Bisnis Dahsyat tanpa modal

Wednesday, April 21, 2010

Monitor your blog visitors using firefox addon


As usual on the blog mostly always use whos.amung.us to know how many visitors are active at the same time. From the widget is visible figures showing how many people are currently active. to know the details, we can menglik these widgets. We'll be redirected to the site immediately Among whos. From that site we can know the current visitor had been reading anything.

With this information we can use it to improve the blog. or choose a post that will come the preferred reader based on the number of visitors to read on the current position.

if we see visitors using whos Among the widget only on the blog why do not we see such active visitors using Mozilla addon. by installing an add-on this we can monitor all the sites that we see what his visitors are online, such as in the image above.
to install this widget you please download the Add-on is in the link below.
Once your download is complete, the next install and referesh browser. see the change. now you can monitor how many visitors your blog via a browser.
good luck.


Monday, April 19, 2010

How to Make Photos Simple GIF Animation

Special for you who stopped by the following studyinginformationsystems.blogspot.com blog exposure about how to easily create animated GIF images. Which obviously is not as complicated as using adobe photoshop, because there are still many who can not you? Hehehe including me, hehe. This time just using the facilities provided by a blog, please dilanjut interested in reading it.

GIF (Graphics Interchange Format) is one of the popular image types in use, primarily in the online world. This one is supporting the GIF file size is small when compared to JPEG or BMP, the image quality will be different indeed. One of the advantages is its ability to generate GIF animated images, although the picture quality not so good.

Animated GIF files you find in many forums, social networking in the form of avatars and used as a "photograph" the identity of the user concerned. With this avatar it is as if the user look more "cool" to appear in the forum, although the avatar can fool other users.
What is important is how to create animated GIF files? This time I want to give information about the facilities to create animated GIF by using the facilities of gickr.com. Follow the steps how to make the following:

1.Prepare an image from your computer as many as 10 images maximum.
2.click on this site
after entry on the blog ... please click the 'upload images from you computer'
browse.trus click select picture you'd like to make GIF
click Open (limit max 10 images)
for size and other pictures up on your tastes.
Click continue at the bottom right corner triangle ... ..
then get this gif image code
completed.

Sunday, April 18, 2010

How give music in your Blog

To put the music on the blog, we can use the site for free music provider that many strewn on the internet, which is important to look for our jelly. In essence there are three types of music provider sites, namely:

1. These sites provide a wide selection of songs that we can choose according to our tastes

2. The site does not provide the song, but we have to upload songs from your computer

3. These sites provide a wide selection of songs, or we can also upload songs from your computer



Certainly among the three existing advantages and disadvantages. The advantage of using services of the first sites that we do not need to have their own songs, we just select the song that is liked and then take it and then input the HTML code into your blog, the process was very fast and practical. But it is sometimes the lack of songs that we like is not available at that site.

For the second site, we can incorporate the benefits of the songs we like without having to depend on the site so any song can be an important yes we should have a song file to be uploaded. shortcomings are because we have to upload songs to the site then in the upload process usually takes quite a long time, so a little tedious when doing the upload process is also of course the cost of surfing we became more and more swollen.

For the third site, for now I just found out one site only, please to the pal who knows the sites that belong to this category to inform the comment box so that known by the other mate. Now for this site so we are more advantages could choose, would pake tracks available or willing to upload can too. but there are no shortcomings in sediakannya control panel for the visitors, so songs that we can not put in anything about the visitors that will run by itself, we need to think about is the song that we like is not necessarily the preferred by the visitors, so this will interfere with the comfort of the blog readers ita.

Yo'i buddy, rich for too long with fendefinisian yes, a bit stale so boring ... sorry boss. We return to the (laptop) topic that originally put the song on his blog. The first example is using a site that has been providing a variety of songs without having to first upload, I take the example www.song2play.com. please follow the following steps:

1. Please visit www.song2play.com

2. Enter the title of the song you want on the search engines available. Example: Hotel California. Or write the name of his band's singer or group. Examples of the Eagle

3. If the title track has not appeared, there is usually a paper Click here to get more Result. just click the text

4. Having seen some of the title song, click on the title track being my friend looking for, will automatically display and navigation controls were selected song will be in perdengarkan

5. In the bottom left hand corner is a box that has been in check, namely Autostart, Show Title song. Autostart means that when visitors visit your blog, it will instantly play songs. Well if you do not want to directly play the alias given to the visitor the opportunity to choose whether to listen to the song or not, my friend had removed the checkmark by clicking

6. Show Song Title meaning in the navigation bar will appear in the title of the song fit. If you do not want to come treat ya just sign centangnya

7. Copy all the HTML code provided in the text area, paste in notepad. Please close the site window

8. The next step is pal live input was provided HTML code into your blog, never to enter HTML code into your blog, I have often discussed in previous posts, if my friend forgot please click here

Put in the Sidebar Guest Book

Setting up a guest book (shoutbox / guestbook) on a blog is a pretty nice thing is important, because this guest book is one of the means for interaction between the mpunya blog with the blog visitors. With the pajangnya guest book in the blog, so the visitors can express his heart out about the blog that you make, the exact contents of a guest book can be highly variable this is a compliment, question, just for fun, or there is also a criticism of the content of your blog , and precisely by the variation of our blog so that makes life more vivid.

site address guest book that the server provider is pretty good and rarely experience down the http://www.shoutmix.com. For the way you please follow the steps below:

1. As usual you should first list by clicking on the writings Get One noe, free>>, or by clicking on Sign Up writings, please you write your data on the form that has been on offer.

2. If you already tedaftar, and accepted as a member shoutmix, please your login with your id

3. In the column entitled "Style, click the menu appearance.

4. Please click on the pulldown menu next to Load From Preset to adjust your view guest book, please select the line with your wishes. If you are finished click Save Settings.

5. To get the HTML code of your shoutbox, please click the Use Shoutbox under the Quick Start menu

6. Click writings Place Shoutbox on the web page. Contents Shoutbox width and height of the desired

7. Copy all the existing HTML code in the text area under the Codes Generated text, then save it in your Notepad program

8. Click Log out which are located on your screen to exit from your shoutmix pages. Please close the site.

9. Completed


To place this shoutbox HTML code in your blog, please follow the steps below.

For bloggers with a classic template:

1. Log in first to blogger.com with your id

2. Click on the Template menu

3. Click Edit HTML

4. Paste the HTML code of your shoutbox has been copied in notepad where you want

5. For details shoubox I take the example with mine, to put it in a browser just click Edit and select Find (on this page) .. then write the words guest book then click on the find, then we will immediately take it to the text. If you have found this article please paste its HTML code shoutbox.

6. Click the Preview button to see our changes.

7. If it fits with earlier changes, click Save Template Changes

8. Completed
---good luck---

How to create animated Ballet Dance





Animation is beautiful to look at or watch, we would like to have seen the animated cartoon films on tv or in the cd / dvd.
Up here we just finished the course or a spectator audience of animation animation course, try to make it. How good if we continue to make animated cartoons shown by many people on tv or other media. It is not difficult to make an animated cartoon of a complex and interesting, if we want to study hard must we desire can occur.
Here I make a short animated cartoon that is Robot Dance Ballet. I created this animated robot with two different software that I use 3-dimensional software 3D Studio Max and Macromedia Flash 8 Pro. Why do I make it with two software? because I think it combines two software will be maximal.

3D Studio Max I used to draw the object 3 dimensionally for 3-dimensional image into a perfect and more delicate. I use Flash 8 as the maker and editing animated animation - his sound, as it makes the Flash animation fast and easy and simple.

Below is an animation Robot Dance Ballet I make, file formats. Swf
please download the animated Robot Dance Ballet.

Download Animated Robot Dance Balet.swf

Thank you ... ...

Wednesday, April 14, 2010

Normalization

Normalization is the process associated with the relational data model to organize data sets with high dependency and or tight linkage.

Normalization is a technique for organizing data into tables to meet the needs of users in

within an organization.

The purpose of normalization:

- To remove data kerangkapan

- To reduce the complexity

- To facilitate the modification of data

- Determining whether a particular relationship beradadalam "good form"

• In cases where the relation R is not in "good form", then the relation

decomposed into a set of relations (R1, R2, ..., Rn) where:

- Every relationship is in "good form".

Decomposition is lossless-join decomposition qualify.

Normalization Process

The data described in table form, and analyzed

under certain conditions to some degree.

If the tables are tested do not meet certain requirements,

then the table needs to be broken into multiple tables

simpler to meet the optimal shape.



The result of the normalization process are sets of

data in normal form (normal form). There are some normal form, namely:

a. First Normal Form (First Normal Form / 1-NF).

b. Second Normal Form (Second Normal Form / 2-NF).

c. Normal Form III (Third Normal Form / 3-NF).

d. Normal Form IV (Fourth Normal Form / 4-NF).

e. Boyce-Codd Normal Forms (Boyce-Codd Normal Form / BCNF).

f. First Project-Join Normal Form (PJNF).

g. I Domain-Key Normal Form (DKNF).

h. Normal Form V (Fifth Normal Form / 5-NF).



Usefulness of normalization:

a. Minimize repetition of information.

b. Facilitate the identification of entities / objects.



a. First Normal Form (First Normal Form / 1-NF).

A relation meet the 1-NF if and only if every attribute of the relation

have only a single value in a single row or record.

A relation is said to have fulfilled the Normal Form

One if any data is atomic ie, each slice

rows and columns have only one data value





b. Second Normal Form (Second Normal Form / 2-NF).



A relation is said to have fulfilled the Second Normal Form if those relationships are already fulfilling the Normal form of unity, and non-key attribute is fully dependent on keynya.

A relation meet the 2-NF if and only if:

a. Meet the 1-NF.

b. Each non-key attributes are functionally dependent

against all the key attributes and not just some attributes.

If a relation satisfy 1-NF and the relationships it has exactly one

attributes that make up the primary key, then the relationship meets the 2-NF.

Rationalization of 2-NF:

a. Having a more explicit semantics of 1-NF.

b. Prevent some anomalies in the data updating condition.

Functional dependence is to:

a. StudentID => Student's, Birthdate (SC1).

b. CourseID => Course, Credit (SC2).

c. StudentID, CourseID => Grade (SC3, SC3A).

d. Grade => Weight (SC3B).



Finally, all the tables SC1, SC2, SC3A, SC3B is in 3-NF,

so that all databases have the condition of 3-NF.

c. Normal Form III (Third Normal Form / 1-NF).

A relation is said to already meet the third Normal Form

when those relationships are already fulfilling the second normal form

and non-key attributes depend not transitive on

keynya



A relation to meet the form III (3-NF) if and only if:

a. The relation is to meet 2-NF.

b. Each key attribute is not does not depend functionally to

Another key attribute is not in relation.

A relation that meets the 2-Nf and only has one key attribute is not

always meet the 3-NF.



d. Boyce-Codd Normal Form (Boyce-Codd Normal Form / BCNF).



A relation satisfy BCNF if and only if every determinant of the existing

on these relationships is a key candidate (candidate keys).

The determinant is a cluster of attributes dimanaa one or more other attributes

functionally dependent.

e. Relationship model or relationship entities (Entity Realtionship (ER) model).



Entity relationship model is based on the perception of the real world

set of basic objects called entities and relationships among entities.

The entities are objects that can be uniquely identified.

Entities are characterized and presented with a cluster of attributes.

Examples of entity attributes WORKERS cluster is the name, date of birth, NIP,

class / rank.

A group of entities which have a characterization of an entity called the cluster variance

(Entity sets).

Each entity of this cluster is called cluster members (member of the set).

Examples of cluster entities are entities bank employee group, customer group entities

bank. Of some clusters had a relationship may occur, for example relations

between bank groups with customers of the bank group.

Based on the number of groups involved, the relationships among entities are distinguished

becomes:

a. Binary relations (binary), ie the relation between the 2 groups of entities.

b. Relationships trio (ternary), namely the relationship between 3 clusters of entities.

c. N-ary relations, ie relationships among n cluster entities.



Especially for a binary relation then the relation between members of two clusters

involved (the cardinality of binary relationships) can be:

a. Relation 1-1 (one-to-one relationship).

Is a member of the group entities associated with exactly one entity

other group members.



b. Relationship 1-many (one-to-many relationships).

Is a member of the group entities associated with one or more

another group member entities. In contrast one group member entities

others are associated with exactly one entity member of the group

partner.



c. Many-1 relations (many-to-one relationship).

Is a member of the group entities associated with one or more

entities other cluster members and vice versa applies.

Beautify Blog With Javascript

I previously had ucapin thanks to which I am intent on publishing this article, in accordance with the above title of an article I once intended to make us good blog blogspot or wordpress step more beautiful with javascript functions that we are planting and for the laity by what name javascript for more details please read here (http://id.wikipedia.org/wiki/JavaScript) I have tried this technique on two different engines that blogspot and wordpress version 2.7 for using wordpress version below that, God willing, please try this trick can still be used and I highly recommend please use mozilla firefox for browsers.


1. Welcome the inclusion of alert and goodbye alert
The first trick is to make our blog when the lid is opened or in a pop up window will appear containing the comments. The trick is very easy to please log in WordPress "Dashboard" then select the "widgets", make the "text" only or can be combined with the "text" that already exist since the trick is in the form script sehinggan later there will be no increase in our widget. For those who use blogspot as enginenya please go to "Dashboard" choose "Layout" continue to choose "page element" to diblogspot I also recommend this trick in aja join with "gadgets" that other script Now that we input to the "text" ( wordpress) and "gadgets" for at blogspot is this:


()

For this sentence "Welcome diblognya Insormation systems, may be useful" and "Thank you for stopping by, take care" please in dressing as they pleased, but watch out she quoted double do not lose because of missing one of the variables above aja then the script will not run.

2.Fav icon is a symbol or symbols that exist in the Address bar with this trick we can change the icon blogspot, wordpress with a different icon in accordance with our desires. Placement of this script is the same as the welcome and goodbye alert script above:
(

)
()

3.Consider this sentence please be replaced at will:

message[0] = “nybi blog”;
message[1] = “Welcome to my blog”;
message[2] = “Enjoy my blog”;
message[3] = “Thanks for visiting”;
message[4] = “Have a nice day”;

seandainya kalimatnya masih mau ditambah silahkan diganti seperti ini :

message[0] = “nybi blog”;
message[1] = “Welcome to my blog”;
message[2] = “Enjoy my blog”;
message[3] = “Thanks for visiting”;
message[4] = “Have a nice day”;
message[5] = “kalimatnya terserah”;
message[6] = “kalimatnya terserah”;
(message[6] angka 6 nya diganti dengan angka 7 dan seterusnya)




4. Roaming Windows Expander
And this is the most extreme tricks, why? because with this trick to make the blog we first opened the screen will appear animated with motion effects, for the script please suck out here:(

Monday, April 12, 2010

Understanding Web Service

There are different versions of a definition of Web Service, which basically describes the characteristics of a Web Service, which among others the following:
An application logic that can be accessed and published using the standard Internet (TCP / IP, HTTP, Web).
Described in XML format.
Identify several with Universal Resources Identifiers (URI)
Are loosely coupled, self-contained, modular and open (Nonproprietary)
Used to support the interoperability of the interaction of machine-to-machine
through the Internet / Intranet. Web services can be implemented in the internal environment (Intranet) for the needs of integration between application systems (EAI = Enterprise Application Integration) or the external environment (the Internet) to support the application for business-to-business (e-business).

Web service is a software component that is selfcontaining, self-describing, modular applications that can be published, allocated and executed on the web (wahli et al. 2006).
Web service is a technology that changed the internet capabilities by adding a web transaction capabilities, namely the ability of the web to communicate with each program pattern-to-program (P2P). The focus for this web is dominated by the communications program-to-user interaction with business-to-consumer (B2C), while the transaction will be dominated by web-to-program interaction programs with business-to-business (Gottschalk. 2002).
Figure 1 is a building block of our web service which provides long distance communication facilities between the two applications is a web service layer architecture (Tidwell, 2001).
Layer 1: Internet Protocol standard is used as a means of transport is HTTP and TCP / IP.
Layer 2: Simple Object Access Protocol (SOAP) based on XML and used for the exchange of information among a group of services.
Layer 3: Web Service Definition Language (WSDL) is used to describe the service attribute.
Layer 4: Universal Description, Discovery and Integration, which is the central directory for a description of the service.

Sunday, April 11, 2010

Data Security


In general, the data is categorized into two, namely the data that is confidential and that no confidential data. Confidential data that are not normally would not be so considered. Noteworthy is that highly confidential data, where each of the data in it will be very valuable for those in need because the data can be easily duplicated. To get the information therein, usually carried out in various ways that are not valid.


Data security is usually related to the following:
a. Physically, in this case unauthorized person trying to get the data to the data by conducting sabotage or destruction of data storage.
b. Organization, in this case unauthorized person to get the data through negligence or leakage of members who handle the data.
c. External threat, in this case unauthorized person trying to get the data through the communication media and also make theft of data stored in the computer.

Computer security function is to maintain the three characteristics, namely:
a. Secrecy, the contents of a computer program can only be accessed by persons eligible. Type that included here is the reading, viewing, printing, or just knowing the existence of an object.
b. Integrity, is the content of a computer that can be modified by a person who has the right, which included writing here is, changing status, deleting, and creating.
c. Availability, is the content of a computer that is available to some groups given rights.

Secure data is data that meets the three characteristics of data security.
Looking at the fact that more data is processed by computer and sent via electronic communication devices, the threat to data security will increase. Some patterns of
threats to computer data communication can be described in the following:

a. Interruption, occurs when the data transmitted from A do not reach the person who is entitled B. Interruption is a pattern of attacks on the nature of the availability (availability of data). An example is damage to the hardware, operating system failure so the system can not find the file you are looking for.

b. Interception, occurs when a third party C successfully read the data transmitted. Interception is a pattern of attacks on the nature of the confidentiality / secrecy (confidentiality of data), for example, is doubling the program or data files that are not visible, or theft of data on the network in a way wireteapping.

c. Modification, the modification attack a third party C successfully alter the message that is sent. Modification is a pattern of attacks on the nature of the integrity (authenticity of data).
d. Fabrication, fabrication attack the attacker succeeded in sending data to the destination by utilizing the identity of another person. Fabrication is a pattern of attacks on the nature of authenticity (authentication data).
To anticipate the threats mentioned above need to be an attempt to protect data sent over communication channels, one of these efforts is to encode information in the data to be sent. Concealment of information that exist in a certain form that can not be understood other parties (who are not interested) is part of cryptography.

Saturday, April 10, 2010

Improve Your Network Securyty


Communications traffic data over the Internet using TCP / IP has become a very large telecommunications power. Every hour, minute, until the second, electronic data valuable in the Internet is passing. Surely these things inspire certain people to try to obtain such data. This has become a serious threat to security on the Internet. For that, we must be more vigilant against efforts that threaten the integrity of the data we have. This paper attempts to provide a simple alternative to readers who want to understand the problem of security on the Internet. In the end, there is a short list that contains about the sources and sites on the Internet of documents related to this article and can be used as a reference for deeper security problems on the Internet.

In general, the problem of security on the Internet can be viewed from two sides is important. The first side is the integrity of data transmitted through the Internet (we call it the integrity of data transmission) and the next side is the level of security in computer networks themselves (we call the internal network security). Let's discuss one by one from the sides of it.



Integrity of Data Delivery

At the moment we are sending data through the Internet network, we always want to send the data we arrived at destination safely and do not experience the intervention of other parties. These Conditions become much more mainstream if we send the data were categorized as confidential data.

At the time we send, the data is going through various types of computers, routers, or gateways, and across a wide range of physical media of communication. We are risking the integrity of the data to the diversity of the above. Obviously we can not possibly check the security level at each hop / point through which the data is because the level of distribution and possession hop is very diverse. One solution that can be applied is data encryption. The main objective of this solution is to prevent the stolen-heard (eavesdropping) to the data we send and we receive. If an "eavesdropper" steal action hearing, he will obtain the encrypted data just so it does not reflect the actual data content.

Thursday, April 8, 2010

ANALYSIS SYSTEM


1. Definition of Systems Analysis

Systems analysis is a term that collectively describes the early phases of system development. Systems analysis is a technique that describes the problem solving component parts by studying how well the component parts work and interact to achieve their goals.



2. Definition of System Design



A problem-solving techniques which are complementary to a string back into the component parts of a complete system which he hoped. An improved system. This involves additions, deletions and changes to the system relatively early parts.



3. Information Systems Analysis



Development phases in the development of information systems that mainly focused on the problems and requirements of business, independent of any technology that can or will be used to implement solutions to those problems.



4. Model analysis approaches Driven



Model Driven is analysis that uses images to combine the issues, requirements, business solutions. Examples of model is frequently used flowchart and DFD. example of the analysis is driven by pendekatanmodel:

Structured-analysis

-Information Engineering

Object-oriented analysis



4.1 Structured Analysis



First is one of the first formal approach for the analysis of information systems. This analysis focuses on data flow and business processes and software. This analysis process is called oriented. Analysis of data flow diagrams (data flow diagram) depicting the process of existing or proposed, together with the input, output and file them.



4.2 Engineering information and data modeling



Engineering duluterfokus information on the structure of data stored on a system. So say centered data. Data models in engineering is called entity relationship information. For more details would be discussed at the next module. Engineering information is said to center on the data because the emphasis on learning and analysis requirements