Chủ Nhật, 1 tháng 11, 2009

The History of halloween


THE TRUE HISTORY OF HALLOWEEN
written by: Your Name
[Your Additional Site Link]

Table of Contents
Brief Introduction 3
The Ancient Roots of Halloween 5
Bringing Halloween To America 8
Early Halloween Celebration Customs 10
Today's Halloween Customs 12
Conclusion 14
Brief Introduction
When you think of Halloween, what springs to mind? For most of us in America, Halloween night is a time of fun and frolic for both young and old alike.
People of all ages come out and dress up in unique costumes as whoever, or, whatever they desire one night of the year. A chance to step outside of ourselves. A moment to forget about the everyday grind stresses that await the morning after. It is a time for smiles, treats, and often time tricks or pranks all in the spirit of good natured fun.
For others amongst us, Halloween may be considered an evil, outlandish ritual that should never be participated in being avoided at all costs. Or a terrifying night when spirits of the dead come back to haunt us. A dark time for horrifying deeds that lead to no good.
But what do we truly know about the ancient traditions that sparked our modern Halloween celebrations?
Are they spawned from tainted, sinister places in the past?
Or could they have been created and intended for something else entirely?
That's what these passages will reveal to you. The True history of Halloween. If you never knew and were curious, then this will enlighten you on all that is Halloween based on the facts throughout history.
I hope you enjoy this ebook and find it educational. As that is the main intention. Not to offend, but to try and educate. Please, try to go in with an open mind. You just may learn something you never knew before about this ancient tradition engrained in our modern day society.
All The Best,

[Your Name]
The Ancient Roots of Halloween
Around 2,000 years ago in the North Eastern region of Europe centralized around the areas of Ireland, the UK, and Northern France, a group of people known as the Celts held sacred religious rituals on the night of October 31st to celebrate the upcoming new year on November 1st. This celebration was know as Samhain, which is pronounced like "sow in", and is a word that means "Summer's End".
The purpose of celebrating on October 31st was because the Celts believed that this night, the night before the beginning of the new year, was the one night the spirits of the dead came back to their earthly realm and could potentially cause havoc.
On this night, they believed that their priests, also know as the Druids, would be able to communicate with these spirits to predict the outcome of the new year more accurately.
For the Celts, October 31st signified the end of summer, which was also the end of their harvest time, and the start of harsh winter months that many would not survive. This was precisely why the Celts looked to their priests to help them gain insight on what to expect in the coming winter months ahead. To them, it was a matter of life or death.
At the beginning of the Samhain celebration, a sacred bon fire would be lit by the Druids in which participants would then burn crops and animals considered sacrifices to their gods in attempts to appease them with a prosperous new year. The animals used in these ceremonies were selected carefully and believed they were unable to survive on their own throughout the harsh winter months ahead.
Throughout the festivities, Celts would wear lavish costumes constructed mainly of animal skins and heads.
After all the celebrations had ended, each participant would take a bit of the bon fire back to their homes and relight their fireplaces that were extinguished earlier in the evening prior to the ceremonies. They did this as a form of protection to keep themselves safe and their farms prosperous during the dark, cold winter months.
While these traditions were practiced for many years, they were about to change when the Romans conquered the Celts around 43 A.D. This would last for the next four hundred years.
The Romans combined the Celtic celebration of Samhain with two of their own that occurred around the same time. The first was called Feralia. This Roman traditional celebration was for remembrance of the dead. It lasted for one day towards the end of October. The second celebration was a day of honor for the Roman goddess Pomona.
An interesting fact about the goddess Pomona is that she was associated with fruit and trees. Her main identifying symbol was the apple, and could give some explanation in to why at some modern day Halloween gatherings people bob for apples.
With the changing and combining of the three traditions, it gained a new name that we are familiar with today. This new celebration, conducted on November 1st, was deemed All Saint's Day. It was a day in which all people were granted permission to freely worship their deity of choice.
However, many people decided to also keep the older traditions and celebrate on October 31st in the ancient ways of their ancestors. This day was given the name All Hallows Eve. Now what we commonly refer to as Halloween, or Hallowe'en.
Bringing Halloween To America
When the first settlers came to America, they left many old traditions and celebrations from the old world behind, including that of Halloween. Many puritans believed it was a paganistic holiday and had no place in the development of their new life.
So, Halloween was all but forgotten. Until the mid nineteenth century when millions of immigrants came across the ocean to America. With them, they brought along their long practiced cultural traditions.
Not long after their arrival, America was changing into a veritable melting pot of cultures. And so, adaptations began changing the custom of Halloween into what we now recognize it as today.
Instead of having huge bon fires as part of traditional Halloween celebrations, people would use pumpkins carving out portions and lighting candles inside as lanterns. Ancient costumes worn went from animal skins to more modern attire such as dressing up as ghosts, ghouls, and witches.
And as for the trick-or-treat candy collecting, well, this is believed to have originated from another old tradition that was termed "Souling". Souling was the practice of people going door to door praying for the souls of the departed at their neighbors homes. In exchange for the prayers, the home owners would offer food to their visitors.
Others also believe that trick-or-treating could have stemmed from people leaving food offerings out on their porches during All Hallows Eve to appease the spirits in letting their home and family be at peace.
The true origins of trick-or-treating are still not known for sure. But what we do know is that it sure is loads of fun!
Even with these changes, some regions of America still frowned upon the celebration of Halloween. In places like New England, strict Protestants did not participate in Halloween. Nor did they allow others to take part in such pagan rituals in their communities.
However, in the earlier years, places like Maryland and many southern colonies celebrated Halloween regularly. And today, thanks to the Irish immigrants coming over during the mid nineteenth century, Halloween has become a national celebrated holiday all across America.
Early Halloween Celebration Customs
When colonial Americans first began participating in Halloween celebrations they would conduct something known as "play parties". These parties were held as public events in celebration of harvesting crops. During the play parties, neighbors would get together and tell tales very similar to ghost stories we tell today. They would also experiment in fortune telling, plus throw in some dancing and singing. Sometimes, there would also be some type of pranks being played. Or "tricks" if you prefer.
Not everyone across America would participate in these play party gatherings however. Even though annual autumn festivals were commonplace, these were not classified as Halloween parties until a bit later.
Around the mid nineteenth century, after the Irish immigrants had arrived in America somewhere along 1846, Halloween became more popular throughout the country. Combining Irish and English traditions of old, people began the more modern day custom of dressing up in costumes and going trick-or-treating. During the early days, treats consisted of food items or money, unlike the candy that is traditionally passed out to trick-or-treaters of today.
By the end of the nineteenth century, Halloween was mainly celebrated with home hosted parties. These would be thrown for both children and adults. During these upgraded get togethers, party goers would play festive games, eat seasonal foods, and wear stylish costumes that were popular to the period. Most hosts would steer clear of things considered too frightening such as ghost stories so everyone could have a fantastic night of fun.
When the 1920's and 30's rolled around, Halloween festivities received yet another update. Many of the celebrations were centered around community activities such as parades and city-wide parties.
In the 1950's Halloween was becoming a celebration geared towards the youth of America thanks to the baby boom. During these years, community based parties were drummed down into classroom festivities and home based parties. And it is also during this time that trick-or-treating came back in to fashion.
Bringing back the tradition of trick-or-treating provided communities with a way to enjoy and share the holiday together without the need for huge "town hall" type gatherings. This was considered a great American tradition of being able to celebrate the holiday as a community while keeping costs and vandalism down.
Today's Halloween Customs
Many of the customs we practice to celebrate Halloween today have deep seeded roots in the traditions of ancient times.
Trick-or-treating for example, most probably originated from All Soul's Day parades that were held in England many years ago. Reason being is that during these parades, destitute peoples would plead for something to eat as they could not afford to buy this sustenance Other families in turn would present them with special pastries deemed "soul cakes" as a promise to pray for those in the family that had passed on to the afterlife.
Not to be forgotten, many families would also leave food and drink outside during All Hallows Eve and All Saint's Day to keep wandering spirits at bay. Some would say that this tradition could be where children dressing up as ghouls and goblins represent the wandering spirits and the candy/food given would coincide with that custom.
Which brings us to why we dress up in costumes today for both parties and the act of trick-or-treating. Long ago, during Celtic times, special ceremonies were held to signify the ending of Summer and the beginning of winter. This was called Samhain.
During these ancient festivities, Celts would wear costumes made from animal skins. The Celts believed that on this night, October 31st, the dead could cross over from their world back in to ours. To keep the spirits from recognizing them, they would dress in costumes to hide their true identities from the wandering spirits.
They believed that by wearing masks, that this would conceal them and make the roaming spirits think they were other kindred spirits simply wandering about and leave them at peace.
By incorporating the disguises and leaving food offerings outside their homes, people of the past believed it would keep restless wandering spirits distracted protecting themselves and their homes from becoming infested with unwanted spirt guests.
Obviously today, there are many other types of costumes we don on Halloween. Not just the traditional witches, goblins, and ghosts of the past.
All of this explains why in current times we wear costumes, throw parties, and go out trick-or-treating on Halloween. To date, Americans spend an estimated $6.9 billion every year celebrating Halloween. That's a whole lot of candy and costumes!
Conclusion
Halloween has come a long way from where it began many years ago. Whether you love it or despise it, Halloween is the second largest commercial holiday celebrated across America today. And it looks like this ancient tradition isn't going anywhere anytime soon.
After reading where our version of Halloween stemmed from, you should have a much clearer understanding of what it's all about. And that, while some people still consider this to be an evil and fearsome holiday, it really all comes down to having a little bit of fun.People love stepping away from reality and hum drum life to become someone else. Halloween gives us the opportunity to do this. Even if it is only once a year.
Have A Happy Halloween,

[Your Name]
[Your Additional Info]



Fame worth L$1

Thứ Hai, 19 tháng 10, 2009

NGUOI HANG XOM



NGÖÔØI HAØNG XOÙM


Nhaø naøng ôû caïnh nhaø toäi

Caùch nhau caùi daäu muøng tôi xanh rôøn

Hai ngöôøi soáng giöõa coâ ñôn

Naøng nhö cuõng coù noãi buoãn gioáng toâi

Gía ñöøng coù daäu muøng tôi

Theá naøo toâi cuõng qua chôi thaêm naøng

Toâi chieâm bao raát nheï nhaøng

Coù con böôùm traéng thöôøng sang beân naøy

Böôùm ôi , böôùm haõy vaøo ñaây

Cho toâi hoõi nhoû caâu naøy chuùt thoâi

Chaû bao giôø thaáy naøng cöôøi

Naøng hong tô öôùt ra ngoøai maùi hieân

Maét naøng ñaêm ñaêm troâng leân

Con böôm böôùm traéng veà beân aáy roài

Boãng döng toâi thaáy boài hoài

Toâi buoàn töï hoûi : hay toâi yeâu naøng?

Khoâng, töø aân aùi nhôõ nhaøng

Tình toâi than laïnh tro taøn laøm sao!

Tô hong naøng chaû caát vaøo

Con böôm böôùm traéng hoâm naøo cuõng sang

Maáy hoâm nay chaúng thaáy naøng

Gía toâi cuõng coù tô vaøng maø hong

Caùi gì nhö theå nhôù mong?

Nhôù naøng , khoâng , quyeát laø khoâng nhôù naøng

Vaâng, töø aân aùi nhôõ nhaøng

Loøng toâi rieâng nhôù baïn vaøng ngaøy xöa

Taàm taàm giôøi cöù ñoå möa

Heát hoâm nay nöõa laø vöøa boán hoâm !

Coâ ñôn buoàn laïi theâm buoàn

Taïnh möa böôm böôùm bieát coøn sang chôi?

Hoâm nay möa ñaø taïnh roài

Tô khoâng hong nöøa, böôùm löôøi khoâng sang

Beân hieân vaãn vaéng boùng naøng

Röng röng toâi guïc xuoáng baøn … röng röng…

Nhôù con böôùm traéng laï luøng

Nhôù tô vaøng nöõa , nhöng khoâng nhôù naøng

Hôøi ôi böôùm traéng tô vaøng

Mau veà ma ø( hoûi thaêm) naøng ñi thoâi

Ñeâm qua naøng ñaõ (thaáy) roài

Ngheïn ngaøo toâi khoùc , quaø toâi yeâu naøng

Hoàn trinh coøn ôû traàn gian

Nhaäp vaøo buôùm traéng maø sang beân naøy

TAÂM HOÀN TOÂI - 1940

NGUYEÃN BÍNH

( xin maïn pheùp söûa hai töø underline treân Trieäu suøng Hôïp )



Photobucket

Chủ Nhật, 18 tháng 10, 2009

The silent corner in Café


Moät buoåi saùng trong moät goùc ñeïp cuûa moät quaùn cafée trong laøng ñaïi hoïc , khoûang 3km töø nhaø , moät khung caûnh thöïc hieän ra trong maét toâi döôøng nhö thaân quen laï thöôøng , tröôùc moät con ñöôøng vaéng boùng ngöïa xe , moät khoâng khí eâm ñeàm laï thöôøng so vôùi choán phoàn hoa , qua haøng cöaû kính trong saùng tröôùc moät maët hoà nöôùc yeân tónh , beân caïnh laø haøng caây xanh cao cao õ ruõ nhöõng caønh laù nheï nhaøng phaûn chieáu treân maët nöôùc laên taên, moät moâi tröôøng toát nheï thoaûng qua ñeå chieâm nghieäm chính mình. Coù phaûi chaêng ñaây laø moät söï ngaãu nhieân hieám thaáy , hình aûnh moät background trong blog cuûa mình treân 360 yahoo

Vôùi taâm traïng xuùc caûnh sinh tình, muoán vieát vaøi lôøi maø toâiø ñaõ chieâm nghieäm trong phaàn giôùi thieäu veà nhöõng khaùi nieäm cô baûn cuûa ngheä thuaät, Trong ñoù deà caëp ñeán vaán ñeà khoâng gian deïp thöôøng neáu qua mieâu taû cuûa taùc giaû thì hình aûnh con ngöôøi vaø söï vaät chæ laø mieâu taû söï hieän höõu voán coù , nhöng yù nieäm môùi chính laø vaàn ñeà tröøu töôïng cuûa ngheä thuaät , vôùi söï phaùt trieån cuûa hình hoïc ba chieàu trong moâi tröôøng deïp ñoù theå hieän moät khung caûnh aûo taïo söï phong phuù cho moät yù nieäm tröøu töôïng theo caûm thuï cuûa moãi caù nhaân qua söï vaät , baát chôït toâi nghó ñeán caâu thô cuûa Nguyeãn Khuyeàn mieâu taû:

Ao thu laïnh leõo nöôùc trong veo

Moät chieác thuyeàn con beù teûo teo

Soùng nöôùc theo laøn hôi gôïn tí

Laù vaøng tröôùc gío seõ ñöa veøo

Quøa thaät vôùi maët hoà nöôùc trong bieác , qua khoâng khí se se laïnh cuûa muøa thu , nhìn qua maët nöôùc yeân aû , theà hieän söï chìm ñaém nheï nhaøng ñeå soi roi con ngöôøi mình qua cuoäc soáng böôm traûi haèng ngaøy , Moät ñieåm moác thaáy söï coâ ñôn cuûa chính mình , nghæ veà thaân phaän cuûa con ngöôøi , cuûa chính ta , moät nguoàn caûm höùng cho saùng taùc , toâi coøn nhôù ñaâu ñoù moät caâu . Thieân taøi chính laø söï aån hieän coâ ñôn cuûa chính mình, laø söï chieâm nghieäm chi tieát trong töøng söï vieäc , Qua khoâng gian ñaàm aám , vôùi laøn nhaïc jazz, Blue nheï nhaøng ñaõ daãn toâi veà khaùi nieâm yeân bình , noùi cho bao quaùt hôn laù khaùi nieâm Hoøa bình . Trong ñoù con ngöôøi soáng yeân vui vôùi nhau maø boû qua nhöõng löøa loïc cuûa theá gian , maø nghó veà chính mình vaø coäng ñoàng. Nhöøng taïp nieäm trong töøng caùi toâi ( Ego) cuûa moãi chuùng ta seõ bay leân khoâng gian , ñeå taïo neân moät thieân ñaøng soáng thöïc ( real Paradise in real environtment)

Ñieàu naøy laøm cho toâi nhôù ñeán moät caâu trong kinh Phaät giaùo :

Thieân haï chi ñòa duy ngaõ ñoäc toân

Coù phaûi chaêng ñoù laø ñöôøng daãn di tìm söï coâ ñôn cuûa chính ta, ñi tìm hoøa bình vaø söï thöông yeâu cuûa nhaân loïai, Khaùc vôùi nhöõng quan ñieåm soáng theo thuyeát hieän sinh , soáng ñeå höôûng thuï vaø theã hieän söï hieän höõu cuûa mình trong xaõ hoäi , laø con ñöôøng ñi tìm söï noåi tieáng vaø söï vinh danh

Thaät tuyeät dieäu khi nhaän caûm nhaän ñöôïc nhöõng caûm xuùc cuûa taùc gìa Hoaøng Phuû Ngoïc töôøng khi vieát veà Trònh Coâng Sôn qua nhöõng taùc phaåm aâm nhaïc. Ñoù cuõng laø con ñöôøng ñi tìm chính mình , caûm thuï söï coâ ñôn trong cuoäc soáng, Nhöûng baøi vieát theå hieän roõ moät nhaân sinh quan trong cuoäc soáng bao la naøy :

Bao nhieâu naêm roài ngöôøi vaãn ra ñi

Ñi ñaâu lanh quanh cho ñôøi moûi meät

Con tim nhaân gian ñoâi doøng nhaät nguyeät

Moät coõi traêm naêm , ngöôøi vaãn ñi veà

Vôùi webside cuûa mình : http://www.myyearbook.com /hoptrieusung

Toâi ñaõ theà hieän quan ñieåm naøy qua moät bulletin keâu goïi caùc baïn , haõy ñaáu tranh choáng chieán tranh vaø baøo veä hoøa bình , baøo veä traùi ñaát nayø , Bôûi vì toâi khoâng ñoàng quan ñieåm trong muïc Battle ñeå theå hieän mình , ñoù chính laø quan ñieãm hieän sinh theo traøo löu cuûa phöông Taây

Moät ñoäc gæa cuûa toâi taïi Ghana, Zimbeque, mieàn nam Chaâu phi, ñaõ vieát email cho toâi raèng , caäu ta môùi chæ muôøi boán tuoåi , Caäu ta noùi raèng Caäu ta nhôù meï quaù , vaø raát muoán caép saùch tôùi tröôøng, nhöng khoâng coù tieàn ñoùng hoïc phí, caäu ta vieát raát ñôn giaûn nhöng ñaõ laøm toâi xuùc ñoäng vaø coù veû chaâu sa. Saùng ra ñoùn con ñi hoïc veà , beù baùo caùo laïi laø beù ñaõ daït hoïc sinh gioûi, laïi moät caûm giaùc nheï nhaøng ñeán vôùi toâi, traùi ngöôïc vôùi caûm xuùc hoài ñeâm, Nhìn nhöõng söï vui ñuøa hoàn nhieân cuûa treû nhoû luùc tan tröôøng , tuï döng toâi caûm thaáy vui laï , Moät caõm nhaän cuûa taùc phaåm Hoâm nay toâi ñi hoïc, trong ñoù coù caâu , <>.

Nhöng ngöôïc laïi laïi caêm thuø caùc baäc cha meï , caùc vò tröôøng thaønh , taïi laøm sao laïi laøm vaån ñuïc taâm hoàn treû thô, maø moät trong soá ñoù bieát ñaâu laïi laø thieân taøi, laø moät taøi nguyeân quoác gia.

Nhôù nöôùc ñau loøng con Quoác Quoác

Ñau loøng moûi mieäng caùi Gia Gia

Oh! God . Neáu giaû söû nhö nhöõng ñieàu trong baøi ca _ (What will be – will be) thöïc söï ñeán vôùi toâi nhö moät lôøi tieân tri cuûa soá phaän . Aâu ñoù cuõng laø con ñöôøng ñi tìm chính mình. Vaø seõ luoân nhôù tôùi caäu beù nôi mieàn xa xoâi



Photobucket

Chủ Nhật, 4 tháng 10, 2009

THE CULTURE AND THE ART

Vaên hoùa vaø ngheä Thuaät : Hai töø naøy coù phaûi laø moät compound nouns ? Chaéc coù theå theo söï nghieân cöùu haøng ngaøn naêm veà söï phaùt trieån cuûa lòch söû treân toaøn theá giôùi , töø Chaâu AÂu , Chaâu Myõ, ñeán Chaâu Phi, Chaâu aù . Ñoù laø söï theå hieän söï phaùt trieån cuûa con ngöoøi soáng trong coäng ñoàng , ñöôïc theå hieän qua caùc neùt Vaên hoùa vaø ngheä thuaät phaûn aùnh cuoäc soáng cuûa con ngöôøi trong coäng ñoàng qua caùc thôøi kyø cuûa lòch söû, Nhöõng con ngöôøi ñoù ñeàu phaûi soáng trong moät moâi tröôøng soáng cuï theå laø traùi ñaát naøy , maø traùi ñaát laø moät haønh tinh trong giaûi ngaân haø naøy

Noù chæ laø moät thieân haø trong vuõ truï naøy. Vöøa qua caøc nhaø khoa hoïc Myõ ñaõ phaùt hieän coù söï soáng cuûa ngöôøi ngoaøi haønh tinh caùch traøi ñaát ta khoaûng 30 naêm aùnh saùng, maø con ngöôøi treân traùi ñaát naøy cho ñoù laø moät caûm nhaän mang tính sieâu nhieân ( Taâm linh) .

Vaäy nhgieân cöùu Vaên Hoùa vaø Ngheä Thuaät aâu chaêng cuõng laø nghieân cöùu veà con ngöôøi hieän höõu trong moät moâi tröôøng hieän höõu .

Con ngöôøi hoï toàn taïi treân hai phöông dieän :

Ñôøi soáng thöïc : Moät söï phaùt trieån töï nhieân cuûa cuoäc soáng

Ñôøi soáng tinh thaàn : Chieàu höôùng phaùt trieàn laø theå hieän söï sieâu nhieân trong noäi taïi cuaû töøng caù nhaân trong quùa trình ñi tìm caùi toâi cuaø mình, tìm ra caùi baûn ngaõ sieâu nhieân laø tìm ra söï giaûi thoùat ñeå tìm tôùi söï thö thaùi , töï taïi trong cuoäc soáng.

Trong lyù thuyeát phaät giaùo theà hieän trong caâu :

Thieân haï duy ngaõ ñoäc toân

Trong lyù thuyeát thieân chuùa giaùo theå hieän trong caâu :

Haõy yeâu thöông keû khaùc nhö yeâu thöông chính baûn thaân mình.

Chaéc coù leõ ñoù chính laø vaán ñeà ôû baát cöù theå cheá chính trò naøo treân traùi ñaát phaûi baûo veä vieäc töï do toân gíao vaø khoâng ñöôïc quyeàn xaâm phaïm noù cho caùc möu ñoà chính trò , baûo veä caùc quyeàn löïc , vaät chaát, mang tính chaát phuø phieám , maø con ngöôøi caàn thieát phaûi caàn ñeán cho söï phaùt trieån töï nhieân cuûa cuoäc soáng.

Söï toàn taïi cuûa toân gíao gaén lieàn vôùi Vaên hoùa – Ngheä Thuaät , ñieàu ñoù ñaõ gaén lieàn töø vôùi con ngöôøi vaø coäng ñoàng töø thuûa khai thieân laäp ñiaï. Ñieàu naøy Khieán toâi maïn pheùp trích löôïc ñaêng Phaàn toång quan veà Vaên Hoùa vaø Ngheä Thuaät cuûa Aán Ñoä cuûa taùc gæa Michael Kampen O’riley :

Söï toàn taïi cuaû con ngöôøi , coäng ñoàng vaø theå cheá qua caùc trieàu ñaïi ñöôïc gaén lieàn vôùi söï phaùt trieån cuûa toân gíao Aán Ñoä.

Caùc Toân gíao chính toàn taïi töø ngaøn xöa trong xaõ hoäi Aán chuû yeáu ñeán nay laø:

Balamon – Aán gíao – Phaät gíao vaø Kyønaø gíao.

Phaät Gíao : Phaät gíao phaùt trieån töø nhöõng lôøi daïy cuûa Siddhartha Guatama ( 563-483) tröôùc coâng nguyeân. Sinh ra taïi thaønh Catilaveä ( Kapilavastu) vuøng sôn cöôùc nöôùc Nepal gaàn bieân giôùi hieän nay cuûa Aán Ñoä . Ngaøi laø con cuûa hoøang haäu Maya vaø Ñöùc vua Shadodhana , veà sau ñöôïc toân laøm ñöùc phaät , ñoù laø baäc gíac ngoä,- Ngöôøi ñaït Hueä trí . Chöõ Ñaït ôû ñaây coù phaûi laø chöõ Ñaït cuûa neàn Vaên hoùa Chaâu Phi , Theå hieän coù moái Lieân quan trong söï phaùt trieån cuûa Phaät gíao veà phía Taây Baéc Aán – Khu vöïc soâng Indus – Ghana- Afganistan .

Ngaøi cuõng ñöôïc goïi laø Shakymuni ( Hieàn nhaân cuûa doøng toäc Shakga). Ñaùp öùng moïi öu tö , saâu saéc ñoái vôùi bao ñau khoà cuû chuùng sinh. Siddhartha rôøi boû cung ñieän , hoøang gia ñeà trôû thaønh moät du só khaát thöïc khoå haïnh. Qua quùa trình tu nieäm , ngöôøi ñaït tôùi nieát baøn , moät traïng thaùi thoùat khoõi ham muoán traàn gian vaø baét ñaàu moät phöông phaùp tu nieäm môùi laø Baùt chaùnh Ñaïo ( Astangita-Marya)

Ñieàu maø toâi ñaõ giôùi thieäu veà baøi Eight Worldly Conditions noùi veà Yeâu Thöông vaø Hoa Hoàng ñöôïc theå hieän laïi goàm :

Chaùnh kieán – Chaùnh tö duy – Chaùnh ngöõ – Chaùnh nghieäp – Chaùnh meänh – Chaùnh tònh tieán – Chaùnh nieäm – vaø Chaùnh ñònh .

Con ñöôøng naøy seõ daãn daét tín ñoà xa rôøi ñau khoå trong ñôøi soáng taïo ra bôûi voâ minh ( Avidya) . Ñoù laø neàn toân gíao choáng laïi neàn toân gíao coå xöa cuõ döïa treân kinh Veda cuûa Aán Ñoä , vôùi heä thoáng ñaúng caáp khaéc nghieät vaø taàng lôùp gíao só huû laäu , thuû cöïu . Phaät gíao laøm toân gíao ñeán ñöôïc moï ngöôøi , nhöõng lôøi Phaät daäy ñöôïc keát taäp vaøo moät loaït caùc vaên baõn goïi laø( Satras) kinh . The theravada, phaät gíao nguyeân thuûy hay coøn goïi laø Hynayana , phaùi tieåu thöøa töø laâu ñöôïc lieân keát vôùi caùc coäng ñoàng töï vieän . ( Phaät Lòch)

Mahayana hay ñaïi thöøa xuaát hieän vaøo khoûang theá kyû ñaàu coâng nguyeân ,gaàn guõi vôùi ñaùm ñoâng hôn , Phaùi naøy nhìn Ñöùc Phaät laø Ñaáng thieâng lieâng, muoán moïi ngöôøi hoaøn thaønh Phaät tính vaø nhìn nhaän nhieuà vò phaät töø quùa khöù – hieän taïi vaø töông lai . Phaät gíao Ñaïi thöøa cuõng nhaän maïnh taàm quan troïng cuûa chö vò boà taùt( Bodhissatras) . Ñoù laø nhöõng baäc gíac ngoä , ñaõ daït ñeán ngöôõng cöûa nieát baøn , nhöng khoâng ñi vaøo maø quay trôû laïi coõi phieàn naõo ñeå ñoä chuùng sinh

Vò Boà taùt raát quan troïng vaø nhieàu ngöôøi bieát nhaát laø Avolokitesvara maø ngöôøi Hoa goïi laø Quanyin . Nhaät goïi laø Kwannon vaø Vieät Nam goïi traïi laïi töø tieáng Hoa laø Quan Theá Aâm , Vì theá caùc tín ñoà phaät giaùo khi gaëp hoaïn naïn khoù khaên thì hay nieäm Quaùn Theá Aâm . Vò naøy thöôøng ñöôïc minh hoïa trong tranh töôïng maø chuùng ta thöôøng gaëp trong caùc chuøa chieàn .

Trong khi Ñöùc Phaät thöôøng maëc moät taêng baøo ( Sanghati) thì caùc vò boà taùt laïi aên maëc raát vöông gæa , gioáng nhö phaät khi coøn treû .

Theâm vaøo vôùi vò phaät lòch söû Shakyamuni , Phaät gíao Ñaïi thöøa coøn coâng nhaän nhieàu vò phaät trong quùa khöù – hieän taïi – vaø töông lai. Trong ñoù coù Maitreya ( Moät boà taùt trôû thaønh Phaät vò lai ,töùc Phaät Dilaëc vaø phaät Adidaø hay voâ löôïng quang phaät , Voâ löôïng thoï Phaät . Vò naøy chuû trì moät coõi cöïc laïc goïi laø Taây Phöông tónh thoå . Tín ñoà Phaät gíao khoâng nghó raèng Phaät hay Boà taùt nguû trong caùc taùc phaåm ngheä thuaät , nhöng caùc hình töôïng tröïc quan maø quùy haønh gæa vaø tín ñoà “ Muïc sôû thò “ laø nhöõng trôï cuï quan troïng treân con ñöôøng tu nieäm .

Ngheä Thuaät Phaät gíao lan toûa töø Aán Ñoä ra moïi höôùng beân ngoøai . Phía taây ñeán Afganistan , phía baéc ñeán Kashmir , ñoâng baéc ñeán Nepal , Taây taïng ,Trung hoa , Haøn Quoác, Nhaät , phía nam ñeán Srilanka veà ñoâng nam qua Mieán Ñieän ñeán Indonesia .




Thứ Ba, 4 tháng 8, 2009

What pets for children ?


Why pets are good for kids
Dogs and other animals can help children cope with a variety of ailments like depression, emotional disorders, and even poor immune function.
Pets are also good preventive medicine for healthy children to help them avoid developing allergies, increasing weight, or becoming social outcasts. Pets can also teach children empathy and compassion.
"Children in dog-owning families have more traditional values, better academic achievement, and greater respect for their parents," said Elizabeth Omerod, companion animal veterinary surgeon, and member of the Pet Health Council in London. "I often witness positive attitudinal changes in young people following the introduction of animals to their lives."
Medical Advantages
This isn't just anecdotal hearsay; it's the subject of numerous medical studies conducted around the world, many of which are found at the Delta Society.
* A Swedish study found that pet exposure during the first year of life was associated with a lower prevalence of allergic rhinitis and asthma in children ages 7 to 13 years old
* A large-scale survey of 11,000 Australians, Chinese, and Germans found that pet owners made up to 20 percent fewer annual visits to the doctor than non-pet owners
* A study of 256 children, ages 5 to 11 years, in three schools in England and Scotland found that kids with pets had fewer sick days
* A study of 100 children younger than 13 years who owned cats found that more than 80 percent said they got along better with family and friends
* Studies have linked family ownership of a pet with high self-esteem in young children and greater cognitive development
* Children with pets at home score significantly higher on empathy and pro-social scales than non-pet owners
Stress Busters on a Leash
What is it about animals that makes them so special around children? Experts overwhelmingly zone in on their ability to decrease stress because they offer love and affection unconditionally.
In one survey, 70 percent of families reported an increase in family happiness and fun after they acquired a pet. Also, the presence of a dog during a child's physical examination or dental treatment has been found to decrease the child's stress and anxiety.
"When under stress, our chemical make-up changes, and a multitude of stress hormones are introduced in the body," said Caryn Sabes Hacker, a psychotherapist with more than twenty-five years of experience with children, and author of A Bully Grows Up: Erik Meets the Wizard.
"Ultimately, these hormones cause inflammation in our cells. Petting an animal, hearing its soft breathing, feeling its heart beat, looking into its sweet eyes, knowing that the pet needs us and that we need the pet, creates feelings of love and a corresponding influx of chemicals from the brain that are calming and comforting and create a sense of well-being and happiness," she said.
Families across the world have harnessed one of the most powerful medicines of all--unconditional love from a furry, four-legged healthcare worker who is on-call twenty-four hours a day and doesn't require a paycheck.

Subscribe

Share/Save/Bookmark

Free Twitter buttons from languageisavirus.com
twitter buttons

CHECK OUT PROFILEANGELS.COM FOR THE HOTTEST PICS!
PROFILEANGELS.COM

Thứ Ba, 21 tháng 7, 2009

THUC AN NOI LEN TINH CACH

Thöùc aên noùi leân tính caùch cuûa baïn:

Ngöôøi thích traùi caây :

Nhöõng ngöôøi thích traùi caây ñöôïc xem laø nhöõng ngöôøi hay chuù yù ñeán ngöôøi khaùc vaø raát nhaïy caûm . Hoï thöôøng coù nhieàu baïn beø, hoï khoâng thích caïnh tranh , do ñoù nhöõng ngöôøi thích traùi caây khoâng coù xu höôùng tìm kieám moät ñiaï vò xaõ hoäi . Hoï coù taøi trong caùc laõnh vöïc ngheä thuaät , tuy nhieân , do thieáu tham voïng cho neân ñoâi khi hoï troâng coù veû caåu thaû.

Ngöôøi thích aên rau :

Nhöõng ngöôøi thích rau thöôøng coù söùc soáng maõnh lieät , hoï thöôøng thaønh coâng trong ngheà nghieäp , laø nhöõng ngöôøi khao khaùt kieán thöùc vaø nhieàu thamvoïng nhö moät quy luaät , nhöõng noã löïc do ngöôøi naøy thöïc hieän khoâng bao giôø rôi vaøo khoaûng khoâng maø thöôøng ñöôïc nhieàu ngöôøi bieát ñeán . Trong cuoäc soáng nhöõng ngöôøi naøy thích an bình vaø coá gaéng traùnh xung khaéc . Tuy theá nhöõng ngöôøi thuoäc loaïi naøy hay lo laéng veà söùc khoûe cuûa mình . Ñieàu quan troïng laø nhöõng ngöôøi thích aên rau neân aên ít muoái , neáu khoâng hoï coù theå bò ñau ñaàu vaø gaëp nhöõng vaán ñeà veà bao töû.

Ngöôøi thích aên thòt :

Ñaây laø nhöõng ngöôøi haáp taáp vaø traûi qua nhöõng thaêng traàm trong ñôøi soáng, thích xoay xôû sao cho gaët haùi ñöôïc thaønh coâng treân ñöôøng ñôøi . Tuy nhieân ñoâi khi hoï khoâng theå thöïc hieän ñöôïc caùc keá hoaïch cuûa mình . Neân nhôù nhöõng ngöôøi naøy khoâng luoân luoân laø nhöõng ñoái taùc laâu daøi . Hoï neân hoïc caùch phaûn öùng laïi söï pheâ bình moät caùch ñuùng ñaén . Nhöõng ngöôøi thích nhöõng böõa aên coù nhieàu thòt thöôøng maéc nhieàu bònh khaùc nhau hôn nhöõng ngöôøi khaùc , nhaát laø nhöõng bònh veà tim maïch vaø ñöôøng ruoät .

Ngöôøi thích aên caù vaø haûi saûn :

Nhöõng nhöôøi thích aên loaïi naøy ñaëc bieät raát bình thaûn vaø kieân ñònh , loøng kieân ñònh vaø söï bình tónh cuøa hoï luoân khieán baïn beø vaø ñoàng nghieäp toân troïng , laø nhöõng ngöôøi ñaùng tin caäy trong cuoäc soáng gia ñình , tuy nhieân hoï thieáu côûi môû . Hoï hieám khi noùi roõ yù kieàn thaät cuûa mình veà nhöõng ngöôøi khaùc , do ñoù laïi laøm haïi ñeán hoï.

Ngöôøi thích thöùc aên cay noàng :

Nhöõng ngöôøi naøy coù tính noùng naõy . Hoï thöôøng khao khaùt coù cuoäc soáng phieân löu , vì theá neân daán thaân vaøo nhöõng hoaït ñoäng tích cöïc nhaèm taïo cho mình nhöõng caûm giaùc maïnh . Chaúng ngaïc nhieân khi nhöõng ngöôøi naøy thöôøng höùa cuoäi trong tình yeâu . Vaán ñeà lôùn nhaát hoï phaûi gaùnh chòu do söï ích kyû cuøa hoï , ñoù laø tích caùch cuøa hoï khoâng cho pheùp bò treâ traùch.

Ngöôøi thích aên beùo:

Ñaùng ngaïc nhieân laø nhöõng ngöôøi thuoäcloaïi naøy raát soâi noåi vaø linh lôïi . Cho duø taïi nôi laøm vieäc hoï thöôøng ñuôïc xem laø nhöõng ngöôøi coâ ñôn , vaø nhöõng ngöôøi naøy cuõng gioûi xoay sôõ ñeå ñaït ñeán ñænh cao ñòa vò cuûa hoï . Hoï ñaëc bieät coù taøi taùn tænh vaø thích laøm cho caùc ngöôøi ñeïp ñeå yù . Lôøi khuyeân toát cho nhöõng ngöôøi naøy laø : Hoï neân hoïc caùch lòch thieäp hôn vì söï côûi môû quùa ñoä laøm toån thöông ñeán nhöõng ngöôøi khaùc


Thứ Hai, 20 tháng 7, 2009

Hop'3D sence from Friendster

Today I want introduce you for my face at Frienster . It is great for making 3d sence that I use in and Now I want to share by


In other way you can see me at Friendster
http://www.friendster.com/sunghop or you can watch my blog at friendster
http://sunghop.blog.friendster.com

By The way I write my feeling about :
SAIGONNIST : I want to say that "Saigonnist" >Its meant . The people who lived in Ho Chi Minh city HCM city , place there are many residents from over all provinces of Vietnam . The Differences of their performance show to owning eating " Tet " . For example China communities concentrated in " Cho Lon " market Who have eaten the "Tet" fowlling their tracditions.
But all communities have the " Tet" as traditions of Vietnam . In the fields of Life by the proverb " Eatting as the Northers - Wearing as the Southers " and Eatting as the Southers - Working as the Northers ". In reverse of livng methods of two sectors . The Northers have eaten royal dishes - The Southers have worn in the model fashions .

The Samples for the Souther just are the "Saigonnists"

Thứ Tư, 15 tháng 7, 2009

My collections




Microsoft ACT: Configuration and Troubleshooting Microsoft Corporation Published: April 2009 Abstract This paper provides information about configuring the Microsoft® Application Compatibility Toolkit (ACT) 5.0, including troubleshooting for known setup issues. This information applies for the following operating systems:
· Windows 7®
· Windows Vista®
· Windows Vista® with Service Pack 1
· Windows Windows Server® 2008 R2
· Microsoft Windows Server® 2003
· Microsoft Windows® XP with Service Pack 2 (SP2)
· Microsoft Windows® 2000



© 2009 Microsoft Corporation. All rights reserved.

Copyright Information The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. © 2009 Microsoft Corporation. All rights reserved. Active Directory, Microsoft, Windows, Windows NT, Windows XP, Windows Vista, and Windows Server are trademarks of the Microsoft group of companies. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.


© 2009 Microsoft Corporation. All rights reserved.

Contents
Microsoft ACT: Configuration and Troubleshooting . 5
Setting Up Your ACT Environment 5
Architecture and Supported Topologies....... 5
Software and Hardware Requirements .......... 7
Software Requirements . 7
Hardware Requirements .. 8
Special Requirements for Using the Update Compatibility Evaluator (UCE) . 9
UCE Supported Operating Systems ......... 9
UCE Supported Hardware Requirements ........ 9
Disk-Space Usage..... 9
Special Requirements for Using the Compatibility Administrator ..... 9
Special Requirements for Using the Setup Analysis Tool (SAT) .. 10
ACT Database Configuration and Modification Recommendations . 10
ACT Database Configuration and Modification ..... 10
ACT Database Role Assignments ................. 11
Additional ACT Database Recommendations ............... 11
Configuring the Infrastructure for the Microsoft Compatibility Exchange ..... 12
Installing ACT 5.5 ....... 12
Configuring the Application Compatibility Manager ....... 13
Using the ACT Configuration Wizard ................ 13
Changing Your Preferences .... 15
Troubleshooting ............... 16
SQL Server Database Related Issues ................... 16
Invalid SQL Server Message .............................. 16
SQL Server Version Is Not Valid ..................... 16
Unable To Connect To SQL Server Database ................ 16
Invalid Permissions and Database-Creation Issue............ 17
Verifying Your ACT Database Permissions for the ACT Log Processing Service .............. 19
ACT Log Processing Share-Related Issues ............ 19
Configuring the Required Privileges for the ACT Log Processing Share ...... 19
Share Level Permissions ......... 20
Folder-Level Permissions (NTFS Only) ........... 20
Additional Troubleshooting Notes ............. 20
ACT Log Processing Share and Windows Firewall ........... 21
ACT Log Processing Share and Workgroup Environments......... 21
ACT Log Processing Service-Related Issues .................. 22
Viewing and Assigning "Log On as a Service" Rights .......... 22
ACT Log Processing Service Fails to Start .. 22



© 2009 Microsoft Corporation. All rights reserved.
Microsoft ACT: Configuration and Troubleshooting
ACT 5.5 provides a way for you to create an inventory for your organization, including your installed applications, computers, and devices. It also enables you to collect compatibility data, to determine the impact of that data in your organization, and, finally, to create mitigation packages to fix the compatibility issues, when possible. There are three phases for effectively using ACT in your organization. The three phases are:
· Phase 1: Collecting Data. Before you can analyze your potential compatibility issues, you must first collect your organization's inventory and the associated compatibility issues. For more information, see the "Microsoft ACT: Phase 1 - Collecting Data" white paper, available for download from the Related Resources section of the Microsoft Application Compatibility Toolkit 5.5 Download Web page.
· Phase 2: Analyzing Issues. After collecting your inventory and associated compatibility data, you can organize and analyze your issues. This includes categorizing, prioritizing, setting your deployment status, and setting your application assessment to create customized reports. For more information, see the "Microsoft ACT: Phase 2 - Analyzing Issues" white paper, available for download from the Related Resources section of the Microsoft Application Compatibility Toolkit 5.5 Download Web page.
· Phase 3: Testing and Mitigating Issues. After analyzing your compatibility issue reports, you can test your applications, to determine if the specified compatibility issues are actually problems within your organization. If you determine that the issues are valid, you can create mitigation packages to fix the issues, by using the Compatibility Administrator. You can also use the other developer tools, provided with ACT, including the Internet Explorer Compatibility Tool, the Setup Analysis Tool, and the Standard User Analyzer tool, to determine additional issues and possible mitigation strategies. For more information, see the "Microsoft ACT: Phase 3 - Testing and Mitigating Issues" white paper, available for download from the Related Resources section of the Microsoft Application Compatibility Toolkit 5.5 Download Web page
Setting Up Your ACT Environment
Before configuring and running ACT, you must verify that you are running supported software, that you meet the minimum hardware requirements, and that you have configured the required permissions and infrastructure.
Architecture and Supported Topologies
The following diagram (Figure 1) illustrates the interaction among the various ACT components.
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 5

Figure 1: ACT 5.5 Architecture
As shown in the diagram, the ACT 5.5 architecture comprises the following major components: · Application Compatibility Manager (ACM). A tool that enables you to configure, collect, and analyze your data, so you can fix any issues before deploying a new operating system or deploying a Windows® update in your organization. · Data Collection Package (DCP). A Windows Installer (.msi) file created by the ACM for deployment to each of your client computers. Each DCP can include one or more compatibility evaluators, depending on what you are trying to evaluate. · ACT Log Processing Service. A service used to process the ACT log files uploaded from your client computers. It adds the information to your ACT database. · ACT Log Processing Share. A file share, accessed by the ACT Log Processing Service, to store the log files that will be processed and added to the ACT database. · ACT Database. A Microsoft® SQL Server® database that stores the collected application, computer, device, and compatibility data. You can view the information stored in the ACT database as reports from the ACM. · Microsoft Compatibility Exchange. A Web service that propagates application-compatibility issues from the server to the client and enables the client computers to connect to Microsoft via the Internet to check for updated compatibility information. The following diagram (Figure 2) illustrates the supported deployment topologies for an ACT 5.5 installation.
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 6

Figure 2: ACT 5.5 Topology
The diagram shows the supported topologies for ACT 5.5 in their recommended usage order. For example, we highly recommend using the distributed ACT Log Processing Service, ACT Log Processing share, and ACT Database topology, and least recommend using a Consolidated Server.
Important If you choose to employ a topology based on distributed logging with a rollup to your central share, you must move the files to the ACT Log Processing Share before actual processing can occur. You can move the files manually or use a technology like Distributed File-System Replication (DFSR) or any other similar technology already employed in your organization.
Software and Hardware Requirements
The following sections list the software and hardware requirements for using the Application Compatibility Toolkit (ACT) 5.5.
Software Requirements
The following table contains the software requirements for using ACT 5.5.
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 7

Type of Software Supported Versions
Operating System · Windows® 7 · Windows Vista® · Windows Vista with Service Pack 1 (SP1) · Windows XP with Service Pack 2 (SP2) or Service Pack 3 (SP3) · Windows® Server® 2003 with Service Pack 2 (SP2) · Windows® Server 2008 R2 ACT does not support: · The Windows® 2000 Professional operating system and earlier versions Important ACT does support running data-collection packages and compatibility evaluators on Windows 2000. · The Windows NT® Server 4.0 operating system
Database Components After ACT has been installed, it requires one of the following database components: · SQL Server 2008 · SQL Server 2005 · SQL Server 2008 Express · SQL Server 2005 Express Edition Note ACT 5.5 does not support SQL Server 2000 or the Microsoft Database Engine (MSDE).
.NET Framework ACT requires the .NET Framework 2.0 or newer.

Hardware Requirements
The following table contains the minimum and recommended hardware requirements.
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 8

ACT components Minimum Requirements Recommended Requirements
Application Compatibility Manager client and ACT Log Processing Service servers 550-megahertz (MHz) processor with 256 megabytes (MB) of RAM 2.8-gigahertz (GHz) processor with 2 gigabytes (GB) of RAM
ACT client databases 1-GHz processor with 512 MB of RAM 2.8-GHz processor with 2 GB of RAM

Special Requirements for Using the Update Compatibility Evaluator (UCE)
The UCE requires that you use only specific operating systems, fulfill specific hardware requirements, and provide sufficient disk space beyond what is supported for the ACT.
UCE Supported Operating Systems
The following operating systems are supported by the UCE. · Windows 7 · Windows Vista® · Windows XP with Service Pack 2 (SP2) or Service Pack 3 (SP3) · Windows® Server 2008 R2 · Windows® Server® 2003 with Service Pack 1 (SP1) or Service Pack 2 (SP2) · Windows 2000 with Service Pack 4 (SP4) and Update Rollup 1
Important The UCE is not supported on earlier versions of the previously listed operating systems, including Windows NT or any 64-bit operating system.
UCE Supported Hardware Requirements
The following minimum hardware requirements are necessary to run the UCE. · Disk drive. 1 GB of free space · RAM. 256 MB
Disk-Space Usage
By default, the UCE limits its disk space usage to 50 percent of the available disk space. This setting attempts to provide enough padding so that the compatibility evaluator does not use all of the free disk space. During an average deployment, the UCE typically logs at least 100 MB per hour of ETL files. Therefore, if you use a four-hour upload interval, the compatibility evaluator will require at least 400 MB of free space. You can modify the percentage of disk space used in the Advanced Settings dialog box.
Special Requirements for Using the Compatibility Administrator
The Compatibility Administrator requires that you use only specific operating systems.
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 9

· Windows 7 · Windows Vista® · Windows XP with Service Pack 2 (SP2) · Windows® Server 2008 R2 · Windows® Server® 2003 with Service Pack 2 (SP2) · Windows 2000 with Service Pack 3 (SP3) or later
Important The Compatibility Administrator does not support Limited User Account (LUA) mode in Windows 2000.
Special Requirements for Using the Setup Analysis Tool (SAT)
The SAT analysis components and driver (often referred to as the SAT Guest) run on the following operating systems: · Windows XP with Service Pack 2 (SP2) · Windows® Server® 2003 with Service Pack 2 (SP2) · Windows 2000 with Service Pack 4 (SP4) and Update Rollup 1 The SAT components (often referred to as the SAT Host) that are required if you decide to use a virtual environment and an automated setup analysis, run on the following operating systems: · Windows XP and newer versions · Windows® Server® 2003 with Service Pack 2 (SP2)
ACT Database Configuration and Modification Recommendations
The following sections describe the recommended ACT database configurations and modifications.
ACT Database Configuration and Modification
You can create the ACT database, by using one of the following options: · While you are configuring ACT 5.5, you can use the Application Compatibility Toolkit Configuration Wizard (ACT Configuration Wizard) to create a new database. -or- · You can run the .sql file. Refer to the following table for the location, based on your operating system:
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 10

Operating System Location of the CreateDB.sql file
Windows 7 Windows Vista Windows Server® 2008 R2 %SYSTEMDRIVE% \Users\All Users\Microsoft\Application Compatibility Toolkit 5\CreateDB.sql -or- %SYSTEMDRIVE% \programdata\Microsoft \Application Compatibility Toolkit 5\CreateDB.sql
Windows XP with Service Pack 2 (SP2) Windows Server® 2003 with Service Pack 1 (SP1) Windows 2000 with Update Rollup 1 for Service Pack 4(SP4) %SYSTEMDRIVE% \Documents and Settings\All Users\Application Data\Microsoft\Application Compatibility Toolkit 5\CreateDB.sql

ACT Database Role Assignments
You must assign the following database roles to the specified accounts. · You must assign the db_datareader, db_datawriter, and db_owner database roles to the user and local service accounts that will be used to run the ACT Log Processing Service. · You must assign the db_datareader and db_datawriter database roles to the user account that will log on to the computer running the Application Compatibility Manager.
Important If your organization does not allow the assignment of the db_owner database role to a user, then you must grant the following reduced permissions to that specific user for every stored procedure. Without these permissions, the Application Compatibility Toolkit will fail to function for that user. · SELECT · INSERT · UPDATE · DELETE · EXECUTE
Additional ACT Database Recommendations
We also recommend that you make the following changes to the database as part of your deployment planning:
· Create a larger database, including a larger log file–size setting, and then set the growth increments appropriately. If you create a database with the default setting for data storage, then the data portion of the database will have an initial size of 1 megabyte (MB),
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 11

and a growth increment of 1 MB. If you create a database with the default setting for the log-file storage, then the log-file portion of the database will have an initial size of 1 MB and a growth increment of 10 percent. We recommend that you try to maintain a data-to-log file ratio of 5:1 or 4:1. For example, if your data portion is 5 gigabytes (GB), then your log-file portion should be 1 GB. · Change the recovery model of your database. The default recovery model is Full, but we recommend that you change this model setting to Simple. · Separate the hard drives on which you store your data portion and log file portion. The default, unless altered by your SQL Administrator, is for both the data and log files to be stored on the same hard drive. Separating the data from the log files will reduce disk I/O contention.
Configuring the Infrastructure for the Microsoft Compatibility Exchange
You must configure your organization's infrastructure to support the Microsoft Compatibility Exchange, while also protecting your intranet security and stability. The recommended method of configuration requires you to allow the appropriate users, on designated computers, to access the Microsoft Compatibility Exchange through your security and network infrastructure.
To configure the infrastructure to support the Microsoft Compatibility Exchange
· Configure your firewalls and URL scanners to allow access to the Microsoft Compatibility Exchange, as follows: · Allow outbound access for the standard Secure Sockets Layer (SSL) TCP port 443, on any computer running the Application Compatibility Manager. · Restrict outbound access to the Microsoft Compatibility Exchange, allowing access only from designated computers and designated users within your organizations. · Enable access to the Microsoft Compatibility Exchange URL, https://appinfo.microsoft.com/AppProfile50/ActWebService.asmx, (only necessary if passing through a firewall).
Installing ACT 5.5
You can download and install ACT 5.5 from the Microsoft Application Compatibility Toolkit 5.5 Download. For more information about the specific software and hardware requirements, refer to the "ACT 5.5 Software and Hardware Requirements" and the "Special Software and Hardware Considerations" sections of this white paper. Installing ACT 5.5 installs the following tools: · Application Compatibility Manager (ACM). A tool that enables you to configure, to collect, to organize, and to analyze your compatibility data.
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 12

· Internet Explorer Compatibility Test Tool (IECTT). A tool that enables you to collect your Web-based compatibility issues, and shows you results in real time. · Standard User Analyzer (SUA). A tool that enables you to detect issues that can occur in applications running as a Standard User. · Compatibility Administrator. A tool that enables you to resolve many of your potential compatibility issues, before you deploy a new version of Windows to your organization. · Setup Analysis Tool (SAT). A tool that enables you to detect issues that can occur during the installation and the configuration of an application.
Configuring the Application Compatibility Manager
Before you can use the Application Compatibility Manager to collect and to analyze your compatibility data, you must configure the tool. This includes configuring your SQL Server instance and database, your ACT Log Processing Service account, and your ACT Log Processing share.
Using the ACT Configuration Wizard
The Application Compatibility Toolkit (ACT) Configuration Wizard enables you to configure the ACT database, the ACT Log Processing share, and the ACT Log Processing Service account. Before starting this exercise, you must verify the following. · You are an Administrator on the computer. · You have read and write permissions to the database. · Your domain computer has write permissions to the ACT Log Processing Service share. · The ACT Log Processing Service account has read and write permissions to the ACT database for the \$ account. · The ACT client is installed on any computer that acts as an ACT Log Processing Server.
To configure your database and log processing settings
1. On the taskbar, click Start, point to All Programs, point to Microsoft Application Compatibility Toolkit 5.5, and then click Application Compatibility Manager. The Welcome to the ACT Configuration Wizard page appears. 2. Review the information on the page, and then click Next. The Configuration Type Selection page appears. 3. Click one of the following options: · Enterprise configuration. Enables all ACT functionality. You must be an administrator on the local computer to click this option. · View and manage reports only. Enables ACT for creating data-collection packages and analyzing your data. You will not have access to the ACT Log Processing
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 13

Service. 4. Click Next. The Configure Your ACT Database Settings page appears. 5. Enter your information according to the following: · SQL Server. Type the name of the Microsoft® SQL Server™ instance that contains your ACT database, select an existing instance from the list, or click Browse to select from a list of available instances on the network. Click Connect. The Configuration Wizard will then attempt to connect to the database server. After a successful connection occurs, the Database field becomes available. · Database. Type the name of your ACT database and then click Create to create a new database, or select an existing database from the list. Note To configure the settings, you must have read and write permissions to the database. If you do not have the appropriate permissions, you must contact your SQL Server administrator. Additionally, you must install the ACT client on any computer that will act as an ACT Log Processing Server. 6. Click Next. The Configure Your Log File Location page appears. Important The ACT Log Processing Service share requires your domain computer to have write access. Additionally, the ACT Log Processing Service share is opened to the Everyone group, by default. 7. Enter your information, according to the following: · Path. Click Browse to locate the folder where your log files are to be processed. If this folder does not exist, click Make New Folder to create it in the appropriate location. · Share as. The ACT Configuration Wizard automatically fills in this box as you fill in your path location. 8. Click Next. The Configure Your ACT Log Processing Service Account page appears. Important The connection between the Application Compatibility Manager and the SQL Server instance in your organization uses Secure Sockets Layers (SSL). No data is exposed to the public. 9. Click one of the options according to the following: · Local System. Click this option to use your local system account credentials to start the ACT Log Processing Service. The ACT Log Processing Service account must have read and write permissions to the ACT database for the
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 14

\$ account. · User Account. Click this option to use the local computer user to start the ACT Log Processing Service. You must also enter your User Name, Password, and Domain. The user account that starts the ACT Log Processing Service must have Log on as a service user rights. For more information · Click Finish. The ACT Configuration Wizard finishes and starts the Application Compatibility Manager.
Changing Your Preferences
ACT enables you to opt out of the ACT Community, to opt in to the Customer Experience Program, and to stop receiving ACT product update notifications. For more information about each of these preferences, see the "Using the Preferences Tab" topic, located in the ACT Help.
To opt out of the ACT Community
1. On the Tools menu of the Application Compatibility Manager, click Settings. 2. Click the Preferences tab. 3. Clear the Yes, I want to join the ACT Community check box, and then click OK. Note You are a member of the ACT Community by default. If you choose to opt out of the ACT Community, you will still receive compatibility data from the Microsoft online database. However, you will not receive compatibility data from other ACT users.
To opt in to the Customer Experience Program
· From the Preferences tab, select the Join the ACT Customer Experience Program check box, and then click OK.
To stop receiving notifications for ACT updates
· From the Preferences tab, clear the Notify me when a newer version of ACT is available (recommended) check box, and then click OK. Note You will receive ACT update notifications by default, enabling you to receive prompts to download the latest versions. If you opt out of this program, you must manually check for updates on the Microsoft Application Compatibility Toolkit 5.5 download page.
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 15

Troubleshooting
There are several known errors that can occur when configuring the SQL Server database to use with the Application Compatibility Toolkit (ACT) and the ACT Log Processing Service. ACT uses the Microsoft SQL Server database for storing and sharing compatibility-issue data. If you do not use Microsoft SQL Server, you can download and install Microsoft SQL Server Express to run on your local computer. For general information about creating a SQL Server database, see Administering the Database Engine on MSDN.
SQL Server Database Related Issues
The following sections discuss some of the common errors that you might encounter while configuring and accessing your SQL Server database.
Invalid SQL Server Message
If you attempt to connect to a SQL Server database that is not valid, you will receive the following error message: "The SQL Server you entered either does not exist or you do not have the required credentials for access." To correct this error, you must verify the following: · That you are connecting to a valid SQL Server database.
· That you have both read and write permissions for the database. If you do not have read and write permissions to the database, contact your SQL Server administrator. For more information, see the Adding a Member to a SQL Server Database Role topic on MSDN.
SQL Server Version Is Not Valid
If you attempt to connect to an invalid SQL Server version, you will receive the following error message: "The SQL Server you are trying to connect to is not a supported version. Please check the Help documentation to find out about the supported versions of the SQL Server." To correct this error, you must verify that ACT supports your version of SQL Server or SQL Server Express. For more information, see the "Software Requirements" section earlier in this white paper.
Unable To Connect To SQL Server Database
If you are experiencing issues connecting to your SQL Server database, you can try the following steps based on your SQL Server database management version.
To attempt to remedy your SQL Server database connection issues
1. Stop your SQL Server instance by typing C:\>net stop into a Command Prompt window.
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 16

Where MSSQLSERVER is the name of your SQL Server instance. The default name for SQL Server is MSSQLSERVER, while the default name for the SQL Server Express Edition is MSSQL$SQLEXPRESS. 2. Enable the TCP/IP protocol for your SQL Server instance: a. Type C:\>SQLServerManager.msc. The SQL Server Configuration Manager tool appears. b. From the SQL Server Configuration Manager, expand SQL Server 2005 Network Configuration, and then click Protocols for MSSQLSERVER. The associated protocols appear. c. Right-click TCP/IP, and then click Enable. The TCP/IP protocols are enabled. 3. Add firewall port exceptions for your SQL Server instance: a. Type C:\>firewall.cpl. The Windows Firewall tool appears. b. In the Windows Firewall tool, select the Exceptions tab, and then click Add Port. The Add a Port dialog box appears. c. Add a firewall exception for TCP port 1433 (SQL Server) and for UDP port 1434 (SQL Browser), and then click OK. Note The SQL Browser is the service that receives incoming SQL requests, allowing you to access the Microsoft SQL Server Express Edition database from a remote computer. By default, this service is disabled, which means you can only access the database locally. If the Application Compatibility Manager or ACT Log Processing Service is not installed on the same computer as the database, the user will be required to manually start the SQL Browser from the Services tool. 4. Type C:\>net start MSSQLSERVER to start your SQL Server instance. 5. Type C:\>sc config SQLBrowser start= auto to change the configuration of your SQL Browser. 6. Type C:\>net start SQLBrowser to start your SQL Browser.
Invalid Permissions and Database-Creation Issue
You will receive an error if you attempt to create an ACT database using the Application Compatibility Manager or the ACT Configuration Wizard and do not have database-creation permissions for the in-use instance of SQL Server. You can either get the required permissions to the user account, or you can ask your SQL Server administrator to create the database.
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 17

Important If you use a user account to create the database, you must also assign it the role of SQL Server administrator.
To manually grant permissions to a user account
1. In the Microsoft SQL Server Management Studio, expand the Security folder, right-click Logins, and click New Logins. The Login - New dialog box appears. 2. On the General page, type the name of the user account used to create the ACT database. 3. Click Server Roles. The Server Roles page appears. 4. Select the check box next to either sysadmin or dbcreator, granting the appropriate security privileges to the user account, depending on your company policies.
To create an ACT database as a SQL administrator
1. With the SQL query tool, open the CreateDB.SQL file located as specified in the "ACT Database Configuration and Modification Recommendations" section earlier in this white paper. 2. Optionally, search for the text, ACT55, and replace that text with the name of your new ACT database. Note You are not required to change the database name from ACT55. 3. Run the CreateDB.SQL script against your target SQL Server by using SQL Server Management Studio, or by using the OSQL tool, running this command: osql -E -S -I CreateDB.sql 4. On the taskbar, click Start, point to All Programs, point to Microsoft Application Compatibility Toolkit 5.5, and then click Application Compatibility Manager. 5. Click Tools, and then click Settings. The Settings dialog box appears. 6. Modify the Database field to reflect your new database, and then use the Application Compatibility Manager to create your data-collection packages and to view your compatibility reports. Important Your user account must have read and write permissions to the ACT database to view the ACT reports and to use the Application Compatibility Manager.
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 18

Verifying Your ACT Database Permissions for the ACT Log Processing Service
The ACT Log Processing Service also requires read and write access to the ACT database.
To grant permissions to the ACT database
1. From the SQL Server Management Studio, expand the Security folder, right-click Logins, and click New Logins. The Login - New dialog box appears. 2. Complete the following information from the General page: · Login name. Type the name of the account for which you require permissions. If you are using the Local System account for the ACT Log Processing Service, you must provide access to the \$ account, where is the name of the computer running the ACT Log Processing Service. · Default database. Select the ACT database that your user account requires permissions to. 3. Click User Mapping. The User Mapping page appears. 4. Select the check box next to your ACT database, defined above. The database role membership appears. 5. Select the check boxes next to db_datareader and db_datawriter, and then click OK. The user account has read and write permissions to the ACT database. This enables database modification. Important If you continue to experience issues with the ACT Log Processing Service, even while using the Local System account, see the Troubleshooting Kerberos Delegation article on MSDN.
ACT Log Processing Share-Related Issues
The following sections discuss some of the common errors that you might encounter while configuring and accessing the ACT Log Processing Share.
Configuring the Required Privileges for the ACT Log Processing Share
You must have two sets of permissions configured for the ACT Log Processing Service share: · Permission for the data-collection packages that run on your local computers to upload the log files to the ACT Log Processing Service share. · Permission for the ACT Log Processing Service to process the data provided from the share to the ACT client database.
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 19

Note The ACT Configuration Wizard automatically sets these permissions. If you are having trouble writing to the ACT Log Processing Service share or processing the log files from the ACT Log Processing Service share, you must verify that you have the correct permissions at both the share level and the folder level.
Share Level Permissions
You must verify that the Everyone group has Change and Read permissions for the ACT Log Processing Service share folder.
To verify or to change the share-level permissions
1. Right-click the ACT Log Processing Service share folder, and then click Properties. 2. Click the Sharing tab, share the folder, and then click Permissions. 3. Add the Everyone group if it is not already there, and then click the Change and Read permission check boxes in the Allow column.
Folder-Level Permissions (NTFS Only)
You must verify the following permissions: · The Everyone group has Write access. · The ACT Log Processing Service account has List Folder Contents, Read, and Write permissions based on the type of account you are using · Local System Account. You must apply these permissions to the \$ account. · User Account. You must apply these permissions to the specific user.
To verify or to change the folder-level permissions
1. Right-click the ACT Log Processing Service share folder, and then click Properties. 2. Click the Security tab, add the ACT Log Processing Service share account, and then click the List Folder Contents, Read, and Write permission check boxes in the Allow column. 3. Add the Everyone group, if it is not already there, and then click the Write permission check box in the Allow column.
Additional Troubleshooting Notes
If you are still having issues with uploading your log files to the ACT Log Processing Service share, you can try these additional troubleshooting tips:
· If you are going across different domains for the computers running your data-collection packages and the ACT Log Processing Service share, you must provide explicit Write permissions for the Anonymous group to the ACT Log Processing Service share. You must
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 20

also provide these permissions if you are uploading data from a non-domain joined computer. For more information, see Everyone Group Does Not Include Anonymous Security Identifier. · If you are running your data-collection packages on computers using Windows 2000, and uploading your collected data to an ACT Log Processing Service share located in a different domain, in addition to the tip above, you must also explicitly enable null session access for the ACT Log Processing Service share.
Important By enabling the null session access for the ACT Log Processing Service share, you are also enabling Anonymous access. As an alternative to enabling Anonymous access, you can provide similar permissions to the Authenticated users group.
ACT Log Processing Share and Windows Firewall
If your organization has Windows Firewall configured on the computer with your ACT Log Share, your data-collection packages will be unable to copy your log files to your share. This prevents you from seeing your compatibility data in the Application Compatibility Manager. To work around this issue, you can either: · Turn off your Windows Firewall completely before setting up your ACT Log Processing Share. -or- · Continue using your Windows Firewall, but enable the File Sharing option.
ACT Log Processing Share and Workgroup Environments
There are known issues if you intend to use ACT in a workgroup environment. If your organization uses workgroups to share data in a multi-user environment, you must perform the following: 1. Enable the Anonymous Logon group, providing Full Control and Modify permissions to the ACT Log Processing share and dbo-related privileges to the ACT database.
Note Prior to Windows Vista, the Anonymous Logon group was included as part of the Everyone group. 2. Enable the Guest group, providing Full Control and Modify permissions to the ACT Log Processing share. 3. Ensure that you are in a sandbox environment and that you understand the risks associated with using the Anonymous Logon group. 4. Ensure that you monitor the failed ACT logs to verify that the SQL Authentication is working properly.
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 21

ACT Log Processing Service-Related Issues
The following sections discuss some of the common errors that you might encounter while configuring and accessing the ACT Log Processing Service.
Viewing and Assigning "Log On as a Service" Rights
The Application Compatibility Toolkit (ACT) uses the ACT Log Processing Service to process your ACT log files and any communication from your compatibility evaluators. Starting the ACT Log Processing Service requires either a Local System or user account. If using a user account, the \ must have Log on as a service logon rights. Otherwise, the account will be unable to start the ACT Log Processing Service and complete the ACT Configuration Wizard.
Note Built-in computer accounts, such as the Local System account, have this right assigned by default. If the ACT attempts to perform the assignment and does not succeed, we recommend trying the following process.
To view and to assign logon rights
1. In Control Panel, double-click Administrative Tools, and then double-click Local Security Policy. The Local Security Settings window opens. 2. Expand the Local Policies folder, and then click User Rights Assignment. Policies and their associated security settings are displayed. 3. Double-click the Log on as a service policy. The Log on as a service Properties dialog box appears. 4. Verify that your \ account appears. If it does not appear, click Add User or Group. The Select Users or Groups dialog box appears. 5. Add your user account information, click OK, and then click OK again to close the Log on as a service Properties dialog box.
ACT Log Processing Service Fails to Start
If your ACT Log Processing Service is not starting and your logs are not being processed, it might be due to: · A conflict between ACT and your SQL Server database. If both ACT and your SQL Server database exist on the same computer, it is possible that the log-processing service started before your SQL Server service. -or-
Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 22

· The ACT Log Processing Service does not have the right permissions to access and write to the ACT database. Refer to the "Configuring the Required Privileges for the ACT Log Processing Share" section earlier in this white paper more information about how to set these permissions.
Important The ACT Log Processing Service account must be an Administrator account.
To manually restart the ACT Log Processing Service
1. In Control Panel, double-click Administrative Tools, and then double-click Services. The Services window opens. 2. Right-click ACT Log Processing Service, and then click Restart. The ACT Log Processing Service starts. 3. From your event log, verify that the service did not generate issues while starting.

Microsoft ACT: Configuration and Troubleshooting
© 2009 Microsoft Corporation. All rights reserved. 23