It is a well-known fact that most software projects fail. Drawing important lessons from common failures is the goal of Bitter Java. Reusing design patterns is not enough for success: patterns are like partial maps of dangerous terrain. They help, but don't prevent you from getting lost. Bitter Java teaches you how to recognize when you are lost, and how to get back on the right path. It illustrates common pitfalls of Java programming through code examples; it then refactors the code and explains why the new solutions are safe. This book is a systematic account of common server-side Java programming mistakes, their causes and solutions. It covers antipatterns for base Java and J2EE concepts such as Servlets, JSPs, EJBs, enterprise connection models, and scalability. If you are an intermediate Java programmer, analyst or architect eager to avoid the bitter experiences of others, this book is for you. After studying antipatterns in this book such as: Book Reviews "Reading this book is like having a consultant guiding you on various aspects of project design for server-side Java coding...save big bucks by reading this book instead of hiring a consultant."DESCRIPTION
"Not only is this book an incredibly useful tool, but it also manages to be a fairly entertaining read! ...Best of all, this book will leave you with an instinctive sense for the antipatterns that you'll face in your future projects, so you can keep your Java brewing smooth and sweet."
--SitePoint Tech Times
"Bitter Java is an excellent example of not having to reinvent the wheel...a superbly presented guide...an essential, core addition to the Java user's reference shelf collection."
--Wisconsin Bookwatch
--Compunotes.com
Bitter Java ebook
Diposting oleh Ruben nurdiasmanto di 08.13 Label: PROGRAMING 0 komentar
Ebook java Swing
has something for all Java audiences, but is mainly intended for experienced and advanced GUI developers. Each chapter begins with a discussion of relevant classes and interfaces, often interspersed with small example applications to demonstrate key features. The remainder is then devoted to extensive, real-world examples that are explained thoroughly and are often built on top of one another. These examples are the main thrust of this book and make up most of its content. |
Each Swing component is covered in depth with several accompanying examples. The authors have also identified five areas of Swing that deserve significantly more attention than others due to their size and complexity: the text package, the tree package, the table package, MDI environments, and pluggable look and feel. Thus, you will find the examples of this material particularly extensive. Additionaly, the authors have included chapters on five special topics: Java2D, Printing, Accessibility, JavaHelp, and CORBA -- all in terms of Swing.
swingdoc.zip: All chapters in Word '97 format (2.7 MB).
All chapter examples (7.0 MB) can be found here
Diposting oleh Ruben nurdiasmanto di 08.09 Label: PROGRAMING 0 komentar
Intellectual Access to Digital Art-Objects
Erwin Panofsky, arguably one of the most influential thinkers of the modern era, is most commonly associated with his "Studies in Iconology,” a series of lectures published in English in 1955. In these lectures, he describes a theoretical system that allows for interpretations of Renaissance paintings in light of philosophy, classical mythology, and general humanistic knowledge. What was particularly distinctive about this methodology was his claim that it held the key to the history of artistic styles as an expression or manifestation of changing worldviews, or Weltanschauung.
This approach, which had a basis in the philosophical system of Georg Fredrich Hegel, essentially says that the course of human history "resembles a clockwork of wheels within wheels activated by the unfolding spirit of mankind, a spirit that animates art, no less than science, law, or religion, in a precise and determined way" (Gombrich, 1996). Because of this intermingling of fields within the scope of human endeavor, a successful art historian would have to be familiar with most of the other historical disciplines to produce the parallels from philosophy, poetry, and all the other aspects of the past. This interpretative method guaranteed art historians a place in the nexus of the humanities, and allowed Panofsky to find ingenious parallels between art and contemporary (meaning contemporary to the painting) culture.
Download Ebook Intellectual Access to Digital Art-Objects
Read More......Diposting oleh Ruben nurdiasmanto di 09.32 Label: DESIGN 0 komentar
The Design and Implementation of An Object-Oriented Toolkit for 3D Graphics and Visualization
Two important trends are emerging in the computer industry. These are the development of object-oriented systems and the use of more complex user interface methods, especially the use of 3D computer graphics and visualization. Object-oriented systems offer the possibility to create better, more maintainable systems with reusable software components. Computer graphics offers a window into the computer and the virtual worlds created there; and when coupled with visualization, enables users to rapidly explore and understand complex systems. Taken together, these two trends will be major forces as the computer industry moves into the 21st century.
It is clear that 3D graphics and visualization are entering mainstream use. As evidence of this we cite the wide spread use of 3D graphics in the entertainment and gaming industries, and its support on the PC. For example, there are now several 3D graphics software API’s on the PC, including OpenGL [1], and hardware boards ranging in cost from hundreds to thousands of US dollars.
Read More......Diposting oleh Ruben nurdiasmanto di 09.29 Label: COMPUTER, DESIGN, MULTIMEDIA 0 komentar
Ebook Resistance Training for Health
Increasing physical activity and participation in an aerobic endurance exercise program have been shown to decrease the risk of chronic diseases (e.g., coronary heart disease [CHD], stroke, osteoporosis, diabetes, obesity/weight control), which have become the leading causes of morbidity and mortality in the United States. The American Heart Association (AHA) has identified physical inactivity as a primary risk factor for the development of CHD along with cigarette smoking, high blood pressure, and elevated levels of cholesterol. As an intervention, the American College of Sports Medicine (ACSM), the AHA, and the Surgeon General’s Report on Physical Activity and Health all have established guidelines for aerobic exercise programs designed to positively affect health status. These recommendations are based on a preponderance of evidence establishing the effect of exercise on disease prevention (see Figure 14.1).
The effects of resistive type exercise (strength training) on health status have been largely overlooked. Traditionally, strength training has been seen as a means of improving muscular strength and endurance (muscle mass) and power, but not as a means for improving health. There is increasing evidence that strength training plays a significant role in many health factors (see Figure 14.1). The ACSM (1990, 1995), AHA (1995), and the Surgeon General’s Report on Physical Activity and Health (1996) all have recognized the importance of strength training as an important component of health. These organizations have recommended performing 1 set of 8–12 repetitions of 8–10 exercises 2–3 times per week for persons under 50 years of age and the same regimen using 10–15 epetitions for persons over 50 years of age.
The research and rationale for this exercise prescription have been reviewed (ACSM, 1990; Pollock et al., 1994; Feigenbaum & Pollock, 1997). Although greater intensity (fewer repetitions and greater weight) with multiple sets can elicit greater improvements in strength and power, it may not be appropriate for older nonathletic participants. A regimen of 8–12 or 10–15 repetitions appears to be an adequate balance for developing both muscular strength and endurance. The research suggests that 80–90% of the strength gains can be elicited using this regimen compared to the high volume types of programs. Thus, because time is an important factor for program compliance, the above recommended guidelines seem appropriate. Although more research is necessary to confirm the best combination of intensity (repetitions, weight, sets) for older or more fragile participants, it appears that the 10–15 repetition guideline may create less joint stress and injury than the 8–12 repetition program.
Download Ebook Resistance Training for Health
Read More......Diposting oleh Ruben nurdiasmanto di 09.27 Label: HEALTH 0 komentar
Teaching an Old Economy Company New Economy Tricks
In recent years, issues traditionally associated with the field of Technical communication have been increasingly referred to in business settings as "knowledge management." Technical communicators generally contribute to knowledge management through their skills of audience analysis, interviews, and research synthesizing relevant knowledge from volumes of information and compiling that knowledge into printed and electronic forms.
CONTENTS
ABSTRACT
LIST OF FIGURES
CHAPTER
- I. FROM THE INDUSTRIAL AGE TO THE KNOWLEDGE AGE
- Technological Evolutions and Revolutions
Information Age Technology
Digitization
Many Forms of Information
From Information to Knowledge
The New Organizational Wealth
Technical Communication, Rhetoric, and Knowledge Management
Knowledge Management's Multiplicity of Definitions
Uniting Common Perspectives on Knowledge Management
Document-centered Knowledge Management
Technological Knowledge Management
Socio-organizational Knowledge Management
Knowledge Organization
The Spectrum of Knowledge Management
II. KNOWLEDGE MANAGEMENT AND ACME IT
- The Codification and Personalization Approaches to Knowledge Management
Barriers to Integration
Drivers for Integration
Acme IT's Knowledge Management Initiative
What Acme IT Does
Reorganizing Acme IT
Strategic Vision of the Knowledge Management Initiative
Measuring the Value of Knowledge Management: Tangible and Intangible
Business Context for Knowledge Management
Communities Within the GKMI
Uniting Codification and Personalization Approaches to Knowledge Management
m. METHODOLOGY
- NATURALISTIC INQUIRY
Emergent Design
THE CASE STUDY
THE EXPLORATORY STAGE
Stages Two and Three: Interviews and Participant Observation
Interviews
Observation
Quality Criteria for the Study
IV. DATA COLLECTION
- Introduction
Acme IT From the Outside In
Contrasts and Conflicts in Leadership
Interviews
Absence of KM Training and Education
Communication
Control
Final Comments on the Data Presented
V. CONCLUSIONS
- The Old Economy
The Old Economy and Codification Approaches to Knowledge Management
The New Economy
The New Economy and Personalization Approaches to Knowledge Management
An Old Economy Company in New Economy Clothes
Knowledge Management: A General Business Strategy for the New Economy
Knowledge Management Meets the Old Economy Filter
A Final Though On Old Economy Companies and Knowledge Management
VI. KNOWLEDGE MANAGEMENT AND TECHNICAL COMMUNICATION
- Core Competencies of Technical Communication and Knowledge Management
Leadership Opportunities for Technical Communicators
Where the Puck is Going to Be: The Future of Knowledge Management
Opportunities for Technical Communicators
BIBLIOGRAPHY
Diposting oleh Ruben nurdiasmanto di 09.25 Label: BUSINESS 0 komentar
The Economic Feasibility of Ethanol Production From Sugar in The United States
The Central American—Dominican Republic—United States Free Trade Agreement (CAFTADR) focused the attention of many in the U.S. sugar industry on the feasibility of converting sugar into ethanol as a new market opportunity for sugar beet and sugarcane producers, as well as a means to help support sugar prices received by producers by reducing the supply of sugar for food use in the domestic market.
The purpose of this report is to investigate the feasibility of producing ethanol from sugar feedstocks in the United States. In the production of ethanol from sugar, five potential feedstocks are examined in this report. These feedstocks include: (1) sugarcane juice, (2) sugar beet juice, (3) cane/beet molasses, (4) raw sugar, and (5) refined sugar. Estimated costs of producing ethanol from these feedstocks are presented along with a discussion of future technologies that may have the potential of reducing the cost of converting sugar feedstocks into ethanol. Comparisons of the cost of producing ethanol from sugar feedstocks are made with grain feedstocks, primarily corn.
Download Ebook The Economic Feasibility of Ethanol Production From Sugar in The United States
Diposting oleh Ruben nurdiasmanto di 09.24 Label: BUSINESS 0 komentar
Does Money Always Make People Happy?
In standard overlapping generations models [e.g. Samuelson(1958), Wallace(1980), Tirole(1985)], the valuation of the intrinsically useless asset, or fiat money, is benign to all agents: every agent in the economy becomes happier when money has positive value than when it does not. As is widely known, markets in some of those economies fail to achieve efficient allocation unless incomes are appropriately transferred across generations. If money is demanded as a store of value, it promotes such transfers and, as a result, improves economic welfare
his paper, however, gives another picture of fiat money not so rosy as the above. In the model of this paper, the valuation of fiat money may be malign to the generations bom in and after the first period. Roughly speaking, this result is brought about by the installation of the following externality in a Wallacian overlapping generations economy: the rate-of-return on physical investment is a decreasing function of the value of money; and dominates the rate of population growth when money is valueless. Owing to the externality, the valuation of money lowers the rate-of-return on physical investment. This implies that the interest rates when money is valued are lower than those when it is not, because arbitrage equalizes the rate-of-return on money with that on physical investment. As the result of this decline in interest rates, the agents except the initial old are worse off when money has positive value.
In this model, the valuation of fiat money is not due to the dynamic inefficiency of nonmonetary economy but to the above-mentioned externality. Notice that money and externality explain each other in this model: the externality is not activated unless money has positive value; at the same time, money cannot have positive value unless the externality is activated. That is, the valuation of fiat money activates the externality, which, in turn, causes the valuation of money by lowering the rate-of-return on physical investment. This is how fiat money is valued in this model. In the following sections the externality is not simply assumed but derived from uncertainty and asymmetric information (moral hazard).
Download Ebook Does Money Always Make People Happy? Read More......Diposting oleh Ruben nurdiasmanto di 09.23 Label: BUSINESS 0 komentar
The Korean Financial Crisis: A Banking Perspective
Is the Korean miracle over? Can we say the same about the East Asian miracle? Did those miracles ever exist? Krugman (1994) argues that East Asia’s economies did not experience significant productivity growth despite their rapid growth. The implicit prediction was that sooner or later the bubble would burst. The current crisis facing the East Asian economies seems to bear out the dire prediction. Even economists who do not share Krugman’s perception of the East Asian miracle agree that structural change is needed if the region’s economies are to regain their dynamism. The main purpose of this paper is to explore Korea’s economic and financial difficulties in some detail so as to gain a deeper understanding of the dynamics of the East Asian crisis.
Bernanke and Blinder (1988) show the importance of credit channels in a modern monetary economy. Vegh and Edwards (1997) expand upon this line of research to explain shock propagation. By applying the same methodology to financial crises, we can better explain the Korean crisis in terms of a credit crunch. This is the basic approach of this paper, and we try to open the “black box” in the manner of Bernanke and Gertler (1995).
The research strategy of this paper is as follows. By developing a model of financial institutions, we show their vulnerability to shocks. We also show that different prudential measures differ in their effectiveness in reducing such vulnerability. Based on a simple model, we discuss the shock propagation mechanism in a macroeconomic framework. Section 2 provides a simple description of the Korean economy both before and after the foreign exchange crisis.
Section 3 develops a simple model to explain the behavior of financial institutions in Korea. Section 4 presents the results of a simulation analysis performed to test the propositions stated in Section 3. Section 5 addresses the implications of these propositions for Korea’s financial crisis. Section 6 discusses the economy after the shock. The paper concludes with section 7.
Download Ebook: The Korean Financial Crisis A Banking Perspective
Read More......Diposting oleh Ruben nurdiasmanto di 09.21 Label: BUSINESS 0 komentar
Free PDF Ebooks INTERIOR DESIGN
The Interior Design Program at Georgian College is dedicated to providing our students with a broad-based proficiency in interior space design and physical space management that will enable graduates to proceed to productive and rewarding professional careers in interior design. The 3-Year Interior Design Diploma is recognized by the Association of Registered Interior Designers of Ontario (ARIDO). Graduates are eligible to become Intern Members of ARIDO. After the requisite four years of experience, Interns who successfully complete the NCIDQ (National Council for Interior Design Qualification) examination achieve Registered Interior Design status in Ontario.
Download Free PDF Ebooks INTERIOR DESIGN
Diposting oleh Ruben nurdiasmanto di 09.15 Label: DESIGN 0 komentar
Toyota Prius ICONIC 2004-2009 model User-Guide
For safety, stepping on the brake before starting has always been highly recommended in all types of vehicles anyway. But in Toyota Prius, it is required. Because if you don’t, you’ll find that only the accessories will power-up. The hybrid system itself won’t start until you push the power button while also stepping on the brake at the same time.
If you do make the mistake of not pressing the brake pedal far enough to the floor, a collection of warning the lights by the speedometer will come on. In that case, lift your foot off the brake. Wait a few seconds, and then press it again... only harder this time. Wait a few more seconds, and then press the PARK button. That will reset the system.
Content
DRIVING
- Just Drive It !
Startup
Shutdown
Cruise-Control
Neutral
Reverse
Hybrid Driving
Brakes
Stealth Driving
"B" Mode
Charge-Level
Radio
Multi-Display
Steering-Wheel
CD Player
Audio Buttons
Inside Air
Outside Air
UNDERSTANDING
- MPG Measurement
Increasing MPG
EPA Estimates
Seasonal Cycles
Emissions
Gas Prices
NURTURING
- Filling the Tank
Multi-Display Care
Long-Term Storing
Polishing
Tire Care
Tire Upgrades
Washing
Valet Use
Grille Blocking
MAINTENANCE
- Oil Changes
Engine Air-Filter
Window Wipers
Fuel Door
Air-Conditioning
OPTIONS
- SKS: Smart-Entry
SKS: Smart-Start
SKS: FOB Battery
Homelink
Electrochromic Mirror
Navigation
Bluetooth
Voice-Recognition
VOICE-RECOGNITION
- Help
Navigation - Commands
Navigation - Locations
Audio
Climate
Screen
OTHER
- Battery-Pack
Rear Hatch
External Cargo
Side Mirrors
Internal Storage
Operational Details
Transmission
Information Sources
Informational Materials
Diposting oleh Ruben nurdiasmanto di 09.13 Label: MANUAL EBOOK 0 komentar
Nokia 6085 User Guide
To use some of the network services, such as mobile internet services, MMS, or remote internet server synchronization, your phone needs the correct configuration settings. Your service provider may have pre-loaded the settings on the phone. If not, you may be able to receive the settings directly as a configuration message.
After receiving the settings, you must save them on your phone. The service provider may provide a PIN that is needed to save the settings. For more information on availability of the settings, contact your service provider.
When you receive a configuration message, Configuration sett. received is displayed.
To save the settings, select Show > Save. If the phone requests Enter settings' PIN:, enter the PIN code for the settings and select OK. To receive the PIN code, contact
the service provider that supplies the settings. If no settings are saved, these settings are saved and set as default configuration settings. Otherwise, the phone asks Activate saved configuration settings?
To discard the received settings, select Show > Discard.To edit the settings, see “Configuration,” p. 76.
Download Free Nokia 6085 User Guide
Read More......Diposting oleh Ruben nurdiasmanto di 09.11 Label: MANUAL EBOOK 0 komentar
PDF MICROSOFT ACCESS 2003 TUTORIAL
Microsoft Access is powerful software designed for PC. It allows you to create and manage databases. A database is an organized body of related information that is arranged for ease and speed of search and retrieval. Some of the examples of databases are: Jerome Library online catalogue, telephone directories, address books, cookbooks, tour books, etc. Most BGSU offices and departments work with Access as their database application. The examples in this tutorial present common features of databases used on campus.
Download Free PDF Ebooks MICROSOFT ACCESS 2003 TUTORIAL
Diposting oleh Ruben nurdiasmanto di 09.10 Label: COMPUTER 0 komentar
Security in MySQL :pdf
When thinking about security within MySQL you should consider a wide range of possible topics and how they might affect the security of your MySQL server and related applications.
All of the following are issues that you should be aware of:
- • Security of the installation itself. The data files, log files, and the all the application files of your installation should be protected to ensure that they are not readable or writable by unauthorized parties. For more information, see Chapter 2, Post-Installation Setup and Testing.
• Access control and security within the database system itself, including the users and databases granted with access to the databases, views and stored programs in use within the database. For more information, see Chapter 3, The MySQL Access Privilege System, Chapter 4, MySQL User Account Management.
• Network security of MySQL and your system. The security is related to the grants for individual users, but you may also wish to re-strict MySQL so that is only available locally, or to a limited set of hosts.
• Security of your application to ensure that SQL injections and other corruption of the data does not occur. See Chapter 1, General Security Issues.
• Ensure that you have adequate and appropriate backups of your database files, configuration and log files. Also be sure that you have a recovery solution in place and test that you are able to successfully recover the information from your backups.
General Security Issues
This section describes some general security issues to be aware of and what you can do to make your MySQL installation more secure against attack or misuse. For information specifically about the access control system that MySQL uses for setting up user accounts and checking database access, see Chapter 3, The MySQL Access Privilege System.
For answers to some questions that are often asked about MySQL Server security issues, see MySQL 6.0 FAQ — Security.
Post-Installation Setup and Testing
After installing MySQL, there are some issues that you should address. For example, on Unix, you should initialize the data directory and create the MySQL grant tables. On all platforms, an important security concern is that the initial accounts in the grant tables have no passwords. You should assign passwords to prevent unauthorized access to the MySQL server. Optionally, you can create time zone tables to enable recognition of named time zones. The following sections include post-installation procedures that are specific to Windows systems and to Unix systems. Another section, Section 2.2.3, “Starting and Troubleshooting the MySQL Server”, applies to all platforms; it describes what to do if you have trouble getting the server to start. Section 2.3, “Securing the Initial MySQL Accounts”, also applies to all platforms. You should follow its instructions to make sure that you have properly protected your MySQL accounts by assigning passwords to them. When you are ready to create additional user accounts, you can find information on the MySQL access control system and account management in Chapter 3, The MySQL Access Privilege System, and Chapter 4, MySQL User Account Management.
The MySQL Access Privilege System
The primary function of the MySQL privilege system is to authenticate a user who connects from a given host and to associate that user with privileges on a database such as SELECT, INSERT, UPDATE, and DELETE. Additional functionality includes the ability to have anonymous users and to grant privileges for MySQL-specific functions such as LOAD DATA INFILE and administrative operations.
MySQL User Account Management
A MySQL account is defined in terms of a user name and the client host or hosts from which the user can connect to the server. The account also has a password. There are several distinctions between the way user names and passwords are used by MySQL and the way they are used by your operating system.
Backup and Recovery
It is important to back up your databases in case roblems occur so that you can recover your data and be up and running again. MySQL offers a variety of backup strategies from which you can choose to select whatever methods best suit the requirements for your installation.
Questions
• 7.1: Does MySQL 6.0 have built-in authentication against LDAP directories?
• 7.2: Where can I find documentation that addresses security issues for MySQL?
• 7.3: Does MySQL 6.0 include support for Roles Based Access Control (RBAC)?
• 7.4: Is SSL support be built into MySQL binaries, or must I recompile the binary myself to enable it?
• 7.5: Does MySQL 6.0 have native support for SSL?
Ebook Security in MySQL Download Now>>
Diposting oleh Ruben nurdiasmanto di 09.08 Label: COMPUTER 0 komentar
joaquin phoenix letterman parting shots
Two Lovers” is the kind of highbrow movie many actors would consider a great showcase: a small, personal film with a demanding central role opposite an Oscar-winning actress. Joaquin Phoenix, the star of the new drama, sees "Two Lovers" in a very different light -- his swan song.
Phoenix's retirement from acting -- which he insists is neither a joke nor a publicity stunt -- has transformed the film's Friday launch into a circus nearly as surreal as anything staged by Fellini or Cirque du Soleil.
"I didn't think it would get this attention," Phoenix says. "I didn't think anybody would care."
The star of "Walk the Line" and "Gladiator" announced last fall that he was quitting acting to pursue a career in music, saying that "Two Lovers" would be his final turn in front of movie cameras. News of the unusual declaration -- Phoenix is just 34 years old and considered one of the top acting talents of his generation -- is threatening to eclipse the film itself, seriously testing the long-standing adage that there's no such thing as bad publicity.
"I have no idea if it helps or hurts," the film's writer-director, James Gray, said at the end of a recent day of publicity for the film, in which Phoenix was trailed by a documentary film crew under the direction of actor (and Phoenix's brother-in-law) Casey Affleck, who is chronicling Phoenix's career transformation. "But my instinct is it's pretty good for the film," Gray says. "It's a small movie, and it wouldn't have gotten a lot of press otherwise."
It's not just Phoenix's retirement (and, more notably, the media's coverage thereof) that is overshadowing the story of "Two Lovers," Gray's examination of the complicated emotional and romantic life of a middle-aged man struggling with mental illness.
At the same time, "Two Lovers" costar Gwyneth Paltrow is attracting a ton of attention too. But it's not for her increasingly rare film work or even her marriage to Coldplay frontman Chris Martin. Instead, the focus has been on the "Shakespeare in Love" actress' new self-help website ( www.goop.com), and not all of the coverage of her luxurious lifestyle tips has been very kind.
"While it's nice to get the attention and get the film's name out, it's a double-edged sword, because it's not reflective of the film," says Eamonn Bowles, whose Magnolia Pictures is releasing "Two Lovers" in New York and Los Angeles on Friday, while the film already is available through video-on-demand services. "The film is anything but a tabloid diversion. It's a soulful, serious, almost old-school story. And we don't want the tabloid fodder to overwhelm the film."
"Two Lovers," which premiered at last May's Cannes Film Festival, is hardly a lightweight romance: The film opens with Leonard (Phoenix) attempting to commit suicide. Leonard, who has moved back in with his parents following a canceled engagement, is soon entangled in two women's lives.
Michelle (Paltrow) is a Brooklyn neighbor who is having an affair with a married man, while Sandra (Vinessa Shaw) is a family acquaintance who is a healthier choice for the emotionally unstable Leonard.
Gray says that he wrote his script with Phoenix (who was in Gray's "The Yards" and "We Own the Night") and Paltrow in mind, and was inspired by the Dostoevsky short story "White Nights," which has been turned into half a dozen other movies.
"I think he's fantastic in the movie," Gray says of Phoenix. "If it's his last movie, I think it would be really sad. He's a wonderfully talented guy, and he has a lot to give the world. But he said over and over again, 'I don't like doing this anymore. I'm tired.' He looked exhausted at the end of the movie. At the end of the process, I saw him quite beaten. I have never met anyone as serious as an artist as him, and he doesn't care what anyone thinks."
That includes the actor's appraisal of his own work. Asked if Phoenix thinks that "Two Lovers" would be a fitting final chapter for this cinematic career, he shrugs, saying that he hasn't watched it. "I don't see the movies I do," Phoenix says. "Why would I?"
Looking more like a hard-living rock star than a matinee idol, Phoenix conducted his interview with matted, disheveled hair, an unruly beard, tattered clothes and dark sunglasses. While some have dismissed his retirement as an Andy Kaufman-style prank, commenting endlessly about his legendary Las Vegas performance, where he lost his balance and toppled off the stage, Phoenix says his switch from multiplex to recording studio is dead serious, a path he began steering toward years ago. Indeed, Phoenix sang all of Johnny Cash's songs in "Walk the Line," for which he was nominated for an Academy Award.
"It's something that I have been doing for a while," Phoenix says, lighting up a cigarette and sipping a Snapple. "I don't want to film right now. . . . It's not satisfying."
Phoenix says he is in a recording studio every day, working to finish an album that he hopes will be completed in a few months. He says the music is hard to categorize and that, while it will include raps, the mix will be eclectic and unpredictable. "I want to do wild, out-there" stuff, he says.
Which also describes how the "Two Lovers" press day unfolded. Journalists interviewing Phoenix were asked if Affleck could film the sessions as part of his documentary, which made the proceedings feel more like "This Is Spinal Tap" performance art than a publicity tour, especially when Phoenix reenacted his Las Vegas stage stumble.
"It really started out innocently," Phoenix says of having Affleck shadow him. "I was in the studio, recording, and I wanted a document of that experience. I wish there was footage of Public Enemy making 'It Takes a Nation of Millions to Hold Us Back,' " he says of the seminal 1988 hip-hop album.
Phoenix says that as a young actor he would walk by movie sets, smell the acrid scent of colored gels smoking in front of hot stage lights and become intoxicated. "I want to get in there, I want to get in there," he says of how was drawn to acting. "But I haven't had that feeling in a while . . . and my mom always told me, 'Be true to your heart.' "
He says that while he has no idea whether he can succeed as well in music as he has in movies, he needs to do what he finds fulfilling. When it comes to acting, he says, "there are too many other elements that are a part of moviemaking that I just find unbearable." Phoenix doesn't spell them all out, but it's clear it became more of a job and less of a "mystifying" creative endeavor.
"I was excited by it," he says of performing in front of a camera. "And then it starts to become this thing."
What's also clearly changed is that the kind of movies Phoenix has been drawn to are not always films audiences care for. Although 2005's "Walk the Line" grossed more than $180 million worldwide, Phoenix's more recent movies have been far less popular, with 2007's "Reservation Road" barely grossing $100,000 domestically. "I just think audiences have become more selective," he says.
That is likely to be the case with "Two Lovers," and Phoenix knows it. As the actor was winding up his unusual day of interviews, he picked up a mounted copy of the film's poster only to discover that another poster was glued to the back, from November's hit " Four Christmases."
"This is how you make money," Phoenix says, looking at the "Four Christmases" poster before turning it around. "And this is how you don't."
source :www.latimes.com
Diposting oleh Ruben nurdiasmanto di 04.07 0 komentar