Buscar en Mind w/o Soul

viernes, septiembre 28, 2007

Evitar referencias circulares en VB6

Una clase "referencia débil" para construir aplicaciones sin referencias circulares

Circular references in Visual Basic 6
An easy and safe technique for preventing circular references in Visual Basic 6

Avoiding a circular reference in VB6 (VB 6, classic VB, VB classic)

How to prevent a circular reference in VB6

Curso introductorio al razonamiento psicológico

Por parte de un gurú de la psicología y economía. Incluye videos y transcripciones de la introducción a cada lección.

Edge: A SHORT COURSE IN THINKING ABOUT THINKING — "A Master Class" By Danny Kahneman
Kahneman's article (with Jonathan Renshon) "Why Hawks Win" was published in Foreign Policy (January/February 2007); Kahneman points out that the answer may lie deep in the human mind. People have dozens of decision-making biases, and almost all favor conflict rather than concession. The article takes a look at why the tough guys win more than they should. Publication came during the run up to Davis, and the article became a focus of numerous discussions and related articles.

The event was an unqualified success. As one of the attendees later wrote: "Even with the perspective a few weeks, I can still think it is one of the all time best conferences that I have ever attended."

Over a period of two days, Kahneman presided over six sessions lasting about eight hours. The entire event was videotaped as an archive. Edge is pleased to present a sampling from the event consisting of streaming video of the first 10-15 minutes of each session along with the related verbatim transcripts.

Ubuntu definitiva - DVD con todo lo que necesitas

Ubuntu Software | Ubuntu Software FAQ
"Ubuntu Ultimate Edition" - What is that?

Due to the popularity of Ubuntu Christmas Edition I have decided to make another distro I'm calling "Ubuntu Ultimate Edition" it has everything listed in the Christmas Edition plus much more I will be listing added features here first. Plenty of HTML to clean up including this page. I have however removed Adobe Acrobat Reader, Adobe Flash, Sun Java & Google Earth due to licensing agreements. Please freat not included in the release is my custom repo pre-added which contains all the software and much more. Firefox's homepage will give detailed descriptions on obtaining all additional software from our custom repo.

What is Ubuntu Ultimate Edition? Screenshots. It is Ubuntu Edgy Eft with the following software pre-added:

jueves, septiembre 27, 2007

Información de procesos del sistema

Sitio que recopila información de qué son los procesos más corrientes o más molestos del sistema

vsmon.exe - vsmon - Process Information
vsmon.exe - vsmon - Process Information

Process File: vsmon.exe or vsmon
Process Name: ZoneLabs True Vector Internet Monitor

Click to Run a Free Scan for vsmon.exe Related Errors

Windows errors related to vsmon.exe ?
vsmon.exe is a process associated with the ZoneAlarm firewall. It is used to monitor Internet traffic and generate alerts depending on the security rules configured by the user. This program is important for the stable and secure running of your computer and should not be terminated. Check that vsmon.exe is stable on your computer.

Recommendation for vsmon.exe:
vsmon.exe is not a critical component.
It is highly recommended to Run a Free Performance Scan to automatically optimize memory, CPU and Internet settings.

Determining whether vsmon.exe is a virus or a legitimate Windows process depends on the directory location it executes or runs from. Click to Scan your PC including vsmon.exe to Detect any Security Threat.

Cortafuegos gratis

El cortafuegos ZoneAlarm no se lleva bien con el eMule: el proceso va bloqueando memoria y creciendo cada vez más, hasta que consigue que el Windows se arrastre.

He encontrado este firewall gratuito, que promete consumir pocos recursos. Lo voy a probar a ver si se descarga un poco mi PC.

Ashampoo® FireWall FREE (1.20, 10.04.2007) - Protección Total para Cualquiera
Pequeño y compacto. Uso de recursos mínimos

Probablemente sabe que necesita un programa cortafuegos para usar Internet con seguridad. Además de protegerle contra los ataques provenientes de Internet, un buen cortafuego también le dirá qué programas instalados en su ordenador están intentando hacer llamadas telefónicas y le permitirá evitarlo. Esto es algo que el mismísimo cortafuegos de Windows® no hace, y que es esencial para identificar y detener las actividades de muchos virus dañinos y programas espías. Por ejemplo, le permite prevenir que su ordenador se pueda convertir en un “zombi” controlado por spammers o hackers.

Pequeño y eficiente en vez de grande y confuso
Si no posee suficientes conocimientos de informática, el uso de un programa cortafuegos puede ser muy frustrante. Además de todo un argot confuso, los actuales cortafuegos son programas muy grandes. Algunas veces se tiene la impresión de estar instalando toda una suite completa en vez de una simple herramienta de red.
El nuevo Ashampoo FireWall FREE es diferente. Su Asistente de Configuración le guía paso a paso a través del proceso de instalación. En Modo Sencillo se usa en un abrir y cerrar de ojos – no se necesita ningún conocimiento técnico especial y todo está explicado con claridad.
Ashampoo FireWall FREE también es extraordinariamente compacto. Incluso con sus cuatro herramientas adicionales es un programa ligero que usa muy poca memoria y recursos del ordenador. Usted obtiene una protección total sin una carga excesiva en su sistema.

PC Tools Firewall Plus - Edición Gratuita
PC Tools Firewall Plus™ 3.0 para Windows® PC Tools Firewall Plus 3.0 para Windows [+] Clic para Descargar PC Tools Firewall Plus Se trata de una aplicación gratuita y fácil de usar que protegerá su equipo de intrusos y de elementos dañinos procedentes de sus redes. Descargue GRATIS Firewall Plus

Tema KDE: sketch

Un tema con aspecto de papel para KDE

Reinhardt Sketch KDE-Look.org
Reinhardt Sketch is an icon set based on the excellent Reinhardt Icon Set by Dan Jensen aka leinir: http://www.kde-look.org/content/show.php?content=6153. All real artistic credit must go to him.


miércoles, septiembre 26, 2007

Manual de monstruos D&D - galería de la verguenza

Stupid Monsters someone was paid to make = the best job ever.


Warning: This article is very geeky. If you aren't familiar with D&D, I suggest skipping all the text until you see a picture of sea lion. You'll know it when you see it, trust me.

Powered by ScribeFire.

Rendimiento penoso en Windows

No soy el único al que le pasan estas cosas :-)

nowwhatthe: Performance - Win & KDE
But the CPU monitoring stuff on windows is entirely useless. Really,
wtf is that thing measuring? It seems like some random value... For
example. The following screenshot was made a little over 10 minutes
after boot. I started firefox, an explorer window (never showed up) and
Outlook. So everything stopped to redraw, most things got slow (but not
moving mouse, or even a window). So - there must be something going on,
right? Well, no. According to the system monitor, those apps which
didn't start nor redraw didn't stop working due to a lack of CPU or

(screenshot taken after minutes of waiting for a response - thought the system was busy...)

1 + 1 = 2... explicado de la forma complicada

Artículo que explica los fundamentos de la formalización matemática: por qué es necesaria, y por qué es mucho más difícil que las explicaciones intuitivas.

The Narrow Road » Blog Archive » On Abstraction

The point of this rigmarole is to show that ‘1 + 1 = 2′
can be enunciated without mention of either ‘1′ or
‘2′. The point may become clearer if we take an
illustration. Suppose Mr A has one son and one daughter. It is required
to prove that he has two children. We intend to state the premise and
the conclusion in a way not involving the words ‘one’ or

We translate the above general statement by putting:

φx. = .x is a son of Mr A,

ψx. = .x is a daughter of Mr A.

Then there is an object having the property φ, namely Mr A junior; whatever x
may be, if it has some property that Mr A junior does not have, it is
not Mr A junior, and therefore not a son of Mr A senior. This is what
we mean by saying that ‘being a son of Mr A’ is a unit
property. Similarly ‘being a daughter of Mr A’ is a unit
property. Now consider the property ‘being a son or daughter of
Mr A’, which we will call χ. There are objects, the son and
daughter, of which (1) the son has the property of being male, which
the daughter has not; (2) the son has the property χ and the
daughter has the property χ; (3) if x is an object which lacks some property possessed by the son and also some property possessed by the daughter, then x
is not a son or a daughter of Mr A. It follows that χ is a dual
property. In short … a man who has one son and one daughter has
two children.

Si enseñásemos Lengua igual que se enseña Matemáticas

+5 Insightful

The Narrow Road » If We Taught English the Way We Teach Math
Imagine that your only contact with “English” as a subject was through classes in school. Suppose that those classes, from elementary school right through to high school, amounted to nothing more than reading dictionaries, getting drilled in spelling and formal grammatical construction, and memorizing vast vocabulary lists — you never read a novel, nor a poem; never had contact with anything beyond the pedantic complexity of English spelling and formal grammar, and precise definitions for an endless array of words. You would probably hate the subject.You might come to wonder what the point of learning English was.

martes, septiembre 25, 2007

Puntos necesarios en un acuerdo de confidencialidad

  • Contenido básico de un Acuerdo o Pacto de Confidencialidad.

    • Establecer
      claramente qué se entiende por Información Confidencial.
      En este sentido, se puede establecer el deber de guardar secreto
      respecto de toda o determinada información tratada, siendo
      recomendable huir de referencias genéricas a la confidencialidad.
    • Establecer
      claramente los medios, recursos o información que se pone a
      disposición del trabajador o tercera empresa, determinando la
      titularidad de la misma.
    • Establecer
      específicamente la obligación de secreto y
      confidencialidad, el deber de actuar diligentemente en cuanto al
      tratamiento, conservación, almacenamiento, transporte, etc...
      estableciendo que en todos los casos deberán adoptarse los
      medios que aseguren y garanticen dicho secreto, y se evite su
      pérdida o el acceso a la misma de terceros no autorizados.
    • Establecer
      la obligación de devolver la información confidencial a
      la que se ha tenido acceso en el momento que termine la relación
      contractual, estableciendo, igualmente, que a pesar de dicha
      terminación, la obligación de confidencialidad y secreto
      permanecerá vigente durante el plazo que sea establecido por las
      partes (la práctica habitual en este sentido, es establecer un
      plazo de 2 años después de finalizada la relación
    • Es conveniente, igualmente, informar de las
      consecuencias que pueden derivarse del incumplimiento de dicha
      obligación de confidencialidad y secreto. Así puede
      establecerse que la sustracción o revelación de dicha
      información puede ser constitutivo de un ilícito de
      naturaleza penal (art. 197 CP del descubrimiento y revelación de
      secretos), puede ser objeto de acciones disciplinarias (despido
      disciplinario en caso de que el incumplimiento venga por parte de un
      trabajador), reclamación de indemnizaciones por daños y
      perjuicios, etc...
    • Por último, en los Acuerdos o
      Pactos de Confidencialidad pueden establecerse todas las
      especialidades, que por razón de la relación contractual
      que se establece, sean establecidas por las partes.
  • Limites de la Obligación de Confidencialidad y Secreto.

    Hay que señalar que la Obligación de Confidencialidad y
    Secreto queda limitada en aquellos casos en los que, por imperativo
    legal, la parte obligada sea requerida por un organismo jurisdiccional
    o administrativo para facilitar determinada información.

    En estos casos, deberán ser atendidas aquellas órdenes en las que:

    • La obligación de entrega venga determinada de manera concreta en la orden.
    • Sea dictada por una administración o juzgado competente.
    • Sea firme.

    En estos casos, se informará a la otra parte de inmediato sobre
    el requerimiento recibido, siempre que no exista obligación de
    guardar secreto sobre el mismo por mandato legal, administrativo o

Powered by ScribeFire.

Acuerdos de confidencialidad y no competencia

La importancia de la Protección de la Información Corporativa. Los Acuerdos o Pa. Tecnologías de la Información. Navactiva
La importancia de la Protección de la Información Corporativa. Los Acuerdos o Pactos de Confidencialidad En este artículo se abordan determinados medios legales a tener en cuenta por cualquier empresa para la protección de su Información Corporativa Confidencial

Plantillas Excel, Formularios, Plantillas Word, Presentaciones PowerPoint, Documentos y escritos profesionales.
Preámbulo y 12 cláusulas que incluyen: 1- Información confidencial. 2 – Pacto de confidencialidad. 3 – Derecho de propiedad. 4 – Propiedad intelectual. 5 – Devolución de la información. 6 – Colaboración. 7 – Pacto de no captación de clientes. 8 – Pacto de no competencia. 9 – Pacto de lealtad. 10 – Pacto de formación. 11 - Compensación. 12 – Derecho aplicable.

Juris Internacional - Acuerdo de confidencialidad
Primero. Confidencialidad
Segundo. Compensación. Resarcimiento.

Protección jurídica del conocimiento tácito. Estudio empírico en el sector alimentario

La sociedad actual, denominada sociedad del conocimiento, otorga especial relevancia al

conocimiento humano, como fuente de riqueza de las empresas. Este conocimiento debe ser

protegido jurídicamente desde una doble vertiente:

1. Frente a posibles espionajes, teniendo en cuenta la facilidad en el intercambio de

información que caracteriza la época en la que nos encontramos.

2. Frente a revelaciones de secretos industriales y del resto de información que tenga

una empresa, que puedan ocasionarse por parte de los empleados de la misma que

decidan trasladarse a otra, dado el alto índice de temporalidad de empleo de esta


Si bien a nivel económico-organizativo, se aprecia esta importancia del conocimiento “esté

expresado en un medio material o no”, como variable determinante del éxito de las empresas,

a nivel jurídico nos encontramos en un estadio menos evolucionado.

2. Tipos de conocimiento

2.1. En primer lugar, podríamos establecer una clasificación en función de los resultados

que puede generar el conocimiento, analizando si los conocimientos que generan los

trabajadores de la empresa suponen un paso inventivo, es decir, descubrimientos novedosos

para la empresa o, por el contrario, cuando el trabajador viene desempeñando una actividad en

la empresa y adquiere conocimientos y los une a sus aptitudes y experiencia, no se convierten

en innovaciones sino únicamente en una mejora de su saber hacer, de su forma de actuar en la

empresa. Así, podemos plantear dos tipos de conocimientos:

Cosmología de Kyoto

Un juego de ambientación oriental, que se parece más a una película de Kurosawa que a un juego de aventuras.

Home of the Underdogs - Entry: Cosmology of Kyoto
What makes Cosmology of Kyoto truly remarkable is that as you enter the town and interact with its inhabitants, you have only two choices. You can, in your arrogance, remain as you are, a contemporary Japanese or American, for example. And you won't get very far. The structure of relations that are the real art of the work won't let you. It does not allow this nonchalance with meaning.

A more interesting choice is to try and understand the world as it would have appeared to a person of the time. Then you start to make your decisions, when you meet the guard, or the priest, or the gambler, according to someone else's meaning making map of Kyoto, and indeed of the world. You work within the constraints the artists have placed in the matrix of relations that are the art of this work. The look and feel of it are just window dressing. They are not art, they are design. The art is the in the relations. Follow along the line of those relations, and you learn what it means to be in the world as the world appears from the point of view of Pure Land Buddhism.

As Roger Ebert concludes in his review, "There is the sense, illusory but seductive, that one could wander this world indefinitely. This is a wonderful game."

Powered by ScribeFire.

Sólo para conocedores de física cuántica

KDE Howto

Enlaces de introducción a KDE recopilados por aaron seigo

aseigo: Getting into KDE Hacking

A couple of blog entries back a reader left this comment:

kde hacking though, I'm in the first year of a computer science program
that I don't think is going to touch on anything kde related, Where
should I start if I wanted to get into kde hacking? Pick up the qt 4
manual, or something else?

I figured I'd answer that question in a blog entry as it is probably one a lot of people have. So here's the short story:

  1. Qt4 comes with a set of tutorials. They are excellent, and walk one through all the basics.

  2. Techbase has a great set of Tutorials that provide great follow up to that

  3. Techbase's Getting Started will provide you with instructions needed to get a KDE4 env up, running and in a state ready for hacking, hacking, hacking!

  4. KDE's API documentation is a great reference once you've started working on KDE

  5. bugs.kde.org lists a lot of open issues if you are looking for small tasks to start with

  6. KDE
    is a meta project made up of lots of smaller projects, such as KDE Edu,
    KDE Games, KOffice, Dolphin, Okular, Solid, Phonon, CoreLibs, Plasma,
    SystemSettings, etc, etc, etc... find something in KDE that fills you
    with the urge to hack and get in touch with that project. Most of them
    have mailing lists and irc channels; if you can't find them you can
    just ask on the general KDE forums such as kde-devel@kde.org or

lunes, septiembre 24, 2007

Autopunteros C++ y compilación privada

Un artículo que explica los autopunteros de C++, y da un ejemplo del patrón/idiom "compiler-Firewall" para evitar recompilar todo un proyecto cuando cambia la parte privada de un .h.

Using auto_ptr Effectively
The Pimpl Idiom is useful for
reducing project build times because it prevents wide-ranging
recompilations of client code whenever the private portions of C change. For more about the Pimpl Idiom and how best to deploy compiler firewalls, see Items 26 to 30 in the book Exceptional C++ (Addison-Wesley, 2000).

// Example 4(b): A safer Pimpl, using auto_ptr

// file c.h
class C
class CImpl; // forward declaration
auto_ptr<CImpl> pimpl_;

// file c.cpp
class C::CImpl { /*...*/ };

C::C() : pimpl_( new CImpl ) { }

Día de 28 horas

viernes, septiembre 21, 2007

Curriculum vitae en LaTeX

Barrapunto | Curriculum Vitae en LaTeX

Curriculum Vitae en LaTeX

Entrada escrita por trinuxfree y
editada por Yonderboy
el Jueves, 20 Septiembre de 2007, 19:38h


Email story

desde el dept. LaTeXeando-el-mundo

Si alguien tiene experiencia de hacerse el suyo propio, que lo cuente aquí.

Nota del editor: A veces, de forma inesperada, un post de
una sola línea, sin enlaces, sobre un tema muy concreto y que
parece destinado a pasar desapercibido se convierte en una fuente de
información y conocimiento. Naturalmente, el interés no
está aquí en el post en sí, sino en los de
más de 50 comentarios que ha suscitado en un solo día un
asunto tan especializado y ajeno a la actualidad. Por eso lo pasa a
portada, tal y como se ha sugerido. Una muestra palpable de que
Barrapunto lo hacen los barrapunteros, con sus valiosos comentarios y
envíos. ;-)

jueves, septiembre 20, 2007

Más fotos de rascacielos

Digg - The Most Beautiful 18 Skylines in the World
The Most Beautiful 18 Skylines in the World

All my years in studying Urban Planning helped me grow a greater appreciation for the dense downtown skyline of the big city. Don't forget to click the images to enlarge them for a better view.

Fotos de ciudades para posters

Software para diseño de interiores

Una aplicación para diseñar en 3 dimensiones los muebles de la casa

Sweet Home 3D

Sweet Home 3D

Sweet Home 3D

Sweet Home 3D is a free interior design application that helps you placing
your furniture

on a house 2D plan, with a 3D preview.

09/12/2007 - New version 1.0 of Sweet Home 3D :

Print, plan export with Copy/Paste, Windows, Mac OS X and Linux installers.

Artículos históricos del New York Times

Gems from the archive of the New York Times (kottke.org)
Gems from the archive of the New York Times
posted September 19, 2007 at 03:03 pm

Now that the NY Times has discontinued their Times Select subscription program and made much more of their 150+ years of content available for anyone to read and link to, let's take a look at some of the more notable items that the non-subscriber has been missing.

Construir Software appliances

Entorno para construir discos autoarrancables configurados para ejecutar una aplicación

rBuilder Online - Front Page
Make your own software appliance in three easy steps.three steps to use rBuilder Online
A software appliance
is an application paired with an execution environment. Basically, this
means that the application is built as a single image with an
accompanying operating system to run it.

miércoles, septiembre 19, 2007

HOWTO: configurar Sharepoint para mandar mails a las listas

MOSS Fan : Configuring email enabled lists



Configuring email enabled lists

Email enabled lists
allow you to add items to a Sharepoint 2007 list by sending an email to
that list with the item(s) you wish to add as attachment(s).

To use e-mail enabled lists with a simple SMTP server setup on a domain controller server, you can do the following:

  1. Install SMTP Server.
  2. Open the IIS MMC snapin.
  3. Right click on Properties of Default SMTP Virtual Server.
  4. Click the Access Tab, Relay. Add the IP address of the SharePoint
    server to the computers that can relay through this virtual server.
  5. Click the Delivery tab, Advanced. For Masquerade Domain enter the
    domain name of your server, leave the Smart Host blank. The
    configuration should look like that.
  6. Open the SharePoint Central Administration and navigate to the Operations tab.
  7. Under Topologies and Services categories - you will find a link to Incoming e-mail settings.
  8. Enable incoming e-mail and use the advanced settings mode.
  9. Leave the Directory Management Services defaults as they are (No).
  10. Fill in the e-mail server display address to be <servername>.<DomainName>
  11. For the drop folder put c:\inetpub\mailroot\drop - if you are not using the default settings you will need to change this.
  12. Browse to your list/library.
  13. Click on list settings for a specif list/library.
  14. Under Communication settings, click Email settings.
  15. Check the Enable this list to receive e-mails.
  16. Fill in an e-mail address for the list/library.

To configure e-mail enabled lists with a simple SMTP server setup on
a standalone server, take a look at the steps highlighted here http://jopx.blogspot.com/2006/11/configuring-incoming-email-settings-in.html

To configure Incoming Email Enabled Libraries in MOSS2007 RTM using
Exchange 2003 in an Active Directory Domain, check out this white paper

Conceptos de musica digital

Serie de artículos que explica qué son las opciones a la hora de ripear archivos de audio (no mp3, sino formatos no comprimidos).

Bit rate, bit depth, sample rate... what's the difference? Part one of
a series on digital audio gives you the scoop on the basics of digital
audio in its most common, uncompressed form.

The AudioFile: basics of uncompressed digital audio: Page 1
Let's go all the way back to the beginnings of digital sound, before it's even digital—in other words, let's get analog. Many audio primers represent sound waves using a graph of a sine wave over time, something like the following:

martes, septiembre 18, 2007

Cálculo mental, cálculo rápido

Trucos matemáticos para hacer operaciones mentales rápidamente

10 Easy Arithmetic Tricks - The List Universe
10 Easy Arithmetic Tricks
jfrater03:42 am30 Comments

Math can be terrifying for many people. This list will hopefully improve your general knowledge of mathematical tricks and your speed when you need to do math in your head.

Medibuntu: multimedia para Ubuntu

Sucesor de EasyUbuntu y Automatix, activa los repositorios multiverse y descarga los codecs para reproducir multimedia.

Medibuntu :: Multimedia, Entertainment & Distractions In Ubuntu
Medibuntu is a packaging project dedicated to distributing software that cannot be included in Ubuntu for various reasons, related to geographical variations in legislation regarding intellectual property, security and other issues:

* patentability of software, algorithms, formats and other abstract creation
* legal restrictions on freedom of speech or communication
* restrictions on the use of certain types of technical solution, such as cryptography
* legal restrictions on imports of software technology, requiring for example specific permissions
* etc.

lunes, septiembre 17, 2007

Dock para Gnome

Un lanzador de aplicaciones para Gnome, como el dock de Max OS X pero más funcional (salen acciones de la aplicación en un popup).

Avant Window Navigator in Launchpad
Avant Window Navigator
Avant Window Navgator (Awn) is a dock-like bar which sits at the bottom of the screen. It has support for launchers, task lists, and applets.

The Awn project is the development of the 'dock', avant-window-navigator, and its corresponding shared library 'libawn', which is used to develop applets.

Thief 2x: videojuego hecho por fans

Una expansión completa, realizada por fans del estupendo juego Thief.

Shadows of the Metal Age: About
Now with its own story to tell, the Dark Engineering Guild has remained hard at work on T2X: Shadows of the Metal Age...

Based on the critically-acclaimed Thief series, T2X is an unofficial expansion building on the technology that made Thief 2 a classic with critics and fans alike. More than 60 artists, designers, writers and programmers from the gaming community have contributed their talents to realize a fresh new Thief experience.

- Thirteen full-length missions take the action through city streets and rooftops, ancient tombs, hotels, museums, cathedrals and more in a gripping tale of vengeance and deception

- Ten new weapons and tools provide the means to evade, outwit, and out-fight your opponents, as well as bringing unprecedented levels of emergent gameplay to the Thief series

- Hundreds of new models, textures and sounds: 3000 lines of new dialogue

- Four beautifully-rendered cutscenes and twelve new briefings in the original Thief style

- A new main character with a fluid, immersive narrative that grips the player until the last scene

sábado, septiembre 15, 2007

Clipping facil

Extension de Firefox para facilitar la creación de entradas de blog y la captura de fragmentos de web.
clipped from clipmarks.com

viernes, septiembre 14, 2007

Generador de numeros de tarjeta

Evidentemente no sirven para comprar :-) Son para comprobar si un registro online funciona correctamente.

Credit card numbers

Credit card numbers that conform to the Luhn formula (MOD 10 check). Usefull for testing e-commerce sites (because they should get past any pre-validation you do, and be declined at the card processor or bank stage).

In testing situations any expiry date within the next 3 years should work

Feedback forces me to clarify this: These are NOT valid credit card numbers. You can't buy anything with these. They are random numbers that happen to conform to the MOD 10 algorithm. They are a technical resource for programmers - that's all.


522182050484 7198
54 67044775632428

VISA 16 digit

4 916567710041263
4556294 819837500

VISA 13 digit


American Express

373 876002965418

Artículos online gratis

Artículos científicos online, acceso temporal gratuito de prueba.

Introducción a la meditación

Beginning Zen Meditation

Beginning Meditation - A Zen Primer

Find a quiet, comfortable spot. Not too hot or too cold; not too bright nor too dark.

Place a cushion on the floor, preferably resting on a thin pad (or blanket or carpeting). Meditation cushions and pads (zafus and zabutons) can be purchased commercially, but other materials, such as pillows, sofa cushions or rolled-up blankets will suffice for beginning meditation at home. Meditating in a chair or on a low bench will also work.

The sitting postures are illustrated in several books on Zen meditation, includingThe Three Pillars of Zen by Philip Kapleau and Taking the Path of Zen by Robert Aitken.

Four Elements Basic To Traditional Meditation

There are four elements basic to most traditional meditation. These elements are:

A quiet place to meditate,
A comfortable or poised posture,
An object for attention-awareness to dwell upon,
A passive attitude.

Cómo funcionan las pantallas táctiles

Incluida la pantalla multipunto del iPhone

Howstuffworks "How the iPhone Works
" Basic touchscreen technology

Most of the time, these systems are good at detecting the location
of exactly one touch. If you try to touch the screen in several places
at once, the results can be erratic. Some screens simply disregard all
touches after the first one. Others can detect simultaneous touches,
but their software can't calculate the location of each one accurately.
There are several reasons for this, including:

  • Many systems detect changes along an axis or in a specific direction instead of at each point on the screen.
  • Some screens rely on system-wide averages to determine touch locations.
  • Some
    systems take measurements by first establishing a baseline. When you
    touch the screen, you create a new baseline. Adding another touch
    causes the system to take a measurement using the wrong baseline as a
    starting point.

    Multi-touch Systems

    To allow
    people to use touch commands that require multiple fingers, the iPhone
    uses a new arrangement of existing technology. Its touch-sensitive
    screen includes a layer of capacitive
    material, just like many other touch-screens. However, the iPhone's
    capacitors are arranged according to a coordinate system. Its circuitry
    can sense changes at each point along the grid. In other words, every
    point on the grid generates its own signal when touched and relays that
    signal to the iPhone's processor. This allows the phone to determine
    the location and movement of simultaneous touches in multiple
    locations. Because of its reliance on this capacitive material, the
    iPhone works only if you touch it with your fingertip -- it won't work
    if you use a stylus or wear non-conductive gloves.

    Mutual capacitance touch-screen

Investigación sobre moral

Página donde explorar tus creencias morales a la vez que colaboras con estudios científicos.



Many aspects of personality are related to morality. Many aspects of behavior are influenced by moral motives. And many conflicts and misunderstandings are driven by differences in morality. But rather than simply telling you these things, we want you to see for yourself. After each questionnaire or experiment you complete, we'll give you an immediate report on how you scored, and what your score means.

Revista de pensamiento Edge

Una revista sobre temas científicos, culturales, políticos... en una palabra: intelectual.

About Edge Foundation, Inc.
The third culture consists of those scientists and other thinkers in the empirical world who, through their work and expository writing, are taking the place of the traditional intellectual in rendering visible the deeper meanings of our lives, redefining who and what we are.

Moral religiosa desde el punto de vista de la psicología

Ensayo sobre cómo se define la moralidad en términos de recientes teorías psicológicas.

Mind Hacks: Moral psychology and religious mistakes
Psychologist Jonathan Haidt has written a thought-provoking essay for Edge
which charts the recent revolution in the psychology and neuroscience
of moral reasoning and suggests that the current critiques of religion
have mischaracterised its true nature, based on these new findings.
Haidt suggests that the recent criticisms of religion don't always reflect the best psychological understanding of what are primarily social, rather than ideological, institutions, and notes research findings showing that religious people tend to be happier and more altruistic than others.

As a self-professed non-believer and high-profile social psychologist, Haidt makes some interesting points that are bound to cause controversy.

Reproductor TV online

Reproductor de video sencillo de usar, descargas usando bittorrent.

Miro - free, open source internet tv and video player

El único reproductor de video que necesitas

Libre y código abierto, por que los medios abiertos importan.

Prácticos para imprimir

Plantillas para imprimir, y hacer cosas útiles con ellos

Useful Items You Never Knew You Could Print Out - The Ultimate Guide
Useful Items You Never Knew You Could Print Out - The Ultimate Guide

After I wrote my post about ‘useful things you could print out’,
many of you were kind enough to help out and point me to some excellent
additional resources! Anyway, I’ve compiled all the
submissions and comments into a definitive ultimate guide. Enjoy!

Amplía fotos para imprimirlas como poster:

Block Posters - Create large wall posters from any image for free!
create any size wall posters from any size images
Totally Free To Use!

Darse de baja - HOWTO

Darse de baja (Dinero y Derechos nº 99) - Newsletter OCU Informa Contenido

Seis casos prácticos

de su operador telefónico? ¿Quiere cambiar el seguro de
su casa o de su coche? ¿Desea darse de baja en el suministro de
agua? Le contamos, punto por punto, cómo poner fin a un

jueves, septiembre 13, 2007

Quién es quien en la Usabilidad en España

Gente VIP, pesos pesados del campo.

Fran Nagaro » 10 gurús del marketing en Internet en España
10 gurús del marketing en Internet en España
Publicado en E-strategia por admin on the Junio 11th, 2007

Hace mucho tenía en mente publicar un listado de las personas que admiro por sus conocimientos y creatividad en el desarrollo de proyectos online. He tenido la suerte de conocer a algunos. A otros les sigo la pista vía RSS.

Viajar por Internet: Una cerveza con David Boronat
Una cerveza con David Boronat

Telepresencia - un robot que trabaja por tí

Este tipo se ha construido un avatar físico para mandarlo a la oficina. Tiene ventajas sobre hacerlo todo por teléfono e internet.

The worker you have to plug in | Technology | The Guardian


Glenn Paulley (left) and Ian McHardy meet with the IvanAnywhere robot. Photograph: Peter Lee/The Record

Han bajado la hipoteca

Apellido 1:*
Apellido 2:*
Teléfono de contacto:*
* campos obligatorios

La Solicitud de información / Contratar supone la aceptación de la siguiente Cláusula legal
ActivoBank es una marca registrada de Banco de Sabadell, S.A.

- Tipo aplicable con Seguro de Vida y Seguro del Hogar vinculados al Préstamo Hipotecario. En caso contrario la revisión anual será Euribor +0,30%
- TAE calculada para una hipoteca a 40 años de 150.000 euros, sin comisión de apertura, incorporando el coste del seguro Protección Vida para un hombre de 30 años (coste del seguro de vida 389,64 euros/año). Tipo primer y resto de años Euribor oficial más 0,22 puntos. TAE 5,04% en base al último Euribor publicado en el BOE el día 23 de junio de 2007: 4,373%.
- Tipo de interés resultante de las revisiones no será inferior al 2,75% ni superior al 15%.
- La edad máxima del contratante al vencimiento de la hipoteca será de 75 años.
- No disponible para construcción.

miércoles, septiembre 12, 2007

Consejos sobre la psicosis

Mind Hacks: Learn first aid for psychosis

This post tells you to how to help someone who is experiencing psychosis, based on first aid guidelines that have just been published in the medical journal Schizophrenia Bulletin

is a mental state where someone might experience hallucinations,
unusual beliefs, paranoia, mixed emotions, muddled thoughts,
hyper-awareness or show unusual or puzzling behaviour.

The guidelines have been drawn from an international committee of
professionals, patients and carers. The detailed points are in table 1
of the paper which is available online as a pdf file.

Simulaciones de prototipos de interacción

Herramientas para crear prototipos interactivos.

Visio Replacement? You Be the Judge

“In the same way that the Internet took us to the next level of
interaction, complete with rich visuals, simulations are doing the same
for application definition.”

Every decade, there’s a new
technology that fundamentally transforms the way people do business,
enhancing productivity and profitability along the way. In just the
past few years, the user experience community has become captivated by
the power of simulation software—the next-generation tool for
requirements definition needed to build any online application. Think
of it as the “flight simulator” for the IT industry.

yesterday’s world, the typical deliverable would consist of a
Visio diagram (composed of static wireframes) or a costly HTML
prototype (still very static in nature)—the equivalent of
drafting a car or a skyscraper in 2D. In today’s world, UX
professionals can produce simulations—high-fidelity visual
representations of what’s going to be built.

In the
same way that the Internet took us to the next level of interaction,
complete with rich visuals, simulations are doing the same for
application definition. The advantage that simulations offer over
traditional deliverables is that they provide interactivity without
requiring the IA to know scripting or a programming language. Plus,
with some packages, changes can even be propagated to all related

Simulations can be used for ideation, definition,
validation, development, and pre-development usability testing. Once a
simulation has been modeled, its usefulness far exceeds that of any
static wireframe primarily because of the simulation’s ability to
look and act like the final product.

martes, septiembre 11, 2007

"Citas darwinistas"

Una agencia de citas online en la que sólo permiten registrarse a la gente guapa. El proceso de admisión es por votación popular entre los miembros.

The Dating Website for Beautiful People - Darwin Dating

Tienen una lista de los más guapos y los más feos.

Online dating for beautiful people

Sick of dating websites filled with ugly, unattractive, desperate fatsos? We are.

Darwin Dating was created exclusively for beautiful, desirable people.
Our strict rules and natural selection process ensures all
our members have winning looks. Best of all, it's completely free...

Banned at Darwin Dating...

Sweat patches

Nerdy glasses

Pocket protectors ... read more

Beautiful singles to recently join...

A thumbnail of Andrea (anje626)
Andrea from United States of America
A thumbnail of Emma (jaimeejay)
Emma from United Kingdom
A thumbnail of kerri (xchavvyxkerrix)
kerri from United Kingdom
A thumbnail of Sara (saracat)
Sara from United States of America
A thumbnail of tobias (thha_)
tobias from Switzerland
A thumbnail of Jonny fergerson (jaytheg23)
Jonny fergerson from United Kingdom