Tampilkan postingan dengan label News. Tampilkan semua postingan
Tampilkan postingan dengan label News. Tampilkan semua postingan

Behind of Bluetooth wireless device

Posted by Android On Senin, 19 September 2011 0 komentar

Bluetooth is the industry specification for personal area networks (personal area networks, or PAN) without wires. Bluetooth connects and can be used to perform the exchange of information between devices.

Spesification of Bluetooth devices was developed and distributed by the Bluetooth Special Interest Group. Bluetooth operates in 2.4 GHz frequency band using a frequency hopping traceiver capable of providing voice and data communication services in real time between bluetooth host-host with limited distance.weakness of this technology is a short range and low data transfer capability.


The presence of bluetooth makes a person no longer mess around with what cable, what color, heading nowhere, and must be plugged in where. The function of the interconnection between the equipment can be replaced by bluetooth chipset that is placed in a built-in electronic equipment related.

The name "Bluetooth" is derived from the name of the king at the end of ten centuries, Harald Blatand which in England is also called Harald Bluetooth. Connotation is not so far wrong, because according to mythology story, supposedly Bluetooth-haired and dark skinned. He likes to eat blueberries or strawberries, then it is worth when the tooth Blatand become bluish or blue tooth.

He is the king of Denmark who has managed to unite the tribes that previously fought, including the tribes of the area now called Norway and Sweden. Even the Scania region in Sweden, where bluetooth technology is found to also include territories. King's ability as a unifier is also similar to bluetooth technology now that can connect various devices such as personal computers and mobile phones.

While the Bluetooth logo comes from the German unification of the two letters which are analogous with the letter H and B (short for Harald Bluetooth), namely H (Hagall) and Runic letter (Blatand) which are then combined.

Beginning of Bluetooth is a wireless communication technology (without cable) that operate in the 2.4 GHz unlicensed frequency band ISM (Industrial, Scientific and Medical) using a frequency hopping transceiver is capable of providing voice and data communication services in real-time between bluetooth host-host with limited service reach distance (around 10 meters).

Bluetooth card that uses the IEEE 802.11 radio frequency standard with a limited range of services and lower ability to transfer data from card to Wireless Local Area Network (WLAN).

Bluetooth formation promoted by five large companies Ericsson, IBM, Intel, Nokia and Toshiba to form a Special Interest Group (SIG), which launched this project. In July 1999 document bluetooth specification version 1.0 was launched.

In December 1999 started again making bluetooth specification documents version 2.0 with the addition of four new promoters of 3Com, Lucent Technologies, Microsoft and Motorola. Currently, more than 1800 companies in various fields to join in a consortium as an adopter of bluetooth technology. Although the standard Bluetooth SIG is currently 'owned' by the promoter group but he is expected to become an IEEE standard (802.15).
READ MORE

New Feature in technology HDMI V.1.4

Posted by Android On Minggu, 10 April 2011 0 komentar


Technology HDMI 1.4 cables now could make you transfer Internet data in the same cable when currently transfers only video and audio data. with this solves problems for people who have an awful time connecting devices to the web and each other in the living room. I use powerline Internet adapters, which connect my DSL broadband line to my living room via power sockets. Wireless doesn’t work so well in my home. So right now, you have to switch cables from one game console to another whenever you use them. It’s a hassle.

HDMI connects devices such as Blu-ray player to a TV set with no loss in the high-definition video quality. All new TVs have the HDMI connectors, as do many other video appliances. HDMI is keeping up with the times. About 24 percent of all consumer electronics devices will require Ethernet in 2009. With more devices connected to the Internet, this new connector means that you will be able to access your content via the Internet on more of your future home devices. The Ethernet connection enables a variety of new applications, such as the ability to play a video on a Blu-ray player on any web-connected TV in your home.

Audio Return Channel so you can connect your stereo to your TV and have it play music on your TV set, even as you get rid of a cable. And HDMI 1.4 has Automatic Content Enhancement, which optimizes the settings on your TV to fit whatever movie or video you’re playing. It also has 3-D support and support for higher resolution video of 4,000 x 2,000 pixels. And another new feature is a complete color palette that allows you to connect almost any HD digital still camera and show the pictures with the highest viewing quality on your TV. Sometimes TVs don’t have the breadth of color to display still pictures well.

one more another feature is the Micro HDMI connector. This connector is about the size of a mini universal serial bus (USB) connector. It can likely be built into cell phones in the future to let you play back high-definition video recorded with a cell phone camera on a TV. I recently saw a demonstration of that at Broadcom’s offices in Sunnyvale, Calif. It looked pretty cool.

READ MORE

Microsoft Surface : the new Generation of multi touch Computer

Posted by Android On Rabu, 17 November 2010 0 komentar


Microsoft Surface is more than a computer. It’s a leap ahead in digital interaction. By enabling you to use your hands instead of a keyboard and mouse, it revolutionizes the way you interact with digital content, while keeping the ability to connect with other devices such as networks, printers, mobile devices, card readers, and more. Our Microsoft Surface Partners have created hundreds of applications for the platform.

Microsoft Surface is currently based on the Windows Vista platform, which makes it especially easy for companies to manage, deploy and support Microsoft Surface units. The current version for the software platform is Microsoft Surface 1.0 Service Pack 1, which enhances Surface with an enhanced user interface, improved manageability to help reduce the cost of ownership, broader international support, and faster, easier ways to design innovative applications. Read more about Service Pack 1 on the Microsoft Surface Blog.

The sophisticated camera system of Surface sees what is touching it and recognizes fingers, hands, paintbrushes, tagged objects and a myriad of other real-world items. It allows you to grab digital information and interact with the content through touch and gesture. And unlike other touch-screens, Surface recognizes many points of contact simultaneously, 52 to be exact. This allows multiple people to use Surface at the same time, creating a more engaging and collaborative computing experience than what is available via traditional personal computers, mobile devices, or public kiosks.

Tagged object recognition is a particularly innovative feature of Microsoft Surface. The tag is what lets Surface uniquely identify objects, helping the system tell the difference between two identical looking bottles of juice, for example. Applications can also use a tag to start a command or action, so simply placing a tagged object on the screen can open up a whole new experience. A tagged object might also identify a cardholder, so they can charge purchases or participate in a loyalty program. A tag can even tell Surface to display unique information about a tagged object, such as showing more information about a bottle of wine, the wine grower, the type of grape and vintage.

a Microsoft Surface unit is a PC that is running the Windows Vista Business operating system, so in some ways, a Surface unit is like a desktop computer or a server. The units include all of the standard manageability features that are available in Windows Vista to enable easy deployment and administration, including Windows Management Instrumentation (WMI), Remote Desktop Connection, Windows Scripting Host, Event Viewer, Performance Monitor, Event Forwarding, Task Scheduler, and so on. You can also use enterprise management tools like the Microsoft System Center family of products to deploy software, maintain patches, manage configuration, and monitor health.

You can also deploy Microsoft Surface units to remote locations away from the immediate reach of an IT administrator and then use remote management tools and scripting to accomplish administration tasks, such as taking a unit offline, installing applications, monitoring the unit, managing updates, and recovering the system.
Microsoft Surface represents a fundamental change in the way we interact with digital content. Leave the mouse and keyboard behind. Surface lets you grab digital content with your hands and move information with simple gestures and touches. Surface also sees and interacts with objects placed on the screen, allowing you to move information between devices like mobile phones or cameras. The result is a fun, social and exciting computing experience like you’ve never had before.

Microsoft Surface has four key capabilities that make it such a unique experience:

* Direct interaction. Users can grab digital information with their hands and interact with content on-screen by touch and gesture – without using a mouse or keyboard.
* Multi-user experience. The large, horizontal, 30 inch display makes it easy for several people to gather and interact together with Microsoft Surface - providing a collaborative, face-to-face computing experience.
* Multi-touch. Microsoft Surface responds to many points of contact simultaneously - not just from one finger, as with a typical touch screen, but from dozens of contact points at once.
* Object recognition. Users can place physical objects on the screen to trigger different types of digital responses – providing for a multitude of applications and the transfer of digital content to mobile devices.

Microsoft Surface uses cameras and image recognition in the infrared spectrum to recognize different types of objects such as fingers, tagged items and shapes. This input is then processed by the computer and the resulting interaction is displayed using rear projection. The user can manipulate content and interact with the computer using natural touch and hand gestures, instead of a typical mouse and keyboard.
READ MORE

VoIP System Standart Features

Posted by Android On Selasa, 09 November 2010 0 komentar
Voice over IP (VoIP) systems today are gaining in popularity today for several reasons, most notable are the availability of so many open source and commercial options, the high degree of available interface devices that allow you to connect to existing circuit based networks and hardware, and the ability to create full end to end IP based solutions using available high-speed links or gateways with commercial trunk providers. However, it is still easy to make a poor purchasing decision unless you take a good look at the basic requirements of what a communication system needs to provide to be effective in your business and help you achieve your cost savings while still maintaining your ability to be connected to your clients and vendors in an effective manner. My intent here is to help outline the 5 standard features that your VoIP system should have for it to be considered the proper solution for your enterprise.

Examination

Standardization and Flexibility

Just like Henry Ford grew the automobile business based upon the obvious concept of standardization, the VoIP industry gained its recent focus and popularity based upon the same ideals. Gone are the days of having to select and architect a solution based upon the supported protocols of one vendor and become locked in. The two major signaling protocols you will see today, H.323 and SIP are the largest players, with H.323 starting to lag behind as SIP gains in popularity and support, more compliant vendors, and continued enhanced to support more media streams and tighter device integration that up until recently has been what was keeping H.323 ahead in the game. Keeping in mind that H.323 is still the more mature technology, currently it is holding its ground in the carrier space and is used quite extensively as a trunk side protocol. This has allowed SIP to comfortably gain foothold in the enterprise space as a local carrier style protocol that is simpler to implement, troubleshoot, and extend with new features as needed. It is clear that for a system to be considered future proof it has to support the currently prevalent standards but also allow ‘plug ability’ and offer support for emerging standards, or alterations to the existing standards as well.

Integration Options

Unless you are starting from scratch you are most likely attempting to integrate a VoIP option into your existing infrastructure as part of a phased deployment strategy. The current list of options to accomplish this is growing longer and longer every day, and that has many benefits for the consumer with regards to architecture, cost, interoperability options, and the quicker movement to tighter standards compliance between vendors. There is no longer a need to consider the move to VoIP to be an all or nothing deal with the introduction of gateway devices that allow you to leverage your current investment in older TDM based equipment and enhance it with the newer IP based messaging solutions. Doing this allows you to add new devices to the newer IP network while maintaining a rich level of integration with the legacy TDM equipment until it lives out its natural (and still depreciable) life span.

Security

As with everything today, security is a huge consideration when you start to think about moving to VoIP. If it is not something that you have already though about, or your vendor has not discussed it deeply with you then I urge you to stop reading this right now, go to your vendor and ASK how secure your current VoIP implementation (or the one you are planning to install) is.

Security is so critical in today’s business market, but because people have felt so safe in the past using TDM voice infrastructures where ‘tapping’ meant actually making a physical connection to the ‘wires’, the thought of security quite often eludes people when you starting the talk about VoIP. It is so easy to fire up a copy of Wireshark on your network, collect some packets, and use the tools built right into the GUI to listen to VoIP conversations. So, what do you do? The answer is simple. You turn on encryption and ensure that every device you use within in your IP infrastructure involved in the call supports the encryption scheme that you pick. Keep in mind that while encryption is good, it does add CPU load to your devices, can cause higher network utilization because the packets can get larger, and can add complexity to any troubleshooting efforts, but you should NOT implement any VoIP system without taking security into consideration. One fine option that I have used is to consider your internal network to be secure and just encrypt the calls that pass via IP between external parties (over your IP based trunks if you use them) or between all your company locations using the public IP network. It’s my feeling that as long as you keep your internal IP infrastructure secure (IE: tight controls on who can enter your IT area, and you are using switches rather than hubs), bothering to encrypt internal IP connections is not always needed because in a properly configured environment you will not be able to capture VoIP data other than what is directed to you. If you are using hubs then all bets are off of course. That is a subject for another article.

Support

As with most other technologies, part of your purchasing and deployment planning MUST be to take the support model into consideration. Don’t just assume that your existing vendor that supports your current internet connection to the external world is going to be there if you have IP trunk problems, understand what terminology like QoS, jitter, and other VoIP lingo means, or even how to correct them if problems occur. As when introducing any new technology you need to have a sit-down with everyone involved in the proposed value chain and establish an understanding of expectations, possible support needs, costs, and schedules. You may find out that your provider is by default blocking the native ports that the typical VoIP protocols require simply because they are not used to requiring them to be open for other clients. If you are ready to move to IP for your voice communications just understand that while you may have been willing to put up with slowness in the afternoons when you tried to use the web to order your dinner so you could pick it up on the way home, a slow data connection can wreak havoc with voice quality and the ability to establish a call. You may need to consider a separate IP connection just dedicated to voice, and in fact you may need to start considering redundant connections using two different providers for your voice if you have not already done so for your data. Additionally, ensure that your vendor has the proper debugging tools in place, knows how to use them, and is willing to offer training to your staff, or that you are willing to use third parties to get them trained, so that they can be used to keep the system running in top condition. Remember that voice communication is still considered a top priority in today’s business world and loosing that, even for a few hours, can make a customer start looking for someone to replace you as a vendor.

Extension Points

Many people today are used to just using the phone to talk, or maybe send faxes, but once the move to IP is made the benefits will start to bring on questions about other methods of application integration, and additional ways to leverage the new communications system. One thing that you should always consider on any new system, not just VoIP, are ways that you can utilize it going forward for things other than just your current needs. A car would not be much use if you could only drive it back and forth to work would it? The same goes for your telephony solution. Right from the start you should consider investigating the extension areas of all the solutions you look at and at least gain an understanding of the features and benefits that each system may or may not offer. For example, it could be very disappointing to get a system all in place and six months latter determine that you still need to add a bank of analog trunk lines to and receive faxes because your solution did not include the ability for Fax over IP (FoIP) codecs. Making blanket assumptions like ‘just because traditional faxes use our existing voice lines the VoIP system should also do fax’ can lead to some very tense moments across a boardroom table. Also consider integration with other areas like Instant Messaging (IM) and application integration such as the ability to build basic Interactive Voice Response (IVR) menus (IE: ‘To talk to support, please press 1, to talk to sales, please press 2,…) into the system and create simple auto attendant applications. These simple features can help add some great value that may not have been considered previously, and allow you to recoup the costs of a VoIP implementation over a shorter timeline than previously anticipated. Areas like this can allow you to bring systems together under one area and thus cut down the size of your external vendor list.
Conclusion

As you can see, the move to VoIP is fraught with decisions, technical considerations, and even some simple human capital management opportunities, but the gains in productivity, efficiency, and the ability to leverage existing infrastructure and gain some valuable benefits in the areas of long term manageability, application integration, multi-modal communications options and simpler to manage infrastructure far outweigh the potential problems as long as the map forward is well thought out and planned. As with most IT based business decisions it is always good to ensure that everyone understands the possible features and benefits as well as the potential risks and how they can be mitigated to derive the value that is expected.

Disclosures and References

As part of my previous experience in VoIP technology I spent 10 years as a product and training specialist working for both Intel Corporation and Dialogic Corporation in the area of Digital PBX TDM to IP interfacing with regards to the Netstructure PBX/IP Media gateway product line. In addition, my secondary focus was working closely with vendors offering tightly integrated VoIP solutions such as Microsoft Exchnage Unified Messaging and IBM Lotus Sametime using these devices as well as the design and development of product training classes, certification programs for user and administrative positions, and product documentation collateral.

READ MORE

VDSL, Improvement of Internet Speed

Posted by Android On Jumat, 05 November 2010 0 komentar
VDSL/VHDSL (Very High Bitrate Digital Subscriber Line) is an improved version of the technology, ADSL or Asymmetric Digital Subscriber Line, which we use to connect to the internet. They are different in how they are implemented so you probably cannot use the equipment of one for the other. The most significant difference between the two technologies that is most relevant to the use is speed. ADSL can reach maximum speeds of 8mbps download and 1mbps for upload. In comparison, VDSL can have up to 52mbps for download and 16mbps for upload.

Because of the extremely high speeds that VDSL can accommodate, it is being looked at as a good prospective technology for accommodating high bandwidth applications like VoIP telephony and even HDTV transmission, which ADSL is not capable of. Another very useful feature of VDSL stems from the fact that it uses 7 different frequency bands for the transmission of data. The user then has the power to customize whether each frequency band would be used for download or upload. This kind of flexibility is very nice in case you need to host certain files that are to be downloaded by a lot of people.

The most major drawback for VDSL is the distance it needs to be from the telephone exchange. Within 300m, you may still get close to maximum speed but beyond that, the line quality and the speed deteriorates rather quickly. Because of this, ADSL is still preferable unless you live extremely close to the telephone exchange of the company that you are subscribed to. Most VDSL subscribers are companies who need a very fast server and would often place their own servers in very close proximity.

Due to the limitations of VDSL and its high price, its expansion is not as prolific as that of ADSL. VDSL is only widespread in countries like South Korea and Japan. While other countries also have VDSL offerings, it is only handled from a few companies; mostly one or two in most countries. In comparison, ADSL is very widely used and all countries that offer high speed internet offer ADSL.
DSL technology known as very high bit-rate DSL (VDSL) is seen by many as the next step in providing a complete home-communications/entertainment package. There are already some companies, such as U.S. West (part of Qwest now), that offer VDSL service in selected areas. VDSL provides an incredible amount of bandwidth, with speeds up to about 52 megabits per second (Mbps). Compare that with a maximum speed of 8 to 10 Mbps for ADSL or cable modem and it's clear that the move from current broadband technology to VDSL could be as significant as the migration from a 56K modem to broadband. As VDSL becomes more common, you can expect that integrated packages will be cheaper than the total amount for current separate services.

In this article, you'll learn about VDSL technology, why it's important and how it compares to other DSL technologies. But first, let's take a look at the basics of DSL.

A standard telephone installation in the United States consists of a pair of copper wires that the phone company installs in your home. A pair of copper wires has plenty of bandwidth for carrying data in addition to voice conversations. Voice signals use only a fraction of the available capacity on the wires. DSL exploits this remaining capacity to carry information on the wire without disturbing the line's ability to carry conversations.

Standard phone service limits the frequencies that the switches, telephones and other equipment can carry. Human voices, speaking in normal conversational tones, can be carried in a frequency range of 400 to 3,400 Hertz (cycles per second). In most cases, the wires themselves have the potential to handle frequencies of up to several-million Hertz. Modern equipment that sends digital (rather than analog) data can safely use much more of the telephone line's capacity, and DSL does just that.
VDSL could change the face of E-commerce by allowing all types of media to run smoothly and beautifully through your computer.
READ MORE

WiFi peer-to-peer Direct is Go

Posted by Android On Minggu, 31 Oktober 2010 0 komentar
Wi-Fi Alliance on Monday announced that its direct peer-to-peer networking version of WiFi, called WiFi Direct, is now available on several new WiFi devices. The Alliance is also announcing that it has begun the process of certifying devices for WiFi Direct compatibility.

The organization has already certified a handful of WiFi cards from Atheros, Broadcom, Intel, Ralink, Realtek, and Cisco, as well as the Cisco Aironet 1240 Series access points. These devices will also be used in the test suite to certify that future devices are compatible with the protocol. Any device passing the tests will be designated "Wi-Fi CERTIFIED Wi-Fi Direct."

"We designed Wi-Fi Direct to unleash a wide variety of applications which require device connections, but do not need the internet or even a traditional network," said Edgar Figueroa, CEO of the Wi-Fi Alliance, in a statement. The certification program will ensure compatibility with the standard across a range of devices. WiFi Direct devices can also connect to older "Wi-Fi CERTIFIED" devices for backward compatibility, so chances are your current equipment will work with newer devices using the protocol.

The new protocol allows compatible devices to connect in a peer-to-peer fashion, either one-to-one or in a group, to share data with each other. The Alliance noted that many users carry a lot of data with them on portable devices like smartphones; WiFi Direct will enable users to connect these devices with each other to share that data without the need for a local WiFi network.

Though ad-hoc WiFi and Bluetooth protocols serve similar purposes, WiFi direct offers the longest range and fastest throughput, and includes enterprise-class management and security features.

READ MORE

Microsoft Windows Azure Future Concept

Posted by Android On 0 komentar
Microsoft unveiled its roadmap for the Windows Azure cloud computing platform. Moving beyond mere Infrastructure-as-a-Service (IaaS), the company is positioning Windows Azure as a Platform-as-a-Service offering: a comprehensive set of development tools, services, and management systems to allow developers to concentrate on creating available, scalable applications.

Over the next 12-18 months, a raft of new functionality will be rolled out to Windows Azure customers. These features will both make it easier to move existing applications into the cloud, and enhance the services available to cloud-hosted applications.

The company believes that putting applications into the cloud will often be a multistage process. Initially, the applications will run unmodified, which will remove patching and maintenance burdens, but not take advantage of any cloud-specific functionality. Over time, the applications will be updated and modified to start to take advantage of some of the additional capabilities that the Windows Azure platform has to offer.

Microsoft is building Windows Azure into an extremely complete cloud platform. Windows Azure currently takes quite a high-level approach to cloud services: applications have limited access to the underlying operating system, and software that requires Administrator installation isn't usable. Later in the year, Microsoft will enable Administrator-level access and Remote Desktop to Windows Azure instances.

For even more compatibility with existing applications, a new Virtual Machine role is being introduced. This will allow Windows Azure users to upload VHD virtual disks and run these virtual machines in the cloud. In a similar vein, Server Application Virtualization will allow server applications to be deployed to the cloud, without the need either to rewrite them or package them within a VHD. These features will be available in beta by the end of the year. Next year, virtual machine construction will be extended to allow the creation of virtual machines within the cloud. Initially, virtual machine roles will support Windows Server 2008 R2; in 2011, Windows Server 2003 and Windows Server 2008 with Service Pack 2 will also be supported.

Microsoft also has a lot to offer for applications that are cloud-aware. Over the past year, SQL Azure, the cloud-based SQL Server version, has moved closer to feature parity with its conventional version: this will continue with the introduction of SQL Azure Reporting, bringing SQL Server's reporting features to the cloud. New data syncing capabilities will also be introduced, allowing SQL Azure to replicate data with on-premises and mobile applications. Both of these will be available in previews by the end of the year, with final releases in 2011.

A range of new building-block technologies are also being introduced, including a caching component (similar to systems such as memcached) and a message bus (for reliable delivery of messages to and from other applications or mobile devices). A smaller, cheaper tier of Windows Azure instances is also being introduced, comparable to Amazon's recently-released Micro instances of EC2.

The breadth of services that Microsoft is building for the Windows Azure platform is substantial. Compared to Amazon's EC2 or Google's AppEngine, Windows Azure is becoming a far more complete platform: while EC2 and AppEngine both offer a few bits and pieces that are comparable (EC2 is particularly strong at hosting existing applications in custom virtual machines, for example), they aren't offering the same cohesive set of services.

Nonetheless, there are still areas that could be improved. The billing system is currently inflexible, and offers no ability for third parties to integrate with the existing Windows Azure billing. This means that a company wishing to offer its own building blocks for use by Windows Azure applications has to also implement its own monitoring and billing system. Windows Azure also has no built-in facility for automating job management and scaling.

Both of these gaps were pertinent to one of yesterday's demonstrations. Animation studio Pixar has developed a prototype version of its RenderMan rendering engine that works on Windows Azure. Traditionally, RenderMan was only accessible to the very largest animation studios, as it requires considerable investment in hardware to build render farms. By moving RenderMan to the cloud, smaller studios can use RenderMan for rendering jobs without having to maintain all those systems. It allows RenderMan to be sold as a service to anyone needing rendering capabilities.

Neither job management—choosing when to spin up extra instances, when to power them down, how to spread the different frames that need rendering between instances—nor billing are handled by Windows Azure itself. In both cases, Pixar needed to develop its own facilities. Microsoft recognizes that these are likely to be useful to a broad range of applications, and as such good candidates for a Microsoft-provided building block. But at the moment, they're not a part of the platform.

Microsoft CEO Steve Ballmer has said that Microsoft is "all in" with the cloud. The company is certainly working hard to make Windows Azure a better platform, and the commitment to the cloud extends beyond the Windows Azure team itself. Ars was told that all new development of online applications within Microsoft was using Windows Azure, and with few exceptions, existing online applications had migration plans that would be implemented in the next two years. The two notable exceptions are Hotmail and Bing, both of which already have their own, custom-built, dedicated server farms.

This internal commitment is no surprise given the history of the platform. Windows Azure was originally devised and developed to be an internal platform for application hosting. However, before there was any significant amount of internal usage, the company decided to offer it as a service to third parties. Now that the platform has matured, those internal applications are starting to migrate over. As such, this makes Windows Azure, in a sense, the opposite to both EC2 and AppEngine. Those products were a way for Amazon and Google to monetize their preexisting infrastructure investment—investment that had to be made simply to run the companies' day-to-day business.

With the newly announced features, there's no doubt that Windows Azure is shaping up to be a cloud computing platform that is both powerful and flexible. Microsoft is taking the market seriously, and its "all in" position seems to represent a genuine commitment to the cloud. What remains to be seen is whether this dedication will be matched by traditionally conservative businesses and developers, especially among small and medium enterprises. A move to the cloud represents a big change in thinking, and the new Windows Azure features will do nothing to assuage widespread fears such as a perceived loss of control. It is this change in mindset, not any technological issue, that represents the biggest barrier to widespread adoption of Windows Azure, and how Microsoft aims to tackle the problem is not yet clear.

READ MORE

IPv6 ( Internet Protocol v6 ) Technology

Posted by Android On Kamis, 21 Oktober 2010 0 komentar
about ipv6 technologyIPv6 are next generation of IPv4. The addressing scheme used for the TCP/IP protocols is called IP version 4 (IPv4). This scheme uses a 32-bit binary number to identify networks and end stations. This 32-bit scheme yields about 4 billion addresses, but because of the dotted decimal system (which breaks the number into four sections of 8 bits each) and other considerations, only about 250 million usable addresses exist. When the scheme was originally developed in the 1980s, no one ever thought that address would become scarce. The advent of the Internet, however, along with the trend of making many devices Internet-compatible (which means they need an address), such as cell phones and PDAs, makes running out of IPv4 addresses a certainty.


Network Address Translation (NAT) and Port Address Translation (PAT) were developed as solutions to the diminishing availability of IP addresses. NAT and PAT enable a company or user to share a single (or a few) assigned IP addresses among several private addresses that are not bound by an address authority. Although these schemes preserve address space and provide anonymity, the benefits come at the cost of individuality, which goes against the very reason for networking in the first place, which is to allow peer-to-peer collaborations through shared applications.

IP addressing scheme version 6 (IPv6) not only provides an answer to the problem of depleting address space, it allows for the restoration of a true end-to-end model, where hosts can connect to each other unobstructed and with greater flexibility. The key elements in IPv6 are to allow for each host to have a unique global IP address, to maintain connectivity even when in motion, and to natively secure host communications.

IPv6 Addresses The 128-bit address used in IPv6 allows for a greater number of addresses and subnets (enough space for 1015 end points - 340,282,366,920,938,463,463, 374,607,431,768,211,456 total).

IPv6 was designed to give every user multiple global addresses that can be used for a variety of devices, including cell phones, PDAs, IP-enabled vehicles, and consumer electronics. In addition to providing more address space, IPv6 has the following advantages over IPv4:

* Easier address management and delegation
* Easy address autoconfiguration
* Embedded IPSec (encrypted security)
* Optimized routing
* Duplicate Address Detection (DAD)

IPv6 Notation
This figure demonstrates the notation and shortcuts for IPv6 addresses.

128 bits are expressed as 8 fields of 16 bits in Hex notation:
2031 :0000:130F:0000:0000:09C0:876A:130B

An IPv6 address uses the first 64 bits in the address for the network ID and the second 64 bits for the host ID. The network ID is separated into "prefix" chunks. This figure shows the address hierarchy.

IPv6 Autoconfiguration
IPv4 deployments use one of two methods to assign IP addresses to a host: static assignment (which is management intensive) or DHCP/BOOTP, which automatically assigns IP addresses to hosts upon booting onto the network.

IPv6 provides a feature called stateless auto con figuration that is similar to Dynamic Host Configuration Protocol (DHCP). Using stateless configuration, any router interface that has an IPv6 address assigned to it becomes the "provider" of IP addresses on the network to which it’s attached. Safeguards are built into IPv6 that prevent duplicate addresses. This feature is called Duplicate Address Detection (DAD).

IPv6 Security
IPv6 has embedded support for IPSec. The host operating system (OS) can configure an IPSec tunnel between the host and any other host that has IPv6 support.

NAT and PAT
Although Network Address Translation (NAT) causes problems with peer-to-peer collaboration, it is still widely used, particularly in homes and small offices.

* Static NAT uses a one-to-one private-to-public address translation.
* Dynamic NAT matches private addresses to a pool of public addresses on an as-needed basis. The address translation is still one to one.

Port Address Translation (PAT) is a form of dynamic address translation that uses a many private addresses to few or one public address. This is referred to as overloading. It is accomplished by assigning port numbers.
READ MORE

Microsoft Windows 8 Releases

Posted by Android On Selasa, 28 September 2010 0 komentar
windows 8 releases image
Microsft Windows 8(next generation of Microsoft Windows 7) is starting to take a OS market. Windows 7 is only 10 months old, but it's never too early to glance on down the road at Windows 8. Microsoft’s next version of Windows client is far enough along that the Windows team seems to have begun sharing details about its goals with Microsoft’s PC partners. A leaked slide deck — excerpts of which first appeared on the Web site of blogger Francisco Martin Garcia — don’t reveal a whole lot in terms of specific features. But they do look like the real deal, as Microsoft Kitchen blogger Stephen Chapman — who pulled out even more of the slides in his post — noted.

The leaked slides (dating from April 2010) reference “Windows 8,” not “Windows v.Next” (the Windows client team’s preferred codename these days). They indicate that the next version of Windows, which is expected by many to ship in 2012, will possibly offer some of these features:

- Fast startup (Huzzah!): A new feature combining Logoff and Hibernate to result will give the look and feel of boot/shutdown be faster

- Slates mentioned specifically as a target form factor: It will be interesting to see how Microsoft distinguishes between slates running Windows Embedded Compact and slates running Windows 8

- Push-button reset: A button “that will essentially reinstall Windows while maintaining all of your personal files, applications, settings, etc. without the need for the user to back all of that stuff up,” as Stephen Chapman of Microsoft Kitchen describes it

- Support for facial recognition as one of the ways identity management/log in will be handled

- IE 9 (no surprise there): With another confirmation of August as being the target for the first beta (though I could see this possibly slipping a bit)

- More thorough help and support, enabling users to do more fixing of issues on their own

- A Windows App Store (mentioned in the section on push-button reset)

Microsoft isn’t commenting (so far) on the slides and isn’t even confirming that they are “Genuine” Windows 8 PowerPoints — or how much they reflect current reality. However, I’d note the date on these slides is April 2010 and they sure have the vague look and feel of early Windows documentation.
READ MORE

Google Doodle for 12th birthday of Google

Posted by Android On Minggu, 26 September 2010 0 komentar
google 12th anniversary imageGOOGLE Inc. is the owner of the Google brand, whose it's main product is search engine "giant" GOOGLE. As one visits the homepage of Google, four colored balls at the top of the Google logo can be seen and as the balls are clicked, it leads to a birthday cake with Google written on it,

Manifesting the 12th birthday of Google

During the early years after its inception, Google celebrated its birthday on the 7th of September. However, for past few years, the date has shifted to 27th September.

Google started an interesting trend of celebrating various occasions via Google Doodles, the changed Google logo that gets redesigned by Google and shown on Google.com on special days to mark their significance. With the help of creative Doodles, many personalities are honored and several events are commemorated.

Within 12 years, Google has proved itself to be the internet giant introducing innovations in its search engine as well as email. Google will celebrate tomorrow September 27 the 12th anniversary for witch occasion Execte News wish to send a worm “Happy Birthday Google”.
READ MORE

Melacak Lokasi Orang dengan Jaringan Selular

Posted by Android On Kamis, 18 Februari 2010 0 komentar
google latitude untuk melacak orang hilangAkhir - akhir ini banyak sekali orang hilang yang entah dimana keberadaannya. Ada sebagian yang bisa ditemukan dan ada juga yang tidak kembali hingga saat ini. Namun saat ini telah ada suatu program untuk melacak lokasi atau melacak keberadaan orang melalui internet, yaitu menggunakan google latitude, program yang lahir melalui pengembangan google maps. Dengan software ini, kita bisa dengan cermat melacak keberadaan orang melalui HP/PC. Tentunya dengan bantuan jaringan selular dan Tower/BTS di sekitar kita.

Cara kerjanya yaitu melalui BTS dan jaringan yang paling dekat dengan lokasi kita berada. Kemudian, google latitude akan menghitung koordinat sang pemegang HP. Namun, cara kerja software ini tidak sehebat GPS yang harganya jutaan rupiah. Maksimal jarak yang dapat dikalkulasi oleh google latitude ini adalah 1 km. Itu juga sudah cukup akurat.

Untuk dapat melacak keberadaan orang, anda harus meng-add terlebih dahulu id google/gmail orang tersebut. Dengan begitu anda dan orang tersebut dapat saling berbagi lokasi. Selain itu, dengan software ini anda juga dapat berhubungan secara langsung melalui IM, SMS bahkan via telepon. Sayangnya aplikasi ini masih kompatibel dengan semua ponsel. hanya beberapa ponsel pintar/smartphone saja yang dapat menggunakan google latitude.

Beberapa ponsel canggih yang dapat menggunakan fasilitas google latitude untuk melacak lokasi orang diantaranya adalah Blackberry, Apple IPhone, IPod Touch dan merk lain yang sudah kompatibel dengan OS Windows Mobile 6.5, Symbian S60 dan tentunya Android. Tetapi jangan senang dulu, karena Google Latitude masih belum dapat digunakan di Indonesia. Coba anda buka http://www.google.com/latitude, disana bisa kita lihat tidak ada indonesia dalam daftar negara google latitude. Hanya ada sedikit negara Asia yang dapat menggunakan fasilitas ini, diantaranya india, hongkong dan tetangga ahli jiplak kita yaitu malaysia.

Namun jangan terlalu kecewa, kita masih bisa berharap aplikasi google latitude ini bisa dikembangkan di negara kita, agar bisa membantu kita dalam melacak keberadaan seseorang yang kita sayangi tanpa perlu kuatir akan kejahatan yang selama ini merajalela. Dan juga dapat meminimalisir kejadian orang hilang atau penculikan yang semakin marak.



Sekian, semoga dapat menjadi ilmu yang bermanfaat bagi kita semua.
READ MORE

Google Chrome OS, Cara Install dan Keunggulannya

Posted by Android On Rabu, 13 Januari 2010 0 komentar
chrome OS, install google chromeGoogle telah meluncurkan sistem operasi berbasis open source bernama Chrome. Silahkan baca Press Release Google Chrome OS. Anda semua juga pasti sudah tahu, OS rilisan Google ini siap bersaing dalam pasar pada tahun 2010 ini, tapi yang disayangkan, Chrome OS hanya akan berjalan pada piranti keras yang memang ada kerjasama dengan pihak Google. Tentunya piranti yang cocok adalah sebuah netbook. Simak perkataan dari pihak google ini, "Mungkin piranti yang cocok adalah sebuah netbook, yang memiliki SSD, konektifitas WiFi, serta full size keyboard", ujar Sundar Pichai, Vice President Google. Chrome OS agaknya akan menjadi tantangan berat bagi Microsoft, yang juga baru merilis OS barunya Windows 7. Duel dua perusahaan besar ini semakin hebat beberapa tahun belakangan, setelah Google berhasil mendominasi bisnis internet.

Rencana Google ini disambut hangat oleh banyak perusahaan pengembang hardware, termasuk Acer, Asus, Hewlett-Packard, Lenovo dan Toshiba. Chrome OS akan dirancang untuk bekerja dengan chip Intel yang banyak diadopsi pada sebagian besar komputer desktop, laptop, dan netbook. Chrome OS juga akan dikembangkan agar kompatibel dengan chip Arm yang banyak digunakan pada perangkat genggam.

nah, untuk menambah ilmu, saya sediakan tutorial singkat install chrome OS, tapi bahasa inggris yaa.. nih dapet dari forum.

Installing Google Chrome OS:

- First things first you will need to download Google Chrome OS Beta and Virtual Box.

- Once you have downloaded the .ISO file and unzipped it you can create your virtual disk.


Step 1 – Name the Virtual Machine and set OS and type to other.


Step 2 – Set the base memory size(RAM) I used 1000MB NOTE: Go easy on this at first you can always bump it up later if need be


Step 3 – Create a new hard disk and boot hard drive


Step 4 -Pick the type of storage you would like I did dynamically expanding storage.


Step 5 – Now set your hard drive space. I could spare 2 GB so that’s what I used.


Step 6 -Go ahead and Run your new Virtual Machine


Step 7 -Begin installing your Chrome ISO


Step 8 -Select your ISO image and blast off!


Step 9 -Select to install Chrome OS then sit back and watch it install.


Step 10 -Enjoy, test and play with Google Chrome OS.

Beberapa Keunggulan Produk Google Crome OS yaitu:

1. Booting yang Cepat
Pichai menyebutkan bahwa Chrome OS sama seperti sebuah televisi saat dinyalakan. Tidak memiliki jeda waktu booting yang lama, karena tak memiliki aplikasi lokal yang membatasi ruang gerak hardware.

2. Masalah Keamanan
OS ini diintegrasikan dengan Chrome browser. Dengan demikian maka selayaknya browser, OS ini akan langsung mengupdate sistem keamanannya secara default. Hal ini masih ditambah lagi dengan penyimpanan data secara fisik dalam storage yang kini dirancang minimalis. Pasalnya semua data dapat disimpan secara online.

3. Dukung Arsitektur X86 dan ARM
Google berjanji untuk mengaplikasikan baik arsitektur X86, ARM dan code-code populer bagi netbook lainnya.

4. Menu Aplikasi
Sebuah aplikasi web yang baru kini dapat ditemui dalam menu aplikasi secara permanen pada Chrome OS ini. Hal ini akan membantu pengguna untuk mencari sebuah aplikasi baru langsung secara online. Selain memudahkan pengguna menu aplikasi ini juga menguntungkan pihak pengembang.

5. Akur dengan Microsoft Office
Walau Microsoft dengan Windows-nya merupakan pesaing berat mereka, namun Chrome OS ini ternyata juga mendukung dijalankannya dokumen office. Saat peluncuran Chorme OS, Pichai juga mendemokan bahwa Chrome dapat membuka sebuah dokumen via Microsoft office live. Microsoft office live adalah sebuah aplikasi web gratis bagi pengguna Windows live. Dan Saat pengguna membuka sebuah dokumen berekstensi .xls, Chorme OS akan langsung membuka Excel via Microsoft Office Live secara online.

Nah, gimana? Keren kan? Tapi kita yang terbiasa memakai windows atau UNIX, harus kembali beradaptasi dengan OS anyar ini. Yah, sekian mungkin yang bisa saya berikan. Untuk selanjutnya, saya akan berikan trik google chrome OS lainnya.
READ MORE

Download Ebook "Membongkar Gurita Cikeas" Full Version

Posted by Android On Sabtu, 02 Januari 2010 0 komentar
Download ebook membongkar gurita cikeas full versionKenapa kartolo posting tentang download ebook membongkar gurita cikeas di blog yang bertemakan teknologi dan internet? padahal jika dilihat memang tidak ada kaitannya dengan blog kartolo ini. Ya..Tidak lain ini adalah bentuk empati kartolo akan kontroversi buku membongkar gurita cikeasini. Selain itu, ebook gurita cikeas ini juga sedang ramai. Buku Gurita Cikeas kini menjadi buah bibir masyarakat, dan tidak kalah heboh dengan kasus Bank Century. Termasuk di kalangan twitter dan facebooker. Oleh karena itu, kartolo juga ikut memposting tentang download ebook membongkar gurita cikeas ini.

Sedikit info saja, Buku Membongkar Gurita Cikeas yang ditulis oleh George Junus Aditjondro, seorang Guru Besar Sosiology Korupsi New Castle University Australia yang pernah menulis beberapa buku, yang membahas tentang KKN antara Presiden Suharto dengan Habibie lewat buku “Dari Soeharto ke Habibie : guru kencing berdiri, murid kencing berlari, yang kedua, puncak korupsi, kolusi, dan nepotisme rezim Orde Baru” (Pijar Indonesia, 1998), dan “Korupsi Kepresidenan Reproduksi Oligarki Berkaki Tiga: Istana, Tangsi, dan Partai Penguasa” (Mei, 2006) Dan akhirnya orang ini kembali menyedot perhatian banyak orang, dari tukang becak hingga RI-1. Termasuk ulah pemukulannya pada Ramadhan Pohan beberapa waktu lalu.

Nah, langsung saja, ini file ebook yang kartolo sebutkan, mungkin sudah banyak yang punya, tetapi ini adalah wujud empati kartolo atas buku kontroversial ini. Silahkan diunduh. Semuanya dari 4shared kok, bukan ziddu.

Membongkar Gurita Cikeas (Full Version).pdf - 6.8MB


Membongkar Gurita Cikeas (Lite Version).pdf - 357KB



Semoga Bermanfaat.



READ MORE

Inilah Virus Komputer Paling Mematikan

Posted by Android On Jumat, 25 Desember 2009 0 komentar
Virus Komputer Paling MematikanMungkin komputer anda sering hang, ato restart sendiri. Ato mungkin lebih parah lagi data hilang dengan sendirinya. Itu tidak lain dan tidak bukan adalah ulah virus. Disini kartolo tidak akan menjelaskan cara menghilangkan virus tanpa install ulang atau cara menghilangkan virus secara instan. Tetapi kartolo akan memberikan daftar virus PC yang paling mematikan. Dan mungkin dari daftar virus ini banyak yang belum anda kenali. Berikut daftar virus komputer yang paling mematikan yang pernah ada.

  1. Nimda : Ini juga tahun 2001, kebalikan dari kata “admiN”. Penyebarannya sangat cepat, menurut TruSecure CTO Peter Tippet, Nimda hanya butuh 22 menit buat menjadi Top Ten saat itu. Target nya server2 Internet, menyebar lewat Internet. Nimda akan membuat backdoor ke OS, jadi penyerang bisa akses ke server dan berbuat apa saja. Nimda juga menjadi DDoS.
  2. Code Red & Code Red II : Muncul musim panas 2001, nyerang OS Windows 2000 & NT. Virusnya bakal bikin buffer penuh jadi ngabisin memori. Paling seru waktu berhubungan dengan White House, semua komputer yang terkena Virus ini bakalan otomatis akses ke web server di White House bersamaan, jadi bikin overload, alias serangan DDoS. Akhirnya Microsoft merilis patchnya saat itu.
  3. The Klez : Muncul tahun 2001, menyebar via email, replikasi trus kirim ke orang2 di address book. Membuat komputer anda tidak bisa beroperasi, bisa menghentikan program antivirus anda.
  4. ILOVEYOU : Setelah “Melissa”, muncul virus ini dari Filipina, bentuk nya worm, program standalone dapat me-replikasi sendiri. Menyebar via email, judulnya”surat cinta” dari pengagum rahasia . Original file nya LOVE-LETTER- FOR-YOU.TXT. vbs. VBS singkatan Visual Basic Scripting. Penciptanya adalah Onel de Guzman dari Filipina. Mungkin virus ini juga pernah muncul dalam tabloid PCMEDIA.
  5. Melissa : Dibuat tahun 1999 oleh David L Smith, basicnya Microsoft Word macro. Menyebar via email dengan dokumen “Here is that document you asked for, don’t show it to anybodey else.”. Kalau sampai dibuka, virus akan replikasi dan otomatis mengirim ke top 50 di address book email. Smith dipenjara 20 bulan dengan denda $5000 dan melarang akses komputer tanpa pengawasan.
  6. Storm Worm : Muncul tahun 2006, disebut “Storm Worm” karena menyebar via email dengan judul “230 dead as storm batters Europe”. Storm worm adalah program Trojan house. beberapa versinya bisa membuat komputer menjadi bots. Atau biasa digunakan hacker untuk spam mail melalui internet. Ini virus pernah menyerang komputer saya beberapa minggu yang lalu.
  7. Leap-A/Oompa- A : Mac yang punya konsep security through obscurity yakin tidak akan terserang virus karena OS nya sistem tertutup. Tapi tahun 2006, virus Leap-A atau biasa disebut Oompa-A muncul. Menyebar lewat iChat pada Mac. Setelah Mac terserang, virus itu akan mencari kontak melalui iChat dan kirim pesan ke tiap kontak itu. Pesannya itu berisi file corrupt yang berbentuk JPEG. Memang tidak berbahaya, namun hal ini menyatakan bahwa masih mungkin akan ada virus berbahaya yang menyerang MAC.
  8. Sasser and Netsky : Penciptanya adalah anak Jerman umur 17 tahun, Sven Jaschan. Sasser nyerang Microsoft Windows. Sasser ini tidak menyebar via email. Tapi jika satu komputer koneksi ke komputer yang terkena virus ini. Virus ini akan membuat komputer tidak bisa di-shutdown kecuali anda mencabut power. Netsky menyebar melalui email dengan 22 Kb attachment file dan jaringan Windows. Bisa membuat serangan DoS pula. Sven Jaschan tidak dipenjara, hanya diberi masa percobaan 1 tahun 9 bulan, karena umurnya masih di bawah 18 tahun.
  9. MyDome (Novarg) : Mulai menyerang tanggal 1 Februari 2004, virus ini membuat backdoor di OS. Pertama kali tanggal 1 itu mulai DDoS. Kedua, tanggal 12 Feb, virus ini berhenti menyebar dan mulai membuat backdoors. MyDoom menyebar via email, selain itu selalu search di search engines, seperti Google mulai menerima jutaan permintaan pencarian dan membuat lambat sampai akhirnya crash. Gara2 MyDoom, Senator US Chuck Schumer mengajukan pembuatan National Virus Response Center.
  10. SQL Slammer/Saphire : Muncul Januari 2003, menyebar dengan cepat lewat internet. Waktu itu sempat membuat layanan ATM Bank Amerika crash, hancurnya layanan 911 Seattle, dan Continental Airlines. Membatalkan beberapap penerbangan karena error check in dan tiketing. membuat kerugian lebih dari $1 milliar sebelum dipacthed.

Nah, bener kan? hebat dan gila. Tetapi memang inilah daftar virus PC yang paling mematikan untuk komputer anda. Kalo untuk anak indonesia mungkin suatu saat akan dapat melampaui ini. AMiin.. hehehehe. Jadi jangan sampai anda lalai dalam memahami kondisi PC anda. Lain kali kartolo akan post tentang bagaimana cara menghilangkan virus ini pada komputer anda. Kalo Brontok atau pun sality memang sudah umum. Jadi tidak seru lagi. hehehehe....

Semoga bermanfaat.

READ MORE

Pergunakan facebook secara bijak

Posted by Android On Selasa, 08 Desember 2009 0 komentar
Artikel ini ada hubungannya dengan artikel kartolo yang sebelumnya, mengenai melihat private photo dan album facebook dan facebook cheat. Dari kedua artikel diatas, siapa bilang facebook selalu bersifat positif, jangan salah! maka sebelum anda terkena dampak positif lebih baik anda menggunakan facebook dengan bijak. kenapa harus bijak?! karena data yang Anda masukan di situs jejaring sosial Facebook, menjadi milik situs itu. Anda pun tidak boleh marah jika data pribadi tersebut dijual ke perusahaan lain. Itulah yang coba dilakukan situs pertemanan besutan Mark Zuckberg dalam meraih keuntungan. Pasalnya, Facebook berencana menjual informasi pribadi yang berisikan 150 juta pengguna dengan menciptakan database market.

database yang diprediksi bernilai sebesar USD5 miliar atau sekira Rp6 triliun, akan dijual dengan mengizinkan perusahaan multinasional melakukan berbagai riset melalui survei melalui database tersebut.

erusahaan dapat menanyakan pertanyaan spesifik kepada pengguna dalam menentukan demografi tertentu, seperti apakah mereka masih lajang atau sudah menikah, lokasi, umur, foto, dan bahkan orientasi seksual.

“Banyak orang mengatakan ‘ini akan menjadi bisnis yang sangat hebat untuk kami’. Namun, dibutuhkan waktu yang sangat lama untuk melakukan survei, dan dunia bisnis seringkali tidak memiliki waktu yang begitu berharga. Saya rasa mereka menyukai respons instan ini,” urai Randi Zurkerberg, Direktur Pemasaran Global.

Tentu saja, ini menjadi inovasi terbaru bagi dunia bisnis terutama dalam hal penelitian. Walaupun sudah diakui oleh Mark Zuckberg, ini merupakan bagian dalam mengeruk keuntungan. Pakar pemasaran juga mengakui, kalau jumlah informasi pribadi yang dimiliki Facebook beserta loyalitas penggunanya dapat bernilai jutaan yang tidak terbilang kepada perusahaan yang bergerak di bidang riset pasar.

tidak hanya itu saja, Percaya atau tidak, saat anda membuat akun (account) di Facebook, maka anda telah berjanji dan menandatangani kontrak (secara digital) untuk setuju dengan apa yang dituliskan di dalam perjanjian dengan Facebook. Ada bagian dari Term of Use ini yang saya ingin bedah untuk anda, karena hal ini menyangkut hak anda terhadap foto-foto user yang diupload ke Facebook.

berikut salinan term of agreement :

When you post User Content to the Site, you authorize and direct us to make such copies thereof as we deem necessary in order to facilitate the posting and storage of the User Content on the Site. By posting User Content to any part of the Site, you automatically grant, and you represent and warrant that you have the right to grant, to the Company an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to use, copy, publicly perform, publicly display, reformat, translate, excerpt (in whole or in part) and distribute such User Content for any purpose, commercial, advertising, or otherwise, on or in connection with the Site or the promotion thereof, to prepare derivative works of, or incorporate into other works, such User Content, and to grant and authorize sublicenses of the foregoing. You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content. Facebook does not assert any ownership over your User Content; rather, as between us and you, subject to the rights granted to us in these Terms, you retain full ownership of all of your User Content and any intellectual property rights or other proprietary rights associated with your User Content.

terjemahannya kurang lebih sebagai berikut :
Saat anda upload gambar-gambar ke Facebook. Maka anda secara otomatis memberikan hak yang SANGAT PENUH, TANPA BISA DIBANTAH, TIDAK BISA DITARIK ULUR, ANDA TIDAK MUNGKIN MENANG, TERSERAH FACEBOOK MAU BERBUAT APA SAJA, BAIK SEBAGIAN MAUPUN SECARA KESELURUHAN, DIMANAPUN DI SELURUH DUNIA, UNTUK APA SAJA, DEMI KEPENTINGAN APA SAJA, MAU DIJADIKAN APA SAJA TERSERAH FACEBOOK, TANPA BERHUTANG TERHADAP ANDA, BAIK KOMERSIAL, ADVERTISING KEPENTINGAN FACEBOOK terhadap gambar-gambar tersebut. Jika anda memutuskan untuk menghapus gambar-gambar anda di akun Facebook tersebut namun bukan berarti Facebook tidak boleh menyimpan copy. Anda memperbolehkan Facebook memakai copy tersebut.

jelas sudah bahwa apa yang ada di dalam account facebook anda tidak sepenuhnya mutlak milik anda, tetapi juga menjadi milik dari website tersebut. maka berhati - hatilah dalam menggunakan account facebook anda.

Nah, demikian yang bisa kartolo berikan. Semoga bisa buat koreksi sobat - sobat semua.

READ MORE

technology WiMAX 4G

Posted by Android On Minggu, 06 Desember 2009 0 komentar
Tak seperti komunikasi generasi kedua (2G) dan ketiga (3G), WiMAX (4G) ini dapat diintegrasikan dengan jejaring kabel Ethernet. Ini semakin memungkinkan pedesaan di pedalaman dapat terhubung menggunakan jejaring kabel Ethernet menggunakan telepon IP (VoIP). Komunikasi data paket berbasis IP (Protokol Internet) dapat dioptimalkan oleh WiMAX.

Meskipun standar WiMAX tak memasukkan dukungan penuh terhadap perangkat bergerak (karena tak ditujukan untuk mematikan 3G, seperti PDA ( personal digital assistant ) dan ponsel, namun kehadirannya sangat revolusioner, yang boleh dikata akan mengancam duopoli cable modem/DSL ( Digital Subscriber Line ). Dengan WiMax, nantinya, selain jangkauan layanannya yang lebih luas dan menutup blankspot, juga koneksi akan tersedia di mana saja ( always on ).


ITU (International Telecommunications Union) tengah dalam proses mempersiapkan standard seluler 4G. Teknologi 4G harus memungkinkan layanan voice berbasis IP, serta streaming multimedia dalam kecepatan yang lebih tinggi daripada sekarang. ITU-R (Radiocommunication Sector) mengharapkan bahwa standard akan mencakup kecepatan data setidaknya 100 Mb/s, serta penggunaan OFDMA, yaitu versi multiuser dari OFDM. Tentu semua harus berbasis IP dan packet. Keluarga 3G saat ini — termasuk WCDMA, HSDPA, CDMA2000, dan EVDO — dirancang dengan optimasi pada jaringan suara.


Sebetulnya sejak tahun 2005-an yang lalu implementasi pre-4G sudah mulai di lakukan oleh para pejuang di Indonesia tanpa sepengetahuan / ijin dari pemerintah tentunya. Salah satu ciri khas 4G adalah seluruh jaringan, termasuk handphone yang digunakan berbasis IP. Tidak seperti generasi sebelumnya yang rata-rata sambungan IP dilakukan di tingkat sentral telepon, atau paling dekat pada tingkat base station di 3G+. Seperti di jelaskan oleh Dana Blair dari Cisco dalam presentasinya yang berjudul “4G: The End of the Intelligent Network”, konsekuensi seluruh jaringan yang berbasis IP, sebetulnya teknologi yang kita gunakan adalah teknologi Internet Telepon (VoIP) terutama menggunakan teknologi Session Initiation Protocol (SIP).

Tahun ini PT LEN Industri (Persero) sebagai salah satu Badan Usaha Milik Negara (BUMN) siap menjadi local manufacture untuk penyediaan sarana telekomunikasi yang saat ini banyak dipasok Negara lain.

“Tahun ini LEN kembali ke bidang komunikasi karena untuk menjawab tantangan pemerintah dimana saat ini seluruh operator penyedia layanan komunikasi harus menggunakan minimal 30 persen kemampuan dalam negeri. LEN menjawabnya dalam bentuk real produk berupa teknologi WIMAX Bukan dalam bentuk asembeling yang hanya dapat memenuhi kebutuhan pengguna 1 sampai 20 persen” terang Direktur Utama PT LEN.

WiMAX merupakan teknologi wireless broadband access (WBA) yang memiliki kecepatan akses tinggi dengan jangkauan luas. Secara sederhananya WiMAX adalah teknologi untuk internet yang aksesnya bisa sampai radius 5-10 Kilometer.

Untuk Produksi, akan dilakukan akhir tahun ini dengan menggandeng vendor asing yaitu Airspan dari Inggris untuk publikasi dan Runcom AS untuk Teknologi.

“Saat ini PT LEN masuk dalam bidang komunikasi bukan sebagai kontraktor tapi lebih pada manufacture dalam hal ini BTS dan CPE-nya saja.Saat ini ada 15 zone operator yang ada di Indonesia yang siap dibidik dan mereka harus menyiapkan satu rencana untuk bermigrasi ke frekuensi baru dalam waktu 6 bulan” katanya.

READ MORE

Roket RX-420 & CN-235 Militer made in Indonesia

Posted by Android On Kamis, 03 Desember 2009 0 komentar



Roket RX-420
peluncuran roket RX-420 Lapan ternyata masih jadi buah bibir. Anehnya bukan jadi buah bibir di Indonesia yang lebih senang ceritera Pilpres, tetapi di Australia, Singapura dan tentu saja di negara tetangga yang suka siksa TKI dan muter-muterin Ambalat yakni Malaysia.
Seperti diketahui roket RX-420 ini menggunakan propelan yang dapat memberikan daya dorong lebih besar sehingga mencapai 4 kali kecepatan suara. Hal itu membuat daya jelajahnya mencapai 100 km. Bahkan bisa mencapai 190 km bila struktur roket bisa dibuat lebih ringan. Yang punya nilai tambah tinggi ini adalah 100% hasil karya anak bangsa, para insinyur Indonesia. Begitu pula semua komponen roket-roket balistik dan kendali dikembangkan sendiri di dalam negeri, termasuk software. Hanya komponen subsistem mikroprosesor yang masih diimpor. Anggaran yang dikeluarkan untuk peluncurannya pun 'cuma' Rp 1 milyar. Kalah jauh dengan yang dikorupsi para anggota DPR untuk traveller checks pemenangan Miranda Gultom sebagai Deputi Senior Gubernur BI yang lebih dari Rp. 50 milyar. Apalagi kalau dibandingkan dengan korupsi BLBI yang lebih dari Rp. 700 trilyun.

Mengapa malah menjadi buah bibir di Australia, Singapura dan Malaysia? Karena keberhasilan peluncuran roket Indonesia ini ke depan akan membawa Indonesia mampu mendorong dan mengantarkan satelit Indonesia bernama Nano Satellite sejauh 3.600 km ke angkasa. Satelit Indonesia ini nanti akan berada pada ketinggian 300 km dan kecepatan 7,8 km per detik. Bila ini terlaksana Indonesia akan menjadi negara yang bisa menerbangkan satelit sendiri dengan produk buatan sendiri. Indonesia dengan demikian akan masuk member "Asian Satellite Club" bersama Cina, Korea Utara, India dan Iran.

Nah kekhawatiran Australia, Singapura dan Malaysia ini masuk akal, bukan? Kalau saja Indonesia mampu mendorong satelit sampai 3.600 km untuk keperluan damai atau keperluan macam-macam tergantung kesepakatan rakyat Indonesia. Maka otomatis pekerjaan ecek-ecek bagi Indonesia untuk mampu meluncurkan roket sejauh 190 km untuk keperluan militer bakal sangat mengancam mereka sekarang ini pun juga!!! Kalau tempat peluncurannya ditempatkan di Batam atau Bintan, maka Singapura dan Malaysia Barat sudah gemetaran bakal kena roket Indonesia. Dan kalau ditempatkan di sepanjang perbatasan Kalimantan Indonesia dengan Malaysia Timur, maka si OKB Malaysia tak akan pernah berpikir ngerampok Ambalat. Akan hal Australia, mereka ada rasa takutnya juga. Bahwa mitos ada musuh dari utara yakni Indonesia itu memang bukan sekedar mitos tetapi sungguh ancaman nyata di masa depan dekat.

CN 235 Versi Militer

Rupanya Australia, Singapura dan Malaysia sudah lama 'nyaho' kehebatan insinyur-insinyur Indonesia. Buktinya? Tidak hanya gentar dengan roket RX-420 Lapan tetapi mereka sekarang sedang mencermati pengembangan lebih jauh dari CN235 versi Militer buatan PT. DI. Juga mencermati perkembangan PT. PAL yang sudah siap dan mampu membuat kapal selam asal dapat kepercayaan penuh dan dukungan dana dari pemerintah..

Kalau para ekonom Indonesia antek-antek World Bank dan IMF menyebut pesawat-pesawat buatan PT. DI ini terlalu mahal dan menyedot investasi terlalu banyak ('cuma' Rp. 30 trilun untuk infrastruktur total, SDM dan lain-lain) dan hanya jadi mainannya BJ Habibie. Tetapi mengapa Korea Selatan dan Turki mengaguminya setengah mati? Turki dan Korsel adalah pemakai setia CN 235 terutama versi militer sebagai yang terbaik di kelasnya. Inovasi 40 insinyur-insinyur Indonesia pada CN 235 versi militer ini adalah penambahan persenjataan lengkap seperti rudal dan teknologi radar yang dapat mendeteksi dan melumpuhkan kapal selam. Jadi kalau mengawal Ambalat cukup ditambah satu saja CN235 versi militer (disamping armada TNI AL dan pasukan Marinir yang ada) untuk mengusir kapal selam dan kapal perang Malaysia lainnya.

Nah, jadi musuh yang sebenarnya ada di Indonesia sendiri. Yakni watak orang Indonesia yang tidak mau melihat orang Indonesia sendiri berhasil. Karya insinyur-insinyur Indonesia yang hebat dalam membuat alutsista dibilangin orang Indonesia sendiri terutama para ekonom pro Amerika Serikat dan Eropa: "Mending beli langsung dari Amerika Serikat dan Eropa karena harganya lebih murah". Mereka tidak berpikir jauh ke depan bagaimana Indonesia akan terus tergantung di bidang teknologi, Indonesia hanya akan menjadi konsumen teknologi dengan membayarnya sangat mahal terus menerus sampai kiamat tiba.Kalau ada kekurangan yang terjadi dengan industri karya bangsa sendiri, harus dinilai lebih fair dan segera diperbaiki bersama-sama. Misalnya para ahli pemasaran atau sarjana-sarjana ekonomi harus diikutsertakan dalam team work. Sehingga insinyur-insinyur itu tidak hanya pinter produksi sebuah pesawat tetapi setidaknya tahu bagaimana menjual sebuah pesawat itu berbeda dengan menjual sebuah Honda Jazz. Kalau ada kendala dalam pengadaan Kredit Ekspor sebagai salah satu bentuk pembayaran, tolong dipecahkan dan didukung oleh dunia perbankan, agar jualan produk sendiri bisa optimal karena akan menarik bagi calon pembeli asing yang tak bisa bayar cash.

READ MORE

Palapa RIng Project with connection up to 1Tbps.

Posted by Android On Selasa, 01 Desember 2009 0 komentar
melalui megaproyek prestisius Palapa Ring yang merupakan pembangunan backbone jaringan serat optik nasional yang akan menjangkau sebanyak 33 provinsi, 440 kota/kabupaten di seluruh Indonesia dengan total panjang kabel laut mencapai 35.280 km, dengan kabel di daratan adalah sejauh 21.807 km. Dana yang dianggarkan untuk keperluan megaproyek prestisius Palapa Ring diperkirakan Rp 3 triliun.

Palapa Ring merupakan kelanjutan pengembangan dari Cincin Serat Optik Nasional (CSO-N) yang digagas oleh PT Tiara Titian Telekomunikasi (TT-Tel). Aplikasi tersebut merupakan jaringan kabel kasar bawah laut berbentuk cincin terintegrasi berisi frekuensi pita lebar yang membentang dari Sumatra Utara hingga Papua bagian barat. Setiap cincin akan meneruskan akses frekuensi pita lebar dari satu titik ke titik lainnya di setiap kabupaten. Akses tersebut akan mendukung jaringan serat optik pita lebar berkecepatan tinggi dengan kapasitas 300 gbps hingga 1.000 gbps di daerah tersebut.

Proyek tersebut akan dikerjakan enam perusahaan yang merupakan anggota konsorsium Palapa Ring :
- PT Bakrie Telecom Tbk (13,3 %),
- PT Excelcomindo Pratama Tbk (13,3 %),
- PT Indosat Tbk (13,3 %),
- PT Infokom Elektrindo (termasuk PT Mobile-8 Telecom Tbk 6,3 %),
- PT Powertek Utama Internusa (sebagai representasi Linbrooke Worldwide Ltd 10 %),
- sisanya diambil PT Telkom.

Setelah penandatanganan kontrak dengan para pemenang tender pada November 2007, proyek ini dimulai sejak pertengahan-akhir 2008. Pembangunannya diperkirakan memakan waktu empat atau lima tahun. Jadi kemungkinan selesainya di tahun 2013.


READ MORE

Comparing Google, Microsoft, Yahoo dan Apple staff salary

Posted by Android On Kamis, 26 November 2009 0 komentar
Kita telah mengetahui bahwa Google adalah perusahaan yang memberikan sangat banyak benefit sekaligus berani membayar mahal. Mulai dari google adsense sampai google checkout. Berapa kira-kira penghasilan dari google untuk karyawannya yang dimaksud tersebut? Berikut adalah sedikit gambaran penghasilan mereka yang kartolo tahu.




Rata-rata yang diambil dari sepuluh orang adalah $97.840 per tahun dengan variasi antara $80.000 dan $150.000 dengan bonus tambahan sebesar $20.000 hingga $45.000. Menambahkan gaji dan bonys, rata-rata insinyur Google yang diambil dari Glassdoor adalah $112.573 (ditambah lagi mereka diberi saham).

Insinyur Yahoo dan Microsoft memiliki gaji yang mirip, tetapi mereka menerima bonus yang lebih kecil sehingga rata-rata gaji total mereka adalah sekitar $105.642 dan $105.375. Rata-rata gaji insinyur Apple hanya sekitar $89.000, akan tetapi mereka berkesempatan menciptakan produk-produk yang paling digemari di dunia.

Demikian yang kartolo ketahui tentang penghasilan karyawan google sampai saat ini. Gimana? Pingin kan? Makanya sering - sering maen ke sini. Biar tambah pinter. hehehe...

Semoga bermanfaat..


READ MORE

Kotroversi pemblokiran blogger oleh DEMPKOMINFO

Posted by Android On Selasa, 24 November 2009 0 komentar
Pejabat DEPKOMINFO meminta maaf kepada para pengguna blog (buku harian di dunia maya) atas kesalahan pemblokiran yang terjadi Senin (23/11) ini. Seharusnya pemerintah memblokir situs yang mengandung Suku, Agama, Ras dan Antar-golongan (SARA).

Gatot Dewa Brata, juru bicara Depkominfo menegaskan, pihaknya meminta maaf jika ada pengguna blog yang terganggu akibat pemblokiran hari ini. Depkominfo sudah berbicara dengan 10 penyedia layanan Internet atau Internet Service Provider (ISP) untuk mengoreksi dan melakukan revisi ulang hari ini.

”Bukan maksud pemerintah memblok semua (blog), mohon dicermati secara cerdas. Tujuan pemerintah adalah kartun yang menghina Nabi, kasusnya sama seperti kasus Youtube dulu,” katanya. ”Kalau ada efek sampinganya kami mohon maaf.”



Menteri Komunikasi dan Informatika Taifatul Sembiring pun sudah mendengar kabar tentang protes para blogger (pengguna blog). ”Saya sudah baca di Twitter (salah satu situs jejaring sosial) hari ini banyak protes,” ujarnya di sela rapat dengar pendapat dengan Dewan Perwakilan Rakyat, Jakarta, Senin (23/11).

Perintah pemblokiran itu secara tertulis namun disposisinya terbatas agar tidak menghalangi akses para penggunanya. Ia sudah menginstruksikan untuk melakukan koreksi pemblokiran. "Jadi itu akan kami koreksi, karena instruksi saya URL-nya saja, tidak masuk pada pelebaran blognya itu,” katanya.

”Namanya kita memberikan instruksi ke bawah. Ditutupnya 2 mili tapi yang terjadi 7 mili . Yang mem-blokir operator bukan Depkominfo. Akan dikoreksi hari ini juga,” tuturnya.

Roy Suryo, anggota Komisi Politik, Keamanan, Politik, Luar Negeri, dan Komunikasi dan Informatika, mendukung pemblokiran yang dilakukan Depkominfo terhadap situs yang menghina Nabi pada hari ini. ”Soal pemblokiran jangan sampai yang diblokir A tapi kena ABCD. Yang diblokir itu harus melalui pertimbangan detail dan teknikal,” ucapnya.

Ia menyatakan, jangan sampai blogger semua terkena pemblokiran oleh pemerintah yang ingin memblokir satu situs. ”Kalau memang semuanya kena itu salah. Mungkin ini terjadi karena kebijakan teknik di lapangan yang salah,” ujarnya.

Roy menambahkan, ”Sampai saat ini belum ada aturan petunjuk pelaksana dan petunjuk teknisnya soal pemblokiran, sementara hanya subjektif dari menteri saja. Saya mendesak supaya peraturan pemerintah segera keluar, jangan sampai merugikan semua pihak.”

READ MORE