Wednesday, September 24, 2008

Try to Feel this

Here we go!
with some bullshit
comin through from your mouth.
talk craps, talk shit
i don't want to hear it.
just sit n shut up.

Here it come
try to feel that,
wild and chaos
if you can take it
then leave it
i don't care
just sit and shut up

Try to feel this
touch every single moment you have,
because someday you will understand,
how it feel to be like this'
if you don't want to listen,
it ok..you suck..
you know that.
Yeah!


YOU SUCK...

truly..
wan

Monday, September 22, 2008

aku cinta padamu

Aku cinta padamu.
wahai Tuhanku.
memberi aku nyawa di muka bumi mu ini

aku cinta padamu..
wahai sang mentari..
penyinar hidupku.
aku cinta padamu.
wahai sang bulan.
menerangi malam malam ku..
aku cinta padamu.
oh bungaku..
memberi seri dalam hidupku.
aku cinta padamu
wahai pelangiku.
memberi warna warni dalam hidupku.
aku cinta padamu.
wahai mimpi mimpiku.
memberi ku angan angan yang indah.

aku cinta padamu sayangku.
memberi ku segala gala yang ku inginkan.

i love u my dear..

nukilan khas utk kasih sayangku

wan~~

Kuala Lumpur Roads have not been taken





Hey RAKAN..KUALA LUMPUR! Bandaraya metropolitan yg bising dan penuh kontrovesi. Malam di Kuala Lumpur pula sunyi sepi di certain jln tp ada juga yg hingar bingar b’pesta sana sini.

LORONG HAJI TAIB..
Seperti semua tahu..mcm aktiviti berlaku di jalan ini. he!he! seperti yg kita semua tahu. ‘PELACURAN’ berleluasa berselindung di sebalik kedai kedai menjual pelbagai barang-barangan. Paling pelik dan melucukn “gadis-gadis” itu bkn lah sebenarnya PURE gadis. Tetapi hanyalah plastik belaka yang lebih di kenali sebagai “BAPOK”. Pelbagai ragam yang dapat dilihat dan adakalanya mengelikan hati. Cuba bayangkan “lelaki cuba memikat hati lelaki”. Pelbagai cara digunakan oleh sang arjuna yang kesepian ini untuk mencari hiburan di malam yang indah itu. Hergh! CHOW KIT ROAD.. Mat Rempit berpesta meghembuskan asap asap motor mereka. Ada yang ‘single rider’, ada yang membawa penumpang dan ada juga pasangan kekasih. ‘Pathetic Romantic’.























funny scene huh?

JALAN SULTAN ISMAIL..
Penghubung jalan ke pusat bandar di Kuala Lumpur. Setiap hari dan setiap masa, jalan ini mmg sesak; sgt sgt sesak. Tapi di malam itu membuktikan bahawa bukan semua jalan di Kuala Lumpur lengang di malam hari. Disko,Pub dan Pemabuk berpesta hingga ke pagi dan semestinya menyebabkan jalan sesak hingga menyerabutkan kepala botak pemandu teksi yang sedia serabut hingga ke akar rambut. Dari 20an hingga ke 50an semuanya bergelak ketawa dan menari untuk menebas semak samun di dalam lubuk fikiran mereka. Biarkan mereka berpesta hingga ke pagi..duit mereka.




















Sebahagian JSI

JALAN BUKIT BINTANG..
Ternyata.. jalan di siang harinya sangat sesak berubah wajah tika malam tengah malam menjelma. Sunyi sepi hinggakan bunyi cengkerik pun boleh kedengaran tetapi kelihatan seorang dua berjalan terhuyung hayang mungkin mabuk kepayang. Mabuk cinta pun boleh jadi.
Berakhir lah perjalanan satu malam mengelilingi Jalan jalan di Kuala Lumpur.





















A journey by wan,acap,megu,nazriq
tenkiu :)








Thursday, September 18, 2008

A trip to Taiping by E!,megu,apek,nazriq

TAIPING..here we come.
16/9 2330 p.m.

The journey of 4 youngsters started in WJA 5261 with full of hoped that our journey will complete safely. in the dark highway Nazriq took the first shift to drive, heading to Taiping.

17/9 0200 a.m

we arrived at R n R Tapah and straightly ran to toilet. our gall bladder was fulled. Suddenly.
when we wanted to enter the car. A chinese, totally naked trying to approach us showing his little brother. hik hik hik.. nazriq tried to flyingkick the chinese brat but he ran away towards crowd that were eating and watching football match. situation went choas. ladies ran away here and there. a big man attack the mad naked guy and kick him at the head. yeah!! the naked maen tried to fight back but a disguised police officer punch that man at lock the man at his head.
just like in WWF. stone cold and the rock. hahahah.. few minutes later, radio-car arrived and took the man away. i think they heading to Tanjung Rambutan hi hi hi. then, apek take the stereng and we continued our journey to Taiping.

5.30 a.m

after a long journey. finally, we arrived at Taiping and tried to find a restaurant to sahur but seem like there is no open-restaurant at all.. then, we found a gigantic signboard "TAIPING BaNDAR WARISAN". and a photo-shot began.


















yeah!

we take a short sleep at masjid TM at taiping.

after our mission finished, we drove directly to shah alam, E take his shift to drive the car..
after solat at RnR tapah..our car broke down and we have to spent about 1 hour for the car to cool down..and after that meguu take the wheel and we safely arrived at shah alam at 5.15 pm














our car broke down. supervise by E,apek,nazriq

that all..our journey mission accomplished and its fun to have journey like this.

tenkiu :)
wan
apek
nazriq
megu

Wednesday, September 17, 2008

glumy gloomy everyday

have you ever heard of the song composed by Seress a Hungrian pianist.
its also renowned as a "Suicide Song" (this suicide thing is illegal in Islam)
this song was hits by Billie Holiday


I once heard this song. True, this was very touchable and can drive anyone in depression to commit suicide. lol!
glumy in all my bad day.
dark and rainy day.
shit to all brat that think they are gold in this land.
i don't need you.
yeah, my life is better than you.
i have all my life already.
i got all my friend, i got all my family.
it ok for u to think what ever you want.

ahakkz.
i'm not a good writer..
thanks

Sunday is gloomy,
My hours are slumberless
Dearest the shadows
I live with are numberless
Little white flowers
Will never awaken you
Not where the black coaches
Sorrow has taken you
Angels have no thoughts
Of ever returning you
Wouldnt they be angry
If I thought of joining you?

Gloomy sunday

Gloomy is sunday,
With shadows I spend it all
My heart and i
Have decided to end it all
Soon therell be candles
And prayers that are said I know
But let them not weep
Let them know that Im glad to go
Death is no dream
For in death Im caressin you
With the last breath of my soul
Ill be blessin you

Gloomy sunday

Dreaming, I was only dreaming
I wake and I find you asleep
In the deep of my heart here
Darling I hope
That my dream never haunted you
My heart is tellin you
How much I wanted you
Gloomy sunday

Wednesday, August 13, 2008

14 AUG 2008

PUBLIC DOMAIN


Public domain software is software that is not copyrighted. If the source code is in the public domain, that is a special case of non-copylefted free software, which means that some copies or modified versions may not be free at all.
In some cases, an executable program can be in the public domain but the source code is not available. This is not free software, because free software requires accesibility of source code. Meanwhile, most free software is not in the public domain; it is copyrighted, and the copyright holders have legally given permission for everyone to use it in freedom, using a free software license.
Sometimes people use the term "public domain" in a loose fashion to mean "free" or "available gratis." However, "public domain" is a legal term and means, precisely, "not copyrighted". For clarity, the Free Software Foundation recommends using "public domain" for that meaning only, and using other terms to convey the other meanings.
Under the Berne Convention, which most countries have signed, anything written down is automatically copyrighted. This includes programs.




BUSINESS SOFTWARE

Business software is generally any software program that helps a business increase productivity or measure their productivity. The term covers a large variation of uses within the business environment, and can be categorized by using a small, medium and large matrix:
The small business market generally consists of home accounting software, and office suites such as Microsoft Office and OpenOffice.org.
The medium size, or SME, has a broader range of software applications, ranging from accounting, groupware, customer relationship management, human resources software, outsourcing relationship management, loan origination software, shopping cart software, field service software, and other productivity enhancing applications.
The last segment covers enterprise level software applications, such as those in the fields of enterprise resource planning, enterprise content management (ECM), business process management and product lifecycle management. These applications are extensive in scope, and often come with modules that either add native functions, or incorporate the functionality of third-party software programs.
Now, technologies that have previously only existed in peer-to-peer software applications, like Kazaa and Napster, are starting to feature within business applications. JXTA is an open source platform that enables the creation of machine and language neutral applications. Peer based applications will be especially useful for aggregating the information at the edge of the network that currently resides in the neurons of the users themselves.

Type:


Digital Dashboards - Also known as Business Intelligence Dashboards, Enterprise Dashboards, or Executive Dashboards, these are visually-based summaries of business data that show at-a-glance understanding of business conditions through metrics and Key Performance Indicators (KPIs). A very popular BI tool that has arisen in the last few years.
Online Analytical Processing, commonly known as OLAP (including HOLAP, ROLAP and MOLAP)- a capability of some management, decision support, and executive information systems that supports interactive examination of large amounts of data from many perspectives.[1]
Reporting software generates aggregated views of data to keep the management informed about the state of their business.
Data mining - extraction of consumer information from a database by utilizing software that can isolate and identify previously unknown patterns or trends in large amounts of data. There are a variety of data mining techniques that reveal different types of patterns.[2]. Some of the techniques that belong here are Statistical methods (particularly Business statistics) and Neural networks as very advanced means of analysing data.
Business performance management (BPM)


source: wikipedia ; the free encylopedia

Wednesday, July 23, 2008

sonnet 8

SONNET 8


Music to hear, why hear'st thou music sadly?
Sweets with sweets war not, joy delights in joy.
Why lovest thou that which thou receivest not gladly,
Or else receivest with pleasure thine annoy?
If the true concord of well-tuned sounds,
By unions married, do offend thine ear,
They do but sweetly chide thee, who confounds
In singleness the parts that thou shouldst bear.
Mark how one string, sweet husband to another,
Strikes each in each by mutual ordering,
Resembling sire and child and happy mother
Who all in one, one pleasing note do sing:
Whose speechless song, being many, seeming one,
Sings this to thee: 'thou single wilt prove none.'


we will cover this song with ska punk way!!

pluspill~~

Wednesday, July 16, 2008

computer

Hi,

what is computer..computer is one of the important technology in this world. almost every company and institution in this world must have at least 5 computer to progress well in administor and really perform for profit of the company..
now, this is a little information about computer..




In practical terms, a computer program may run from just a few instructions to many millions of instructions, as in a program for a word processor or a web browser. A typical modern computer can execute billions of instructions per second (gigahertz or GHz) and rarely make a mistake over many years of operation. Large computer programs comprising several million instructions may take teams of programmers years to write, thus the probability of the entire program having been written without error is highly unlikely.
Errors in computer programs are called "bugs". Bugs may be benign and not affect the usefulness of the program, or have only subtle effects. But in some cases they may cause the program to "hang" - become unresponsive to input such as mouse clicks or keystrokes, or to completely fail or "crash". Otherwise benign bugs may sometimes may be harnessed for malicious intent by an unscrupulous user writing an "exploit" - code designed to take advantage of a bug and disrupt a program's proper execution. Bugs are usually not the fault of the computer. Since computers merely execute the instructions they are given, bugs are nearly always the result of programmer error or an oversight made in the program's design.[8]
In most computers, individual instructions are stored as machine code with each instruction being given a unique number (its operation code or opcode for short). The command to add two numbers together would have one opcode, the command to multiply them would have a different opcode and so on. The simplest computers are able to perform any of a handful of different instructions; the more complex computers have several hundred to choose from—each with a unique numerical code. Since the computer's memory is able to store numbers, it can also store the instruction codes. This leads to the important fact that entire programs (which are just lists of instructions) can be represented as lists of numbers and can themselves be manipulated inside the computer just as if they were numeric data. The fundamental concept of storing programs in the computer's memory alongside the data they operate on is the crux of the von Neumann, or stored program, architecture. In some cases, a computer might store some or all of its program in memory that is kept separate from the data it operates on. This is called the Harvard architecture after the Harvard Mark I computer. Modern von Neumann computers display some traits of the Harvard architecture in their designs, such as in CPU caches.
While it is possible to write computer programs as long lists of numbers (machine language) and this technique was used with many early computers,[9] it is extremely tedious to do so in practice, especially for complicated programs. Instead, each basic instruction can be given a short name that is indicative of its function and easy to remember—a mnemonic such as ADD, SUB, MULT or JUMP. These mnemonics are collectively known as a computer's assembly language. Converting programs written in assembly language into something the computer can actually understand (machine language) is usually done by a computer program called an assembler. Machine languages and the assembly languages that represent them (collectively termed low-level programming languages) tend to be unique to a particular type of computer. For instance, an ARM architecture computer (such as may be found in a PDA or a hand-held videogame) cannot understand the machine language of an Intel Pentium or the AMD Athlon 64 computer that might be in a PC.[10]
Though considerably easier than in machine language, writing long programs in assembly language is often difficult and error prone. Therefore, most complicated programs are written in more abstract high-level programming languages that are able to express the needs of the computer programmer more conveniently (and thereby help reduce programmer error). High level languages are usually "compiled" into machine language (or sometimes into assembly language and then into machine language) using another computer program called a compiler.[11] Since high level languages are more abstract than assembly language, it is possible to use different compilers to translate the same high level language program into the machine language of many different types of computer. This is part of the means by which software like video games may be made available for different computer architectures such as personal computers and various video game consoles.
The task of developing large software systems is an immense intellectual effort. Producing software with an acceptably high reliability on a predictable schedule and budget has proved historically to be a great challenge; the academic and professional discipline of software engineering concentrates specifically on this problem. (from Wikipedia:the free encylopedia:computer 2008)