Sabtu, 16 Mei 2009

what's in the computer

computer is very close to humans, ranging from business, message, share experiences, even to the sharing of computer crime. usually starts from small up to the hacker who extream like to light up to allow the virus to the virus and turn off your computer hardware.

So that sometimes people get a challenge in the world of hackers, but the computer is very much needed from the middle up to middle to bottom, all serve as daily needs, as an example of the increasingly digital world, and playing songs from Hp Mp4 or require that any computer. so that all needs to be even, to the graphic design, to the programmers.

Besides all that can be used with Internet connection, which in the current spread throughout the region that allows internet users will no longer feel the distress, many available Internet connection that is now spread even to the connection using the HP support only as long as the WEB can be connected to the internet, is now also available modem using the card that has a lifetime of active, and also the hotspot that is usually free to use, for example on campus and also a cafe.

And for lovers of the internet is now available through many internet businesses that make many people switch to the internet business that promises more than the superficial business. Many businesses that promise depends on the owner only if the money he konsis get the overflow.

Many businesses are offered through the internet from free to paid.

Selasa, 05 Mei 2009

Computing

Met Office
Following the links from weather to IT systems

Met Office seeks better IT forecasts

CMDB project aims to improve Met Office's customer services

Written by Gareth Morgan

For weather-obsessed Britons, the Met Office is an instantly recognisable institution, and one much loved despite its tendency to publish gloomy forecasts.

But providing estimates of expected rainfall for the early evening weather forecast is just one facet of the Met Office's work – commercial pilots, firefighters and radiation leak investigators all rely on reports regularly delivered from the Met Office's Exeter headquarters.

In all, the Met Office produces about 650 services to external agencies. Each service is supported by a breathtaking assortment of interconnected IT systems, including supercomputers, mainframes and servers.

That complexity creates problems, as Clare Hubbard, a service manager at the Met Office explains: "In many cases, the first we'd know about a problem with one of our services would be when the customer called up to find out what had happened to their report."

Furthermore, identifying the root cause of problems was challenging, as the client reports are generated using a variety of different systems.

For example, FireMet provides regional fire services with weather information that gives firefighters information on wind directions in specific locations, which helps them understand how the fire is likely to spread and identify a safe approach when dealing with major incidents. Building up this local picture requires input from a huge number of systems – so a problem with one of the 100-plus internal IT systems could cascade down and interrupt its client services.

The Met Office's IT team realised that it needed a mechanism to trace on which IT systems individual services were dependent. The ultimate aim is to be able to follow a line from one of the Met Office services, such as FireMet, " all the way down to the plug in the wall" says Chris Beighton, team leader for knowledge management at the Met Office.

Ultimately, the goal is to achieve a business service management approach to IT, where the key elements of the IT infrastructure are aligned to meet the goals of the business. However, the Met Office had some groundwork to do before this was possible.

In 2006, it initiated a programme to update its service management suite. It had been using version four of the Remedy service management software from BMC Software, and as part of its licensing arrangement it already had the option to upgrade to Remedy 7.

The Met Office currently has about 500 support users and 1,300 end users, and Remedy has been used as the operational application for change, problem and incident management.

The upgrade was necessary because BMC had stopped supporting Remedy 4, reports Hubbard, and the system had been so heavily customised over the years that patching had become increasingly troublesome. But the upgrade was additionally attractive because Remedy 7 could support ITIL, the IT infrastructure best practice framework.
"We also have a large number of Linux and Firefox users, so having a system that supports them was also necessary," she adds.

The next stage of this process was to build a configuration management database (CMDB), to capture and store information on its entire IT infrastructure.

The first phase of populating began in January 2009. This has been aimed at filling its "asset gaps". As Beighton explains, much of the knowledge about what systems the various services rely on is "carried around in people's heads".

Capturing that information was essential to successfully populating the CMDB and it was essential that staff bought into the project. When staff have a sense of ownership over the process, it increases the chances of getting accurate information, says Beighton.

The process is complicated by the variety of systems that feed into each of the Met Office's services. While supercomputers and mainframes are relatively easy to classify, the Met Office also uses a colony of stations to take atmospheric measurements which then feed data into its modelling systems.

For the Met Office to be able to consider all constituent parts of a service, it needs to be able to record the status of these external stations as part of its CMDB, says Hubbard. "In effect, we're treating some sheds as if they were IT racks," she jokes.

The final phase of the CMDB project is due to be finished by March 2010. Once complete, the IT team at the Met Office expects to be able to provide a comprehensive report of operational performance. And for Hubbard, that would be a particularly rosy forecast.


duplicate copy of : http://www.computing.co.uk/computing/analysis/2241578/met-office-seeks-better, at 05.05.2009

Kamis, 23 April 2009

Computer Universities in Southeast Asia.


Violet Campus

Vision
Becoming Computer Open Universities in Southeast Asia.

Mission
Mission STMIK Amikom Yogyakarta: Generate a graduate of global quality, productive, spirited entrepreneur, professional disciplines in science and technology, especially knowledge of computers and informatics berbasisi. Research and produce quality and reliable Global Global community.


Purpose

1. Experts ready to establish that the use of information technology, have a certain noble, and be able to work in a professional, useful for the community, nation, state, and religion.
The 2nd Improve the quality of public education, print skilled labor that is ready to apply the skills in control technology ntuk support of national development.

So that the Vision, Mission, Objectives and Goals can be executed consistently in operation, the Vision, Mission and Objectives Targets need socialized overlooks Sivitas academic STIMIK Amikom YOGYAKARTA, so hopefully there is unity in pelaksanaanya income which can facilitate achievement of goals set.






Awards be Amikom Until the Year 2007

In 2007 this Amikom has achieved several awards at national level and at international level. Here are the award-an award that has to be the year 2007.

1. INTERNATIONAL AWARD - APICTA (Asia Pacific ICT Awards), Merit ICT Education & Training APICTA Indonesia 2006
Hanif Al FATTA, S. Kom, Lecturer STMIK Amikom Yogyakarta selected sebgai Nomination Tertiary Student Project category at the Asia Pacific Information & Communication Technology Award (APICTA) in Macao, 2006.


2. INTERNATIONAL AWARD - APICTA (Asia Pacific ICT Awards), Integrated University Management System Nomination
Arief Setyanto, MT, Lecturer STMIK Amikom Yogyakarta was chosen as Nomination category Education & Training in the Asia Pacific Information & Communication Technology Award (APICTA) in Macao, 2006.


3. NATIONAL AWARD - Indosat Wireless Information Communication (IWIC)
Andi Sunyoto, S. Kom., Lecturer STMIK Amikom Yogyakarta was chosen as Champion II Indosat Wireless Information Communication (IWIC) 2006.


4. INTERNATIONAL AWARD - The Best e-Practice Award ADOC Taiwan
Kusrini, M. Kom and Arief Setyanto, MT, lecturers STMIK Amikom Yogyakarta, each recognized with the Best Practice of e-Taiwan ADOC Award, 2005.


5. INTERNATIONAL AWARD - ASEAN Developer Citra Award for Enterpreneurship
Dr. M. Suyanto, MM., Chairman STMIK Amikom Yogyakarta, receive awards ASEAN Developer Citra Award for Enterpreneurship, 2004.


have been copied from http://amikomcollege.blogspot.com/2008

Kamis, 09 April 2009

The Computer

what there is inside the computer that needed to be capable of operating

Computers are made of the following basic components:

  1. Case with hardware inside:

    1. Power Supply - The power supply comes with the case, but this component is mentioned separately since there are various types of power supplies. The one you should get depends on the requirements of your system. This will be discussed in more detail later

    2. Motherboard - This is where the core components of your computer reside which are listed below. Also the support cards for video, sound, networking and more are mounted into this board.

      1. Microprocessor - This is the brain of your computer. It performs commands and instructions and controls the operation of the computer.
      2. Memory - The RAM in your system is mounted on the motherboard. This is memory that must be powered on to retain its contents.
      3. Drive controllers - The drive controllers control the interface of your system to your hard drives. The controllers let your hard drives work by controlling their operation. On most systems, they are included on the motherboard, however you may add additional controllers for faster or other types of drives.

    3. Hard disk drive(s) - This is where your files are permanently stored on your computer. Also, normally, your operating system is installed here.

    4. CD-ROM drive(s) - This is normally a read only drive where files are permanently stored. There are now read/write CD-ROM drives that use special software to allow users to read from and write to these drives.

    5. Floppy drive(s) - A floppy is a small disk storage device that today typically has about 1.4 Megabytes of memory capacity.

    6. Other possible file storage devices include DVD devices, Tape backup devices, and some others.

  2. Monitor - This device which operates like a TV set lets the user see how the computer is responding to their commands.

  3. Keyboard - This is where the user enters text commands into the computer.

  4. Mouse - A point and click interface for entering commands which works well in graphical environments.

These various parts will be discussed in the following sections.

Digital in computer