.
However, being a successful trader is far from easy. Not only does a person need to be knowledgeable in the instrument(s) that they are trading, and to be familiar with the markets they are in, they also need to have the right attitude towards trading.
For a better understanding of what it takes to be a successful trader, we spoke to three well-known traders in Singapore who have been successful in their respective field.

Part 1: Stock Trading – Collin Seow

collin-seow
Source: Collin Seow
Collin Seow is the founder of Collinseow.com / TradersGPS. He is a qualified Chartered Portfolio Manager (CPM) holding a Certified Financial Technician (CFTe) qualification and is a member of MENSA Singapore.
A charismatic trainer, his courses equip people with trading and investment strategies that help them navigate the complex financial markets.
Qn: How long have you been trading stocks for? What does your trading strategies focus on?
CS: I have been trading stocks for more than 21 years but to be honest, for the first few years, it was more like buying and “hoping” for the best.
My strategy has definitely evolved over the years. In the initial years, it was a discovery process. I was mainly using fundamental analysis to identify and buy stocks that I thought had dropped below their true value. The next stage of my learning journey was to trade short term using technical analysis (TA) and finally developing a rule-based trading system (algo) based on TA to buy and sell. The time frame that I hold stocks can range from weeks to months.
Qn: What are some common mistakes that you typically see new traders making?
CS: 2 mistakes most new traders make.
1. No confidence in their strategy
Losses are part and parcel of trading. However, losses are also what shake people’s confidence in their strategies. This is the main reason why new traders constantly jump from one strategy to another. Each time they meet a few losses on a strategy, they will switch to another. To become a profitable trader, we must become masters of our strategy, psychology, and risk. To become masters, we need to put in the time and effort, to gain the experience and knowledge in our strategy.
2. Not paying attention to money management
Money management is very important in trading. A lot of new traders focus on making money but not on losing money properly. This one simple step of learning how to manage your losses can turn you from a losing trader into a breakeven, or even slightly profitable trader.
Qn: What are the areas of focus that new traders should pay attention to instead?
Read More





















































































          Eclipse Foundation Europe Selected to Provide Open Source and Technology Dissemination Expertise for EU H2020 IoT Research Project        
We are pleased to announce our participation in the Adaptive Gateways for Diverse Multiple Environments (AGILE) project.
          Internet Speed at work... (UK)        

At our head office we have an 8MB SDSL (gateway for servers/vpns), an ADSL2 for normal web browsing (ie the gateway for normal users) and an ADSL2 for the video conferencing.


          CI20 status update        
I didn't really have much time to work on more hardware support on CI20 but it's been a while since the last post so here's what I've got:
  • drivers for on-chip ehci and ohci have been added. Ohci works fine, ehci for some reason detects all high speed devices as full speed and hands them over to ohci. No idea why.
  • I2C ports work now, including the onboard RTC. You have to hook up your own battery though.
  • we're no longer limited to 256MB, all RAM is usable now.
  • onboard ethernet is supported by the dme driver.
There's also an unfinished driver for the SD/MMC ports.
The RTC is a bit funny - according to the manual there's a Pericom RTC on iic4 addr 0x68 - not on my preproduction board. I've got something that looks like a PCF8563 at addr 0x51, and so do the production boards that I know of. Some pins on one of the expansion connectors seem to be for a battery but I haven't been able to confirm that yet. Either way, since the main connector is supposed to be Raspberry Pi compatible any RTC module for the RPi should Just Work(tm), with the appropriate line added to the kernel config.
Some more work has been done under the hood, like some preparations for SMP support.

Here's the obligatory boot transcript, complete with incomplete drivers and debug spam:

U-Boot SPL 2013.10-rc3-g9329ab16a204 (Jun 26 2014 - 09:43:22)
SDRAM H5TQ2G83CFR initialization... done


U-Boot 2013.10-rc3-g9329ab16a204 (Jun 26 2014 - 09:43:22)

Board: ci20 (Ingenic XBurst JZ4780 SoC)
DRAM:  1 GiB
NAND:  8192 MiB
MMC:   jz_mmc msc1: 0
In:    eserial3
Out:   eserial3
Err:   eserial3
Net:   dm9000
ci20# dhcp
ERROR: resetting DM9000 -> not responding
dm9000 i/o: 0xb6000000, id: 0x90000a46 
DM9000: running in 8 bit mode
MAC: d0:31:10:ff:7e:89
operating at 100M full duplex mode
BOOTP broadcast 1
DHCP client bound to address 192.168.0.47
*** Warning: no boot file name; using 'C0A8002F.img'
Using dm9000 device
TFTP from server 192.168.0.44; our IP address is 192.168.0.47
Filename 'C0A8002F.img'.
Load address: 0x88000000
Loading: #################################################################
	 ##############################################
	 369.1 KiB/s
done
Bytes transferred = 1621771 (18bf0b hex)
ci20# bootm
## Booting kernel from Legacy Image at 88000000 ...
   Image Name:   evbmips 7.99.18 (CI20)
   Image Type:   MIPS NetBSD Kernel Image (gzip compressed)
   Data Size:    1621707 Bytes = 1.5 MiB
   Load Address: 80020000
   Entry Point:  80020000
   Verifying Checksum ... OK
   Uncompressing Kernel Image ... OK
subcommand not supported
ci20# g 80020000
## Starting application at 0x80020000 ...
pmap_steal_memory: seg 0: 0x6bf 0x6bf 0xffff 0xffff
Copyright (c) 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
    2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015
    The NetBSD Foundation, Inc.  All rights reserved.
Copyright (c) 1982, 1986, 1989, 1991, 1993
    The Regents of the University of California.  All rights reserved.

NetBSD 7.99.18 (CI20) #20: Thu Jun 11 13:06:41 EDT 2015
	ml@blackbush:/home/build/obj_evbmips32/sys/arch/evbmips/compile/CI20
Ingenic XBurst
total memory = 1024 MB
avail memory = 997 MB
mainbus0 (root)
cpu0 at mainbus0: 1200.00MHz (hz cycles = 120000, delay divisor = 12)
cpu0: Ingenic XBurst (0x3ee1024f) Rev. 79 with unknown FPC type (0x330000) Rev. 0
cpu0: 32 TLB entries, 16MB max page size
cpu0: 32KB/32B 8-way set-associative L1 instruction cache
cpu0: 32KB/32B 8-way set-associative write-back L1 data cache
com0 at mainbus0: Ingenic UART, working fifo
com0: console

apbus0 at mainbus0
JZ_CLKGR0 3f587fe0
JZ_CLKGR1 000073e0
JZ_SPCR0  00000000
JZ_SPCR1  00000000
JZ_SRBC   00000002
JZ_OPCR   000015e6
JZ_UHCCDR c0000000
dwctwo0 at apbus0 addr 0x13500000 irq 21: USB OTG controller
ohci0 at apbus0 addr 0x134a0000 irq 5: OHCI USB controller
ohci0: OHCI version 1.0
usb0 at ohci0: USB revision 1.0
ehci0 at apbus0 addr 0x13490000 irq 20: EHCI USB controller
48352 46418
UHCCDR: c0000000
UHCCDR: 60000017
caplength 10
ehci0: companion controller, 1 port each: ohci0
usb1 at ehci0: USB revision 2.0
dme0 at apbus0 addr 0x16000000: DM9000 Ethernet controller
jzgpio at apbus0 addr 0x10010000 not configured
jzgpio at apbus0 addr 0x10010100 not configured
jzgpio at apbus0 addr 0x10010200 not configured
jzgpio at apbus0 addr 0x10010300 not configured
jzgpio at apbus0 addr 0x10010400 not configured
jzgpio at apbus0 addr 0x10010500 not configured
jziic0 at apbus0 addr 0x10050000 irq 60: SMBus controller
iic0 at jziic0: I2C bus
jziic1 at apbus0 addr 0x10051000 irq 59: SMBus controller
iic1 at jziic1: I2C bus
jziic2 at apbus0 addr 0x10052000 irq 58: SMBus controller
iic2 at jziic2: I2C bus
jziic3 at apbus0 addr 0x10053000 irq 57: SMBus controller
iic3 at jziic3: I2C bus
jziic4 at apbus0 addr 0x10054000 irq 56: SMBus controller
iic4 at jziic4: I2C bus
pcf8563rtc0 at iic4 addr 0x51: NXP PCF8563 Real-time Clock
jzmmc0 at apbus0 addr 0x13450000 irq 37: SD/MMC controller
25227 24176
jzmmc0: going to use 25227 kHz
MSC*CDR: 80000000
sdmmc0 at jzmmc0
jzmmc1 at apbus0 addr 0x13460000 irq 36: SD/MMC controller
25227 24176
jzmmc1: going to use 25227 kHz
MSC*CDR: 20000018
sdmmc1 at jzmmc1
jzmmc2 at apbus0 addr 0x13470000 irq 35: SD/MMC controller
25227 24176
jzmmc2: going to use 25227 kHz
MSC*CDR: 00000000
sdmmc2 at jzmmc2
jzfb at apbus0 addr 0x13050000 not configured
JZ_CLKGR0 2c586780
JZ_CLKGR1 000060e0
usb2 at dwctwo0: USB revision 2.0
starting timer interrupt...
jzmmc_bus_clock: 400
sh: 6 freq: 394
sdmmc0: couldn't identify card
sdmmc0: no functions
jzmmc_bus_clock: 0
sh: 7 freq: 197
jzmmc_bus_clock: 400
sh: 6 freq: 394
sdmmc1: couldn't identify card
sdmmc1: no functions
jzmmc_bus_clock: 0
sh: 7 freq: 197
jzmmc_bus_clock: 400
sh: 6 freq: 394
sdmmc2: couldn't identify card
sdmmc2: no functions
jzmmc_bus_clock: 0
sh: 7 freq: 197
uhub0 at usb0: Ingenic OHCI root hub, class 9/0, rev 1.00/1.00, addr 1
uhub1 at usb1: Ingenic EHCI root hub, class 9/0, rev 2.00/1.00, addr 1
uhub2 at usb2: Ingenic DWC2 root hub, class 9/0, rev 2.00/1.00, addr 1
PS_LS(1): 00001801
port1: 00001801
port2: 00000000
ehci0: handing over full speed device on port 1 to ohci0
umass0 at uhub2 port 1 configuration 1 interface 0
umass0: Generic Mass Storage Device, rev 2.00/1.05, addr 2
scsibus0 at umass0: 2 targets, 1 lun per target
sd0 at scsibus0 target 0 lun 0:  disk removable
sd0: fabricating a geometry
sd0: 15193 MB, 15193 cyl, 64 head, 32 sec, 512 bytes/sect x 31116288 sectors
root on sd0a dumps on sd0b
sd0: fabricating a geometry
/: replaying log to memory
kern.module.path=/stand/evbmips/7.99.18/modules
pid 1(init): ABI set to O32 (e_flags=0x70001007)
Thu Jun 11 07:15:08 GMT 2015
uhub3 at uhub0 port 1: Terminus Technology USB 2.0 Hub [MTT], class 9/0, rev 2.00/1.00, addr 2
Starting root file system check:
/dev/rsd0a: file system is journaled; not checking
/: replaying log to disk
umass1 at uhub3 port 5 configuration 1 interface 0
umass1: LaCie P'9220 Mobile Drive, rev 2.10/0.06, addr 3
scsibus1 at umass1: 2 targets, 1 lun per target
sd1 at scsibus1 target 0 lun 0:  disk fixed
sd1: 465 GB, 16383 cyl, 16 head, 63 sec, 512 bytes/sect x 976773168 sectors
swapctl: adding /dev/sd1b as swap device at priority 0
Starting file system checks:
/dev/rsd0e: file system is journaled; not checking
/dev/rsd0g: file system is journaled; not checking
/dev/rsd0f: 1 files, 249856 free (31232 clusters)
/dev/rsd1e: file system is journaled; not checking
random_seed: /var/db/entropy-file: Not present
Setting tty flags.
Setting sysctl variables:
ddb.onpanic: 1 -> 0
Starting network.
Hostname: ci20
IPv6 mode: autoconfigured host
Configuring network interfaces: dme0.
Adding interface aliases:.
add net default: gateway 192.168.0.1
Waiting for DAD to complete for statically configured addresses...
/usr: replaying log to disk
Building databases: dev, dev, utmp, utmpx.
Starting syslogd.
Starting rpcbind.
Mounting all file systems...
/stuff: replaying log to disk
/home: replaying log to disk
Clearing temporary files.
Updating fontconfig cache: done.
Checking quotas: done.
/etc/rc: WARNING: /etc/exports is not readable.
/etc/rc.d/mountd exited with code 1
Setting securelevel: kern.securelevel: 0 -> 1
Starting virecover.
Checking for core dump...
savecore: no core dump
Starting local daemons:.
Updating motd.
Starting ntpd.
Starting sshd.
Starting mdnsd.
Jun 11 03:23:01 ci20 mdnsd: mDNSResponder (Engineering Build) starting
Starting inetd.
Starting cron.
The following components reported failures:
    /etc/rc.d/mountd
See /var/run/rc.log for more information.
Thu Jun 11 03:23:02 EDT 2015

NetBSD/evbmips (ci20) (console)

login:

          CI20 reaches userland        
My CI20 now makes it to userland, with root and ethernet via USB. Here's the transcript:
U-Boot SPL 2013.10-rc3-g9329ab16a204 (Jun 26 2014 - 09:43:22)
SDRAM H5TQ2G83CFR initialization... done


U-Boot 2013.10-rc3-g9329ab16a204 (Jun 26 2014 - 09:43:22)

Board: ci20 (Ingenic XBurst JZ4780 SoC)
DRAM:  1 GiB
NAND:  8192 MiB
MMC:   jz_mmc msc1: 0
In:    eserial3
Out:   eserial3
Err:   eserial3
Net:   dm9000
ci20# dhcp 
ERROR: resetting DM9000 -> not responding
dm9000 i/o: 0xb6000000, id: 0x90000a46 
DM9000: running in 8 bit mode
MAC: d0:31:10:ff:7e:89
operating at 100M full duplex mode
BOOTP broadcast 1
DHCP client bound to address 192.168.0.47
*** Warning: no boot file name; using 'C0A8002F.img'
Using dm9000 device
TFTP from server 192.168.0.44; our IP address is 192.168.0.47
Filename 'C0A8002F.img'.
Load address: 0x88000000
Loading: #################################################################
	 #######################################
	 347.7 KiB/s
done
Bytes transferred = 1519445 (172f55 hex)
ci20# bootm
## Booting kernel from Legacy Image at 88000000 ...
   Image Name:   evbmips 7.99.5 (CI20)
   Image Type:   MIPS NetBSD Kernel Image (gzip compressed)
   Data Size:    1519381 Bytes = 1.4 MiB
   Load Address: 80020000
   Entry Point:  80020000
   Verifying Checksum ... OK
   Uncompressing Kernel Image ... OK
subcommand not supported
ci20# g 80020000
## Starting applicatipmap_steal_memory: seg 0: 0x3b3 0x3b3 0xffff 0xffff
Loaded initial symtab at 0x80304754, strtab at 0x8032d934, # entries 10499
Copyright (c) 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005,
    2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015
    The NetBSD Foundation, Inc.  All rights reserved.
Copyright (c) 1982, 1986, 1989, 1991, 1993
    The Regents of the University of California.  All rights reserved.

NetBSD 7.99.5 (CI20) #170: Sat Mar  7 10:43:03 EST 2015
	ml@blackbush:/home/build/obj_evbmips32/sys/arch/evbmips/compile/CI20
Ingenic XBurst
total memory = 256 MB
avail memory = 247 MB
mainbus0 (root)
cpu0 at mainbus0: 1200.00MHz (hz cycles = 120000, delay divisor = 12)
cpu0: Ingenic XBurst (0x3ee1024f) Rev. 79 with unknown FPC type (0x330000) Rev. 0
cpu0: 32 TLB entries, 16MB max page size
cpu0: 32KB/32B 8-way set-associative L1 instruction cache
cpu0: 32KB/32B 8-way set-associative write-back L1 data cache
com0 at mainbus0: Ingenic UART, working fifo
com0: console

apbus0 at mainbus0
dwctwo0 at apbus0: USB controller
jzgpio at apbus0 not configured
jzfb at apbus0 not configured
usb0 at dwctwo0: USB revision 2.0
starting timer interrupt...
uhub0 at usb0: vendor 0000 DWC2 root hub, class 9/0, rev 2.00/1.00, addr 1
uhub1 at uhub0 port 1: vendor 1a40 USB 2.0 Hub [MTT], class 9/0, rev 2.00/1.00, addr 2
uhub1: multiple transaction translators
umass0 at uhub1 port 1 configuration 1 interface 0
umass0: LaCie P'9220 Mobile Drive, rev 2.10/0.06, addr 3
scsibus0 at umass0: 2 targets, 1 lun per target
sd0 at scsibus0 target 0 lun 0:  disk fixed
sd0: 465 GB, 16383 cyl, 16 head, 63 sec, 512 bytes/sect x 976773168 sectors
umass1 at uhub1 port 2 configuration 1 interface 0
umass1: Apple Inc. iPod, rev 2.00/0.01, addr 4
scsibus1 at umass1: 2 targets, 1 lun per target
sd1 at scsibus1 target 0 lun 0:  disk removable
uhidev0 at uhub1 port 4 configuration 1 interface 0
uhidev0: vendor 04d9 VISENTA V1, rev 1.10/1.00, addr 5, iclass 3/1
ukbd0 at uhidev0: 8 modifier keys, 6 key codes
wskbd0 at ukbd0 (mux ignored)
uhidev1 at uhub1 port 4 configuration 1 interface 1
uhidev1: vendor 04d9 VISENTA V1, rev 1.10/1.00, addr 5, iclass 3/1
uhidev1: 3 report ids
ums0 at uhidev1 reportid 1: 3 buttons, W and Z dirs
wsmouse0 at ums0 (mux ignored)
uhid0 at uhidev1 reportid 2: input=2, output=0, feature=0
uhid1 at uhidev1 reportid 3: input=1, output=0, feature=0
sd1: fabricating a geometry
sd1: 7601 MB, 950 cyl, 64 head, 32 sec, 4096 bytes/sect x 1946049 sectors
uhub2 at uhub1 port 6: vendor 03eb Standard USB Hub, class 9/0, rev 1.10/3.00, addr 6
axe0 at uhub2 port 1
axe0: D-LINK CORPORAION DUB-E100, rev 2.00/10.01, addr 7
axe0: Ethernet address 00:80:c8:37:00:e1
ukphy0 at axe0 phy 3: OUI 0x0009c3, model 0x0005, rev. 4
ukphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, auto
root on sd0a dumps on sd0b
kern.module.path=/stand/evbmips/7.99.5/modules
WARNING: no TOD clock present
WARNING: using filesystem time
WARNING: CHECK AND RESET THE DATE!
init: copying out path `/sbin/init' 11
pid 1(init): ABI set to O32 (e_flags=0x70001007)
Thu Mar  5 18:27:33 UTC 2015
Not checking /: fs_passno = 0 in /etc/fstab
swapctl: adding /dev/sd0b as swap device at priority 0
Starting file system checks:
random_seed: /var/db/entropy-file: Not present
Setting tty flags.
Setting sysctl variables:
ddb.onpanic: 1 -> 0
Starting network.
Hostname: ci20
IPv6 mode: autoconfigured host
Configuring network interfaces: axe0.
Adding interface aliases:.
add net default: gateway 192.168.0.1
Waiting for DAD to complete for statically configured addresses...
axe0: link state UP (was UNKNOWN)
Building databases: dev, utmp, utmpx.
Starting syslogd.
Starting rpcbind.
Mounting all file systems...
Clearing temporary files.
Checking quotas: done.
Setting securelevel: kern.securelevel: 0 -> 1
Starting virecover.
Checking for core dump...
savecore: no core dump
Starting local daemons:.
Updating motd.
Starting sshd.
Starting inetd.
Starting cron.
Thu Mar  5 18:27:55 UTC 2015

NetBSD/evbmips (ci20) (console)

login: 

          Dancing the Cailleach        

Carrying the Fire, Samhain, Rannoch Moor, 2015 

 Last month on the road to Holt in Norfolk a man came across a deer as he was speeding homeward. It was a fully pregnant doe. The man did an unprecented thing: he slit open the belly of the dead creature and delivered a live fawn.
I am holding a copy of the Eastern Daily Press where the story has just made the front page, in spite of all the terrors and hostilities clamouring for attention. The tiny fawn looks calmly outward, suckling on a bottle of milk, held in the large tattooed hands of the man.

When asked what made him stop that morning he said: 'It is perhaps something you will never come across again in your lifetime and I am just thankful that I knew what to do.'

The instructions were simple. Catch the 16:21 train from Glasgow to Fort William. Get out at Corrour and follow the stag.

Some part of us knows that beneath the noise and strife of the modern world, beyond the headlines, there is a deep place where our presence on the Earth is not for nothing. That when we come across it on an empty road at dawn we will know what to do. For thousands of years our negotiation with life was understood in terms of our relationship with the horned beasts we once lived alongside, and a mythical being, sometimes known as the Mistress of the Deer. In Scotland, and particularly in this part of the Highlands, she is known as the Cailleach (pronounced Call-y-ack). Samhain – All Souls, Day of the Dead and Halloween – is the time when the Cailleach, Queen of Winter, takes over the mantle of Earth from Bridget, the bright one, in a similar way the Oak cedes to the Holly at the summer solstice in England.  

The instructions were simple. 'You’re going to be the Cailleach' said Dougie, 'and dance to a piped lament on the moor.' '
It will be dark then,' I said. 
'Yes,' he said. 'Very dark. And maybe raining'.

So that was it how it was when we set out on a moonless wet night: Jack (the Stag), Wilf (the Wolf), Dougie and I on 30 October to walk the track toward Corrour station. I will bring up the rear, Dougie said. Martha (the Cook) remained at the hostel to hold the hearth. I was left on the hillside with instructions to light the fire (rags soaked in citronella) and start the music (in a box hidden by the rock) and do my thing.

I don’t really know what I am going to do of course. I have a red velvet dress on and a furry cape and a large fashion hat I have wreathed in birch twigs and barn owl's wings. A midge veil is covering my face - not that there are any midges at this time of year, though there are roving and rutting stags. One is out there. We have just seen him. He was massive and did not move away when Jack flashed his torch. I have done some challenging gigs in my time, but this has to be the mother of all of them.

ctf hostel
Carrying the Fire is a series of events created by artist and Dark Mountain curator Dougie Strang. So far there have been three, all set at Wiston Lodge on the Scottish borders. They have been small gatherings, for about 60 people, shaped in a similar way to the Uncivilisation Festivals – workshops, music, performance, discussion and of course a storytelling fire. This year's was a departure. It was for a smaller group (20) built around the festival of Samhain and located deep in the heathery heart of Rannoch Moor. We would be based at a wooden hostel, once the boathouse of the shooting lodge, beside Loch Ossian (Osh-een) at the foot of Beinn a’ Bhric, the Cailleach's mountain. The nearest road is 18 miles away.

The structure for the event was woven around three mythic stories embedded in this territory, which Dougie would tell over the weekend: on arrival beside the crackling stove with mugs of cocoa, by the Samhain fire, and on the platform of the highest station in Britain as we departed. On Saturday we would be taken by Neil Harvey (of Wild Journeys) up the mountain trails to do a 'Whakapapa' - a walking exchange between pairs of people, sharing our lifestories and geographies. On Sunday I would lead a workshop based on the Earth Dialogue and send folk out into the hills on their own. They would come back and relate what they experieced to each other in groups of four and then draw a collective dream map.

Like all Carrying the Fire events the fire would be a focal space where people sing and tell stories and pass round a bottle of malt. This part is mapped out. What we don't know is that Gavin will also pass quartz rocks around, so we can make sparks in the dark; that Ben and Darla and Tamsin will teach us a Georgian song taught to them by Ivan who used a giant staff to protect orphaned children; or that Jonny will read a passage about the last wolf making her trek across the snow fields of the north where the swans sleep. And out of the darkness a skein of whooper swans will fly over the loch, calling.  

The instructions were simple. You go out and stand in the land, you come back and relate what happened. What you say, what you do with what you know, is the thing that the Earth waits for. Your gift. What is that story? You forgot it. Ah. Here is a hint.

Arrive in the dark.
Follow the stag.
Wait for the people to come round the hill.

ctf 5-walking-gavin
When Jack comes round the corner his flambard has gone out. Luckily I can see a tiny infrared beam from his head torch. I leap into action -- light fire, switch on music -- and begin to sway, arms moving about like antlers and birch trees in the wind, boots anchored on the slippery rocky slope. I can't see or hear anything through the veil. I don't know whether anyone is there, or whether they have gone past. I keep dancing until I hear people howling and laughing in the distance. They have discovered Wilf! I gather everything up and go to find him. I feel exultant. '

You looked about ten foot tall!' exclaims everyone, when we walk back in (without costumes). 'And then you would disappear! And reappear. It was scary. It was magical!'
'Is dance your practice?' asks another. 'You were so rooted! '
No.' I laugh, 'but I do love to dance'. (I didn't like to say I couldn't move my feet in their massive boots on that rock in case I fell over).  

DSC_0383Samhain is a door. It is a door to the ancestors, and this is what we are doing up here, connecting with the ancestor that lives in our bones, out in the wild places. The Cailleach is the ancestor creator of these high places. Out of her creel she once tossed big stones that became the peaks that now tower above the golden deer grass and shiny lochans of the valley floor. She brings the cold sharp winds of winter, commands the weather and wildness. Her face is blue and sometimes veiled like the mist. In the spring she washes her plaid in the Corryvreckan whirlpool between Jura and Scarba, and then she turns into a rock.

We walk over this springy rocky rainsoaked moor, sprinkled with the flowers of heather and milkwort like a fading summer dress. I pocket the last of the year's bilberries and bearberries and Martha shows me some fragrant crackly leaves from a plant I haven't seen in years, bog myrtle, also known as sweet gale, and says she will make a tea from them all. A tea that will have the bitter taste of farewell.  


ctf 17-samhain-map-gavinSamhain is a door. Sometimes you need a set and a setting, a space, permission to do things differently: to dig deep, to sit alone, to dance in the night with a veil over your head. You don't know what will happen except something will happen. A small thing that makes sense of everything. That expectancy, that sharpness, that not-knowing is part of its territory.

I could tell you about the people who came, and the laughing around the tables as the feast of venison and pumpkin was served, or the sight of twenty pairs of boots hanging from the rafters, or the drama of crossing the stream, or how my Whakapapa companion, 18 minutes into his 20 minute story, told me that something dark happened on the mountain when his friend slipped and fell to his death. There were always hills and mountains, he said, that came at a pivotal point, that changed the direction of everything. The Dales, Mont Blanc, Glencoe. How that all our lifechanging territories and encounters that we recount on our return make some kind of collective pattern: woods which were torn down for houses, a tsunami in Sri Lanka that nearly drowned a family, a broken road in Iceland that snapped a connection between people, housing estates in Britain where art and writing reforged them.

I could tell you how how I woke to find Venus and a sickle moon in a clear sky and swam into the cold waters of the loch. How I watched the sun creep downwards from the peaks, turning the dun hillsides gold, the mountains like beasts crounching, attentive, so alive I could almost touch them. How the star Sirius rose over the mountain, as it has always risen over the mountain, heralding winter.

ctf deerskin
When Donald of the Brown Eyes hunts his last deer he slits open the belly and finds a ball of wool. It is the beginning of sheep herding in the Highlands and a domesticated relationship with the creatures. In modern Scotland deer are killed on the road, deer are shot by blood-hungry elites and deer (and sheep) chew every last tree standing. When the wolves and the Cailleach roamed on these mountains and the people met around the fire everything was held in balance. Something of that balance, what is sometimes called medicine, is contained in these old stories and in, we are hoping, this event.

Carrying the Fire's name is taken in part from the dystopic novel, The Road, where the father explains to his son that the purpose of being human is 'to carry the fire' and that if that spirit is lost the art of being human is also lost. The Cailleach is not human: she is a mythic being that lives deep in our bones and sinews, the parts of us that resonate with stones and wild weather. She reminds us of human beings' original bargain with Earth. Sometimes we need a reminder that she is still there, so we can carry the fire, come what may. So, in spite of living in a 24/7 world, we can mark time; in spite of living in a world where we are told we do not belong, we can make ourselves at home.

I took eight stones out of the loch and laid them on Jack's deer pelt. Here is a medicine wheel, I said: the blue stones represent the Earth cross and red stones represent the sun cross. The eight work like doors, marking gateways you go through. In the Americas the medicine wheel is about space and the directions that bring different challenges and riches. The north is where the ancestors live.

'The wheel of these British islands however is all about time. The stones mark a clock on which you can measure the time of the year and your own time and the time we are all in now – which is a time of breakdown and decay. What old forms need to go and what ancient roots need to hold fast in this time? What are we all doing here together at this moment with the ancestor mountain behind us and the lake of the bard before us?'

Everyone leaves and goes out on the pathways toward the hillsides. Some crouch down beside the loch or the roots of the birch trees at the back of the hostel. Some walk out of sight. I go out and sit on a rock striped with white quartz, and sing a chant to the mountain: it is a song that comes from the Andes, that comes from the Sierra Madre, that come from a sky island known as the Place of Many Springs. No one taught me that song.

beinn a bhric
Sometimes you contact something from the dark peaty layer, as Dougie calls the Cailleach's territory, that bursts through the dimensions, through time and space. It calls you to attention: the part of you that knows what to do when you find a dead deer on the roadway. You can deliver the fawn, you can do your thing in the dark and the rain. You can remember. Remembering can take you away from the light of the fire and the kitchen, and yet in the dark you feel you belong, you matter, in a way no culture, no family, no work, no political ideology, can ever make you feel. I am not sure I can take you there with words. I can show you the stones. I can dance. Everything else you walk yourself:

'It was not a psychological or therapeutic setting', wrote Caroline Ross, afterwards,
but a deeply connected almost mythic space.  As I have only seen properly described in the words of Riddley Walker, or perhaps the books of Ursula K LeGuin, People are not the only people there. Land, rocks, mountains and lakes, beings and heroes of the past, forces and gods are at the fireside too...
...if you showed me a far-off society where Samhain was celebrated as we did at Carrying the Fire, I would go into exile from this country to live there with those good people and become part of that culture. Ceremony, gathering together and marking the passage of the year and of our lives are so lost in the wider human culture in Britain from which I am mostly alienated, and manage to evade by living moored beside a tiny island in the middle of a river.
My heart was at home over Samhain, and through unparalleled good fortune, I was at home both culturally and geographically. People are made refugees every day and must leave their hearths for uncertain futures. Even within this country, Britons are displaced from the beneficial aspects of their culture and nature, by the market, homelessness, delusion and a thousand other causes.


But the deer are still here, and so are the mountains, and the wind, and there is still enough wood to make a fire. There are people who can still remember the stories that makes sense of everything, and the movements that are the shape of antlers or a tree moving in the wind. And if on a winter's day in the Highlands you hear a raven croak behind you, the Cailleach will still be there to show you her misty face that is sometimes blue.

P1190736


Way out
Images by Gavin MacGregor, Sarah Thomas, Jonny Harris and Charlotte Du Cann.  

Charlotte Du Cann is an editor/art editor and distributor for Dark Mountain books. This weekend she is taking part in a series of DM workshops and talks, curated by co-founder Dougald Hine in Sweden. This month's will be based on her story about the Underworld The Seven Coats (Issue 6). charlotteducann.blogspot.co.uk. 

Keep an eye out for next year's Carrying the Fire/Dark Mountain gathering. Details to be announced next year.
          A New Direction For The Galaxy Express & Sci-Fi Romance Quarterly        

After almost eight years of blogging, it’s time for a new direction here at The Galaxy Express. It’s time to shake things up and explore other ways of sharing my love of science fiction romance!


Given the existence of Sci-Fi Romance Quarterly and the overlapping work I’ve been doing for both the magazine and TGE, I approached my colleagues KS Augustin and Diane Dooley with the idea of merging TGE and SFRQ. Subsequently, we created Galaxy Express 2.0. This way, we can more efficiently streamline our efforts, which remain focused on delivering the best SFR gateway we can for readers.

Additionally, KS Augustin and Diane Dooley will join me as co-bloggers! Many of the posts, especially mine, will continue to focus on SFR, while others will explore a variety of topics. It’ll be a fun way to freshen things up!

Never fear, the original TGE will remain here, with periodic links to the new blog as posts appear. Keeping this blog live means we can all continue to use this site for the extensive information it contains.

Most book release news previously covered by TGE will now be channeled through Sci-Fi Romance Quarterly. I coordinate that content, so continue to send me information about your forthcoming books!

Three posts per month will appear at Galaxy Express 2.0 on the following dates:

10th – KS Augustin
20th – Diane Dooley
30th – Heather Massey (that’s me!)

I anticipate contributing additional SFR-themed posts as the mood strikes and to feature news as time allows.

I'll continue to use Twitter to share my adventures in sci-fi romance, so look for me there as well: @thgalaxyexpress.

As you can tell, this isn’t goodbye; rather, it’s an invitation to continue the adventure at Galaxy Express 2.0. See you there!

Joyfully yours,
Heather


          Scheduled Task to Update Your Federation Trust        
Microsoft published an article this morning about keeping your federation trust up-to-date. This is really important if you are in a hybrid configuration or if you are sharing free/busy information between two different on-premises organizations using the Microsoft Federation Gateway as a trust broker. Microsoft periodically updates the certificates used by the Microsoft Federation Gateway […]
          Choosing an Ecommerce Shopping Cart        

NEW YORK - MAY 20:  In this photo illustration...Image by Getty Images via Daylife

Choosing an online shopping cart is a big decision. Unlike a traditional brick and mortar business, your website is your only chance to impress potential customers. It needs to project a professional image to capture the trust of your visitors. The shopping cart is a particularly important part of your website because it deals with people’s personal information and credit card numbers. People are nervous about online purchases and need to be assured that they are giving their credit card numbers to a reputable company.

There are several types of ecommerce shopping carts available. They range from merchant services, which require no programming skills, to fully integrated shopping carts that require custom programming. The three main categories of shopping carts are:

* Merchant services such as eBay and 2Checkout
* Hosted shopping cart services
* Fully integrated shopping carts

Merchant Services

Most shopping carts require you to have your own merchant account and gateway. A merchant account is a bank account that allows a business to conduct credit card transactions and the gateway allows the transaction to be conducted over a secure connection. It’s okay if you don’t have a merchant account or gateway. Merchant service shopping carts allow you to use their merchant account, gateway and shopping cart for a higher cost.

Merchant services are beneficial for very small businesses or those that are just starting and don’t have a lot of orders. Merchant services provide the merchant account, gateway, hosted shopping cart and will maintain your customer’s personal information. They usually require a set-up fee between 50 and 200 dollars, transaction fee between 30 and 75 cents, and 5% to 10% of each transaction. Because you are using their merchant account, your customer’s credit card statement will show the merchant services business name not yours. In some cases, customers will not recognize the charge and may dispute it.

Merchant service shopping carts have an administrative interface, which allows you to login to your account to add products, prices and shipping options. The shopping cart generates the html for the purchase buttons and you simply copy and paste the html into your web pages. When your customer clicks on the purchase button, he is taken to another website to enter the credit card information. This indicates to the customer that you are a small business. Some potential customers will abandon the shopping cart rather than enter their credit card information on a website they know nothing about.

Once your business grows to the point where you are processing over $1000 a month, it’s more cost effective to apply for your own merchant account and switch to either a hosted shopping cart (little or no programming) or a fully integrated shopping cart (programming required).

Hosted Shopping Cart

The hosted shopping cart is a great solution for a small business that is processing over $1000 a month but does not have the resources to create or customize a fully integrated shopping cart. Hosted shopping carts are similar to the merchant services because they provide an administrative interface for you to enter products, pricing and shipping options. They will generate the html for the purchase buttons, which can be copied and pasted into your html pages.

Hosted shopping carts face some of same problems as merchant service carts because your customers will be transferred to a different website to enter the credit card information. Some hosted shopping carts allow you to customize the shopping cart so that it has the same look and feel as your websites. Customizing your shopping cart may require some programming skills, but it could also prevent customers from abandoning their shopping carts.

The main difference between the merchant services shopping cart and the hosted shopping cart is the name that appears on the customer’s credit card and pricing. Hosted shopping carts allow you to use your own merchant account and gateway, which means the customer’s credit card statement will show your business name next to the charge. This can decrease your charge backs.

If you are using your own merchant account and conducting over $1000 of transitions each month, the hosted shopping carts can be less expensive than merchant services. Your merchant account will probably charge a monthly fee between 20 and 60 dollars, transaction fee between 10 and 50 cents, and a percentage of the transaction, usually ranging between 2% to 3.5%. In addition to the merchant fees, your shopping cart service will also charge a monthly fee between 10 and 30 dollars and could charge a transaction fee. These fees sound more expensive than the merchant service option, but if you are processing over $1000 a month and growing, it’s better to pay flat monthly fees than continue to be charged 5 to 10 percent of the each transaction.

Fully Integrated Shopping Carts

The fully integrated shopping cart is a great option for any business that can afford it. The shopping cart will be dynamic and will have the same look and feel as your website. The ZIP Baby Potty Training Store is a great example of a fully integrated shopping cart. Fully integrated shopping carts like this contain features that are not found in merchant service or hosted shopping carts. For example, you can discount items, display customer reviews, assign products to multiple categories, display out of stock notifications, sort products and prices, and display shipping estimates without requiring the customer to create an account.

Integrated shopping carts require advanced programming skills and can often be used with your own merchant account or with a service that allows you to use their merchant account for a higher fee. There are many integrated shopping carts available. Free carts require the most programming skills, but if you don’t have the programming skills necessary to customize a free shopping cart, there are many companies that specialize in customizing fully integrated shopping carts.

Your choice of a shopping cart can have a dramatic impact on your business. Your website is the first and only impression you get to make so you’ll want to make it as professional as possible. While shopping for a shopping cart system, put yourself in your target customer’s shoes and browse the Internet. Review your competitor’s websites as well as those outside your industry. Make a list of shopping carts that you find appealing and research them thoroughly before choosing one.

Copyright 2004 Danna Henderson. All Rights Reserved.

Reblog this post [with Zemanta]

          ABACA EMAIL PROTECTION GATEWAY        

Abaca’s Email Protection Gateway™ Get the best performance at the best price. Guaranteed. Abaca has created a unique product that stops 99% of spam without any updating or management on your part. It’s the first truly plug-and-play anti-spam appliance. Abaca Email Protection Gateway. 99% spam blocking everyday without tuning , or we pay you. The … Continue reading "ABACA EMAIL PROTECTION GATEWAY"

The post ABACA EMAIL PROTECTION GATEWAY appeared first on Niktek.


          New Collection Guides on ExploreUK        
​University of Kentucky Special Collections Research Center is pleased to announce the following collections have been organized and are now available on ExploreUK.
  • Commission on Religion in Appalachia records, 1997ms352  
    The Commission on Religion in Appalachia (CORA) records (dated 1935-1998, undated; 185.8 cubic feet; 178 record storage boxes, 5 half-sized storage boxes, 6 flat boxes, 3 case folders) consists of operating records, ephemera, photographs, film, and audio recordings documenting the activities of CORA relating to causes such as labor, civil rights, and environmental protection in Appalachia.
     
  • Barkley, Alben W. and Barkley family moving image and audio recordings, 2016av003
    The Alben W. Barkley and Barkley family moving image and audio recordings (dated 1940-1968; 0.67 cubic feet; 23 items) consist of seven reel-to-reel audio tapes and sixteen Super 8 (8mm) color film reels with no accompanying audio tracks featuring Vice President Alben W. Barkley of Paducah, Kentucky and his immediate family and descendants.
     
  • Kentucky Civil War Commission press releases, 65m126
    The Kentucky Civil War Commission press releases (dated 1961-1965; 0.23 cubic feet; 1 box) includes the manuscripts for a weekly newspaper column by the executive coordinator of the commission, Joe Speed Jordan.
     
  • Kentucky Hemp Growers Cooperative Association Museum and Library, 2014ms0041
    The Kentucky Hemp Growers Cooperative Association Museum and Library collection (dated 1850-2013, undated, bulk 1993-2013; 19.49 cubic feet; 29 boxes, 14 items) comprises the exhibit materials and documents housed by the Museum and Library alongside the operating records of both the KHGCA and their museum and library.
     
  • Mabel Henderson Reed papers, 63m284
    The Mabel Henderson Reed papers (dated 1942-1962; 0.95 cubic feet; 2 boxes) consist of scrapbooks of newspaper clippings, correspondence, and short essays, concerning World War II and the Japanese people.
     
  • Garrard County records, 68m64
    The Garrard County records (dated 1784-1916; 2.63 cubic feet; 5 boxes) consists of official documents pertaining to the different towns in Garrard County, Kentucky.
     
  • Cornelia Anderson Watkins papers, 68m52
    The Cornelia Anderson Watkins papers (dated 1851-1871, undated; 0.23 cubic feet; 1 box) includes a book of poems, two diaries, a map, and a letter written to a friend, which document the effects of the Civil War.
     
  • Joseph Elliott Johnston papers, 66m11
    The Joseph Elliott Johnston papers (dated 1964; 0.23 cubic feet; 1 box) consist of original materials used for Johnston's 1964 book Life Begins at Eighty.
     
  • John Woodring blacksmith ledger, 2017ms004
    The John Woodring blacksmith ledger (dated 1799-1822, 1852; 0.23 cubic feet; 1 box) consists of an accounting ledger for the Bardstown, Kentucky, blacksmiths John Woodring and Henry Beckett.
     
  • Walker family WWI correspondence, 2009ms086
    The Walker family correspondence (dated 1917-1919; 0.2 cubic feet; 1 box) comprise of letters, photographs, and newspaper clippings sent to Dallas Walker documenting his service in the Ambulance Corps during WWI, and the Walker family professional and personal activities, including the family-run tobacco manufacturing company located in Covington, Ky, I.L. Walker Tobacco Company.
     
  • Paul R. Foster papers, 65m142
    The Paul R. Foster papers (dated 1946-1951, 0.96 cubic feet; 4 boxes) consist of copies of indictments, photographs of the tribunal in session and of the defendants and a copy of the verdict as well as a prepared summary of the German War Criminal Trial at Nuremburg in 1945-1946.
     
  • Josephine and James Morton papers, 2016ms054
    The Josephine and James Morton papers (dated 1839-1921, bulk 1860-1877; 2 cubic feet; 5 boxes) consist of correspondence, journals, financial documents, sermons, and photographs which document the Civil War and Presbyterian ministries in Kentucky.
     
  • Gateway Foundation records, 2016ms046
    The Gateway Foundation records (dated 1959-2016, undated; 10.59 cubic feet; 12 boxes, 6 oversize boxes, 3 items) comprise office files, printed materials, and newspaper clippings that document the Chicago-based therapeutic community's substance abuse treatment programs and addiction services.
     
  • Thomas Hines autograph album, 2010ms001
    The Thomas Hines autograph album (dated 1860-1862; 0.15 cubic feet; 1 box) consists of a bound volume called Album of Love, containing notes, signatures, letters, and poems written by friends and acquaintances in expressions of affection and hopes of being remembered.
     
  • Woman's Club of Central Kentucky records, 2013ms0770
    The Woman's Club of Central Kentucky Records (dated 1897-2016, bulk 1929-2016; 19.64 cubic feet, 30 boxes) primarily comprise constitutions and bylaws, ledgers, Executive Board meeting minutes, yearbooks and calendars, and scrapbooks that document the Woman's Club of Central Kentucky's operations and events.
     
  • Clay Lancaster residential architectural photographs, 2014av001
    The Clay Lancaster Kentucky architectural photographs (dated 1910-1990, undated; 2.3 cubic feet; 16 boxes) consists of writer and historian, Clay Lancaster's architectural photographs and negatives.
     
  • Edward W. Rannells papers, 1982ua017
    The Edward W. Rannells papers (dated 1928-1971, undated; 1.75 cubic feet; 5 boxes) comprise correspondence, collected works, and newspaper clippings that document the work of Rannells as an art educator and Head of the University of Kentucky Art Department; his work to organize art exhibitions at the University of Kentucky and elsewhere; and his activities with professional organizations at regional and national levels
     
  • Nancy T. Ray papers0000ua010
    The Nancy T. Ray papers 
    (dated 1964-1972; 0.7 cubic feet, 2 boxes) comprises correspondence, financial documents, newspapers clippings, periodicals, flyers, meeting minutes, and organization constitutions that document three University of Kentucky student organizations (Associated Women Students, Students for a Democratic Society, and Student Mobilization Committee) and the national peace movements of the 1960s and 1970s.

          HEADS UP 2/15        
 
 
Top World News Now                 
February 15, 2013
 

United States
Environmentalists Press Obama in Heated Oil Pipeline Debate
NRA exec accuses Obama of gun 'charade' at State of the Union
Kerry: Moves Against North Korea Would Scare Iran Off Nukes
Senate Republicans Block Hagel Nomination For Defense Secretary
Key US general backs keeping Afghan forces at peak strength
Missouri Democrats Introduce Legislation to Confiscate Firearms – Gives Gun Owners 90 Days to Turn in Weapons
Transocean to pay $400 million for 2010 Gulf of Mexico oil spill
High taxes force more Americans to renounce their citizenship
600 children living in Washington, DC homeless shelter
Conspiracy Theorists Leap at the Confusing Case of Dorner’s Multiple Wallets
Body in burned cabin ID'd as Christopher Dorner
Cruise ship nightmare nearing end for passengers after hellish trip
CDC Warns of Super-Gonorrhea
 
 

Russia
Russia activates ‘Operation Fortress’, 20,000 troops after air defense forces shoot down space object
Putin orders Russian security on high alert before Olympics
Putin Warns Foreign NGOs Against 'Meddling' In Russian Affairs
Putin Orders FSB to Set Up Anti-Hacker Defense
Putin: Russia will not tolerate foreign pressure
Foreign Ministry: Russia ‘Ready’ to Consider Further Nuclear Arms Cuts
Army Chief: Russia may be drawn into resource wars in future
Russian Army Commissions Bioengineered Liver for $17 Mln
Russia charges Georgian politician with plotting mass unrest
Constitutional Court: Authorities must not politically discriminate against protesters
Six Suspected Militants Killed in Dagestan Operation
Very strong earthquake in a sparsely populated Siberia area
Thousands of Russian convicts may go untracked if bracelet batteries die