Oktober 17, 2009

tugas t_WeB

RIA(Rich Internet Aplication)

Aplikasi web adalah suatu aplikasi yang berbentuk klien / server yang dapat membentuk halaman-halaman web berdasarkan permintaan pemakai. Web dapat diakses oleh berbagai platform dengan menggunkan browser, seperti internet eksplorer, Mozilla, Google Chrome dan lain lain. Klien adalah pemakai yang meminta halaman web sedangkan server adalah penyedia layanan yang melayani permintaan dari klien dan mereka berhubungan dalam satu jaringan internet. Dunia internet saat ini sangat popular di kalangan masyrakat di berbagai lapisan masyarakat, mengingat begitu kompleksnya kebutuhan hidup masyarakat yang juga dapat diakses dari dunia maya internet. Pemakaian personal computer (PC) di rumah-rumah, kantor-kantor, sekolah dan di mana pun kita berada, kita dapat mengakses internet.

Suatu halaman internet sebenarnya disusun atas script-script tag HTML yang dikirim oleh server dan kemudian akan diterjemahkan menjadi halaman internet sesuai dengan permintaan klien. Tag scripting HTML disusun oleh beberapa tag dari suatu bahasa pemrograman di sisi server. Banyak sekali bahasa pemrograman yang biasa digunakan untuk menyusun tag pada script HTML, seperti PHP, ASP, JSP, PERL, dan lain-lain. HTML sekarang dikembangkan menjadi eXtensible HyperText MarkupLanguage (XHTML), sebuah versi yang lebih matang dan stabil. XHTML datang bersama beberapa cara dan pemikiran yang baru mengenai tag dalam halaman web. Aturan aturan dalam XHTML lebih ketat dibandingkan HTML dari segi cara penulisan.XHTML dapat merupakan perpaduan antara HTML dan XML karenamerupakan formulasi ulang HTML dalambentuk XML. Sekarang ini, XHTML menjadi standar suatu web berdasarkan rekomendasi W3C (World Wide Web Consortium). CSS dan javascript adalah bahasa program untuk membuat tampilan web menjadi interaktif.CSS dan javascript disisipkan di antara sintaksHTML.Berbagai contoh aplikasi web yaitu seperti mesin pencari atau search engine(google,yahoo), tokoonline(amazon), situs berita(detikcom), layanan akademis perguruan tingg i(website IT Telkom) dan lain-lain

Untujk saat ini para pengguna internet menjadi semakin dimanjakan dengan teknologi yang semakin berkembang. RIA (Rich Internet Aplication) yaitu sebuah teknologi baru dalam dunia internet yang memungkinkan klien untuk menikmati berselancar di dunia maya sambil menikati nonton televise dan sarana hiburan multimedia dimana pun. Teknologi yang mengusung platform baru yaitu Java FX yang menggabungkan bentuk dan fungsi untuk membangun RIA. Platform JavaFX 1.0 Sun membuka pasar global yang luas bagi para pengembang dan pembuat konten yang ingin menyebarkan konten, layanan dan pengalaman lintas layar bagi pelanggan mereka. Industri di dunia memperkirakan teknologi Java telah dipergunakan oleh lebih dari 90 persen desktop dan laptop, 85 persen pada telepon seluler dan juga pemimpin teknologi pada televisi generasi mendatang yaitu pemutar media Blu-ray dan juga seperangkat TV. Teknologi Java FX ini, dikembangkan di Santa Clara, California oleh pemilik platform Java yaitu Sun Microsystem dan menjadi andalan Sun dalam mengusung teknologi RIA, dan menjadi pesaing bagi Silverlight dari Microsoft, dan Flek dari Adobe.

Peluncuran Java FX menunjukan bahwa pengembangan Java sudah semakin luas hingga menjangkau ke berbagai kebutuhan pengembang Web, pembuat konten dan disainer visual. Dengan Java FX Sun, juga menandakan bahwa sudah terjadi inovasi lebih lanjut pada platform Java yang dapat memperluas kemampuan yang mencakup aplikasi yang beraneka ragam untuk segala aspek kehidupan. Adapun cakupannya mulai dari browser pada komputer, hingga perangkat telepon seluler dan televisi. Benar-benar menjadi lebih menarik dunia Web yang semakin berkembang dan semakin kompleks.

By Didik Nurhadi

Referensi VIVA NEWS, edisi Jum’at 9 Januari 2009

Oktober 16, 2009

TUGAS MULTIMEDIA

Didik Nurhadi


Multimedia database

Multimedia terdiri dari dua kata yaitu multi dan media, multi berarti beberapa dan media berarti sarana atau alat. Sebenarnya Kata multi media sering digunakan lebih banyak dipakai di dunia hiburan dan sudah ada sebelum keadaan computer seperti sekarang ini. Contohnya pementasan theater multimedia yang sudah ada sejak lama yaitu satu bentuk pementasan teater yang didukung oleh banyak alat bantu seprti pengeras suara, lampu panggung, gambar bergerak pada latar dan sebagainya. Sedangkan multimedia database merupakan perluasan kemampuan basis data yang dapat menyimpan data tidak hanya teks, tetapi dapat berupa suara, gambar,animasi, maupun data multimedia lainnya. Dukungan sistem basis data yang dapat menyimpan data dalam format multimedia dapat diberikan oleh ORACLE, PostGreSQL, Ms SQL Server dan beberapa produk lainnya. Hal ini sesuai dengan perkembangan teknologi yang sangat pesat, tuntutan akan kreativitas dan juga inovasi.

Perkembangan computer yang semakin luas dan kemampuan computer yang semakin meningkat. Ditamah lagi media penyimpanan data yang semakin besar, kemudian jaringan komunikasi data dengan kecepatan tinggi yang sdah tersedia saat ini, Format yang saat ini di dukung untuk dapat disimpan dengan baik sebagai salah satu nilai dari field database adalah blob, didalam field ini kita dapat menyimpan data berupa gambar. Dukungan ini sudah diberikan oleh Microsoft SQL server sejak versi 6,5 [RUJUKAN] , postGreSQL 7.2 [RUJUKAN]juga mendukung tipe image. Penyimpanan data dengan format multimedia juga biasa dilakukan dengan trik menyimpan alamatnya (path) dalam salah satu field di database. Trik ini biasanya dilakukan oleh programmer untuk meringankan/memperkecil ukuran basis data sehingga kinerja aplikasi menjadi lebih baik. Pada kasus penyimpanan data blob sebenarnya trik yang sama juga dilakukan, hanya saja manajemen penyimpanannya dilakukan sendiri oleh mesin basis data, sehingga dari sisi programmer terlihat bahwa data blob ini tersimpan dalam field yang bertipe blob tersebut.

Oktober 10, 2009

mekanisme kerja web

Nama : Didik Nurhadi
Nim : 10751000183
Lokal : TIF V C

Mekanisme kerja WEB BROWSER
Mula-mula user atau klien mengetikan URL atau alamat situs yanga akan dituju, tindakan ini biasa disebut dengan request, pada browser (Mozila, IE,GChrom,Flok,Saffari, dll). Request adalah suatu permintaan suatu skrip (PHP, ASP,JSP,Dll). Setelah request dieksekusi di browser, maka request yang berupa URL tersebut dikirim ke WebServer. Kemudian WebServer mengambilkan skrip tersebutdan memberikan ke mesin pengolah skrip, yang juga terdapat di WebServer. Secara lebih detail, server yang melayani permintaan dari klien sesungguhnya berupa suatu perangkat lunak yang dinamakan Web Server. Secara internal, web server inilah yang berkomunikasi dengan perangkat lunaj yang disebut Midleware dan Midleware inilah yang berhubungan dengan basisdata(database). Selanjutnya, mesin pengolah skrip menterjemahkannya menjadi kode HTML. Oleh WebServer, hasil dari mesin pengolah skrip ini dikirim kembali ke user/klien. Browser klien menterjemahkan kode HTML menjadi Informasi pada layar.











Gb. Mekanisme kerja WEB BROWSER


• Web server adalah server yang melayani permintaan user terhadap halaman Web.
• Middleware adalah perangkat lunak yang bekerja sama dengan web server dan berfungsi menerjemahkan kode-kode tertentu, menjalankan kode-kode tersebut, dan memungkinkan berinteraksi dengan basisdata.
• Browser atau webbrowser adalah perangkat lunak di sisi user yang digunakan untuk mengakses informasi Web.

April 09, 2009

networking

The CTDP Networking Guide Version 0.6.3 February
3, 2001

This guide is primarily about TCP/IP network protocols and ethernet network architectures, but also
briefly describes other protocol suites, network architectures, and other significant areas of networking.
This guide is written for all audiences, even those with little or no networking experience. It explains in
simple terms the way networks are put together, and how data packages are sent between networks and
subnets along with how data is routed to the internet. This document is broken into five main areas which
are:
1. Basics - Explains the protocols and how they work together
2. Media - Describes the cabling and various media used to send data between multiple points of a
network.
3. Architecture - Describes some popular network architectures. A network architecture refers to the
physical layout (topology) of a network along with the physical transmission media (Type of wire,
wireless, etc) and the data access method (OSI Layer 2). Includes ethernet, Token Ring, ARCnet,
AppleTalk, and FDDI. This main area of the document can and should be skipped by those
learning networking and read later.
4. Other Transport Protocols - Describes IPX/SPX, NetBEUI, and more.
5. Functions - Explains some of the functionality of networking such as routing, firewalls and DNS.
6. Further Details - Gives information about some protocols not covered in the "Basics" section. In
the future, it will include more information about packet fragmentation and re-assembly along
with more details about UDP and especially TCP and TCP connections.
7. More Complex functions - Documents multicasting, dynamic routing, and network management
8. Applications - Documents how some of the applications work such as ping and traceroute. In the
future, it will cover telnet, Rlogin, and FTP.
9. Other Concerns - Includes installing drivers, network operating systems, applications, wide area
networks, backing up the network and troubleshooting the network.
10. References - Includes a reference list of terms, RFCs and recommended reading.
The reader may read this document in any order, but for beginners, it would be best to read through from
the beginning with the exception of sections 2 (media), 3 (architecture), and 4 (other). At some point,
however, the reader should be able to break from the basics and read about routing and IP masquerading.
Introduction
There are no links to various reading material or software packages inside this document, except under
the references section. This is because it is more structured, and makes it easier to keep the document
current.
This document will first talk about the network basics so the reader can get a good grasp of networking
concepts. This should help the reader understand how each network protocol is used to perform
networking. The reader will be able to understand why each protocol is needed, how it is used, and what
other protocols it relies upon. This document explains the data encapsulation techniques in preparation
for transport along with some of the network protocols such as IP, TCP, UDP, ICMP, and IGMP. It
explains how ARP and RARP support networking. In functional areas, such as routers, several examples
are given so the user can get a grasp on how networking is done in their particular situation. This
document covers routing, IP masquerading, and firewalls and gives some explanation of how they work,
how they are set up, and how and why they are used. Firewalls and the available packages are described,
but how to set them up is left to other documentation specific to the operating system and the package.
Application protocols such as FTP and Telnet are also briefly described. Networking terms are also
explained and defined.
This document explains the setup of networking functions using Linux Redhat version 6.1 as an
operating system (OS) platform. This will apply to server functions such as routing and IP masquerading.
For more documentation on setting up packages, read documentation on this web site and other locations
specific to the operating system and the package. If you know how to set up other operating servers such
as Windows NT, you can apply the information in this document to help you understand how to
configure services on that OS platform.
This document was written because I perceived a need for a basic networking document to explain how
these networking services work and how to set them up, with examples. It will help a novice to learn
networking more quickly by explaining the big picture concerning how the system works together. I have
seen much good networking documentation, but little that explains the theory along with practical setup
and applications.

Best Practices to Turn Asset Management Into a Profit-Center

Best Practices to Turn Asset Management Into a Profit-Center

Lean is the elimination of enterprise waste, the streamlining of processes to increase productivity, and the more efficient use of capital assets and valued personnel in the pursuit of continuously improving bottom lines. It is common knowledge that asset downtime disrupts production and drives up both process and per unit operating costs. The irony is that companies can use asset performance management in implementing lean maintenance techniques not only to make more widgets, but to make each widget more profitably.

This paper provides concrete suggestions and identifies specific areas within the maintenance process where companies and enterprises can reduce waste, increase reliability, and view the maintenance effort as an integral part of a lean business posture. Recommended areas of improvement:

* Optimize parts inventory so parts are available for preventative and corrective maintenance
* Facilitate preventative maintenance activities for critical assets
* Provide cross-training for personnel to allow more skill flexibility
* Encourage and empower all stakeholders to initiate improvements

Maret 24, 2009

load me

Cybercriminals are realizing enormous profits from placing hidden malware in popular Web sites and infecting innocent visitors to these sites. Sophos estimates that there were roughly two million such malware variants in 2007, which equaled the total

great

This white paper explores insider attacks and insider risk, and shows how to control them by controlling and monitoring access. The paper describes the more common vulnerabilities exploited by insider attacks and a method for assessing insider risk.

dear

This white paper explores insider attacks and insider risk, and shows how to control them by controlling and monitoring access. The paper describes the more common vulnerabilities exploited by insider attacks and a method for assessing insider risk.

guys

This whitepaper discusses the powerful combination of Microsoft Windows PKI (Public Key Infrastructure) and Thales nCipher’s HSMs (Hardware Security Modules). Author and renowned PKI expert, Brian Komar, connects the benefits that

white

High-privilege administrative accounts hold the keys to gain access to the most sensitive IT processes and proprietary data—yet this level of access is far too often based on little more than trust alone. In this whitepaper, Enterprise Management .

plays

A Computer network is an interconnection of a group of computer.
Computer network may be classified according to the network topology,
such as Bus network, Star Network, Ring network, Mesh network,
Hybrid network, etc. Needs identification is a crucial step before
designing and developing a computer network. Based on the
identification, then the suitable network topology can be determined as
well as the hardware needed for that network. A case study in designing
computer network conducted based on the result of identification in
2006 at Indonesian Center for Vegetables Research, Lembang (ICVR),
West Java and Secretariat Jakarta. It is recommended that computer
network at ICVR and Secretariat should use Bus, Star, Hybrid and
wireless topology. The difference between these two networks in ICVR
and Secretariat is Demiliterized zone is applied at Secretariat.

choose

There are many devices which can be used to store or write data in your computer system. The options include hard drives, USB/Firewire storage devices, CD writers and DVD writers.

Hard drives are a very essential (and delicate) piece of equipment and are a standard feature on most computers. CD writers are also very common.

USB/Firewire storage devices and DVD writers are currently getting more popular with consumers.

Maret 23, 2009

work

There are many devices which can be used to store or write data in your computer system. The options include hard drives, USB/Firewire storage devices, CD writers and DVD writers.

Hard drives are a very essential (and delicate) piece of equipment and are a standard feature on most computers. CD writers are also very common.

USB/Firewire storage devices and DVD writers are currently getting more popular with consumers.

g

External Space

The first factor to consider is how much space your PC case is going to take up. Are you placing it on a tight, crammed desk? Or on a large desk? If you have the space, tower PC cases are a good choice. If you're short of space, you may wish to consider smaller mini PC cases which are getting more popular these days.

pc

The quality of application icons plays a vital role for application development. The more informative and eye-catching an icon is, the faster users can find it on the desktop or access the necessary function on the toolbar. The initial impression is based not only on the program's functionality, but on its visual appeal as well. The communication value of an icon is often underestimated, but virtually any person would agree that our attention is initially drawn by the image, not the contents underlying it. Therefore, it should be a rule of thumb for any serious developer to think about the visual aspect of the application well in advance. Nevertheless, things do not happen the way we want, and deadlines are often closer then we assume. If you are approaching your deadline and are experiencing time shortages because of testing, bug fixing and rechecking, and your designer has taken a sick leave, do not give way to despair. Your client will sign the close form in time, because your interface icons are right here! The Icon Empire Hardware Icon Library is a comprehensive set of items that cover most of the possible hardware-related application's needs. From a floppy drive to a web camera, from an audio cable connector to a bar code scanner, from a calculator to a GPS navigator - this fantastic icon set has everything you can think of! The designers of Icon Empire Hardware Icon Library have spent many an hour working on the product that was intended for the most meticulous clients. The level of detail and the exquisite look of each icon reflect the desire of the developers to provide their customers with a single option of immediately integrating the icons into the application. Your competitors will envy you, your client will be happy and you will know that the interfaces and the files of your future projects are safe with Icon Empire Icon Libraries and the team of professionals who do not simply design icons, but do it the way you want!