Tampilkan postingan dengan label Definition. Tampilkan semua postingan
Tampilkan postingan dengan label Definition. Tampilkan semua postingan

Rabu, 03 April 2013

What is a Port ?

By: copy paste uye On: 18.30
  • Share The Gag
  • Port

    Picture a bay where there are lots of private boats are docked. The overall location is called a seaport, literally a port at or on the sea. Everyone wanting to dock thereÑrequesting landing servicesÑuses the same port. Seaports work with berth numbers assigned to individual boats. The port name and the berth number combine into the "who, what, and where" of boat identification.
    In geek-speak, berth numbers on the Internet are Internet Protocol or IP addresses, a user's numerical identifier on the Internet. Depending on connection type and service provider, a user's IP address may or may not remain the same with each connection to or "docking" on the Internet.
    A computer port is a type of electronic, software- or programming-related docking point through which information flows from a program on your computer or to your computer from the Internet or another computer in a network. (A network, by the way, is a series of computers that are physically or electronically linked.)
    In computer terms, a computer or a program connects to somewhere or something else on the Internet via a port. Port numbers and the user's IP address combine into the "who does what" information kept by every Internet Service Provider.
    Ports are numbered for consistency and programming. The most commonly used and best known ports are those numbered 0 to 1023 dedicated for Internet use, but they can extend far higher for specialized purposes. Each port set or range is assigned specialized jobs or functions, and that's generally all they do. Usually, all identical system services or functions use the same port numbers on the receiving servers.
    For example, all computers accessing or requesting Quote of the Day will always use port 17, because that port is officially reserved for that purpose, and only requests for that service use port 17. Outgoing information is channeled through a different or private port, keeping the "incoming line" open for others. Email received on a local computer generally uses a TCP port 25. File Transport Protocol or FTP uses port 21, to name only a few port assignments.


    TCP/UDP

    TCP stands for Transmission Control Protocol, and UDP is the abbreviation for User Datagram Protocol. Both pertain to data transmissions on the Internet, but they work very differently.
    TCP is considerably more reliable. It is connection-based transmission of data. There must be anchored points between sending location to receiving location, and data A that is sent first will always arrive at the destination prior to data B which was sent second. The only transmission that fails is one that is broken (for instance, if the transmitting point's Internet connection was lost or a receiver's website is down or an email address is no longer valid. The email server is the receiving point that counts thereÑnot the user name.)
    UDP is connectionless protocol. Data is sent regardless of the receiving destination's status. Unfortunately, there is no guarantee that the data will ever be received, in what order, or in what condition.
    An example between the two might involve mailing two sets of two letters. Set A comprises Letters 1 and 2. Set A is sent via the postal service called TCP that has a permanent, pre-defined route with no derivation. Letters 1 and 2 will arrive, and they'll arrive in order.
    Meanwhile, Set B comprises Letters 3 and 4 which were sent on chronological days via the postal service nicknamed UDP. Because they were sent with the routing and delivery instructions, "Get there when you can by whatever route you might findÑmaybe. Just do the best you can," Letter 4 arrives torn, water-stained, bent, folded, and generally well mutilated; Letter 3 never shows up at all and is never returned to the sender.
    Another difference between TCP and UDP surrounds data streaming. Data sets sent via TCP are sent seamlessly; there is no separation between bits of data which allows for a smoother viewing or listening experience.
    UDP streaming data sets or packages are guaranteed to arrive, but they do so individually. Slightly lagging or jerking pictures or sound may result as each separately arriving package is received, read, and played. While seeming to contradict the above, the difference is in the data "packaging" aspect. Bits of data, those individual letters, aren't guaranteed to arrive or in what shape. The streaming data is packaged "in bulk," and boxes are sent, not envelopes. The streaming data "boxes" are sent along more reliably, and if they're requested, they'll be delivered. Consider the delivery of a higher priority, air travel versus ground transportation or certified mail versus standard mail.
    The previously uninitiated in geek-speak can comfortably brag that they no longer take any port in a computer storm, metaphorically speaking, but they know whether to have a program transmit or receive via a TCP or a UDP connection, which is progress, indeed.

    Port Range Groups

    0 to 1023 - Well known port numbers. Only special companies like Apple QuickTime, MSN, SQL Services, Gopher Services and other prominent services have these port numbers.
    1024 to 49151 - Registered ports; meaning they can be registered to specific protocols by software corporations.
    49152 to 65536 - Dynamic or private ports; meaning that they can be used by just about anybody.

    Mengapa Cowok Jelek Bisa Dapet Cewek Cantik ?

    By: copy paste uye On: 15.31
  • Share The Gag
  • Salam sahabat jitu. Artikel info dan definisi kali ini akan membahas permasalahan kaum pria atau cowok. Anda pasti sudah tahu bahwa saat ini cowok jelek tidak selalu mendapatkan hal yang jelek-jelek, terkadang dari mereka punya sesuatu yang lebih, seperti suara merdu, rejeki mengalir seperti aliran sungai, dan sebagainya termasuk soal cewek atau wanita. Nah dibawah ini akan dibahas mengapa cowok jelek bisa dapetin cewek cantik ?
    Ada beberapa alasan yang bisa dijabarkan kenapa cewek cantik lebih memilih cowok jelek, atau bisa kita katakan, alasan kenapa cowok jelek bisa dapetin cewek cantik dan seksi.
    • Alasan Pertama :  Mengapa mendapatkan cinta dari cewek paling cantik itu mudah adalah karena cewek yang terlalu cantik pastinya banyak diperhatikan cowok. Namun umumnya cowok hanya berani memperhatikan saja dan tidak serius bertekad untuk mendapatkannya cinta cewek itu. Hal itu karena kebanyakan pria merasa minder dan tidak yakin bisa mendapatkan cewek paling cantik dan mulus tersebut. Nah, karena sekarang kamu sudah tahu kenyataan ini, sekarang adalah kesempatan kamu untuk berani bertindak dengan yakin untuk mendapatkan cewek cantik itu. 
    • Alasan Kedua : Bisa jadi ada banyak cowok yang berusaha mendekatinya, tapi semua cowok menggunakan cara pendekatan yang kuno, basi, cara lama. Si cewek paling cantik yang sudah hafal cara pendekatan cowok biasa, akan merasa jenuh dan menganggap tidak penting atau tidak menantang. Ini juga kesempatan kamu.
    Sebenarnya masih banyak alasan yang bisa mendukung kenapa cowok jelek bisa mendapatkan cewek cantik. Seperti yang akan diterangkan dibawah ini.
    1. Kalo Cowok Punya Cewek Jelek, Pasti Dicengin Sama Temen-Temennya
      Sesama cowok biasanya nyela dalem-dalem. Kalau jelek, pasti langsung dibilang jelek. Kalau bego, langsung dibilang bego. Begitulah cowok, hinaannya blak-blakan. Nah, ini yang ditakutin oleh cowok yang punya cewek jelek. Cowok ini takut kalau terus-terusan dihina sama temen-temennya.
      Efeknya, banyak cowok yang nggak mau punya cewek jelek. Karena takut jadi celaan di antara teman-temannya. Kebayang dong kehilangan temen-temen gara-gara punya cewek jelek. Pasti banyak cowok normal nggak mau kehilangan temennya demi ngebelain cewek jelek. Parah sih, tapi ya emang begitu kenyataannya mau gimana lagi? Kalau cowok mau putusin cewek jeleknya, gampang. Bilang gini aja “aku lebih milih temen-temen aku. Aku nggak mau kehilangan mereka”. Jangan bilang kalau kamu mutusin cewek jelek kamu karena dia buruk rupa. Bilang kayak tadi aja, walaupun sebetulnya kamu mutusin dia karena dia jelek.
    2. Kalo Cewek Punya Cowok Jelek, Nggak Akan Langsung Dihina Sama Temen-Temennya
      banyak cewek yang santai-santai aja bawa-bawa cowok jeleknya ke hadapan temen-temennya. Karena nggak akan dihina kayak pertemanan antar cowok di atas.
      Selain itu, biasanya cewek itu hatinya gampang terenyuh. Jadi kalau temennya punya cowok jelek, tapi trus terbukti kalau cowok buruk rupa itu berhati seperti emas, pasti cewek tadi lupa sama kejelekan tampang pacar temennya yang jelek tadi. Jadinya nggak dicela deh.
      Berbahagialah cowok jelek yang punya cewek cantik.
    3. Cewek Lebih Tolerir Sama Cowok Jelek Dibanding Cowok ke Cewek Jelek
      Kamu jelek? Kalo kamu cewek, yang bisa kamu lakuin cuma berdoa supaya ada cowok cakep yang mau, atau biar nggak terlalu muluk, berdoa biar seenggak-enggaknya ada cowok yang mau. Tapi kalo kamu cowok jelek kamu masih punya harapan. Cewek cenderung lebih bisa memaklumi kejelekan wajah cowok, terutama kalo dia punya sifat yang baik, humoris, attitude yang bagus, apalagi kalo kaya. Jadi, kalo kamu nemu di mal pasangan yang cowoknya jelek tapi ceweknya cantik banget, berarti cowok baik, lucu, dan/atau kaya.
    4. Cewek Cantik Punya Cowok Jelek, Biasanya Untuk Sensasi
      Jujur nih gan, cewek itu adalah mahluk yanng haus akan pujian dan sanjungan, gak cuman dari pasangan tapi juga dari golongan alias group rumpinya, nah biar di kata dia cewek yang baik hati dan tidak sombong maka dia memilih cowok yang jauh dari yang di bayangkan, udah kurus, item, dekil, gak pernah mandi, tatoan, panuan, cacingan lagi, biar apa coba, biar banyak yang terharu atas kebaikannya, kalo di tanya "kenapa kamu memilih tuh cowok sih?" jawabnya cuman satu dan itu persis seperti di cerita romance ala televisi, "karna gue melihat hatinya, bukan tampangnya...", intinya, walaupun hati menjerit yang penting terkenal baik hati.GUBRAK..!!
    5. Cewek Cantik Punya Cowok Jelek Demi Masa Depan
      Siapasih orang yang gak mikir masa depan, seandainya di suruh milih nih, ada cowok jelek buncit, item, hidung gede, mata merah, pake mata panda, suka garuk garuk kaki lagi, tapi dia punta 9 toko emas, 8 Mall, 7 Bank Swasta, 6 Showroom Mobil, dan Rp.54.321.000.000.000.000. deposito, di banding dengan cowok kamu yang cakep putih, berotot, tapi pengangguran, suka ngutang, dan cuman bawa motor metic?mana yang kamu pilih? pasti jawabannya demi masa depan maka aku pilih pilihan yang pertama...gendut...gendut deh, yang penting bisa happy, hidup bahagia dan mati masuk surga karna membahagiakan orang jelek.
    6. Cowok Jelek Punya Cewek Cantik Karna Di Jodohin
      Nih dia gan, bener bener anugrah buat si cowok dan musibah jangka panjng buat si cewek, inget gak ceritanya siti nurbaya?nah gitu dah maksud Admin. Gak perlu ane jelasin panjang lebar, agan agan sekalian pasti dah ngerti maksunya, jadi buat para cewek yang terpaksa di jodohin, ane cuman bisa bilang, kasian deh lu, dan bagi cowok nya, ane cuman bisa mengucapkan selamat menikmati.
    Nah, alasan diatas sepertinya sudah cukup jelas untuk menjawab pertanyaan kita ? semoga anda mendapatkan jodoh sesuai dengan keinginan anda. Sampai jumpa diartikel info dan definis berikutnya. Salam sahabat jitu.

    Mencari Perpaduan Warna di Colorschemedesigner

    By: copy paste uye On: 13.32
  • Share The Gag
  • Salam sahabat jitu. Kali ini artikel definisi dan info, khusus bagi anda sahabat jitu yang mempunyai minat tinggi dalam bidang seni desain grafis. Anda pasti tahu bahwa perpaduan warna yang sesuai adalah salah satu kunci desain grafis yang bagus. Seperti perpaduan warna antara biru dengan kuning dan sebagainya. Salah memilih warna akan berakibat buruk bagi anda dan penikmat karya anda. Hampir semua hal seperti blog pun membutuhkan perpaduan warna yang sesuai agar dapat diterima dengan baik oleh mata kita (tidak membuat mata sakit).
    Penelitian bahkan menunjukkan bahwa warna desain sebuah program membuat seseorang betah berlama-lama menatap program tersebut. Hal ini terkadang menjadi poin penting dalam merancang sebuah program seperti program penjualan, kasir dan sebagainya.
    Nah mungkin ada banyak cara yang bisa anda gunakan untuk memadukan atau menserasikan warna. Salah satu cara yang akan saya bahas adalah dengan menggunakan bantuan colorschemedesigner. Dengan bantuan layanan web tersebut anda bisa mencocokan warna dengan baik. Seperti contoh dibawah ini.
    Nah, diatas itu adalah contoh perpaduan warna yang serasi antara biru dengan kuning. Anda bisa menggunakan contoh 1 warna, 2 warna, 3 warna, dan sebagainya. Anda juga akan diperlihatkan kode dari warna tersebut, layanan ini benar-benar akan memanjakan anda sahabat jitu. Kemudian jika anda membutuhkan modul yang membahas keserasian warna. Anda bisa mendownloadnya dibawah ini.
    Sayangnya, colorschemedesigner ini belum menyediakan software atau aplikasi, jadi anda harus terhubung ke internet untuk mencoba layanan ini. Semoga informasi ini bermanfaat bagi anda. Sampai jumpa diartikel info lainnya. Salam sahabat jitu.

    Rabu, 27 Maret 2013

    Aggregator Indonesia

    By: copy paste uye On: 04.36
  • Share The Gag
  • Salam sahabat jitu, beberapa hari yang lalu kabarnya provider internet saya, mengalami gangguan, bahkan adf.ly pun memberikan pernyataan yang sama. Sehingga saya memohon maaf apabila pelayanan blog saya mengalami gangguan. Nah pada artikel kali ini, saya akan sedikit membahas aggregator indonesia. Aggregator ? apa itu ? untuk lebih mengenal apa itu aggregator, mari kita sama-sama menyimak artikel ini sampai selesai. Semoga ilmu yang didapat dapat maksimal dan bermanfaat bagi anda.
    Aggregator blog adalah suatu situs yang berisi kumpulan situs. Bisa kita analogikan situs ini seperti index pada sebuah buku, jika ada perubahan data langsung ditampilkan secara otomatis di dalam situs aggregator.
    Sehingga apabila kita mengaitkannya dengan konsep SEO, cara ini merupakan salah satu cara yang terbaik untuk mempromosikan blog anda agar lebih dikenal dan populer dengan memasukkan alamat blog anda dan  Feed/RSS blog anda ke situs blog aggregator ini. Dengan memasukkan alamat blog dan Feed/RSS anda ke situs aggregator maka setiap anda meng-update atau memposting artikel baru ke blog anda, maka postingan anda juga akan tampil di blog.
    Saat ini di Indonesia telah banyak situs penyedia blog agregator, namun kebanyakan harus mendaftar terlebih dahulu dan prosesnya berbelit-belit alias susah sulit, sebagian lagi malah digunakan hanya untuk komunitas di bidang tertentu seperti komunitas TI, komunitas blogger, dan komunitas-komunitas yang lain yang sifatnya tertutup untuk kalangan umum. Namun sobat jangan kecewa terlebih dahulu karena masih ada satu blog aggregator indonesia yang paling bagus, sangat mudah cara daftarnya dan tak salah disebut sebagai aggregator indonesia yang terbaik dan terpopuler di Indonesia yang memiliki alamat http://blog-indonesia.com
    Berikut langkah-langkah yang harus sobat lakukan untuk mendaftar di agregator blog tersebut.
    • Buka aggregator blog-indonesia.
    • Klik menu Submit Blog. 
    • Tulislah data blog anda pada form submit your blog untuk mendaftarkan blog anda di http://blog-indonesia.com
    • Setelah semua data telah anda isikan maka akan muncul.
    • Blog anda telah berada pada tahap antrian untuk diproses di dalam aggregator blog ini.
    Demikian postingan saya tentang aggregator blog Indonesia, semoga artikel ini dapat bermanfaat bagi anda. Dan tetap semangat untuk sahabat jitu sekalian. Salam blogger indonesia.

    Kamis, 14 Februari 2013

    What is pinterest ? and how do you use it ?

    By: copy paste uye On: 20.36
  • Share The Gag
  • So, what is Pinterest? I’ve just classed Pinterest as social networking, but to be strictly accurate it’s a social bookmarking site. Bear with me. Such sites, like Redit and Stumbleupon, are well-established, enabling like-minded people to discover new websites in areas that interest them.
    Pinterest came along in 2010 and the clue to its philosophy lies in the name. Pinterest is a virtual pinboard - a platform for sharing pictures and videos. Its uniqueness, its appeal, and the key to its success, lie in the way it showcases these categories.
    So how does Pinterest work? Pinterest organises pinboards according to categories. Click on one - I’m choosing Food and Drink here - and you will be met with an array of photographs of the subject. Each photo represents the cover of a pinboard.
    I click on a tempting image labelled “Hot Fudge Pie”. The picture appears in enlarged form, and beneath it a row of thumbnails headed “Food”, from the same pinboard. An unmistakeable “Like” button at the top right enables you to, well, like it, Facebook-style.
    Below the enlarged image is a further row of thumbnails – covers of pinboards created by the person who pinned our chocolatey image. Click a thumbnail and it takes you to a further pinboard by that person. You can comment on pictures, and as with Twitter, follow the person pinning them. You can also Tweet, e-mail or repin - that is, add the picture to your own boards.
    Who uses Pinterest? At present, four out of every five Pinterest users are female, with a solid proportion 54 years old or over.
    To register, go to pinterest.com and sign up. You can add a picture and profile if you wish.
    Getting started with your own pinboards Once registered, you will see your user name displayed in the top right hand corner. Mouse over it and a drop down menu appears. Click “Boards” and you will see a row of blank boards, ready for you to fill up.
    Enter a name for a board, click “Create Board”, and you’re ready to start pinning. Select a Category and you can begin uploading pictures, either from your computer or by adding pins from the internet. I created a small pinboard in five minutes flat in the Photography category, uploading photos already stored on disk.
    How do I pin images from the internet? You will first need to install the “Pin it” button in your web browser. This step is a little trickier, but once done, pinning images is simple. You need to drag the “Pin It” button to your browser’s bookmarks bar – see Pinterest’s Help section if unsure. You then simply click the “Pin It” button on said bar when you see an image you’d like to pin.
    You don’t have to be at home to use Pinterest. Apps for iPhone, Android and iPad enable you to pin while out and about.

    Selasa, 12 Februari 2013

    Apa itu alexa rank ? Pentingkah ?

    By: copy paste uye On: 19.48
  • Share The Gag
  • Salam sahabat jitu. Kali ini kita belajar masalah ranking atau peringkat, ya sesuai judul pada artikel kali ini kita akan membahas apa itu alexa rank dan seberapa penting bagi blog atau website kita.
    Kadang di website lain terpasang widget alexa, tapi kita ingin tahu dari mana sich angka tersebut muncul. Dan tentu anda sudah mencari di blogger dan pasti anda tidak menemukannya ?  Berikut sedikit penjelasan mengenai alexa rank ini:

    Alexa Rank atau Peringkat Alexa adalah peringkat yang di buat oleh Alexa.com untuk website atau blog yang dihitung berdasarkan banyaknya trafik atau kunjungan ke website atau blog tersebut. Adapun data trafik atau kunjungan itu berdasarkan informasi dari jutaan pengguna internet yang memasang Toolbar alexa pada browser internet mereka.

    Lalu Dari mana Alexa.com dapat mengetahui Jumlah trafik atau kunjungan di blog kita?
    Seperti penjelasan di atas, bahwa informasi yang di dapat oleh alexa.com adalah bersumber dari toolbar alexa  yang terpasang pada jutaan komputer pengguna internet. Dengan terpasangnya alexa toolbar pada browser yang kita pakai, maka alexa.com dapat mengetahui  jumlah pengunjung serta page view  (jumlah halaman yang dilihat) pada website atau blog. Setelah data tersebut terkumpul maka mesin alexa akan secara otomatis membuat ranking atau peringkat pada website atau blog itu.

    Asal kita tahu bahwa Peringkat alexa atau alexa rank di mulai dari peringkat 1 sampai peringkat puluhan juta. Peringkat yang paling bagus tentunya peringkat satu, Semakin kecil nilai peringkatnya, maka kualitas peringkat tersebut semakin baik, ini berbanding terbalik dengan yang namanya Google Page Rank, jika google page rank semakin besar angka peringkatnya, maka semakin bagus.

    Pentingkah Alexa rank atau Peringkat Alexa bagi sebuah Website atau Blog?
    Bagi anda pemilik website atau blog yang tidak menjadikan web atau blognya tersebut untuk mencari uang di internet, maka alexa rank atau peringkat alexa tidak begitu akan berguna. Meskipun tidak berguna, terkadang alexa rank menjadi sebuah gengsi tersendiri, karena jika alexa rank bagus maka boleh di bilang website atau blog tersebut adalah sebuah blog yang populer.
    Namun, alexa rank atau peringkat alexa sangat penting sekali bagi anda yang menjadikan web atau blog sebagai tempat untuk mencari uang di internet. Kenapa sangat penting? karena tempat-tempat mencari uang di internet seperti Teks Link ads,  ask2link serta web-web penghasil uang lainnya menjadikan alexa rank sebagai tolok ukur. Semakin bagus alexa rank yang anda miliki, maka akan berbondong-bondong pula para pemasang iklan atau adverstiser yang mau memasang iklan di web atau blog anda, ini artinya  $ akan sangat mudah untuk masuk ke kantong anda.

    Bagaimana cara meningkatkan alexa rank?
    Karena alexa rank begitu penting bagi anda yang sedang mencoba mencari rezeki secara online, maka tentu saja alexa rank harus anda kejar semaksimal mungkin. Ada banyak cara untuk meningkatkan alexa rank, Salah satu cara yang paling efektif adalah memasang alexa rank widget pada web atau blog yang anda miliki seperti yang ada di blog ini. Bagi anda yang ingin memasang alexa rank widget bisa anda dapatkan di alexa.com dan anda tinggal masukan alamat web atau blognya, lalu ambil scriptnya dan masukan di web atau blog anda. Jika belum faham, pada posting berikutnya akan saya bahas khusus.
    Nah sampai disitu dulu ulasan mengenai alexa rank. Semoga dapat menambah wawasan anda. Sampai jumpa diartikel berikutnya, salam sahabat jitu.

    Cara mendapatkan uang dari internet

    By: copy paste uye On: 02.24
  • Share The Gag
  • Salam sahabat jitu. Artikel kali ini mungkin terdengar menggiurkan bagi anda. Tapi anda harus mempelajarinya secara mendetail, seksama, memang mendapatkan uang dari internet bukanlah suatu hal yang mustahil. Lebih tepatnya bisa dibilang gampang-gampang susah, kadang keberuntungan seseorang turut andil dalam hal ini. Ok anda pasti penasaran kan ? cara apa saja yang bisa dipakai untuk mendapatkan uang dari internet, ulasan lengkapnya ada dibawah ini.

    Beberapa cara mendapatkan uang dari internet

    1. Paid review
    menghasilkan uang dari paid review (kadang disebut juga pay per post atau sponsored reviews) via broker atau tanpa broker. Ada banyak broker program ini, namun saya hanya menyarankan kepada anda untuk mencoba broker berikut:
    Kelebihan bila menggunakan broker adalah ada banyak pengiklan, dan anda tidak perlu repot-repot untuk mencarinya. Namun, kelemahannya adalah penghasilan anda akan dipotong oleh broker tersebut (30-50%). Besarnya uang per review berbeda-beda setiap broker. SR memberlakukan sistem bid sehingga Anda bisa melakukan penawaran sesuai rangking blog Anda di broker tersebut. Kisaran penawaran yang umum adalah $5-$200.
    Sementara itu, broker lain menggunakan sistem non-bidding. Blogverstise dan Review umumnya memberikan job seharga $5-$10. Bila anda berniat menghasilkan uang dari paid review tanpa broker. Biasanya pengiklan atau agen iklan menghubungi anda langsung. anda tinggal mematok harga kisaran $25-$50 untuk sebuah paid review di blog-blog berbahasa Inggris anda.
    Tips singkat: Untuk menghasilkan banyak uang dari program paid review, menurut beberapa ahli, blog Anda sebaiknya:
    • Memiliki page rank minimal 2
    • Alexa rank di bawah 500 ribu
    • Memiliki konten dalam bahasa Inggris
    • Topiknya kesehatan, traveling, rumah, finansial, dan otomotif
    2. Pay per click (PPC)
    PPC adalah program yang akan membayar Anda bila ada iklan yang diklik pengunjung. Empat program PPC manca negara yang bisa anda ikuti adalah:
    Dari keempat program PPC tersebut, yang terfavorit dan mewah adalah Google AdSense dan Infolinks.
    Sementara itu, anda juga perlu mengikuti PPC lokal di blog-blog berbahasa Indonesia, seperti:
    3. Iklan mandiri
    Iklan mandiri adalah menyediakan slot iklan (berupa banner) di blog sendiri tanpa perantara. Ukuran banner bervariasi, mulai dari 125×125 sampai 728×90. Biaya beragam karena bergantung kepada jumlah pengunjung. 

    4. Cost per mile (CPM)
    Program CPM membayar Anda berdasarkan seribu impresi. Sebagai contoh, sebuah blog yang menghasilkan 100.000 page views per bulan menampilkan iklan dengan CPM $1, maka blog tersebut akan mendapatkan $100 per bulan (100.000/1.000 x $1). Bila Anda memiliki blog berhasa Inggris dengan jutaan page views per bulan, Anda bisa mencoba:
    5. Afiliasi
    Pembayaran program afiliasi berdasarkan komisi dari produk atau jasa orang lain yang dipromosikan. banyak juga jejearing afiliasi yang layak dicoba, antara lain:
    Sekadar informasi, afiliasi adalah salah satu program penghasil dolar yang menjanjikan. Pat Flyn adalah salah satu contoh blogger sukses di bidang ini (ia menghasilkan lebih dari $10,000 per bulan).

    6. Text link ads
    Text link ads adalah iklan link yang muncul di tulisan atau sidebar. Harga iklannya bervariasi, bergantung kepada brokernya. Berdasarkan pengalaman, harganya berkisar antara $4-8 per bulan. Broker text link ads yang bisa anda ikuti adalah:
    7. Paid download
    Paid download adalah program yang akan membayar Anda jika file yang Anda simpan di situs penyimpanan gratis di-download orang lain. File ini bisa berupa pdf, gambar, software, dan lain-lain. Uang yang akan Anda dapatkan bervariasi, umumnya $0.001 per download. Dengan kata lain, Anda akan dapat $1 bila file Anda di-download oleh seribu orang.

    Bagaimana ? apa anda tertarik untu mencoba salah satu diantara cara-cara tersebut. Atau anda akan mencoba semua ? semua tergantung kepada anda sahabat jitu, tapi saya sarankan agar anda menekuni dengan sungguh-sungguh dan tidak menyerah. Berusaha lebih dari 1 kali akan membuat anda mengerti kelemahan anda dan membuat anda semakin kuat. Selamat berjuang. Salam sahabat jitu.

    Sabtu, 15 Desember 2012

    What is RSS ?

    By: copy paste uye On: 10.39
  • Share The Gag
  • RSS stands for "Really Simple Syndication". It is a way to easily distribute a list of headlines, update notices, and sometimes content to a wide number of people. It is used by computer programs that organize those headlines and notices for easy reading.
    What problem does RSS solve?
    Most people are interested in many websites whose content changes on an unpredictable schedule. Examples of such websites are news sites, community and religious organization information pages, product information pages, medical websites, and weblogs. Repeatedly checking each website to see if there is any new content can be very tedious.
    Email notification of changes was an early solution to this problem. Unfortunately, when you receive email notifications from multiple websites they are usually disorganized and can get overwhelming, and are often mistaken for spam.
    RSS is a better way to be notified of new and changed content. Notifications of changes to multiple websites are handled easily, and the results are presented to you well organized and distinct from email.
    How does RSS work?
    RSS works by having the website author maintain a list of notifications on their website in a standard way. This list of notifications is called an "RSS Feed". People who are interested in finding out the latest headlines or changes can check this list. Special computer programs called "RSS aggregators" have been developed that automatically access the RSS feeds of websites you care about on your behalf and organize the results for you. (RSS feeds and aggregators are also sometimes called "RSS Channels" and "RSS Readers".)
    Producing an RSS feed is very simple and hundreds of thousands of websites now provide this feature, including major news organizations like the New York Times, the BBC, and Reuters, as well as many weblogs.
    What information does RSS provide?
    RSS provides very basic information to do its notification. It is made up of a list of items presented in order from newest to oldest. Each item usually consists of a simple title describing the item along with a more complete description and a link to a web page with the actual information being described. Sometimes this description is the full information you want to read (such as the content of a weblog post) and sometimes it is just a summary.
    For example, the RSS information for headlines on a local news website could contain the following information:
    Item 1:
      Title:Sidewalk contract awarded
      Description:The city awarded the sidewalk contract to Smith Associates. This hotly contested deal is worth $1.2 million.
      Link:http://www.gardencitynews.com/contractawards/sidewalk.htm
    Item 2:
      Title:Governor to visit
      Description:The governor is scheduled to visit the city on July 1st. This is the first visit since the election two years ago. The mayor is planning a big reception.
      Link:http://www.gardencitynews.com/news/2004/06/gov-visit.htm
    The RSS information is placed into a single file on a website in a manner similar to normal web pages. However, the information is coded in the XML computer language for use by a program (the RSS aggregator) and not by a person like a normal web page.
    RSS aggregator programs
    Think of an RSS aggregator as just a web browser for RSS content. RSS aggregators automatically check a series of RSS feeds for new items on an ongoing basis, making it is possible to keep track of changes to multiple websites without needing to tediously read and re-read each of the websites yourself. They detect the additions and present them all together to you in a compact and useful manner. If the title and description of an item are of interest, the link can be used to quickly bring the related web page up for reading.
    Here is a screen shot of an RSS aggregator in action. On the left is a list of the RSS feeds being monitored, along with an indication of the number of unread items in each feed in parenthesis. On the right are the details of the most recent items in a selected RSS feed (in this case, the New York Times). 

    Boston Globe (10), CNET News.com, etc. 

    There are many RSS aggregators available. Some are accessed through a browser, some are integrated into email programs, and some run as a standalone application on your personal computer.
    How do I find out if a website has an RSS feed?
    It is getting more and more common for websites to have RSS feeds. They usually indicate the existence of the feed on the home page or main news page with a link to "RSS", or sometimes by displaying an orange button with the letters "XML" or "RSS". RSS feeds are also often found via a "Syndicate This" link. Text "RSS" links sometimes (there are lots of variations) point to a web page explaining the nature of the RSS feeds provided and how to find them. The buttons are often linked directly to the RSS feed file itself.
    Once you know the URL of an RSS feed, you can provide that address to an RSS aggregator program and have the aggregator monitor the feed for you. Many RSS aggregators come preconfigured with a list to choose from of RSS feed URLs for popular news websites.
    How is the RSS feed file produced?
    Unless you are maintaining a website or want to create your own RSS feed for some other purpose, how the RSS feed is produced should not be of concern and you may skip this section.
    The special XML-format file that makes up an RSS feed is usually created in one of a variety of ways.
    Most large news websites and most weblogs are maintained using special "content management" programs. Authors add their stories and postings to the website by interacting with those programs and then use the program's "publish" facility to create the HTML files that make up the website. Those programs often also can update the RSS feed XML file at the same time, adding an item referring to the new story or post, and removing less recent items. Blog creation tools like Blogger, LiveJournal, Movable Type, and Radio automatically create feeds.
    Websites that are produced in a more custom manner, such as with Macromedia Dreamweaver or a simple text editor, usually do not automatically create RSS feeds. Authors of such websites either maintain the XML files by hand, just as they do the website itself, or use a tool such as Software Garden, Inc.'s ListGarden program to maintain it. There are also services that periodically read requested websites themselves and try to automatically determine changes (this is most reliable for websites with a somewhat regular news-like format), or that let you create RSS feed XML files that are hosted by that service provider.
    Tying it all together
    Here is a diagram showing how the websites, the RSS feed XML files, and your personal computer are connected: 

    Two web servers each with an RSS file being checked by an aggregator 
     
    The diagram shows a web browser being used to read first Web Site 1 over the Internet and then Web Site 2. It also shows the RSS feed XML files for both websites being monitored simultaneously by an RSS Feed Aggregator.
    Other uses
    In addition to notifying you about news headlines and changes to websites, RSS can be used for many other purposes. There does not even have to be a web page associated with the items listed -- sometimes all the information you need may be in the titles and descriptions themselves.
    Some commonly mentioned uses are:
    • Notification of the arrival of new products in a store
    • Listing and notifying you of newsletter issues, including email newsletters
    • Weather and other alerts of changing conditions
    • Notification of additions of new items to a database, or new members to a group
    One RSS aggregator is all that you need to read all of the RSS feeds, be they headlines, alerts, changes, or other notifications. RSS is shaping up to be a very popular and useful means for communicating. 

    from:http://rss.softwaregarden.com/aboutrss.html

    Kamis, 13 Desember 2012

    What is WHOIS Information and Why is it Valuable ?

    By: copy paste uye On: 00.25
  • Share The Gag
  • whois is a widely used Internet record listing that identifies who owns a domain and how to get in contact with them. The Internet Corporation for Assigned Names and Numbers (ICANN) regulates domain name registration and ownership. Whois records have proven to be extremely useful and have developed into an essential resource for maintaining the integrity of the domain name registration and website ownership process.

    What is in a Whois record?
    A Whois record contains all of the contact information associated with the person, group, or company that registers a particular domain name. Typically, each Whois record will contain information such as the name and contact information of the Registrant (who owns the domain), the name and contact information of the registrar Registrar (the organization or commercial entity that registered the domain name), the registration dates, the name servers, the most recent update, and the expiration date. Whois records may also provide the administrative and technical contact information (which is often, but not always, the registrant).

    Whois Thick and Thin Models
    There are two different data models for storing Whois resource information:

    Thin Model. Thin Whois lookup only gives the registrar, name servers and registration dates. To acquire additional information, a secondary lookup at the registrar on file is necessary to attain full information on domain name ownership.
    Thick Model. A thick Whois provides useful additional details beyond what is contained in a thin Whois record. Typically, the additional details contain contact (registrant, administrative, and technical) information. A lookup, then, will supply all the necessary information on who owns the domain, where it is registered, what name servers it uses, when it was registered and when it may expire.
    It takes a lot of effort to track down Whois information given the large number of registrars and Whois servers out there. DomainTools makes it easy to find Whois information in one spot. Our Whois Lookup is a great place to start.

    The purpose and value of the data in the Whois system has evolved in a number of ways over time including:
    • Reinforcing the stability and security of the Internet by providing network operators, computer incident response teams and ISPs with appropriate contacts
    • Regulating the registration status of domain names
    • Supporting law enforcement officials participating in national and international investigations.
    • Assisting in the battle against abusive uses of information communication technology, including illegal and other acts motivated by racial discrimination, violence, hatred, xenophobia, and related intolerance, any form of child abuse, child pornography, pedophilia, and exploitation of and trafficking in humans.
    • Supporting inquiries and necessary steps to carry out trademark clearances and to help expose intellectual property infringement, theft and misuse in accordance with applicable international treaties and national laws.
    • Helping businesses and other users and organizations in fighting fraud and safeguarding public interest
    • Upholding overall user confidence in the Internet as an efficient and reliable means of communication by helping users to identify which entities or persons are responsible for services and content online
    • Tracking down spam or malicious behaviorists
    Accuracy of Whois information. The information in a Whois record is initially provided when a domain name is registered. Over time, things change, and the information gets out of date. ICANN requires domain registrants have the ability to update their contact details. Each registrar has slightly different procedures for changing the information that appears on a Whois record. It generally involves accessing account information via the registrar's website, or via a call center representative. Whois record changes may take a period of time (often in the vicinity of 24 hours) to take effect. Having accurate, up-to-date Whois data makes it easier to contact a registrant or administrator.

    Whois Privacy. It is important to note that there is no way to hide the existence of a domain registration since anyone can check Whois to confirm the status of a domain. The Internet Corporation for Assigned Names and Numbers (ICANN) requires that the contact information of those who own and manage a domain name to be made publicly available via Whois directories. This includes mailing addresses, phone numbers and email addresses.
    Some domain registrars offer private registration services (also known as proxy services) in which the registrar's contact information is shown, and not that of the registrant. With this "private registration", the organization providing the domain privacy service is the domain registrant and contact. It is also important to note that even if domain privacy services are leveraged, it is not necessarily a guarantee of true anonymity. Registrars may be bound by law to release private information.
    There are even a few privacy caveats with certain domain extensions, such as .us and .ca domains. As of March 2005, the National Telecommunications and Information Administration (NTIA) declared that all owners of .us domains will not have the option to privatize their information, and that it must be made publicly available. Beginning in June of 2008, the Canadian Internet Registration Authority no longer posted details of domain registrants associated with .ca domains. However, corporations and organizations are still required to publicize information.
    Share on tweet

    Rabu, 12 Desember 2012

    Historical generation computer systems

    By: copy paste uye On: 14.11
  • Share The Gag
  • Some brief history of the computer are as follows.

    First Generation

    With the onset of the Second World War, the countries involved in the war sought to develop computers to exploit their potential strategic importance a computer. This increased funding for computer development and accelerate technical progress. In 1941, Konrad Zuse, a German engineer to build a computer, the Z3, to design airplanes and missiles. 
    Party allies also made other progress in the development of computer power. In 1943, the British completed a secret code-breaking computer called Colossus to crack the secret code used by Germany. The Colossus did not significantly affect the development of the computer industry because of two reasons. First, the Colossus is not a versatile computer (general-purpose computer), it was only designed to decode secret messages. Second, the existence of the machine was kept secret until decades after the war ended. In the mid-1940s, John von Neumann (1903-1957) joined the University of Pennsylvania team, initiating concepts in computer design are up to 40 years is still used in computer engineering. Von Neumann designed the Electronic Discrete Variable Automatic Computer (EDVAC) in 1945 with a memory to hold both programs and data. This technique allows the computer to stop at some point and then resume her job back. The main key von Neumann architecture is the central processing unit (CPU), which allowed all computer functions to be coordinated through a single source. In 1951, UNIVAC I (Universal Automatic Computer I) made by Remington Rand, became the first commercial computer that uses the Von Neumann architecture model. 
    First generation computers were characterized by the fact that operating instructions were made specifically for a particular task. Each computer has a different binary coded program called a machine language (machine language). This causes the computer is difficult to be programmed and the speed limit. Another feature is the use of first-generation computer vacuum tube (which makes the computer at that time are very large) and magnetic cylinders for the storage of data.

    Second Generation 

    In 1948, the invention of the transistor greatly influenced the development of computers. The transistor replaced the vacuum tube in televisions, radios, and computers. As a result, the size of electric machines is reduced drastically. The transistor used in computers began in 1956. Other findings in the form of magnetic core memory-second generation computers smaller, faster, more reliable, and more energy efficient than its predecessor. The first machine that utilizes this new technology is the supercomputer. IBM makes supercomputer named Stretch, and Sprery-Rand makes a computer named LARC. These computers, both developed for atomic energy laboratories, could handle large amounts of data, a capability much in demand by atomic scientists. The machine is very expensive and tend to be too complex for business computing needs, thereby limiting. There are only two LARC ever installed and used: one at the Lawrence Radiation Labs in Livermore, California, and the other at the U.S. Navy Research and Development Center in Washington DC The second generation of computers replacing the machine language to assembly language. Assembly language is a language that uses abbreviations to replace the binary code.In the early 1960s, computers began to appear successful second generation in the business, in universities and in government. The second generation of computers is a computer which used transistors. They also have components that can be associated with the computer at this time: printers, storage, disk, memory, operating system, and programs.

    Third Generation 
    Although the transistors in many respects the vacuum tube, but transistors generate substantial heat, which could potentially damage the internal parts of the computer. Quartz stone (quartz rock) eliminates this problem. Jack Kilby, an engineer at Texas Instruments, developed the integrated circuit (IC: integrated circuit) in 1958. IC combined three electronic components onto a small silicon disc, made from quartz. Scientists later managed to fit more components into a single chip, called a semiconductor. As a result, computers became ever smaller as more components were squeezed onto the chip. Other third-generation development is the use of the operating system (operating system) which allows the engine to run many different programs at once with a central program that monitored and coordinated the computer's memory.

    Fourth GenerationAfter IC, the only place to go was down the size of circuits and electrical components. Large Scale Integration (LSI) could fit hundreds of components onto one chip. In the 1980's, Very Large Scale Integration (VLSI) contains thousands of components on a single chip.Along with the proliferation of computer usage in the workplace, new ways to harness their potential developed. Along with the increased strength of a small computer, these computers can be connected together in a network to share a memory, software, information, and also to be able to communicate with each other. Computer networks allow a single computer to establish electronic collaboration to complete a task process. By using direct cabling (also called Local Area Network or LAN), or [telephone cable, the network can become very large.

    Fifth Generation

    Defining the fifth generation computer becomes quite difficult because the field is still very young. Example of fifth generation computer imaginative fictional HAL9000 computer from the novel by Arthur C. Clarke titled 2001: Space Odyssey. HAL displays all the desired functions of a fifth-generation computers. With artificial intelligence (artificial intelligence or AI), HAL may have enough reason to hold conversations with humans, using visual feedback, and learn from his own experiences. 
    From the two definitions above, it can be defined computer system is an electronic network that consists of software and hardware that perform a specific task (receive input, process the input, keep the commandments, and provides output in the form of information). Moreover, it can also be interpreted as elements related to running an activity using a computer. 
    Computers can help people in their daily work, the job such as: word processing, number processing, and image processing.The ultimate goal of a computer system to process the data to produce information that needs to be supported by elements that comprise hardware (hardware), software (software), and brainware. Computer hardware is the hardware itself, the software is a program that contains commands to perform certain processes, and human brainware are involved in the operation and manage computer systems.Or computer systems are elements related to running an activity using a computer. Elements of a computer system consisting of human (brainware), software (software), set of instructions (instruction set), and hardware (hardware). Computer hardware is the hardware itself, the software is a program that contains commands to perform certain processes, brainware are humans involved in the operate and manage computer systems, and instruction set is a command.Elements of a computer system consisting of human (brainware), software (software), set of instructions (instruction set), and hardware (hardware). Thus, these components are the elements involved in a computer system. Of course, the hardware does not mean anything if there is not one of the other two (software and brainware).The three elements of a computer system must be interconnected and form a single unit. Hardware without software is not going to mean anything, just a dead thing. Both hardware and software are also not work if there are no people to operate them.Thus, these components are the elements involved in a computer system. Of course, the hardware does not mean anything if there is not one of the other two (software and brainware). A simple example, who will start the system if there are no humans. Or will execute any command if no computer software.Computer system is closely associated with the hardware alone, but also to learn about the computer system programming a bit.At first all operations in a computer system is handled by only one user. So all the settings on the hardware and software made by the user. But along with the development of the Operating System on a computer system, this arrangement was submitted to the Operating System. All kinds of resource management is governed by the Operating System.Setting the hardware and software is closely linked with the protection of hardware and software itself. Thus, when the first protection against all kinds of hardware and software for the system to run stable is done directly by the user so now System Operations who is responsible for many things. Operating systems should be able to regulate the use of all kinds of hardware resources required by the system to avoid the things that are not desirable. Along with the rise of resource sharing that occurs in a system, then the operating system must be able to intelligently adjust which should take precedence. This is because, if the regulation is not going well, it can certainly be a hardware failure protection.With the presence of multiprogramming which allows the utilization of several programs in memory at the same time, the utilization can be increased with concurrent use of these resources, but on the other hand will cause a problem because there is only one program can run at the same time unit. There will be many processes that affected only the result of a disturbance in one program.For example, only if a hard drive into a resource that is needed by a wide variety of programs, then there could be damage caused by hard disk temperatures too hot due to a congestion situation at the same time the use of resources from so many programs to send requests for the use of disk them. 
    This is where the hardware protection act. Operating system must either provide maximum protection, so that if there is one program that does not work then it will not interfere with the performance of the operating system and the programs that are running other.In addition, the operating system on the computer, In general, the computer system consisting of a CPU and device controllers are connected via a bus which provides access to memory. Generally, each device controller is responsible for a hardware spesisfik. Each device and the CPU can operate concurrently to gain access to the memory. The existence of some hardware can cause synchronization problems. Therefore, to prevent a memory controller is added to synchronize memory access. 
    At a more advanced computer systems, more complex architecture.To improve performance, use multiple buses. Each bus a data path between several different devices. In this way the RAM, processor, GPU (AGP VGA) connected by high speed primary bus is better known as the FSB (Front Side Bus). While other devices connected by a slower bus speed lower bus connected to another more quickly get to the main bus. For communication between the bus is used a bridge. 
    Responsibilities bus synchronization indirectly also affect memory synchronization performed by a bus controller or known as a bus master. Bus master will control the flow of data until at one time, the bus only contains data from a single device. In practice bridge and bus masters are brought together in a chipset. If the computer is turned on, which is known as booting, the computer will run the bootstrap program is a simple program that is stored in the form of ROM chip CMOS (Complementary Metal Oxide Semiconductor). Modern CMOS chips usually type EEPROM (Electrically Erasable Programmable Read Only Memory), which is non-volatile memory (not lost if the power is turned off) that can be written and erased with an electronic pulse. Then Bootstrapping program, better known as the BIOS (Basic Input Output System). Bootstrap main program, which is usually located on the motherboard will examine the major hardware and hardware-initialization of the program in the hardware known as firmware. Bootstrap main program will then find and load the operating system kernel into memory and then proceed with the initialization of the operating system. From this program the operating system will wait for certain events. This event will determine what to do next operating system (event-driven). This event in modern computers is usually marked by the appearance of the software or hardware interrupt, so the OS is called Interrupt-driven. Interrupt from hardware normally delivered via a specific signal, while the software sends an interrupt by invoking a system call or also known as monitor call. System / Monitor this call will cause the trap is a special interrupt generated by the software due to problems or requests for operating system services. Trap is also often referred to as the exception. Each interrupt occurs, a set of codes known as ISR (Interrupt Service Routine) will determine the action to be taken. To determine the action to be done, can be done in two ways polls that make computer check one by one device that is investigating the source of the interrupt and ISR by using alamatalamat stored in the array is known as an interrupt vector in where the system will check the Interrupt Vector whenever an interrupt occurs. Interrupt architecture must be able to store the address of the instruction that in-interrupt. On the old computer, the address is stored in a particular place are fixed, whereas on the new computer, the address stored on the stack along with state information at that time.