Pages

Subscribe:

Followers

Minggu, 10 Juli 2011

FACEBOOK HISTORY

On October 1, 2005, Facebook expanded to twenty-one universities in the United Kingdom, the entire Instituto Tecnologico y de Estudios Superiores de Monterrey (ITESM) system in Mexico, the entire University of Puerto Rico network in Puerto Rico, and the whole University of the Virgin Islands network in the U.S. Virgin Islands. Facebook launched a high school version in September 2005, which Zuckerberg called the next logical step. At that time, high school networks required an invitation to join.Facebook later expanded membership eligibility to employees of several companies, including Apple Inc. and Microsoft. On December 11, 2005, universities in Australia and New Zealand were added to the Facebook network, bringing its size to 2,000+ colleges and 25,000 + high schools throughout the United States, Canada, Mexico, the United Kingdom, Australia, New Zealand, and Ireland. Facebook was then opened on September 26, 2006, to everyone of ages 13 and older with a valid e-mail address.In October 2008, Facebook announced that it was to set up its international headquarters in Dublin, Ireland.

Recently[as of?], Facebook.com was the top social network across eight individual markets in the Southeast Asia/Oceania region (Philippines, Australia, Indonesia, Malaysia, Singapore, New Zealand, Hong Kong and Vietnam), while other brands commanded the top positions in certain markets, including Google-owned Orkut in India and Brazil, Mixi.jp in Japan, RenRen in China (where Facebook is currently inaccessible), CyWorld in South Korea and Yahoo!’s Wretch.cc in Taiwan.[citation needed]

In 2010 Facebook began to pro-actively involve its users in running the website by inviting them to become beta testers after passing a question-and-answer-based selection process, and also by creating a new section known as Facebook Engineering Puzzles where users would solve computational problems and then potentially be hired by Facebook.
[edit] Financia
Facebook's former headquarters in downtown Palo Alto, California.

Facebook received its first investment of US$500,000 in June 2004 from PayPal co-founder Peter Thiel, in exchange for 7% of the company. This was followed a year later by $12.7 million in venture capital from Accel Partners, and then $27.5 million more from Greylock Partners.A leaked cash flow statement showed that during the 2005 fiscal year, Facebook had a net loss of $3.63 million.
With the sale of social networking website MySpace to News Corp on July 19, 2005, rumors surfaced about the possible sale of Facebook to a larger media company.Zuckerberg had already said he did not want to sell the company, and denied rumors to the contrary.On March 28, 2006, BusinessWeek reported that a potential acquisition of Facebook was under negotiation. Facebook reportedly declined an offer of $750 million from an unknown bidder, and it was rumored the asking price rose as high as $2 billion.

In September 2006, serious talks between Facebook and Yahoo! took place concerning acquisition of Facebook, with prices reaching as high as $1 billion.Thiel, by then a board member of Facebook, indicated that Facebook's internal valuation was around $8 billion based on their projected revenues of $1 billion by 2015, comparable to Viacom's MTV brand, a company with a shared target demographic audience.

On July 17, 2007, Zuckerberg said that selling Facebook was unlikely because he wanted to keep it independent, saying "We're not really looking to sell the company... We're not looking to IPO anytime soon. It's just not the core focus of the company."In September 2007, Microsoft approached Facebook, proposing an investment in return for a 5% stake in the company, offering an estimated $300–500 million.That month, other companies, including Google, expressed interest in buying a portion of Facebook.
On October 24, 2007, Microsoft announced that it had purchased a 1.6% share of Facebook for $240 million, giving Facebook a total implied value of around $15 billion.However, Microsoft bought preferred stock that carried special rights, such as "liquidation preferences" that meant Microsoft would get paid before common stockholders if the company is sold. Microsoft's purchase also included rights to place international ads on Facebook. In November 2007, Hong Kong billionaire Li Ka-shing invested $60 million in Facebook.
Entrance to Facebook's current headquarters in the Stanford Research Park, Palo Alto, California.

In August 2008, BusinessWeek reported that private sales by employees, as well as purchases by venture capital firms, had and were being done at share prices that put the company's total valuation at between $3.75 billion and $5 billion. In October 2008, Zuckerberg said "I don't think social networks can be monetized in the same way that search did... In three years from now we have to figure out what the optimum model is. But that is not our primary focus today."

In August 2009, Facebook acquired social media real-time news aggregator FriendFeed,a startup created by the former Google employee and Gmail's first engineer Paul Buchheit who, while at Google, coined the phrase "Don't be evil".In September 2009, Facebook claimed that it had turned cash flow positive for the first time.In February 2010, Facebook acquired Malaysian contact-importing startup Octazen Solutions.On April 2, 2010, Facebook announced acquisition of photo-sharing service called Divvyshot for an undisclosed amount.In June 2010, an online marketplace for trading private company stock reflected a valuation of $11.5 billion.
At the All Things Digital conference in June 2010, Zuckerberg was asked if he expected to remain CEO if the company went public. Zuckerberg said he did, adding that he doesn't "think about going public ... much." He said he did not have a date in mind for a potential IPO.

BOROBUDUR Architecture



Architecture
Borobudur ground plan taking the form of a Mandala
Borobudur architectural model

Borobudur is built as a single large stupa, and when viewed from above takes the form of a giant tantric Buddhist mandala, simultaneously representing the Buddhist cosmology and the nature of mind. The foundation is a square, approximately 118 metres (387 ft) on each side. It has nine platforms, of which the lower six are square and the upper three are circular. The upper platform features seventy-two small stupas surrounding one large central stupa. Each stupa is bell-shaped and pierced by numerous decorative openings. Statues of the Buddha sit inside the pierced enclosures.

Approximately 55,000 cubic metres (72,000 cu yd) of stones were taken from neighbouring rivers to build the monument.The stone was cut to size, transported to the site and laid without mortar. Knobs, indentations and dovetails were used to form joints between stones. Reliefs were created in situ after the building had been completed.

The monument is equipped with a good drainage system to cater for the area's high stormwater run-off. To prevent flooding, 100 spouts are installed at each corner, each with a unique carved gargoyle in the shape of a giant or makara.
Half cross-section with 4:6:9 height ratio for foot, body and head, respectively

Borobudur differs markedly from the general design of other structures built for this purpose. Instead of being built on a flat surface, Borobudur is built on a natural hill. However, construction technique is similar to other temples in Java. Without the inner spaces seen in other temples, and with a general design similar to the shape of pyramid, Borobudur was first thought more likely to have served as a stupa, instead of a temple.A stupa is intended as a shrine for the Buddha. Sometimes stupas were built only as devotional symbols of Buddhism. A temple, on the other hand, is used as a house of worship. The meticulous complexity of the monument's design suggests that Borobudur is in fact a temple.

Congregational worship in Borobudur is performed in the form of pilgrimage. Pilgrims were guided by the system of staircases and corridors ascending to the top platform. Each platform represents one stage of enlightenment. The path that guides pilgrims was designed to symbolize Buddhist cosmology.

Little is known about Gunadharma, the architect of the complex.His name is recounted from Javanese folk tales rather than from written inscriptions.

The basic unit of measurement used during construction was the tala, defined as the length of a human face from the forehead's hairline to the tip of the chin or the distance from the tip of the thumb to the tip of the middle finger when both fingers are stretched at their maximum distance. The unit is thus relative from one individual to the next, but the monument has exact measurements. A survey conducted in 1977 revealed frequent findings of a ratio of 4:6:9 around the monument. The architect had used the formula to lay out the precise dimensions of the fractal and self-similar geometry in Borobudur's design.This ratio is also found in the designs of Pawon and Mendut, nearby Buddhist temples. Archeologists have conjectured that the 4:6:9 ratio and the tala have calendrical, astronomical and cosmological significance, as is the case with the temple of Angkor Wat in Cambodia.
Lion gate guardian
Stairs of Borobudur through arches of Kala
A narrow corridor with reliefs on the wall

The main structure can be divided into three components: base, body, and top.The base is 123×123 m (403.5 × 403.5 ft) in size with 4 metres (13 ft) walls.The body is composed of five square platforms, each of diminishing height. The first terrace is set back 7 metres (23 ft) from the edge of the base. Each subsequent terrace is set back 2 metres (6.6 ft), leaving a narrow corridor at each stage. The top consists of three circular platforms, with each stage supporting a row of perforated stupas, arranged in concentric circles. There is one main dome at the center; the top of which is the highest point of the monument, 35 metres (115 ft) above ground level. Stairways at the center of each of four sides give access to the top, with a number of arched gates overlooked by 32 lion statues. The gates are adorned with Kala's head carved on top of each and Makaras projecting from each side. This Kala-Makara motif is commonly found on the gates of Javanese temples. The main entrance is on the eastern side, the location of the first narrative reliefs. Stairways on the slopes of the hill also link the monument to the low-lying plain.
A carved gargoyle for water drainage

The monument's three divisions symbolize the three "realms" of Buddhist cosmology, namely Kamadhatu (the world of desires), Rupadhatu (the world of forms), and finally Arupadhatu (the formless world). Ordinary sentient beings live out their lives on the lowest level, the realm of desire. Those who have burnt out all desire for continued existence leave the world of desire and live in the world on the level of form alone: they see forms but are not drawn to them. Finally, full Buddhas go beyond even form, and experience reality at its purest, most fundamental level, the formless ocean of nirvana. Kāmadhātu is represented by the base, Rupadhatu by the five square platforms (the body), and Arupadhatu by the three circular platforms and the large topmost stupa. The architectural features between three stages have metaphorical differences. For instance, square and detailed decorations in the Rupadhatu disappear into plain circular platforms in the Arupadhatu to represent how the world of forms – where men are still attached with forms and names – changes into the world of the formless.

In 1885, a hidden structure under the base was accidentally discovered.[31] The "hidden foot" contains reliefs, 160 of which are narratives describing the real Kāmadhātu. The remaining reliefs are panels with short inscriptions that apparently provide instructions for the sculptors, illustrating the scenes to be carved.The real base is hidden by an encasement base, the purpose of which remains a mystery. It was first thought that the real base had to be covered to prevent a disastrous subsidence of the monument through the hill.There is another theory that the encasement base was added because the original hidden foot was incorrectly designed, according to Vastu Shastra, the Indian ancient book about architecture and town planning.Regardless of its intention, the encasement base was built with detailed and meticulous design and with aesthetics and religious considerations.

VIRUS PROGRAMS

The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s. Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1971.Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system.Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Reaper program was created to delete Creeper.

A program called "Elk Cloner" was the first computer virus to appear "in the wild"—that is, outside the single computer or lab where it was created. Written in 1981 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk.This virus, created as a practical joke when Skrenta was still in high school, was injected in a game on a floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displaying a short poem beginning "Elk Cloner: The program with a personality."

The first PC virus in the wild was a boot sector virus dubbed (c)Brain, created in 1986 by the Farooq Alvi Brothers in Lahore, Pakistan, reportedly to deter piracy of the software they had written.

Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the personal computer, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk, usually inadvertently. PCs of the era would attempt to boot first from a floppy if one had been left in the drive. Until floppy disks fell out of use, this was the most successful infection strategy and boot sector viruses were the most common in the wild for many years.

Traditional computer viruses emerged in the 1980s, driven by the spread of personal computers and the resultant increase in BBS, modem use, and software sharing. Bulletin board-driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software. Shareware and bootleg software were equally common vectors for viruses on BBS's.[citation needed]

Macro viruses have become common since the mid-1990s. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel and spread throughout Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most could also spread to Macintosh computers. Although most of these viruses did not have the ability to send infected email messages, those viruses which did take advantage of the Microsoft Outlook COM interface.[citation needed]

Some old versions of Microsoft Word allow macros to replicate themselves with additional blank lines. If two macro viruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a "mating" of the two and would likely be detected as a virus unique from the "parents".
A virus may also send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend (a trusted source) follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating.
Viruses that spread using cross-site scripting were first reported in 2002, and were academically demonstrated in 2005. There have been multiple instances of the cross-site scripting viruses in the wild, exploiting websites such as MySpace and Yahoo.

5 Tips for Better Sleep



5 Tips for Better Sleep
1: Regular Sleep & Wake Schedule

Maintain a regular bed and wake time schedule including weekends. Our sleep-wake cycle is regulated by a "circadian clock" in our brain and the body's need to balance both sleep time and wake time. A regular waking time in the morning strengthens the circadian function and can help with sleep onset at night. That is also why it is important to keep a regular bedtime and wake-time, even on the weekends when there is the temptation to sleep in.

2: Soothing Bedtime Routine
stretch
That workout routine before bed could be interfering with your sleep.

Establish a regular, relaxing bedtime routine such as soaking in a hot bath or hot tub and then reading a book or listening to soothing music. A relaxing, routine activity right before bedtime conducted away from bright lights helps separate your sleep time from activities that can cause excitement, stress or anxiety which can make it more difficult to fall asleep, get sound and deep sleep or remain asleep. Avoid arousing activities before bedtime like working, paying bills, engaging in competitive games or family problem-solving. Some studies suggest that soaking in hot water (such as a hot tub or bath) before retiring to bed can ease the transition into deeper sleep, but it should be done early enough that you are no longer sweating or over-heated. If you are unable to avoid tension and stress, it may be helpful to learn relaxation therapy from a trained professional. Finally, avoid exposure to bright before bedtime because it signals the neurons that help control the sleep-wake cycle that it is time to awaken, not to sleep.

 3: Set the Mood

Create a sleep-conducive environment that is dark, quiet, comfortable and cool. Design your sleep environment to establish the conditions you need for sleep - cool, quiet, dark, comfortable and free of interruptions. Also make your bedroom reflective of the value you place on sleep. Check your room for noise or other distractions, including a bed partner's sleep disruptions such as snoring, light, and a dry or hot environment. Consider using blackout curtains, eye shades, ear plugs, "white noise," humidifiers, fans and other devices.

4: Find Quality Mattress & Pillows
Remove mattress tag HPA, large
Sleep on a comfortable mattress and pillows. Make sure your mattress is comfortable and supportive. The one you have been using for years may have exceeded its life expectancy - about 9 or 10 years for most good quality mattresses. Have comfortable pillows and make the room attractive and inviting for sleep but also free of allergens that might affect you and objects that might cause you to slip or fall if you have to get up during the night.

5: Bed for Sleep & Please Only!

Use your bedroom only for sleep and sex. It is best to take work materials, computers and televisions out of the sleeping environment. Use your bed only for sleep and sex to strengthen the association between bed and sleep. If you associate a particular activity or item with anxiety about sleeping, omit it from your bedtime routine. For example, if looking at a bedroom clock makes you anxious about how much time you have before you must get up, move the clock out of sight. Do not engage in activities that cause you anxiety and prevent you from sleeping.

THE TITANIC STORY

The Titanic Story

On that fateful night of April 14, 1912 there were 2,235 souls crowded aboard the R.M.S. Titanic.  There was no wind to speak of.  The frigid, dark sea was calm, like a plate glass mirror beneath the star-spangled heavens.  It was an hour before midnight on a starry, moonless night.  While the band played on beneath the decks in the first class lounge, and while the night watch paced the Bridge high above, the greatest maritime tragedy in the history of sailing, stealthily, silently awaited them in the ice-strewn midnight waters of the North Atlantic. Survivors recalled a gentle shudder that briefly shook the 900 foot long vessel.  It came and went so quickly that nobody gave it much of a second thought.  Except for the occupants of the Bridge–who in the split seconds before that collision, saw the towering iceberg ahead, floating in their unlighted pathway.  The helmsman swerved to miss the iceberg–but they would have been better off to have struck it head on.  In narrowly avoiding a head-on collision, they suffered an even worse fate!
  Three-fourths of the iceberg lay unseen beneath the calm ocean surface.  When  the Titanic swerved, it brushed the iceberg's underside on the starboard side of the bow, slitting a quarter of an inch wide opening more than 300 feet down the side of the vessel.  Like a titanic can opener, the iceberg knifed open the side of the iron hull.  The damage was just enough to cause the metal plates to buckle so that six watertight compartments began taking in sea water. So scientifically had this great sailing ship been constructed, with 16 watertight compartments in a 1/6 mile long hull, that the captain had made a pre-voyage boast, "Not even God himself could sink her".  The builders had calculated that even if four of the compartments should burst, the ship would still float!  But on that starry night, six of them exploded and began to suck in the frigid water of the North Atlantic!  Mathematically, the "unsinkable ship" was mortally wounded.  And, in two hours she was gone.  Commander Lightoller, one of the few crew members who survived the tragedy, described the moment she sunk.
Of the 2235 occupants, 1522 met their death in those dark waters including most of the men, most of the third class, most of the crew, and all of the band.  Only 713 people were rescued.
And the world lined up for hours to relive their tragic story in the most watched movie ever in human history.  Why?
Could it be that Titanic is more than a tale about love and death of heart throbs Kate Winslet and Leonardo DiCaprio?  Could it be that there's a deep, subconscious sense the world over that this tragedy at the beginning of the 20th century was in fact a WARNING PARABLE of an ominous unnamed tragedy that hangs like Damocles' sword over our planet, while we're partying to beat the band?

Jumat, 04 Februari 2011

WASPADAI KEYLOGGER DI WARNET




Waspadalah terhadap keylogger di warnet
Banyaknya cerita-cerita para chatter dan netter tentang tindakan hackingnya
terhadap warnet-warnet membuat penulis menjadi lebih waspada terhadap
komputer-komputer warnet, ini bukan kekhawatiran yang mengada-ada karena
pada awal tahun 2002 penulis pernah iseng melakukan dan mengeruk banyak
password account para netter, dimana ini membuktikan bahwa orang tidak
begitu susah memasang keylogger di warnet pada jaman dulu apalagi saat ini
begitu banyak warnet di Yogya menggunakan DeepFreeze lama. Tapi yang tak
habis pikir permainan yang udah lama usang ini tetap menjadi senjata orang
iseng yang tidak bertanggung jawab untuk mengambil password-password
account orang.
Di kota Gudeg ini penulis hanya mempercayakan acces internet kepada warnetwarnet
tertentu saja walaupun mungkin pendapat ini bisa saja berubah diwaktu
yang akan datang, jangan harap warnet dengan penguncian Ctrl + Alt + del
dapat penulis singgahi lagi, apalagi ada warnet yang mengaktifkan program
yang dibuat dengan tidak jelas seperti program yang dibuat dengan Delphi
(terlihat banget Iconnya waktu Alt + Tab Iconnya) karena penulis belum tahu
fungsinya, penulis juga tidak ingin tahu karena penulis tidak mau
menghabiskan waktu untuk menyelidiki hal tersebut apalagi lagi jika misal
admin atau OP tahu jika komputer warnet di utak-atik lebih dalam malah justru
bisa jadi masalah, untuk menghindari hal-hal tersebut lebih baik penulis

menggunakan warnet-warnet yang sudah biasa penulis gunakan, hampir semua
warnet di Yogya pernah penulis kunjungi, rata-rata warnet di Yogya
menggunakan DeepFreeze dan Billing Explorer, ada yang mengganti
DeepFreeze dengan tool lain, itu sah-sah saja tapi bagi pengguna sangat sensitif
terhadap keamanan hal tersebut dapat memunculkan keraguan, karena orang
dapat saja berpikir tidak adanya deepfreeze karena komputer tersebut sudah di
lumpuhkan deepfreezenya dan ada keyloggernya, dan sebagainya.
Terlepas dari penulis sebenarnya hanya mempercayakan acces internet dengan
beberapa langkah yang dilakukan dengan cepat.
1) Restart komputer sebelum billing aktif, karena waktu restart banyak
waktu yang bisa kita gunakan dan hemat, misal pasang Flashdisk, lepas
jaket atau tas dan sebagainya, bisa juga waktunya diisi ke ke kamar kecil
kalau kebelet :P.
2) Setelah restart dan mengaktifkan biaya sewa internet pertama kali penulis
tekan Alt+Ctrl+Shift+F6 untuk melihat bahwa DeepFreeze aktif, ini wajib
bagi penulis tanpa ini penulis tidak akan banyak melakukan aktifitas
memasukkan password kalaupun melakukannya paling mungkin pakai
virtual keyboard.
3) Langkah Ctrl + Alt + Del dilakukan jika misal menggunakan warnet asing
/ baru tapi jika warnet biasa yang penulis kunjungi kadang langsung
lanjut aja tanpa terlalu banyak ngecek asal DeepFreezenya aktif karena
kalau kita sewa warnet maka yang penting adalah kepercayaan terhadap
keamanan warnet., karena tanpa hal itu kenyamanan kita menggunakan
Internet akan sedikit terganggu, jadi pastikan anda menggunakan warnet
sesuai dengan pilihan anda ☺.
4) Setelah semua diperiksa maka acces Internetpun dilakukan, penulis tidak
banyak melakukan hal yang lebih karena selain masalah waktu juga
malas dan tidak mau membuat masalah tapi walaupun begitu memang
yang namanya waspada itu harus, sebagai tambahan penulis pernah
mendengar di warnet yang biasa penulis kunjungi, bahwa DeepFreezenya
yang telah diinstall di komputer warnet telah hilang, kata seorang
Operator yang kebetulan penulis denger hehe dan waktu penulis periksa
di komputer tersebut ada program DeepUnfreeze di drive usernya,
ckckck.
Diharapkan dengan adanya artikel ini dapat membuat kita lebih waspada
terhadap pencurian password dari komputer warnet yang dilakukan oleh orangorang
yang tidak bertanggung jawab.
by : xcode magazine