NEWS TODAY

Latest News :
Recent News
View As:

Posts 4 Introduction to Telematics - the Java Community Process

Posts 4 Introduction to Telematics - the Java Community Process 
Definition
Java Community Process (Java Community Process / JCP) was established in 1998, is a formal mechanism that allows interested parties to develop technical specifications for Java technology standards. Anyone can become a member of the JCP by completing the form available on the website of the JCP. JCP membership to organizations and commercial entities requires an annual fee but free to individuals.
JCP involves the use of Java Specification Request (Java Specification Request / JSRs), ie the formal documents that describe proposed specifications and technologies to add to the Java platform. Formal public reviews of JSRs will appear before the JSR becomes final and the JCP Executive Committee vote on it. A final JSR provides a reference implementation which is a free implementation of the technology in source code form and a Technology Compatibility Kit to verify the API specification. A JCP JSR describe itself. As of 2009, JSR 215 describes the current version (2.7) of the JCP.

  
At this time the growing Java technology, Sun Microsystems introduced Java version 1.2 or better known as Java 2 consisting of JDK and JRE version 1.2.
In Java 2, the java is divided into three categories:
· Java 2 Standard Edition (J2SE), this category is used to run and develop Java applications on a level PC (Personal Computer)
· Java 2 Enterprise Edition (J2EE), this category is used to run and develop Java applications in the environments entriprise with added functionality-functionality of java sort of EJB (Enterprise Java Bean), Java CORBA, Servlet and JSP and Java XML (Extensible Markup Language )
· Java 2 Micro Edition (J2ME), this category is used to run and develop Java applications on devices handled or some sort of mobile devices, Palm, PDA, and Pocket PC. J2ME is designed to be able to run Java programs on a sort of mobile devices and PDAs, which have different characteristics with a regular computer, for example, the small amount of memory in cell phones and PDAs. J2ME consists of the following components of the Java Virtual Machine (JVM) and the Java API (Application Programming Interface) as well as other tools for Java application development some sort of emulator and emulator Java Phone Motorola. In J2ME is divided into two parts known as configuration and profile.
Virtual Machine
Virtual machine (VM) is an environment, typically a program or operating system, which does not physically exist but run in another environment. In this context, VM called "guest" environment while running so-called "host". The basic idea of the virtual machine is mengabtraksi hardware of a computer (CPU, memory, disk, etc.) to multiple execution environments, thus creating the illusion that each environment running computer [separate] sendiri.VM arise because of the desire to run many systems komputer.Teknologi operation on a virtual machine has many uses such as enabling hardware consolidation, facilitate recovery system, and run the software earlier.



One important application of VM technology is cross-platform integration. Some of the more important application is:
· Consolidation of servers.
If several servers run applications that only takes up very little resources, VM can be used to incorporate the applications that run on only one server, even if the application requires that the operating system is different.
· Automation and consolidation of development and testing environment.
Each VM can act as different environments, this allows developers so it does not need to provide the physical environment.
· Run the software earlier.
The operating system and software can be run on previous newer systems.
· Facilitate recovery system.
Virtualization solutions can be used for system recovery plan that requires portability and flexibility across platforms.
· Demonstration software.
With VM technology, clean operating system and its configuration can be provided quickly.
Advantages of Virtual Machine (VM)
VM technology has several advantages, among others:
· It security. VM has a complete protection in a variety of system resources, namely by abolishing the division of resources directly, so there is no problem of protection in the VM. VM system is a perfect vehicle for research and development of the operating system. With VM, when there is a change in one part of the machine, it is guaranteed not to change other components.
· Allows to define a network of Virtual Machine (VM). Each piece of information sent through the network of virtual communication. Again, the network modeled after physical communication network is implemented in software.
Disadvantages Virtual Machine (VM)
Some of the main difficulties of the concept of VM, which are:
· Storage System.
As an example of the difficulty in the storage system is as follows: Suppose we have a machine that has three disk drives but want to support 7 VM. This situation is clearly not possible for us to be able to allocate each disk drive for each VM, as the software for the virtual machine itself will require substantial disk space to provide virtual memory and spooling. The solution is to provide a virtual disk, known also by minidisk, where power storage size is identical to the actual size. Thus, the VM approach also provides an interface identical to the underlying hardware.
· Implementation difficult. Although the concept of VM is quite good, but difficult to implement VM.


APIs
An application programming interface (API) is the interface that a software program tool to allow other software to interact with it, much the same way as the software will probably implement a user interface to allow people to use it. API implemented by applications, libraries and operating system to determine how other software can make calls to or from their service requests. An API determines the vocabulary and calling conventions the programmer should employ to use the service. This may include specifications for routines, data structures, object classes, and protocols used to communicate between the consumer and the executor API.
· Features
API is an abstraction. Software that provides the functionality described by an API is said to be an implementation of the API.

API can:
· Depending on the language, which is only available in a particular programming language, using the syntax and language elements was to create a convenient API to use in this context.
· Language-independent, that is written in a way that means it can be called from multiple programming languages. This is a desirable feature for service-style API that is not tied to a process or system and can be given as remote procedure calls or web services.
For example, a website that allows users to check out local restaurants capable of coating the above review their maps are taken from Google Maps, as Google Maps API which has allowed it ituGoogle Maps' API control what information third-party sites can take, and what can be done with that.
"API" can be used to refer to the complete interface, function, or even a set of APIs provided by an organization. Thus, the meaning coverage is usually determined by the person or documents that communicate information.
· Web API
                        When used in the context of web development, usually an API defined set of Hypertext Transfer Protocol (HTTP) request messages along with a definition of structural response messages, usually expressed in a While "Web APIs" virtual synonym for web services, the trend is recent ( the so-called web 2.0) has been moving away from Simple Object Access Protocol (SOAP) based services more directly to the Representation of the State Transfer (REST) ​​style communications. Web API allows the combination of multiple services into new applications known as mashups.
· Implementation
                        POSIX standard defines an API that allows a variety of computing functions should generally be written so that they can operate on many different systems (Mac OS X and various Berkeley Software Distribution (BSD) implements this interface), however, using it requires a recompile to each platform. API compatible, on the other hand, allows compiled object code to function without any changes, the implementation of any system API. It is beneficial to both software providers (where they can distribute the existing software on a new system without producing / distributing upgrades) and the user (where they might be older than installing software on their new systems without buying an upgrade), although this need a variety of software generally also required the implementation of the API library





Rate it :

Goodbye My father






Father....
No longer spoken from my lips when I find you at home
Father....
No longer spoken from my lips when I address you
Father....
Not yet arrived in front of me

Man poor but to be rich
Strong men who never cried in front of her children
Great man who never complained and gave up for the sake of their children
Man responsible for protecting his wife and children

Goodbye sir ...
It's still so painful departure
rest wound so deep
Probably will not even be cured

He wanted to meet, look at you, joking and laughing with you and hug you ...

I really miss you sir ...
May you be happy there
May Allah put you in jannah
Aamiin ...

Father...
my pray always
May we met again in jannah
And you will not leave us again

We are here to be strong, as strong as the rock in the ocean
Shall not waver despite the waves hit thousands
We promise, we will be happy here
Until reunited father ..



Rate it :

Scrumptious Thanksgiving Arrive in Your place

Scrumptious Thanksgiving Arrive in Your place


Assalamu’alaikum warahmatullahi wabarakatuh.

Waaah already a long time I did not bercuap yaa-cuap this place, already a lot of the same dust cobwebs ya, must be in the same broom clear dip el * ga *
Ya want a little to make a story, about an unexpected experience "), may yaaa, yuk aah start aja not let the longer

Either should be happy or sad should I feel when I actually arrived and stepped on Arab land that time. Happy as I can go run the pilgrimage with mom and my sister. Sad because the father does not participate with us, but I believe, the father must know and clay that we can finally run a pilgrimage that had been planned by the father before.

Yaaa ... pilgrimage is indeed worship previously planned. Are you hoping to invite his wife and two children to perform pilgrimage together, although I was not aware of the plan earlier. But alas, the father of the current circumstances it is very supportive, heart disease father of recurrence and should frequently check up to the hospital and could not be separated from the supervision of a physician. Doctors also do not allow the father to too many activities, because they can lead to heart disease father recurrence.

Up to the date of May 23, 2015 the father breathed his last. Honestly day it was truly a day that makes me feel very devastated devastated. I can not accept the current situation, I do not want to be left father, I was not ready. I'm disappointed, annoyed, angry, why God so quickly called the father, why God did not give a long time for the father. I can not be happy father, I could not give anything to you, I have not been able to make a father proud to have a son like me. I was devastated, saw father lying in front of my eyes. There's nothing I can do but cry. But I realized, I care about you, but God is much the same dear father. I realize that God does not want you continue to feel sick.

Exactly at 12.30 the night in the local area (Jeddah) I and other Umrah pilgrims arriving at King Abdul Aziz airport. Then we continue the journey to Medina in the travel for 4 hours of Jeddah. During my trip I was amazed by the views of the desert and mountain rocks on the right and left of the road. Allah akbar, God is great. So great was the power of Mu Ya Allah.


Congratulations on the road, on the right and left of the road filled with mountain rocks

On arrival in Medina the more my heart pounding, tears fell so heavy. There are no words that I speak but words thankful because I was given the opportunity to come in and arrive at this place. Yaaa Masjiid Nabawi, where this place is located inside the mosque of the Prophet ate of the Muslims, the Prophet of the end times of the Prophet Muhammad S.A.W

In this mosque I met with all the Muslims from various countries of Turkey, Palestine, India, Egypt, Malaysia, Singapore, Brazil and many others. Masjid Nabawi in my experience the unexpected events, starting often greeted by people in the Prophet's Mosque, given drinking water, given the date until there were hugging and kissing my cheek (woman why women). Subhanallah really wonderful, loving Muslims: ")
Until one afternoon before the noon prayer, two (2) people pretty white woman came up to me and other Umrah pilgrims entourage who was sitting waiting for a noon, and then he said
"Assalamu'alaikum, can speak English?"
without doubt the sudden affection answered "Yes" with a smiling face.
Then the woman asked again "From Indonesia right?"
"Of course" I replied.
With a face full of happy two women told him that she wanted to take pictures with my bersana mothers and other worshipers. 2 This woman came from Palestine, two women said that yes, happy and liked by the people of Indonesia, he said that the Indonesian people well, polite and willing to help, always helping State. Therefore two women wanted a photo with us (me and my mothers other worshipers of travel that I follow), after the two women hugged me kissing my cheek. Honestly who knows what happened to me, then I feel happy and bahagis be met by two women, all the more so they say that they like and are happy with the people of Indonesia. But unfortunately, I did not ask who the two of them and I did not capture the moment on camera that I L

After 3 days in the Medina me, mama, mas dani and other worshipers traveled to the city of Mecca, but prior to the city of Mecca, we all conduct mikot before Umrah in the mosque beer ali, after it had kama proceeded to Masjid forbidden in city Mecca , Approximately 5 hours we traveled there (interspersed with breaks).
Arriving in the city of Mecca, the atmosphere is a little different, the wind that blows feels tight because it Madinah and Makkah is currently experiencing winter, but cold in Makkah colder than in the medina. I and other worshipers first break at the hotel until the wait time tawaf. Promptly at 1 me and pilgrims continue the worship tawaf and headed into the Haram. When entering the mosque, my heart was pounding, plus when he saw the temple as the crow flies, the pounding of my heart. Incessantly I express gratitude and reciting Talbiyah, Subhan Allah O Allah I still do not believe I could come here, I can see the temple in person and up close (as it usually see the temple of the picture, can now be viewed directly) , Dear Allah....

Honestly when he saw the temple and during tawaf in my mind is just Dad, I miss you, I want to meet with the father. Tears flowed ceaselessly into my cheeks, while I give a little sob Talbiyah sentence. All the people around me (pilgrims travel) including mama, can only be stroked my shoulder, trying to help stop the cry that seemed to weep from my lips.

Completed tawaf, a lot of prayer that I prayed, I knew an opportunity like this is very difficult to get, I have to take advantage of this opportunity to continue and many pray and give gratitude for what God has given them.

The longer, more flowing tears, only father I remember it
"Father, ade miss the same father. Ade, same mama mas has come here, sir, we got here safely pack. Father wants us all present here together pack, the father who wants us to worship together. Mr. ade dear father, father missed ade, ade want to see the father. "

"Ya Allah Ya Rahman Ya Rahim, only Thee I begged and asked, terpatkan my father disisimi, beside the best and most beautiful in Jannah thy God, Protect and keep you there, 'God, take away the father of the heat of the fire of Hell Ya Allah, give father happiness there. As well as give me the strength and the strength to deal with all the God, and give me always facilities, and Kelancaraan alive so I can be happy mama and my brother, beriaku health so that I was able to keep mom and my sister Ya Allah "

Increasingly heavy tears fell down her cheeks.
Yaaa maybe it was a handful of prayer that I could say much more * *
* First stop crying yaa-nangisnya, the nyesek fear can not breath # deritapenyakitkecil *



After completing the tawaf, later followed by sa'i (safa hill to the road of dignity for men trot) and tahalul (haircuts). Completed the major pilgrimage (to myself) my mama and mas dani resume worship in front of the temple while waiting for the dawn of time, because already menunjjukkan local time at 04.00 am.

Although the hours of 04.00 am, here never know the word quiet, always busy, always solid. Many of them are still conducting worship tawaf or just pray, dhikr or read the Qur'an in front of the altar near the temple.



Ohiya if in Arabic (Madinah and Makkah) there are two times the azan. Adhan first call to prayer beads and tahajud, second azan (interval 1 jam'an) the call to prayer for dawn prayers. The distance between the adhan and ikomat was about 30 minutes late. Deh stand there, worship tuh feel at peace, and feel constantly reminded. And I tuh most like to sit near the temple, do not want to move it feels.

After morning prayers, my mama and mas dani not directly move from our prayers. We always silent while dhikr and reading the Qur'an. When these eyes darting * what is * see here and there, suddenly these eyes fixed on the sky above the temple. Subhan Allah, Allahu Akbar ..... I have never seen such a beautiful sky, the sky pink and blue, plus the moon is white, yaaa I love the moon, unrelenting I give thanks to God, bernar -Right favor of God given so beautiful.

I am the type of person who like to capture certain moments, so views of the beautiful sky that I will not waste it. Because I know, moments like that I have rarely encountered. And this appearance dawn sky above the temple


And many-monet monet that makes me feel amazed: ")

Duuh from earlier story actually real length netesin basic maudlin tears * *
Sorry yaa, the pemblog weve whiny hehe: "")

Furthermore, my little story of the places that I visited there pas: ")
Under yaaaa ...

Foto Masjid Kuba in Madinah






 Foto in Masjid Nabawi at Madinah
























Morning near the Ka'bah, while dhuha'an
This intention mama photo from the side, instead eeh keambil head wrote, because suananya really crowded here: ")


Duhhh rich by now aja yaa stories .. already were mostly ...
Actually there are many more photos, but the scared nyampah hehe: ")

This story does not intend to show off, just want to share their stories to the blogger wrote. And hopefully make that has not been here to here, and who have been here can be here again. Aamiin Allahumma'aamiin: ")

NB: The photos in share an original photo that I took from my smartphone, do not believe? No evidence Disaya and can ask to me J

Thank blogger ......


Wassalamualaikum warahmatullahi wabarakatuh









Rate it :

Audit Around The Computer, Audit Through The Computer

Audit Around The Computer, Audit Through The Computer 
AUDIT
Definition
Audit is a systematic process for obtaining and evaluating evidence in writing or orally by using evidence that objectively about a collection of questions. Examples of the audit is an audit of financial statements of a company, in which the auditor will conduct audits to assess the financial statements that the data is relevant, accurate, complete and fairly presented. Auditor issued the results correctly and will be even better if it comes from an independent opinion.

Type on IT Audit
Types of audits on Information Technology is divided into 2 (two), namely:
· Auditing around the computer
· Audit through the computer

Audit Around The Computer
Auditing around the computer into the category of information systems auditing and more precisely into the audit methods. Auditing around the computer can be said only check on the user side and only on keluaranya enter without checking the depth of the program or the system, it could also be said that the audit around the computer audit is seen from the perspective of black box.
In pengauditannya ie an auditor to test the reliability of the information generated by the computer by first calculating the result of a transaction that is entered in the system. Then, the calculation is compared with the output generated by the system. If it turns out valid and accurate, it is assumed that the control system has been effective and the system is running properly.
Auditing around the computer to do at the moment:
· Source documents are available in paper form (non-machine language), means it is still invisible and seen visually.
· The documents are stored in a file in a way that is easy to find.
· Output can be obtained from the auditor's list of detailed and easily browse through every transaction of the source document to the output and vice versa.


Pros and Cons of Audit methods Around The Computer:
Advantages :
· The audit process should not take long because it did not in-depth audit.
· No need to know the whole process of handling systems
weaknesses:
· Generally the database includes a substantial amount of data and it is difficult to manually searched
· Do not make the auditor to understand better the computer system
· Ignore the control system, so prone to errors and potential weaknesses in the system
· Over the past with respect rather than preventive audit
· The ability of the computer as a supporting facility audit unused
· Do not include the overall aims and objectives of the audit

Through The Computer Audit
Audit through the computer is where an auditor other than checking the data input and output, as well as to test the program and its system or the so-called white box, so that the auditors feel yourself step by step implementation of the system and the system knows how the system is run on a specific process.
Auditing around the computer to do at the moment:
· System computer application processing sizeable input and produce output that is big enough, thus expanding the audit to examine its validity
· An important part of the company's internal control structure contained in the computerized used

Strengths and Weaknesses Through The Computer Audit:
Advantages:
· Can improve strength testing application system effectively.
· Can check directly logic processing and system applications.
· The ability of the system can handle the changes and the possibility of loss that occurred in the days to come.
· Auditor obtain great ability and effective in testing of the computer system.
· Auditor feel more confident about the correctness of his work.
Weakness:
· Costs required relatively high because jumlaj many working hours to be able to lenih understand the internal control structure of the implementation of the application system.
· Need deep technical expertise to understand how the system works.


CYBER LAW

Difinition Cyber law
Siber Law (Cyber ​​Law) is a legal term that is related to the use of information technology. Another term used is the law of Information Technology (Law of Information Techonology) Cyber ​​Law (Virtual World Law) and Law mayantara. The terms of birth because Internet activity and usage of information technology-based virtual. Cyber ​​law terms used in this paper is based on the premise that if the cyber synonymous with "virtual world" will be enough to face problems when associated with the verification and enforcement.
Given the law enforcement agencies will face difficulties if it should prove an issue that is assumed to be "virtual", something that is not visible and apparent. On the internet it is cyber law law, the law specifically applies in the cyber world. Broadly cyber law not only covers crimes on the internet, but also the rules that protect the perpetrators of e-commerce, e-learning; holders of copyrights, trade secrets, patents, e-signature; and many more. Cyberlaw needed because the base or foundation of law in many countries is "space and time". Meanwhile, the Internet and computer networks to push the limits of space and this time.

Differences Cyber ​​law in various countries (Indonesia, Malaysia, Singapore Vietnam, Thailand, United States):
Here's an explanation of each country:

CYBER LAW STATE INDONESIA
The initiative to create a "cyberlaw" in Indonesia had already begun before 1999. The main focus this time is on the "umbrella law" is generic and a little concerning electronic transactions. The "umbrella" is done so that there is a base that can be used by law and other regulations. But in reality this does not happen. For matters related to electronic transactions, digital signature recognition as a conventional signature is the target. If the digital signature can be recognized, then this will simplify many things like electronic commerce (e-commerce), electronic procurement (e-procurement), and various other electronic transactions.
But apparently there are some entries in the journey so that other things went into the design of "cyberlaw" Indonesia. Some things that might make include matters relating to crime in cyberspace (cybercrime), abuse of the use of computers, hacking, divulging passwords, electronic banking, Internet use for administration (e-government) and healthcare, the problem of intellectual property rights, abuse domain name, and privacy issues. The name of the bill was changed on the Utilization of Information Technology, to the Electronic Transactions, and eventually became the Bill on Information and Electronic Transactions. In other countries these materials are generally broken down into several law.
There is one interesting thing about the design of this cyberlaw related territories. Suppose a cracker of a European country do the destruction of a site in Indonesia. One approach taken is if the result of the activity crackingnya felt in Indonesia, then Indonesia to judge concerned. What we can do is catch this cracker if he visited Indonesia. In other words, he lost the chance / right to visit a place in the world.

CYBER LAW STATE MALAYSIA
Digital Signature Act 1997 was passed by the first Cyberlaw Malaysian parliament. The purpose of this Cyberlaw, is to allow businesses and consumers to use electronic signatures (instead of a handwritten signature) in legal and business transactions. The next Cyberlaw that will apply is the Telemedicine Act 1997. This Cyberlaw empowering medical practitioners to provide medical services / consultancy from a remote location through the use of electronic communication facilities such as video conferencing.

CYBER LAW OF THE SINGAPORE
The Electronic Transactions Act has existed since July 10, 1998 to create a legal framework of the legislation for electronic commerce transactions in Singapore. ETA made with the aim of:
· Facilitate electronic communication by means of electronic records that can be trusted
· Facilitate electronic commerce, namely eliminating barriers unauthorized electronic trading on the writing and signature requirements, and to promote the development of legislation and business infrastructure necessary to implement a guarantee or secure electronic commerce
· Facilitate the electronic storage of government documents and company
· Minimize the incidence of alektronik same archive (double), changes are not intentional and deliberate about the archives, and fraud in electronic commerce, etc.
· Assist toward uniformity of rules, regulations and the validation and integrity of electronic archives
· Promoting trust, integrity and reliability of electronic records and electronic commerce, and to assist the development and expansion of electronic commerce through the use of electronic signatures to guarantee the authenticity and integrity of the correspondence using electronic media.
In ETA include:
· Electronic Contract
Electronic contract is based on an online trading laws are conducted properly and quickly and to ensure that electronic contracts have legal certainty.
· Liability Service Provider Network
Adjusting the potential / opportunity that is owned by the network service provider to do things that are not desirable, such as taking, carrying, destroy material or third party information using the network services.
· Signature and Electronic Records
The law requires records / electronic archival evidence to deal with cases electronically, therefore signatures and electronic records must be lawful. On the Singapore issues about privacy, cyber crime, spam, content online, copyright, electronic contracts has been set. Meanwhile, consumer protection and the use of domain names has been no design but online dispute resolution already contained design.

CYBER LAW OF THE VIETNAM
Cyber ​​crime, the use of domain names and electronic contracts in Vietnam suudah stipulated by the Vietnamese government, while for consumer protection issues of privacy, spam, content online, digital copyright and online dispute resolution has not received the attention of the government so that there is no design.
In countries such as Vietnam law is still very low presence, it can be seen from only a few laws governing cyber, when issues such as spam, consumer protection, privacy, content online, digital copyright and ODR great importance to people who might feel aggrieved.

CYBER LAW OF THE THAILAND
Cybercrime and electronic contracts in the State Thailand has been set by the government, although that has been the enactment of just 2 but others such as privacy, spam, digital copyright and ODR are already drawing this design stages.

CYBER LAW OF THE UNITED STATES
In America, Cyber ​​Law governing electronic transactions known as the Uniform Electronic Transactions Act (UETA). UETA is one of the few legislation proposed by the United States National Conference of Commissioners on Uniform State Laws (NCCUSL).
Since then 47 states, Colombia, Puerto Rico, and the US Virgin Islands have adopted it into their own laws. The purpose is to bring its overall legal channels to different states Yag on areas such as retention of paper documents, and the validity of electronic signatures so as to support the validity of electronic contracts as a viable media agreement. UETA 1999 to discuss among others the:
· Article 5: Set up the use of electronic documents and electronic signatures
· Article 7: Giving legal recognition to electronic documents, electronic signature and electronic contract.
· Article 8: Managing information and documents presented to all parties.
· Article 9: To discuss attribution and influence of electronic documents and electronic signatures.
· Article 10: Determine if conditions change or error in an electronic document occurs in the data transmission between the parties to a transaction.
· Article 11: Allows a notary public and other officials who are authorized to act electronically, effectively eliminating the requirement of a stamp / seal.
· Article 12: Stating that needs "document retention" filled with maintaining electronic documents.
· Article 13: "In the prosecution, the evidence of a document or signature can not be excluded just because it is in electronic form"
· Article 14: Set the automatic transaction.
· Article 15: Defines the time and place of dispatch and receipt of electronic documents.
· Article 16: Set the transferable document.



Rate it :

Ikhlas To Be True

Short story 

Ikhlas To Be True 

The night was a night that mebuat Dania heart sad and happy, Dania happy because in the end he could meet her lover named Rudi, Rudi night was also invited Dania to meet with his friends. During the meeting Dania, Rudi and other friends are happy storytelling and joking together and there was no sadness terbesit of their faces visible jokes and laughter.
However, after the end of the meeting that night, Rudi Dania lover invited her to have a serious talk. Dania confused what will be discussed by her lover.

"Dania .... hmm already watch a short film that yesterday?" Asked Rudi
"Yes already, I memorized kok episode 1 to episode 3 hehhe .." said Dania with spirit
"Gini ......" said Rudi
Dania just stared thoughtfully while occasionally asking "Iyaaa why?"
"Not now deh ...." said Rudi
"Loh why? now wrote. Why is it? "Asked a curious Dania
"Tomorrow aja gak element of support now ..." said Rudi
"Iiih curious, what's the matter? You want to leave it? "Asked behind Dania
"Go where ? yes enggalah "said Rudi
"Then ? Why? "the more curious Dania
"Hmmm ........" quite a long wait for Rudi answered, and Dania only saw Rudi faces are hesitant to tell a story.
Dania retaliated by giving expression of fear and worry.

"Okee ... Look, it seems we must maintain a distance deh" said Rudi
"Meaning?" Asked Dania shocked
"Yes we keep the distance, I want to watch you, I want you ngehormatin" responsible behind Rudi
"What the hell you tuh, ngejauh you want from me? The reason you made ninggalin me? "asked Dania while melihatkan eyes were glazed
"Not so Nia. After I watched the short film I should be more aware of guarding you, I should be able to keep a distance with you in the sense that I respect yourself and can take you to a good path. Not by courting handrails, street alone and not the Dania supposed "said Rudi explanation
"During this time I'm not a good woman you think?" Asked behind Dania with tears in his eyes
"Aperture Dania not, you're the woman I select, I want you to keep on with me, I'm sure with you, but I want to continue ngejaga tetep you fully Dania" said Rudi
"Ngejaga? gmn tuh hell do you mean? so far you emang not ngejaga me? "asked Dania behind
"Yeah I ngejaga you, I do not want anyone to get hurt than you. But I mean this time I want you nejaga well without degrading yourself. For example we want to go our own way can the continued pact wrote directly in place, do not let people you looked ugly, too. "Obviously Rudi
"You mean you do not we go if we're not together? directly meet? continue to ride motorcycles that split-split? "he asked in a tone rather high Dania stifling sobs
"Yes ... for the sake of goodness you too" said Rudi limp
"Suppose we want to come keacara friend me or your friend, we must dateng with different vehicles that? Ethical really what it will say. Just the same so if you've not anggep me, and probably one of the ways you create ngejauhin me ... "said Dania with sobs that is irreversible .....
"Please do not thinkers weird Dania, I'm not going to ninggalin you, I also want cepet-cepet our relationship could halal Dania. If you do not I anggep for what I kenalin you to my parents? why would I invite you to the brothers of me? "said Rudi with tears in her eyes

......... Silent no words that come out of the mouth of Dania only sobs that sounded so quaint .....

"Dania all for your kindness and I, I again tried to work hard on our Dania later ..." said Rudi
Silent no response whatsoever from the mouth Dania, he terliat silent and think of something ......
"Dania why the silence?" Asked Rudi again
"I'm thinking ..." said Dania bit bitchy full sob
Dania rather long silence, in Dania heart pain, feeling confused .....
"Why did you change the heck Rud, usually when I cry you always wipe the tears I, usually you nenangin me, but now wiped my tears just do not" said Dania hearts .....

Long after the debate that increasingly many questions raised Dania also more swift tears dripped from Dania eye, the more complicated also talks going until late that night. The talk was really made sad Dania, Dania feel what was wrong of him.

Rudi was seen not bear to see Dania crying continuously.
Sangking sad and emotionally Dania taking out the words
"If you really want to keep the distance with me, I want ngehormatin okay. But do not ever hubungin me if ak important, not have phone-call me, not have to play home and I do not ..... "
"Dania Dania Dania .... not mean I Dania. Kok keliatannya even yaa wants you away from me? "Rudi selak
"You why even reverse the facts? if I'm away from what you made me cry-cry gini rich? "asked behind Dania
"Dania not mean I ninggalin or ngejauhin you, I want to keep the distance Dania, for you by your kindness. We both learned so better Dania ...... I will keep trying for us on our behalf Dania .. "said Rudi
"Then we will rarely call, rarely love the news, rarely met, I can not call you in the morning, I have more words of affection, not ...."
"Unfortunately it is not only spoken, but dibuktikkan, and I will buktiin it all ..." again Rudi menyelak with a smile ..

Dania still can not memjawab anything, he just silence seemed confused and did not know what she had to say, only tears were still rolling down her cheeks .....

While Rudi looked at the clock that was already showing Puluk 11:00 pm ....
"I came home yaaa, it's late. Not bad you do not come home at this hour, Inshaa God I am here again ... "said Rudi
"Yes .." said Dania briefly
"I'm going home tablets, then if there is anything in the way you nyesel loh .." Rudi said as he led a little joke ...
"What the hell is really original way really ..." said Dania increasingly annoyed
"Yaa do not be sad anymore, I'll get home I kabarin again for sure ..." said Rudi assured
"Whatever .." said Dania short again
"How come you're so cold gini to me ..." asked Rudi sad
"Engga, already I was wrong sorry, there return cautiously yes, reportedly awaited ..." said Dania
"Okay, I said goodbye to you before ya mama ....." Rudi and went into the house to say goodbye
"I came home Yaudah yaa, Assalamu'alaikum ...." Rudi said farewell

Yaaa when Rudi return Dania still could not hold back her tears and Dania kept thinking why did this all to be like this, Dania kept thinking as she continued to cry. Until a few dozen minutes later Mobile Dania sounds, it turns out a message from Rudi who said that he had reached home and Dania wanted to sleep.
However Dania still awake, accompanied by tears that kept flowing.
"Lord, I know this is the best, I realized it was good for me and him. But somehow I was sad and can not accept this, I can not be like this if, one year more we are together but why be like this in the end.
God....
Help me to mengikhlaskan everything, help me to keep thinking positively, please do not let this heart continues to dirty, do not let this selfish sense continues ingrained ....... "says Dania hearts

Not tasted it turned 2:00 o'clock in the morning, Dania trying to plug in the earphone to his ear and blame songs from his mobile phone. Dania participate consecutive course of time sleeping soundly with the remaining prints of tears rolling down her cheeks and her pillow while accompanied by music that is still abuse from his cell phone.

In prayer Dania hope
"God take care of him for me, of God not separate us
Let me touch it, hold it and hold her, once
If this is indeed the best, help me for this sincer all
I know the Lord, if not, I just like women are not good "






Ikhlas To Be True 
Rate it :

Ahok Litigation Case Continues

Ahok Litigation Case Continues
 Actual Madura; General Chairman of Nahdlatul Ulama (NU), Said Aqil Siradj Ahok's statement particulars of Surah Al-Maidah verse 51 which gave rise to polemics should still be prosecuted. Apology former regent of East Belitung it cannot stop the legal proceedings.

"Instead of people vigilante, better processed (by law). If it is processed right depart from the presumption of innocence. Departing from zero. From the community vigilantism," he said after a meeting with Coordinating Minister for Politics Wiranto in the office of the Coordinating Ministry for Politics, Central Jakarta, on Friday (14/10).

Said admits Ahok long as it's often hurl abusive words. Until tail on religiously offensive speech. It is then made things increasingly worse. "The series before the always remove the words are harsh. This happens to be religiously offensive, offend the Koran, so even more so," he said.

Said also hoped cases like this is the last place and serve as a valuable lesson for the community. He also asked the Ahok to be more careful when issuing a statement. "We hope this is the last. Remove the waffle it carefully. It's the most valuable lesson," he said.

However, Said said, who admitted one resulted from an act or word were like sprain. "People that already claimed one means sprain well. It is very likely done by anyone," he said.

According to Said, the leader would have to be dignified, issue a kind word, and be an example for the people, be it attitudes or words. Said admitted issuing such a statement does not mean do not like Ahok.


, I do not hate anyone. But I regret saying that. Yet he understood baseball. The context was like what, like what nuzulnya asbabun, why does it out, its historical background like what right he understands baseball. If I understand, "he said. (Source: ROL)
Rate it :

Example Use Code IT in the Use of Information Technology

Example Use Code IT in the Use of Information Technology

In the globalization era is definitely a lot of people who know and use the existing technological development today. One of the growing use of information technology today is the use of social media by using the Internet increasingly rampant among our society. For example, the use of social media who use the internet has poisoned all walks of life, not only among the gods alone, but among teenagers, housewives and even small children were already knows social media that exists today, but anyway yeah the use of information technology such as social media in children small must remain under the supervision of parents.

In the use of information technology is certainly present Code of Conduct that must be considered. What is the Code of Conduct that?
Okay, the code of conduct could be interpreted as an act of what is right or wrong, what actions should be done and what actions should be avoided.

And here I'll give you some Examples in Use Code of Conduct in the Use of Information Technology through the Internet:

Avoiding and does not publish information that is directly related to the problem of pornography and Nudism in all its forms.
Avoiding and does not publish information that has a tendency to offend direct and negative issues of ethnicity, religion and race (SARA), including efforts humiliation, harassment, discrediting, torture and all forms of violations of the rights of individuals, groups or institutions or other institutions.
Avoiding and does not publish information that contains instructions to perform an unlawful act (illegal) positive in Indonesia and international conditions generally.
Not displaying all forms of exploitation of children and minors.
Do not use, publish and or exchange of material and information that have a correlation to the activities of pirating, hacking and cracking.
When using scripts, programs, text, pictures or photos, animations, sounds, or forms of matter and other information that is not the work itself must include the identity of the source and copyright owners when there and willing to do the revocation if there are appealed and was responsible for all the consequences that might arise.
Not attempted or carried out attacks against the product technical, resource (resource) and equipment owned by other parties.
Respecting ethics and all sorts of regulations and the general Internet community fully responsible for the content of the cargo and its website.
For offenses committed by managers, members can directly strike.
From the description above can be concluded that the use of the Internet in the Information Technology must be accompanied by a code of ethics that is good and true to avoid things that are not desirable, and for parents required to pay attention and keep an eye on their children, especially children under age use information technology, especially the internet.

Use Internet By Wisdom To Not Stuck!



Rate it :
 

Blogger news

Powered by Blogger.

Popular Posts

Menu

Pages

45ini.blogspot.com

45ini.blogspot.com

About

Popular Posts

TOP
Copyright © 2016. HIT MAN - All Rights Reserved
Distributed by: hit man