Kamis, 06 Januari 2011

1
Fried Chicken Paste


Material:

     * 1 small chicken cut into small
     * 1 small garlic into small pieces
     * 1 teaspoon salt SDK
     * 1 stalk lemongrass, take the whites only.
     * 1 red chili, seeded
     * 1 red tomato, thinly sliced
     * cooking oil to taste

Chili:

     * 8 pieces red chili
     * 5 red chili pepper
     * 3 cloves garlic
     * grains pepper to taste
     * 1 1 / 2 SDK tea fried shrimp paste
     * salt to taste

How to cook:


     * Brush chicken with salt and white until blended bwang
     * Fried chicken until golden brown and then lift
     * Saute until wilted lemon grass and chili oil with 4 SDK
     * Enter the tomatoes and other spices, and cook until fragrant
     * Enter the fried chicken, mix well
     * Remove and serve to family

0
Young Coconut Ice Cream


Material:

     * 1 / 2 ltr fresh sus
     * 100 ml coconut water
     * 1 SDK cornstarch, dissolve slightly in water
     * 3 chicken eggs, take the yellow of course and then shaken
     * 200 gr young coconut meat
     * 100 mk heavy cream


Method:

     * Combine milk and coconut water then stir well
     * Cook over low heat while stirring continues until the heat
     * Enter the cornstarch liquid and then stirring constantly until boiling
     * Ambi little dough then mix with egg yolk.
     * Put back into the batter. Cook until boiling then remove and keep on stirring until the steam is lost.
     * Add young coconut meat and cream and stir well.
     * After a bit cold, put in freezer until half frozen.
     * Stir until blended and then save it back in the freezer until frozen.
     * Serve in small glass cups...

0
Chicken Cordon Bleu

 

Material:

2 chicken breasts, skinless
2 pieces of sliced roast beef (roast beef)
2 teaspoons mustard
salt & pepper to taste

Skin:
 
wheat flour (plain flour)
bread crumbs (bread crumbs)
1 egg beaten

Method :
1. Cut the chicken breasts horizontally (wide), but do not get truncated. Open in the middle, coat wit mustard, salt & pepper.
2. Place roast beef in tengah2 chicken breasts, cover again. If necessary, skewer with a toothpick so as not to
open. Put in refrigerator for 30 minutes.
3. Labur chicken breasts with flour, then dip in beaten eggs. After that labur with bread flour until the whole
surface of the coated chicken breasts.
4. Fry over low heat first. After 3 / 4 cooked, raise the fire. Do not forget to discard toothpicks after cooking,
before the serve.
5. Serve with ketchup or chili sauce


 

0
White Cake Recipe Fruit Cake

   

Material:
      * 220 g butter
     * 300 g sugar
     * 4 egg yolks
     * 4 egg whites
     * 60 g mixed peel
     * 100 g currants
     * 150 g candied cherries
     * 300 g raisins
     * 180 g plain flour
     * 60 ml orange juice


Method:

     * Beat butter and sugar until smooth.
     * Add egg yolks, beat well.
     * Enter your fruits and orange juice and stir well.
     * Add flour and stir well.
     * Beat the egg whites until stiff.
     * Enter into the batter and stir well.
     * Pour into a baking dish, smooth.
     * Bake in the oven to 180 C for 30 minutes.
     * Remove and let cool.

0
Technology acceptance model

The Technology Acceptance Model (TAM) is an information systems theory that models how users come to accept and use a technology. The model suggests that when users are presented with a new technology, a number of factors influence their decision about how and when they will use it, notably:
  • Perceived usefulness (PU) - This was defined by Fred Davis as "the degree to which a person believes that using a particular system would enhance his or her job performance".
  • Perceived ease-of-use (PEOU) - Davis defined this as "the degree to which a person believes that using a particular system would be free from effort" (Davis 1989).
The TAM have been continuously studied and expanded, the two major upgrade being the TAM 2 (Venkatesh & Davis 2000 & Venkatesh 2000) and the Unified Theory of Acceptance and Use of Technology (or UTAUT, Venkatesh et al. 2003). A TAM 3 have also been proposed (Venkatesh & Bala 2008).

History

 TAM is one of the most influential extensions of Ajzen and Fishbein’s theory of reasoned action (TRA) in the literature. It was developed by Fred Davis and Richard Bagozzi (Davis 1989, Bagozzi & Warshaw 1992). TAM replaces many of TRA’s attitude measures with the two technology acceptance measures— ease of use, and usefulness. TRA and TAM, both of which have strong behavioural elements, assume that when someone forms an intention to act, that they will be free to act without limitation. In the real world there will be many constraints, such as limit the freedom to act (Bagozzi & Warshaw 1992).

Bagozzi, Davis and Warshaw say:
Because new technologies such as personal computers are complex and an element of uncertainty exists in the minds of decision makers with respect to the successful adoption of them, people form attitudes and intentions toward trying to learn to use the new technology prior to initiating efforts directed at using. Attitudes towards usage and intentions to use may be ill-formed or lacking in conviction or else may occur only after preliminary strivings to learn to use the technology evolve. Thus, actual usage may not be a direct or immediate consequence of such attitudes and intentions. (Bagozzi & Warshaw 1992)
Earlier research on the diffusion of innovations also suggested a prominent role for perceived ease of use. Tornatzky and Klein (Tornatzky & Klein 1982) analysed the adoption, finding that compatibility, relative advantage, and complexity had the most significant relationships with adoption across a broad range of innovation types. Eason studied perceived usefulness in terms of a fit between systems, tasks and job profiles, using the terms "task fit" to describe the metric (quoted in Stewart 1986)

Usage

Several researchers have replicated Davis’s original study (Davis 1989) to provide empirical evidence on the relationships that exist between usefulness, ease of use and system use (Adams, Nelson & Todd 1992; Davis 1989; Hendrickson, Massey & Cronan 1993; Segars & Grover 1993; Subramanian 1994; Szajna 1994). Much attention has focused on testing the robustness and validity of the questionnaire instrument used by Davis. Adams et al. (Adams 1992) replicated the work of Davis (Davis 1989) to demonstrate the validity and reliability of his instrument and his measurement scales. They also extended it to different settings and, using two different samples, they demonstrated the internal consistency and replication reliability of the two scales. Hendrickson et al. (Hendrickson, Massey & Cronan 1993) found high reliability and good test-retest reliability. Szajna (Szajna 1994) found that the instrument had predictive validity for intent to use, self-reported usage and attitude toward use. The sum of this research has confirmed the validity of the Davis instrument, and to support its use with different populations of users and different software choices.
Segars and Grover (Segars & Grover 1993) re-examined Adams et al.’s (Adams, Nelson & Todd 1992) replication of the Davis work. They were critical of the measurement model used, and postulated a different model based on three constructs: usefulness, effectiveness, and ease-of-use. These findings do not yet seem to have been replicated.
Mark Keil and his colleagues have developed (or, perhaps rendered more popularisable) Davis’s model into what they call the Usefulness/EOU Grid, which is a 2×2 grid where each quadrant represents a different combination of the two attributes. In the context of software use, this provides a mechanism for discussing the current mix of usefulness and EOU for particular software packages, and for plotting a different course if a different mix is desired, such as the introduction of even more powerful software (Keil, Beranek & Konsynski 1995).
Criticisms of TAM as a "theory" include its lack of falsifiability, questionable heuristic value, limited explanatory and predictive power, triviality, and lack of any practical value. (Chuttur 2009)
Venkatesh and Davis extended the original TAM model to explain perceived usefulness and usage intentions in terms of social influence and cognitive instrumental processes. The extended model, referred to as TAM2, was tested in both voluntary and mandatory settings. The results strongly supported TAM2 (Venkatesh & Davis 2000).
In an attempt to integrate the main competing user acceptance models, Venkatesh et al. formulated the Unified Theory of Acceptance and Use of Technology (UTAUT). This model was found to outperform each of the individual models (Adjusted R square of 69 percent) (Venkatesh et al. 2003).
For a recent analysis and critique of TAM see Bagozzi (Bagozzi 2007).
Independent of TAM, Scherer (Scherer 1986) developed the Matching Person & Technology Model in 1986 as part of her National Science Foundation-funded dissertation research. The MPT Model is fully described in her 1993 text (Scherer 2005, 1st ed. 1993}}), "Living in the State of Stuck," now in its 4th edition. The MPT Model has accompanying assessment measures used in technology selection and decision-making, as well as outcomes research on differences among technology users, non-users, avoiders, and reluctant users.

 



0
How to set laptop wireless

1. Check your computer / laptop you whether wireless driver has been installed anything yet
2. How to check the Menu - Run, type devmgmt.msc / right click my computer-select properties-select
    hardware-select device manager, as shown below:

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXwoSKYlGXXfKsIhzCks23hbQVpP16y5iKni1hrFOCNIFAvGV6uTZ3AYN6_PYYdOOoB4nNx1Xgg1cbL1gGVE-Z3CmlWDE69ZQdzMv9nbKHRr0RM2Oi6EtRuWhQ_tQCWi4Z7WYjFHRPbL0/s320/dm_wifi.JPG 
3. If you do not like the picture above, yes the driver is first installed (usually marked with colored yellow      question mark if the driver is not installed)

4. Select Control Panel - Network Connections, double click on the wireless network connection options.
    On the left side menu, select refresh the network list, so it will appear a list of existing wireless networks in   range
Wireless connection is divided into two groups, unsecured and secured. On unsecured laptop we'll automatically registered to use dynamic IP, sedangankan on our secured registration is required prior to the network admin to get the IP.
Choose one of the unsecured-if any-from the list of available wireless connectivity options, and then press the connect button on the bottom right

 
5.If the connect, the Windows tray icon, will appear wi-fi icon that flashes green comes with the quality of  
  wi-fi signal strength received the Excellent (54 Mbps), Very Good, Good, Low, Poor
  To view the connection status, double-click on the icon will display a window status of the wireless               connection.

6.Coba click the wireless icon located on the right side menubar under the computer / laptop.
Sabtu, 01 Januari 2011

0
Keep your eye

 [mata1.jpg]

Unless you are working in the field, common for employees to be in front of the computer from morning until the time at home. All day dealing with computer screens is not rare cause eye condition feels tired. The eyes feel uncomfortable, irritation, pain, drowsiness so that it looks red, and watery. Vision was blurry and often see double, even the ability to see and distinguish colors to be dropped. Symptoms of eye fatigue is usually called Astenopia.If allowed to be sustainable, these symptoms will be followed by headaches, shoulder, back and waist, vertigo, and bloated. Health problems like this is really going to disrupt productivity. Here are tips to keep your eye health is maintained.

1. Rest your eyes.Eyes off the computer monitor every 15 minutes or so by looking out the window or into a corner or a distant object for about 10 minutes. If necessary, attach the reminder to remind you to blink because the eye is too focused on computer monitors, tend to forget to blink. Another easy way is to close your eyes for 20 seconds.

2. Note the position of your seat and position of the eye against the computer monitor.Put your computer monitor equal or lower with your eye level. Position the monitor is lower than eye level will increase the production of tears and soothe tired eyes. Research also shows that a low monitor position reduces muscle fatigue in the neck, increase attention span and an overall sense of comfort for computer users.

3. Notice the lighting in the room your work palace. Avoid work in the room who had less than 200 lux illumination. Excessive lighting is also not good for the eyes. Light source should come from the side of the monitor with a soft light. Also reduce the brightness of your monitor level. This will make the eye feel more comfortable.


4. Take a Break.After working at the computer for 90 minutes to 120 minutes, you need to rest for 10-20 minutes. Wake up from your chair to take a walk and do simple relaxation to relax tense muscles.

5. Get used to check the health of your eyes at least once a year.Thus, vision problems can be quickly detected and immediate action taken to overcome them.

6. Meet the nutritional needs of your eyes.Always try to eat foods rich in carotenoids such as carrots, yellow melons, and peaches. Lutein and zeaxanthin are two substances that can be found in pumpkin, green vegetable that will protect the retina from damage. Vitamin C is found in green leafy vegetables, all kinds of berries and orange, is antioxidant that can also help to protect the eyes from cataracts attack. While Vitamin E is an antioxidant that also protects cells from free radical attack. Vitamin E can be found in grains, vegetable oils and green vegetables.Vitamin B is a vitamin that support the work of nerves, including nerves of vision. This vitamin can be found in whole grains, fresh vegetables and fruit growth.
As an option, you can also consume a supplement containing vitamin B match your needs.

0
The story of the apple tree

 [apel.JPG]

One time, there lived a big apple treeand boys whohappy playing under the apple tree everydays. He was happy to climbup to the treetops, eating fruit, lyingin the leafy shadeleaves. The boy loved the treeapple. Likewiseapple tree, a very loving little boy.Time flies. The boy has nowgrow up and no longerplaying with the apple tree every day.One day he cameapple tree. His face looked sad.Come over here, and play with me, beggedapple tree.I'm not a little kid playing withtree again, he answeredman, I'd love to have toys, but Ino money forbuy it.The tree replied, Sorry, but I did nothave the money .. but you mayapelku take all the fruit and sell it. You canget money forbuy toys.The boy was very happy. He grabbedall the apples ontree and left happily. But afterit, the boy did notnever come again. The tree was sad again.One day the boy returned again. Treeapples are very pleased to seecome.Come play with me again, said the apple tree.I do not have the time, the boy replied, Imust work tofamily. Now need a house to a placelive. Will youhelp me?Sorry, but I did not have a home. But you cancut down all branchestwigs to build your house, the tree said.Then the boy cut all the branches andapple tree branchand left happily. The tree was also felthappy to see the boywas happy. But the boy never came backagain. The tree waslonely and sad. One hot summer day, childrenman came again. Treeapple feel delighted.Come and play with me, the tree said.I'm sad, said the boy. I'm getting oldand want to live in peace.I want to go on vacation and sailing. Will yougive me a ship tocruise?Sorry, but I do not have a boat. But you can my body and cut stemsuse it to create a ship that you want.Go sailing andhave fun.Then the boy cut the tree trunkthe apple and make the shipwhich in idamkannya. He went sailing and did not plainlyonce again came to seeapple tree. Finally, the boy returned againafter yearslater.Sorry son, I've never had appleagain for you.That's fine. I also have no teeth toapelmu fruit bite.I also do not have a trunk and branches that canyou rock.Now I'm too old for that.I really do not have nothing else canI give you.The only remaining roots of old-akarku andThis dying, word treeapples with tears.I do not need anything else now. Ionly takes placerest. I was so tired after all this timeleave.Ooh, very nice. Do you know, the roots of treesParents are the best placefor to lie down and rest. Come, let uslying in the armsroot-akarku and rest in peace.The boy lay in the arms of the rootstree. Apple treevery happy and smiling with tears in hiseyes.This is the story of us all. Apple treeare our parents.When we were young, we are happy to play with dadour mothers. When weGrowing up, we left them, and onlycome when we needsomething or when we are in trouble. No matteranything, our parentswill always be there to provide what could bethey givemake us happy. You guys are probably thinking howthe boy hadacted very rude to the apple tree. Butthat's how wetreating our parents.

0
Prayer Love

 [ist2_866927_hands_out.jpg]

 Allahu Rabbi, I ask permission
When one day I fell in love
Do not allow love for Thy reduced
Up to neglect the existence make thee
Allahu Rabbi, I have begged
When one day I fell in love
Fill my heart with Thy love numbers infinite
Let Barbie in thee remain intact
Allahu Rabbi, let
When one day I fell in love
Chose me someone whose heart is full of love-thy
And made me even more admired
Allahu Rabbi
When one day I fell in love
Arrange a meeting
Give us a chance to be closer to your love
Allahu Rabbi, I said that last
When one day I fell in love
Do not you turn away from me
I love bestowed Thy
Love that never faded by time
Amiiinnn .......

0
Microsoft RPC Critical Vulnerability and Emergency Patch

 [jaringan+network.jpg]

Vulnerability MS08-067 is critical !
This weakness can be used to mengambail over your computer without
known through the network and without the "involvement" you (phishing).

If experience and still remember the bitterness of the total dead tissue because
Blaster, Sasser or Korgo worms, weakness in this RPC protocol
which is used by network worms.

If users of Windows OS pesonal (not connected to the network
company), it is advisable to install security patches ASAP.

If you are in charge of IT and in the network you are using Windows
OS, it is advisable to run the patch as soon as possible
testing, pilot deployment, validation and full deployment.

Sometimes the patch had a bug which after the install even bother
function or system performance. So, you should not ever do
deployment in production systems (which are used for the operations of the company)
NO patch validation stage

0
"Dad, how long will we be buried?"

Slightly overcast clouds, when the feet of small feet running happily Yaniabove the road crossing the red light district Rubber.Greatness waved his red shirt who waved in the wind. Handright hand holding the ice cream into his mouth while occasionally liftingto taste,while his left hand gripping his pants belt Institute.Yaniv and his father entered the public cemetery Rubber, rotatingmoment to the right & then sat on top a pile of gravestones "Hj Rajawali daughter Muhammad 19-10-1915: 20 - 01-1965 ""Son, this is your grandmother's grave let We pray for your grandma" Yani viewhis father's face, then mimicked his father's hand which held up to the top andjoinclosed his eyes as his father. He listened to his father praying forHis grandmother ..."My father, grandmother when he died aged 50 years Well yes."
His father nodssmile, while looking at the grave of his mother."Well, it means 42-year-old woman dead Well yes ..." Yani said acting as his eyes glazed and his finger counting. "Yes, your grandmother already on in the tomb 42 years ... "Yani turned his head, looked around, a lot of graves there.In addition to her grandmother's grave is an old cemetery mossy "Muhammad Zaini: 19-02-1882: 30-01-1910 ""Hmm .. If that had been dead 106 years ago, yes Well",finger pointing gravestone beside her grandmother's grave. Once again his fathernod.Her hands stroked his head raised her only child. "Dondhuk why? "the father said his son's eyes looked calm." Hmmm, dad
said last night, that if we die, then at the grave and our manysin, we will be tortured in hell "Yani said  he asked approvalfather. "Yeah kanyah?"His father smiled, "So?""Yeah .. If grandma many sins, means grandmother was tortured 42dong yah years in the grave? If grandmother many rewards, it's 42 year happy grandmother buried .... Ya do not yah? "Eyes sparkled as can YaniHis father explained to his opinion.His father smiled, but looked frowning glance, it seemsworried ..... "Yes son, you're smart," his father said curtly. Returning from the funeral, my father looked uneasy Yani Above prayer mat,think about what their children say ... 42 years until now ...if Judgement comes another 100 years ... 142 years being tortured .. or happyburied ...... Shed a tear ...If she died .. So many sins ... was 1000 years ago Resurrectionagain means he will be tortured 1000 years? Innalillaahi WAinna ilaihi rooji'un .... More tearsdripping, could he so long tortured? Yes if the apocalypse 1000 years  forward,if 2000 years more? If 3000 years more? During that time he willtortured in the grave. Then after buried? Will not it worse?  but see scenes on television of thugs beaten mass yesterday he already can not stand?Ya Allah ... He was getting down, his hands raised, and over his shoulderup and down erratically .... more tears flooded his beard Cor as aluka Khusnul khootimah .. over time in reading it PRAYuntil his voice hoarse ... And he paused when sounding coughYani.She went Yani who was asleep on the couch Bamboo. In betulkannyablanket. Yani kept falling asleep .... without knowing, how the father isthank him for having resuscitate the meaning of alife ... And what will come in front of him ..."Yaa Allah, put the world in my hand, do not you put in my heart ... "
 
Education & Technology | © 2010 by Agus Hockey | Supported by Tips, Trik, and Technology & WordPress Theme 2 Blog

Kiriman ini mengonfirmasi kepemilikan saya terhadap situs dan situs ini mematuhi kebijakan program dan Persyaratan dan Ketentuan AdSense.