Skip to main content

Submit new post by e-mail

Maybe I'm a little bit late about this. I just found up this feature... At first I was thinking about posting my blog via email. And then after googling I found my answer on someone blog. He said that to post your blog using email, you must enable it in your blog setting... I think you can do this setting by your self. But if anyone have a problem or question about this settings, just send me your comment

---- 
Sent using a Sony Ericsson mobile phone

Comments

Popular posts from this blog

The Future Of Computing is Ubuntu Phone

As we are know, in the beginning of January 2013. Canonical announce their new project called Ubuntu Phone. From the beginning Ubuntu was just another Linux distro,  but now Canonical driving Ubuntu far beyond its beginnings as just another Linux distro into an Operating System that works on  television and even being  an android and iPhone competitor, Ubuntu is skating to where they puck is going to be. But, which such a bold move, there are significant obstacles to overcome. The soon to be released Ubuntu Phone is paving the way that all smart phones will eventually go. Back to the late  1943 where  computers were gigantic, filling rooms and requiring constant care and maintenance. Over time, the components required to build the computers become smaller and cheaper, till eventually it was possible to put one on your desk until the laptop computer, a smaller, more portable, but just as powerful machine was made and make it nearly obsolete. And then, com...

Throwing The Sun Tzu Baby Out With The InfoSec Bathwater

Steve Tornio and Brian Martin just published a  5,000 word rant  against anyone who dares utter the name Sun Tzu in connection with information security. According to Tornio and Martin, Sun Tzu – the principal strategic authority who’s seminal work has served to guide China’s military and civilian leadership for 2500 years, is “ not relevant to modern day InfoSec ” because  “information security is not warfare (leaving aside actual warfare, of course” . That’s a pretty huge stipulation considering that the People’s Republic of China has been heavily invested in information technology R&D to revolutionize both its Armed Forces and its civilian infrastructure simultaneously for the past 20 years or so. The same is true for the Russian Federation (sans Sun Tzu, of course). I’d love to hear either of these two gentlemen discuss where they make the distinction between InfoSec for the enterprise versus InfoSec as an “expression of warfare by other means” (to paraphras...

Parsing XML dengan java SAX Parser

Melanjutkan dari post saya tentang parsing XML dengan Java, pada entri sebelumnya teknik parsing yang digunakan dengan menggunakan DOM Parser. pada entri kali ini saya akan membahas bagaimana cara untuk mem-parsing XML dengan SAX parser. pada entri kali ini kita tetap menggunakan XML dengan struktur yang sama dengan entri sebelumnya. <?xml version="1.0" encoding="UTF-8"?> <personnel> <employee type="permanent"> <name>Seagull</name> <id>3674</id> <age>34</age> </employee> <employee type="contract"> <name>Robin</name> <id>3675</id> <age>25</age> </employee> <employee type="permanent"> <name>Crow</name> <id>3676</id> <age>28</age> </employee> </personnel> pembacaan xml dengan SAX Parser...