Friday, April 12, 2013

(Flash Back) Intro PHP

 Taken directly from PHP's home, PHP.net, "PHP is an HTML-embedded scripting language. Much of its syntax is borrowed from C, Java and Perl with a couple of unique PHP-specific features thrown in. The goal of the language is to allow web developers to write dynamically generated pages quickly."

This is generally a good definition of PHP. However, it does contain a lot of terms you may not be used to. Another way to think of PHP is a powerful, behind the scenes scripting language that your visitors won't see!
When someone visits your PHP webpage, your web server processes the PHP code. It then sees which parts it needs to show to visitors(content and pictures) and hides the other stuff(file operations, math calculations, etc.) then translates your PHP into HTML. After the translation into HTML, it sends the webpage to your visitor's web browser.

 

What You Should Already Know

Before you continue you should have a basic understanding of the following:
  • HTML
  • JavaScript
If you want to study these subjects first, find the tutorials on our Home page.

What is PHP?

  • PHP stands for PHP: Hypertext Preprocessor
  • PHP is a widely-used, open source scripting language
  • PHP scripts are executed on the server
  • PHP is free to download and use
lamp PHP is simple for beginners.

PHP also offers many advanced features for professional programmers.


What is a PHP File?

  • PHP files can contain text, HTML, JavaScript code, and PHP code
  • PHP code are executed on the server, and the result is returned to the browser as plain HTML
  • PHP files have a default file extension of ".php"

What Can PHP Do?

  • PHP can generate dynamic page content
  • PHP can create, open, read, write, and close files on the server
  • PHP can collect form data
  • PHP can send and receive cookies
  • PHP can add, delete, modify data in your database
  • PHP can restrict users to access some pages on your website
  • PHP can encrypt data
With PHP you are not limited to output HTML. You can output images, PDF files, and even Flash movies. You can also output any text, such as XHTML and XML.

Why PHP?

  • PHP runs on different platforms (Windows, Linux, Unix, Mac OS X, etc.)
  • PHP is compatible with almost all servers used today (Apache, IIS, etc.)
  • PHP has support for a wide range of databases
  • PHP is free. Download it from the official PHP resource: www.php.net
  • PHP is easy to learn and runs efficiently on the server side

Friday, March 1, 2013

10 IT Skills in the World's Most Wanted

This time I just wanted to give a little information about the work in the IT world 

Information Technology
The first is the results of a survey conducted by the Survey Forecast to 334 IT executives as respondents. The results found that 33% of them plan to recruit new workers in 2013.Areas of expertise that will be most needed are: 


 Programming and Application
 Development
 Project Management
 Help Desk / Technical Support
 Security
 Business Intelligence / Analytics 
 Cloud / SaaS
 Virtualization 
 Networking
 Mobile Applications 
 and Device Management Data Center 

In a different approach, Trainsignal also do the same. The survey was conducted to IT professionals who sits on managerial positions in various global companies.


The data obtained is the need for expertise as follows: 
 Software Development 
 Mobile Development 
 Web Development
 Information Security 
 Cloud / SaaS
 Network Management 
 Service Management
 Virtualization Extract,
 Transform and Load Business Intelligence 
In addition, it's good to also see the information published by Forbes. Although not specifically address the IT world, but pulling data from Forbes show IT as a dominant area of ​​expertise required by the business.

 Here is a list of the ratings given to Forbes: 
 Software Developers (Applications and Systems Software)
 Accountants and Auditors
 Market Research Analysts and Marketing Specialists 
 Computer Systems Analysts 
 Human Resources, Training and Labor Relations Specialists
 Network and Computer Systems Administrators 
 Sales Representatives (Wholesale and Manufacturing,Technical and Scientific)
 Information Security Analysts, Web Developers and Computer Network Architects 
 Mechanical Engineers
 Industrial Engineers 

And where my college now has produced people who are experts in IT wolrld
 STIMIK "AMIKOM" Yogyakarta

Welcome "JAVA"

Currently,i'm also learning about JAVA on campus Stimik "AMIKOM" Yogyakarta, I post about java to learn as well, let's learn together.


 Applicability Welcome has 4 (four) components:
    
definition package (package)
    
comment
    
class definition (class)
    
method of play    welcome package;


 
welcome {public class
 
/ *** @ Param args* /public static void main (String [] args) 

{/ / TODO Auto-generated method stubSystem.out.println ("Welcome!");}
 
}


 Let us discuss one by one.
 Definition package (package)selamatdatang package;Package in Java is a collection of the various codes are summarized in a single package. To facilitate the writing and distribution of the logic of a program, a packet is divided into multiple files (file) where each file has a function or a very special task, such as a file function to declare constants and classes, while the other file contains the implementation classes and procedures.In the example above SelamatDatang applications, this package only contains one file whose contents consist of one class and one method.Definition packages are not always necessary, but it is a good habit to train us to think logically and systematically.Comment

/ *** @ Param args* // / TODO Auto-generated method stubComments will not be processed by the compiler but is useful for other programmers. Java language has three types of comments:

    
/ * Text * / - The compiler will ignore words between / * and * /

    
/ ** Documentation * / - This is a comment that is used specifically for documentation. The compiler will ignore the comments from / * to * /. Javadoc tool will process documentation comments to make automatic documentation of the source program.

    
/ / Text - The compiler will ignore everything from / / to the end of the lineClass Definition

Welcome {public class
    
...
}

 Classes are an integral part of the Java language since Java is an object-oriented language. Each application must consist of one class. Here we define Welcome class as the main class.Method of playIn the Java programming language, each application must have one method of play that looks like the following:public static void main (String [] args) {...}

Method of play is similar to the main function in C / C + + where the function is the gateway dimulanya a program. The method can be called to play include variables, either only one variable, many variables or even none at all.The latter is the following command to display the Welcome on your computer.System.out.println ("Welcome!");

The command uses the Java core libraries, the class system.


The computer program is a series of instructions that a computer can work. A job may be simple for humans can not be understood by the computer. Man must give instructions to the computer how to do suatutugas in a programming language. Different programming languages ​​to human language, because the computer requires a more standard rules of what should and what should not be in a programming language. This rule is called the syntax of the language.

The syntax of a programming language is determined by what can be done by a computer, such as loop (iteration), branch (branch), or function. Only a program with correct syntax that can be compiled or interpreted, which in turn can run on a computer. The compiler will give an error message if there is an error in the syntax so that we fix it.

To be a successful programmer, we have to understand in detail the syntax of the programming language that we will use. However, the syntax is only part of the story. We want to create a program that we run in accordance with what we want. This means that the program must be logically correct. Logically correct program is called having the correct semantics.

On this site we will learn about the syntax and semantics of each of the Java programming language. Syntax easily memorized, but the semantics is more like a feeling. For that, try to download and run the program examples so that we can understand how each program works.




Thursday, February 28, 2013

Start to learning "JAVA"

World of programming  ​​have so many programs languages in it, in my blog has given some language tutorial and this time I will discuss about JAVA, we will learn from the beginning to the final stage.



History of Java
Java pioneered by James Gosling, Patrick Naughton, Chris Warth, Ed Frank, and Mike Sheridan of Sun Microsystems, Inc. in 1991. They need about 18 months to make the first version. This language was initially called "Oak" but was changed to "Java" in 1995 as the name of Oak have made copyright and used as other programming languages. Between making of Oak in fall 1992 to be announced to the public in the spring of 1995, many people involved in the design and evolution of language. Bill Joy, Arthur van Hoff, Jonathan Payne, Frank Yellin, and Tim Lindholm is a key contributor to finalize the original prototype.
Modern Java
Java has been used in many ways and have proven its existence in the 21st century. Today, Java is used various types of applications such as embedded applications, financial applications, desktops, airplane simulation, image processing, games, distributed enterprise applications called J2EE and much more.
Java Virtual Machine (JVM)
Java Virtual Machine is a simple application written in C language for mengeksi programs written in the Java language. At the time of compilation (a change from a high-level language into a lower language), the program was changed to CODE BYTE. Then at the time of execution, the JVM byte code reading tersebu and turn it into machine language understood by the operating system where the program is run.
Because the JVM is very dependent on the platform (machine language is a low level language only understood by a particular machine, such as Intel, but it can not be understood by other machines, such as the Macintosh), byte code can be made to be free from the confines of a particular platform. Byte code generated in the process of compiling the Java language will always be the same for each operating system or the type of engine, but it will change the JVM bytecode into machine language goals.
Just In Time Compiler (JIT)
Although Java was designed to be interpreted, technically nothing prevents Java is compiled into machine language like other programming languages. Sun provides a compiler Just In Time Compiler (JIT) compile to byte code into machine language at the same time with the execution. However, the JIT approach produces more capabilities than the usual interpretation.


 Excess of Java

Other programming languages ​​that existed before Java birth is a good language and easy dipelajasi by professional programmers. However, the programmer is wanting something new that has a lot to solve their problems. Primarily the security of their code. This gave rise to a revolutionary mind to find another programming language called Java. Not only the safety but also some things that are often referred to as a Java-buzzwords. These words explain the additional features and some of the things that makes Java so successful and accepted by the software world. Here is the description and advantages of these words.
Simple and Object Oriented
As described earlier, Java was born of a deep thinking will programming language that existed at the time, such as C and C + +. This will facilitate the professional programmer to understand more clearly about Java, functionality, and so if he has a basic knowledge of C + + and object-oriented programming concepts. The goal is that the basic concepts of Java technology can be understood easily, and the programmer can quickly produce something as early as possible. Not only this, the inventor of Java ensures that the Java programming language also stems from the existing base at the time. Then they throw a variety of complex and confusing features.
The Java programming language was designed from the outset to be an object-oriented language. After about 30 years, object technology finally become a reality and is accepted by most of the programming community. The concept of object-oriented software allows the creation of complex, network-based, so it can be concluded that the Java technology platform making software produces a good and efficient as well as object-oriented.
The advantage that you get from Java
Start quickly: Java is an object-oriented programming language, easy to learn, especially for programmers who are already familiar C or C + +


 Write fewer programs: Number of classes, number of methods, etc., show that a program written in the Java programming language has a number of 4-fold smaller than the same program written in C + +

    
Write a program better: the Java programming language advocating the practice of making a good program, and automatic garbage collection helps you avoid memory leaks. Object orientation, component architecture JavaBeans, and reach broad Yanga, an easily extensible API, allowing you to use your existing code.

    
Making programs more quickly: The Java programming language is easier than C + +, programming will be 2 times faster, with far fewer lines.

    
Avoid dependence on a specific platform: You can run your program on multiple platforms by using a library written NOT specific to a particular platform.

    
Write once, run anywhere: Because applications written in the Java language is compiled into byte code is platform independent, written application can be run consistently on any platform.

    
Distribute your software easily: With Java Web Start, the user program will be able to use your applications with ease. Automatic version checking system when the program starts the user ensures you are always running the latest version. If a new version is available, Java Web Start will install automatically.
 



source : java.lyracc 

Saturday, February 23, 2013

Google Searches for Style (google glasses)






People wearing Google’s glasses are transported to a strange new world in which the Internet is always in their line of sight. But for people looking at the people wearing those glasses, the view is even stranger — someone wearing a computer processor, a battery and a tiny screen on her face.

As Google and other companies begin to build wearable technology like glasses and watches, an industry not known for its fashion sense is facing a new challenge — how to be stylish. Design has always been important to technology, with products like Apple’s becoming fashion statements, but designing hardware that people will wear like jewelry is an entirely different task. 

In a sign of how acute the challenge is for Google, the company is negotiating with Warby Parker, an e-commerce start-up company that sells trendy eyeglasses, to help it design more fashionable frames, according to two people briefed on the negotiations who were not authorized to speak publicly because the partnership has not been made official.
Google and Warby Parker declined to comment.They join other companies that are grappling with these design challenges, including big companies like Apple, Nike and Jawbone and smaller ones like Pebble, MetaWatch and Misfit Wearables.
Jawbone’s health-tracking wristband, Up, for instance, was designed by Yves Behar, the company’s chief creative officer and a well-known designer who has worked with fashion and furniture companies. Apple, which is said to be making a smart watch, has assigned some of its top designers to make curved glass that is comfortable and aesthetically appealing. 

On Wednesday, Google began accepting applications to choose a small group of people to buy an early version of the glasses, called Google Glass. It hopes to sell Glass to the broader public this year, according to two people briefed on the plans.
The frames do not have lenses, though Google is experimenting with adding sunglass or prescription lenses in some versions. They have a tiny screen that appears much bigger from the wearer’s perspective than it does on the frame. Glass wearers can take pictures or record video without using their hands, send the images to friends or post them online, see walking directions, search the Web by voice command and view language translations. 

The glasses reach the Internet through Wi-Fi or Bluetooth, which connects to the wireless service on a user’s cellphone. The glasses respond when a user speaks, touches the frame or moves the head.
For Google, the glasses are a major step toward its dream of what is known as ubiquitous computing — the idea that computers and the Internet will be accessible anywhere and we can ask them to do things without lifting a finger.
The glasses will eventually incorporate several Google products, which could become more useful when they are in front of a user’s eyes rather than on a phone or a computer screen.
For instance, the latest version of the glasses can provide walking and hiking directions from Google Maps, alerts from Google Now about a coming meeting or a traffic jam, and video chats from Google Hangouts. 

In a video released on Wednesday, Google offered ideas about what to do with the glasses. A ballerina could record and stream live video behind the scenes and onstage; a tourist in Thailand could ask Google to translate the word “delicious” while eating noodles on a boat; or a family could video chat over a long distance with a relative on her birthday. 

Other seemingly far-fetched uses are not far off. The glasses could be used to play an augmented reality game in which the real world was annotated with virtual information. Google has such a smartphone app, called Ingress. Users could photograph an object or building and the glasses could identify it, something that is already possible using Google on phones and computers.
Though Google warns of technical bumps as people use the glasses, it has already solved many of the technical challenges. The biggest obstacle now is getting people to use them. 

Though Google employees have been spotted wearing them in the San Francisco Bay Area, they receive strange looks, for example, from a bartender who made fun of his Glass-wearing patrons.
Privacy advocates worry about a day when people wearing glasses could use facial recognition to identify strangers on the street or surreptitiously record and broadcast conversations. On a more mundane level, rude behavior like checking e-mail during conversations would become much easier to hide. 

google glasses

The America of the Arab Street






Why? What happened to the liberal youth of the Arab world in whom we invested our hopes and support? Why are Muslims so sensitive, so easily offended; why do some so readily resort to violence?
The liberal protesters who demanded freedom and democracy last year were able to unite and overthrow dictators in Tunisia and Egypt. But their failure to explain what their liberalism stands for has opened the way for a new, Islamist-oriented power elite that capitalizes on old lies and half-truths to twist religion and history to manipulate the masses. 

The leaders of nascent democracy-oriented political parties in the Arab world’s most politically vibrant country, Egypt, are hobbled by egotistical rivalries, a lack of centralized leadership, urban elitism and an inability to connect with rural majorities. Secular luminaries like Mohamed ElBaradei, former director of the International Atomic Energy Agency, or Naguib Sawiris, a prominent businessman and politician, are not at ease in the new Egypt. As their political parties struggle to articulate a message, Islamist leaders with strong religious credentials have been able to mobilize a broad popular base. 

Arab societies remain deeply religious. In liberal Morocco, 89 percent of the people say that religion is “very important” in their lives, according to a recent Pew poll. Mosques are packed every Friday; religious events promote widespread charity, and believers are encouraged to support candidates who are perceived to be more godly. But there is a deeper problem that goes well beyond the popular appeal of Islamist parties: A cancerous narrative has taken hold of many Arab minds. 

In Egypt, 75 percent of Muslims do not believe that Arabs carried out the 9/11 attacks, according to a 2011 Pew poll. Many believe that it was either Israel, the U.S. government, or both. The West is viewed through a hodgepodge of conspiracy theories, half-truths and a selective reading of history.
When I met Muhammad Mahdi Akef, the influential former leader of the Muslim Brotherhood, in April 2011, he insisted that Al Qaeda was a figment of the Western imagination. The idea that it doesn’t exist, that the United States attacked itself, is buttressed by preachers in mosques, on satellite television channels and in glossy Arabic books. 

The United States and the West are widely seen as waging a war on Muslims. Al Qaeda videos promote this vision as a continuation of the Crusades. Many Muslims recall incidents of perceived hostility in their own lifetime — the wars in Iraq and Afghanistan; the abuses at Abu Ghraib prison and Guantánamo Bay; the banning of minarets in Switzerland; the outlawing of face veils in France; NATO troops burning copies of the Koran in Afghanistan. In this vein, the recent anti-Islam film confirms the belief that the West is out to destroy Islam. 

In most Arab countries, citizens require government permission to produce films. For many Arabs, it is inconceivable that U.S. citizens are not under the same controls. The attacks on U.S. embassies after the release of the offensive video “Innocence of Muslims” on YouTube must be seen in this context.
When I watch Al Jazeera Arabic I am stunned by unchallenged references in talk show interviews to the “American Zionist plan” or “the American enemy” or the “ally of the Zionist entity.” Attacking the United States has become part of the political culture in much of the Middle East. To challenge it is to be a labeled a “sellout,” a “traitor” or a “Zionist agent” and to court social isolation.
And yet on the streets of Arab capitals, McDonald’s, Starbucks and other American brands remain hugely popular — as are American clothes, technology and television shows and films. The same U.S. embassies that were attacked were surrounded almost daily by long lines of people applying for visas to enter the United States. There are almost 50,000 Saudi students in American universities. Tens of thousands more from across the region are vying to do the same. 

On the day that the protests broke out in Egypt and Libya, I was in the Library of Congress in Washington. Founded in 1800, its main reading room has a magnificent dome with dedications to world civilizations — Islamic civilization prominent among them — to which the United States is indebted. A two-volume English translation of the Koran, donated by Thomas Jefferson, is preserved in the library. In 1805, President Jefferson invited the Muslim ambassador from Tunisia to the White House for an iftar meal to break the Ramadan fast.
Today, America’s Muslims are freer and more prosperous than Muslims in any other part of the world. Their daily lives show that the narrative about a U.S.-Islam war is a myth.
The Arab world is at an important crossroads. It is time to abandon this false narrative. Not enough has been done to educate Arab and Muslim religious leaders in the Middle East about the reality of religious freedom in America. Their misunderstanding of liberty leads to their silence — or worse, incitement.
A U.S. invitation to Ali Gomaa, Egypt’s grand mufti, Sheik Ahmed al-Tayyib, grand imam of Al-Azhar, or Saudi Arabia’s popular Sheik Salman al-Awdah as guests of the American people at the president’s State of the Union address in Congress would help demonstrate a different America to young, religious Arabs. These clerics, and others like them, command the support of millions. We can create a new narrative.
The United States can also help by being seen to be a fair arbitrator of the Arab-Israeli conflict. Better relations with some 300 million Arabs strengthens U.S. influence, and helps more than 7 million Israelis, too.
No country has as much soft power at its disposal in the Arab world as does the United States. A new generation of Arabs deserve a better future than following the madness of those who shout “Obama, Obama, we are all Osama.” 

Ed Husain is a senior fellow for Middle Eastern Studies at the Council on Foreign Relations.
“Obama, Obama, we are all Osama” the crowd chanted outside the U.S. Embassy in Cairo on Sept. 11. The slogan also found its way to Tunis, where a mob attacked the embassy as well, and the chant was taken up in Qatar and other Muslim countries. 


Friday, February 22, 2013

INTRODUCTION TO DATA COMMUNICATIONS

  • 1. INTRODUCTION TO DATA COMMUNICATIONS DEFINITION OF TERMS F         Data Communication is the act of relaying a message or information in binary form between two points (the transmitter and the receiver). F Computer Network is an interconnected collection of autonomous computers. Autonomous means that there should no clear master/slave relationship between the computers. NETWORK GOALS F Resource Sharing. One goal of establishing computer networks is to facilitate sharing of programs, equipment, and data without any regard to the physical location of resource and the user. F High Reliability. Computer networks provide high reliability by having alternative sources of supply. For example, all files could be replicated on two or three machines, so if one of them is unavailable (due to hardware failure), the other copies could be used. Introduction to Data Communications 1 

  • 2. F Cost Savings. Small personal computers connected in a network have a much better price/performance ratio than large ones such as mainframes. F Communication Medium. A computer network can provide a powerful communication medium among widely separated employees. Networks can enhance human-to-human communication. USES OF DATA COMMUNICATION AND NETWORKS F Access to Remote Information F Electronic Mail F Electronic Banking F Electronic Newspaper and Libraries F Electronic Bulletin Boards F Value-Added Services F On-line Department Stores/Groceries F Interactive Entertainment Introduction to Data Communications 2 

  • 3. NETWORK CLASSIFICATION F                                                                                      Networks are often classified by the distance of the communicating processors from each other. Interprocessor Processors located Example Distance in the same 0.1 m Circuit Board Data Flow Machine 1m System Multicomputer 10 m Room Local Area Network 100 m Building Local Area Network 1 km Campus Local Area Network 10 km City Metropolitan Area Network 100 km Country Wide Area Network 1,000 km Continent Wide Area Network 10,000 km Planet The Internet Data flow machines are highly parallel computers with many functional units all working on the same program. Multicomputers are systems that communicate by sending messages over very short, very fast buses. A Metropolitan Area Network (MAN) is basically a bigger version of a LAN and normally uses similar technology. Introduction to Data Communications 3 

  • 4. CONNECTIVITY ALTERNATIVES F                                                                              Stand Alone Sharing of diskettes Modem and the public telephone system Temporary physical connection Local area network (but the network software is enabled only when needed) Applications and Data Personal Computer Introduction to Data Communications 4 

  • 5. F Shared Logic Sharing the capability of a single processor with more than one user time sharing In multiprocessor systems, shared logic means sharing the main processors or support processors with more than one user. user enters commands here applications execute here Shared Dumb Terminal Applications Storage and Shared Data Host Computer applications share (shared processor) data here Dumb Terminal Introduction to Data Communications 5 

  • 6. F Shared Resources Multi-user sharing of devices and/or peripherals applications execute here Shared Personal Computer Local Area Applications Network Storage and Shared Data Network File Server applications share data here Personal Computer applications execute here Issues: 1. Equitable sharing of devices 2. Integrity of data Introduction to Data Communications 6 

  • 7. F Shared Logic and Resources applications execute here user enters commands here Personal Computer Local Area Network Shared Shared Applications Applications Storage and Storage and Shared Data Shared Data Network File Server Host Computer (shared processor) applications share applications share data here data here applications execute here Introduction to Data Communications 7



 
Pratama Master powered by blogger.com
Design by Simple Diamond and Pratama Master