Senin, 12 Mei 2014

4IA10_SOFTSKILL_PENGANTAR KOMPUTASI MODERN_FATARA HUTAMI AUGIA_TUGAS3

QUANTUM COMPUTING
A Quantum Computer (also known as a Quantum Supercomputer) is a computation device that makes direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data. Quantum computers are different from digital computers based on transistors. Whereas digital computers require data to be encoded into binary digits (bits), each of which is always in one of two definite states (0 or 1), quantum computation uses qubits (quantum bits), which can be in superpositions of states. A theoretical model is the quantum Turing machine, also known as the universal quantum computer. Quantum computers share theoretical similarities with non-deterministic and probabilistic computers; one example is the ability to be in more than one state simultaneously. The field of quantum computing was first introduced by Yuri Manin in 1980 and Richard Feynman in 1982. A quantum computer with spins as quantum bits was also formulated for use as a quantum space–time in 1969.
As of 2014 quantum computing is still in its infancy but experiments have been carried out in which quantum computational operations were executed on a very small number of qubits. Both practical and theoretical research continues, and many national governments and military funding agencies support quantum computing research to develop quantum computers for both civilian and national security purposes, such as cryptanalysis.
Large-scale quantum computers will be able to solve certain problems much more quickly than any classical computer using the best currently known algorithms, like integer factorization using Shor's algorithm or the simulation of quantum many-body systems. There existquantum algorithms, such as Simon's algorithm, which run faster than any possible probabilistic classical algorithm. Given sufficient computational resources, however, a classical computer could be made to simulate any quantum algorithm; quantum computation does not violate the Church–Turing thesis.

QUANTUM ENTAGLEMENT
Quantum entanglement is a physical phenomenon that occurs when pairs or groups of particles are generated or interact in ways such that the quantum state of each particle cannot be described independently – instead, a quantum state may be given for the system as a whole.
Measurements of physical properties such as position, momentum, spin, polarization, etc. performed on entangled particles are found to be appropriately correlated. For example, if a pair of particles is generated in such a way that their total spin is known to be zero, and one particle is found to have clockwise spin on a certain axis, then the spin of the other particle, measured on the same axis, will be found to be counterclockwise. Because of the nature of quantum measurement, however, this behavior gives rise to effects that can appear paradoxical: any measurement of a property of a particle can be seen as acting on that particle (e.g. by collapsing a number of superimposed states); and in the case of entangled particles, such action must be on the entangled system as a whole. It thus appears that one particle of an entangled pair "knows" what measurement has been performed on the other, and with what outcome, even though there is no known means for such information to be communicated between the particles, which at the time of measurement may be separated by arbitrarily large distances.

PENGOPRASIAN DATA QUBIT
Qubit or quantum bit is the basic unit of information in quantum computers. In a quantum computer, a number of elemental particles such as electrons or photons can be used (in practice, the success has also been achieved by the ion), either at their expense or polarization acts as a representation of 0 and / or 1. Each of these particles are known as qubits, the nature and behavior of these particles (as expressed in quantum theory) forms the basis of quantum computing. Two of the most relevant aspects of quantum physics is the principle of superposition and entanglement.

QUANTUM GATES
In quantum computers and quantum circuit model of computation in particular, a quantum logic gates or quantum gates are the basic operations of quantum circuits on a small number qubit.Mereka are the building blocks of quantum circuits, such as logic gates for circuits digital convensional classic.

ALGORITMA SHOR
Shor's algorithm is a further example of the basic paradigm (how much computational time required to find a factor of n-bit integers?), But this algorithm seems isolated from most of the other findings of quantum information science. At first glance, it is just as ingenious programming tricks with little fundamental significance. Appearances are deceptive; researchers have shown that Shor's algorithm can be interpreted as an example of a procedure to assign the energy levels of quantum systems, a process that is fundamental. As time goes on and we charge more on the map, should be so easy to understand the principles underlying Shor's algorithm and other quantum algorithms and, we hope, develop new algorithms.

Selasa, 29 April 2014

Cloud Computing

Cloud computing in general can be portrayed as a synonym for distributed computing over a network, with the ability to run a program or application on many connected computers at the same time. It specifically refers to a computing hardware machine or group of computing hardware machines commonly referred as a server connected through acommunication network such as the Internet, an intranet, a local area network (LAN) or wide area network (WAN) and individual users or user who have permission to access the server can use the server's processing power for their individual computing needs like to run an application, store data or any other computing need. Therefore, instead of using a personal computer every-time to run the application, the individual can now run the application from anywhere in the world, as the server provides the processing power to the application and the server is also connected to a network via internet or other connection platforms to be accessed from anywhere. All this has become possible due to increasing computer processing power available to humankind with decrease in cost as stated in Moore's law.In common usage, the term "the cloud" is essentially a metaphor for the Internet. Marketers have further popularized the phrase "in the cloud" to refer to software, platforms and infrastructure that are sold "as a service", i.e. remotely through the Internet. Typically, the seller has actual energy-consuming servers which host products and services from a remote location, so end-users don't have to; they can simply log on to the network without installing anything. The major models of cloud computing service are known as software as a service, platform as a service, and infrastructure as a service. These cloud services may be offered in a public, private or hybrid network. Google, Amazon, IBM, Oracle Cloud, Rackspace, Salesforce, Zoho and Microsoft Azure are some well-known cloud vendors. Network-based services, which appear to be provided by real server hardware and are in fact served up by virtual hardware simulated by software running on one or more real machines, are often called cloud computing. Such virtual servers do not physically exist and can therefore be moved around and scaled up or down on the fly without affecting the end user, somewhat like a cloud becoming larger or smaller without being a physical object.
From the above explanation of cloud computing , there are many benefits that we can take from cloud computing , namely :
1.    Scalability , ie cloud computing we can increase our storage capacity without having to purchase additional equipment , such as hard drives , etc. . We simply add the capacity provided by the cloud computing service providers .
2.    Accessibility , ie we can access data whenever and wherever we are , as long as we are connected to the Internet , making it easier for us to access the data when important .
3.    Security , we can be assured that the data security of its cloud computing service provider , so for IT based company , the data can be stored securely in the cloud computing provider . It also reduces the cost required to secure corporate data .
4.    Creation , ie the user can do / develop their creations or projects without having to submit their projects directly to the company , but the user can send it through the cloud computing service providers .
5.    Anxiety , when a natural disaster strikes our proprietary data stored safely in the cloud even though we damaged hard drive or gadget
Here is how the data storage and replication of data on the use of cloud computing technology . With Cloud Computing is no longer a local computer should run the heavy computational work required to run the application , no need to install a software package for every computer , we only perform the installation of the operating system on application . Computer networks that make up the cloud ( Internet ) handles them instead . This server will be running all applications ranging from e - mail , word processing , to complex data analysis programs . When users access the cloud ( internet ) for a popular website , many things can happen . Users of Internet Protocol ( IP ) for example can be used to determine where the user is located ( geolocation ) . Domain Name System ( DNS ) services can then redirect the user to a server cluster that is close to the users so that the site can be accessed quickly and in their local language . The user is not logged into the server , but they login to their services using a session id or cookie that has been obtained is stored in their browser . What users see in the browser usually comes from a web server . Webservers run the software and interface presents the user with the means used to collect orders or instructions from the user ( click , type, upload , etc. ) These commands are then interpreted by webservers or processed by the application server . Information is then stored in or retrieved from a database server or file server and the user is then presented with a page that has been updated . The data is synchronized across multiple servers around the world for global access quickly and also to prevent data loss.
Characteristic of Cloud Computing :
1 . On Demand Self Service ( yourself when self-service is needed )
Users can order and manage services without human interaction with the service provider , for example by using a , a web portal and interface management . Procurement of services and equipment as well as related resources occur automatically on providers
2 . Broad Network Access ( access to large networks )
Services available are connected via broadband networks , especially for adequately accessible through the Internet , either using a thin client , thick clien , or other media such as smartphones .
3 . Resource Pooling (resource fused )
Cloud service providers provide services through resources that are grouped in one or multiple locations of data centers consisting of a number of servers with multi - tenant mechanism . This mechanism allows a multi- tenant computing resource is shared by several users , where those resources either in the form of physical or virtual, can be allocated dynamically to the needs of users / customers on demand . Thus , customers do not need to know how and where the demand for computing resources met by the service providers . Importantly , all requests can be fulfilled . The computing resources include storage , memory , processor , network band , the virtual machine .
4 . The Rapid Elasticity ( rapid elasticity )
Computing capacity that can be provided rapidly and elastically supplied , be it in the form of the addition or reduction of the required capacity .
5 . Measured Service ( measurement )
Available cloud resources should be managed and optimized its use , with a measurement system that can measure the usage of each computing resource use ( storage , memory , processor , bandwidth , and user activity , etc. ) . Thus , the amount of resources used can be measured in a transparent manner which will be the basis for the user to pay for the cost of using the service .
The relative security of cloud computing services is a contentious issue that may be delaying its adoption. Physical control of the Private Cloud equipment is more secure than having the equipment off site and under someone else's control. Physical control and the ability to visually inspect data links and access ports is required in order to ensure data links are not compromised. Issues barring the adoption of cloud computing are due in large part to the private and public sectors' unease surrounding the external management of security-based services. It is the very nature of cloud computing-based services, private or public, that promote external management of provided services. This delivers great incentive to cloud computing service providers to prioritize building and maintaining strong management of secure services.[146] Security issues have been categorised into sensitive data access, data segregation, privacy, bug exploitation, recovery, accountability, malicious insiders, management console security, account control, and multi-tenancy issues. Solutions to various cloud security issues vary, from cryptography, particularly public key infrastructure (PKI), to use of multiple cloud providers, standardisation of APIs, and improving virtual machine support and legal support

Not all cloud computing systems have the same user interface . Services such as Web - based e - mail program utilizes existing Web browsers such as Internet Explorer or Firefox . Other systems have unique applications that provide network access to clients . At the back end of the system are the various computers , servers and data storage systems that create the " cloud " of computing services . In theory , a cloud computer system can include almost any computer program you can imagine , from the data processing to video games . Typically , each application will have its own dedicated server . cloud computing servers centrally manage the system , monitoring traffic and client demands to ensure everything runs smoothly . These systems follow a set of rules called protocols and uses a special kind of software called middleware . Middleware network allows computers to communicate with each other . Mostly, the server is not running at full capacity . That means no processing power unused waste products . It will require a way . This technique is called server virtualization . By maximizing the output from each server , server virtualization reduces the need for the machine to work . 

Selasa, 25 Maret 2014

Client Server

Arsitektur File Server
  • Model pertama Client/Server
  • Semua pemrosesan dilakukan pada sisi workstation
  • Satu atau beberapa server terhubungkan dalam jaringan
  • Server bertindak sebagai file server
  • File server bertindak sebagai pengelola file dan memungkinkan klien mengakses file tersebut
  • Setiap klien dilengkapi DBMS tersendiri
  • DBMS berinteraksi dengan data yang tersimpan dalam bentuk file pada server
  • Aktivitas pada klien:
  • Meminta data
  • Meminta penguncian data
  • Tanggapan dari klien
  • Memberikan data
  • Mengunci data dan memberikan statusnya


Batasan File Server
  • Beban jaringan tinggi karena tabel yang diminta akan diserahkan oleh file server ke klien melalui jaringan
  • Setiap klien harus memasang DBMS sehingga mengurangi memori
  • Klien harus mempunyai kemampuan proses tinggi untuk mendapatkan response time yang bagus
  • Salinan DBMS pada setiap klien harus menjaga integritas databasse yang dipakai secara bersama-sama ð tanggung jawab diserahkan kepada programmer
Arsitektur Database Server
  • Klien bertanggung jawab dalam mengelola antar muka pemakai (mencakup logika penyajian data, logika pemrosesan data, logika aturan bisnis)
  • Database server bertanggung jawab pada penyimpana, pengaksesan, dan pemrosesan database
  • Database serverlah yang dituntut memiliki kemampuan pemrosesan yang tinggi
  • Beban jaringan menjadi berkurang
  • Otentikasi pemakai, pemeriksaan integrasi, pemeliharaan data dictionary dilakukan pada database server
            Materi Sebelumnya : http://gamuri.blogspot.com/2014/03/client-server.html

Sumber :

Impact of Mobile Computing


Type Mobile Computing
• Laptops are portable computers , small and can be carried anywhere very easily integrated in a casing . Weight laptops range from 1 to 6 pounds depending on size , materials and specifications . The power source comes from batteries or A / C adapter which can be used to recharge the battery and to power the laptop itself . Usefulness same laptop with a desktop computer , which distinguishes only the size making it easier for users to carry it around .
• Wearable Computer or computer that is applied in the human body . An example is Computer Glacier Ridgeline W200 . W200 is made from reinforced magnesium alloy which maximizes strength and minimizes overall weight . At only 10.2 ounces and was formed in the arm contour , W200 combines the same features of a standard computer with a device that provides comfort and ergonomic wrist worn instrument . The W200 has a 3.5 “color display with touch screen , backlit keyboard and a hot swappable battery . Wireless function of W200 ensure continuous connectivity regardless of the user’s location with plug and play Wi – Fi , Bluetooth and GPS modules . Using Windows CE or Linux operating systems , the unit can be quickly configured to access the remote host system through integrated wired or wireless interfaces . Hands – free operation of the W200 that overcomes the physical limitations associated with normal hand-held computer . This allows the user complete freedom to continue their daily activities with both hands while using the computer has full access at all times . In addition to the electronic compass , the system also integrates the latest and most innovative features , such as tilt and silent reckoning , which allows critical battery savings when the unit is not in use . Hands – free usability of the W200 makes it of special interest for Emergency Services , Security , Defense , Warehouse , Field Logistics and any area where access to a large amount of information required . W200 ridge line of the glacier when it joins rugged computers developed for data collection .
• PDAs ( Personal Digital Assistants ) is an electronic device and a computer -based small form and can be taken anywhere . According to my knowledge PDAs are widely used as a personal organizer at first , but because of its development , then multiply its utility function , such as a calculator , clock and timing pointer , computer games , internet users , receiving and sending electronic mail ( e – mail ) , radio receiver , video recorder , and a memo recorder . Apart from it with a PDA ( pocket computer ) , we can use the address book and store addresses , e-book reading , using GPS and many other functions . Even more sophisticated version of the PDA can be used as a mobile phone , Internet access , intranets , or extranets via Wi – Fi or Wireless Network . One of the typical PDA is the ultimate touch screen facility

• SmartPhone is a mobile phone offering advanced capabilities , its ability to resemble capabilities virtually the PC ( computer ) . Generally, a mobile phone as a smartphone when it is said to be running on the operating system software that is complete and has a standard interface and platform for application developers . While some say that a smartphone is a simple mobile phone with advanced features such as the ability to send and receive emails , surf the Internet and read e -books , built -in full keyboard or external USB keyboard , or has a VGA connector . In other words , the smartphone is a miniature computer with phone capabilities .
4 . Tool for Mobile Computing
- GPS ( Global Positioning System )
- Wireless ( Acess )
- GIS ( Location )

Excess and deficiency
Advantages of Mobile Computing
- Application wide
- Moving / berpidah freely locations
- Non- switch networks

Disadvantages of Mobile Computing
lack of Bandwidth
Internet access in peralatanini slow when compared to wired access , but with the use of technology GPRS , EDGE and 3G networks , high -speed Wireless LAN is not too expensive but has a limited bandwidth .
power consumption
Mobile computing is highly dependent on battery life .
Transmission disorders
Distance to the transmitter signal and weather affect transimis data on mobile computing .
Potential Occurrence of Accidents
Some accidents are often caused by akhir2 motorists who use mobile computing devices while driving .

Usefulness And Other Issues
As the use of mobile Internet using mobile internet sites , the ability of the site to be able to use (usability ) is important to attract and retain the attention of ” user stickiness ” ( the degree to which the user remain our site ) . There are three dimensions of usability , ie effectiveness , efficiency and satisfaction . However, users often find today’s mobile devices are not effective , especially because of restrictions pocket-sized keyboard and services , thus reducing its usefulness . Moreover, due to the limited storage capacity and speed of access to information than most smartphones and PDAs , as difficult or impossible to download large files from the per Alatan this kind . Technical limitations and other restrictions that slow the spread of m – commerce .
Failure In Mobile Computing and M – Commerce
Same with other technologies , especially new ones , there are many failures of the application and of the whole company in the mobile computing and m – commerce . It is important to anticipate and plan for the possibility of failure and learning from failure . Case Northaest Utilities beberikan some important insights .
The existence Impact of Modern Computing
The impact of modern computing is that it can help people to solve complex problems using computers . One example is a biometric . Biometric derived from the Bio and Metric . The word bio is taken from the ancient Greek language which means life , while Metric is also derived from the ancient Greek language , which means the size , so if concluded biometric means of life measurements .
But an outline of a biometric measurement of the statistical analysis of biological data that refers to the technology to analyze the characteristics of a body ( people) . From these explanations it is clear that describe Biometric detection and classification of physical attributes . There are many different biometric techniques , including :
• Reading of fingerprints / palm
• Hand geometry
• Reading of the retina / iris
• Voice recognition
• The dynamics of signatures .
And according to Don Tapscott (1995 ) in his book entitled ” The Digital Economy : Promise and Peril In The Age of Networked Intelligence ” illustrates how the impact of computing technology on human life . Application technology is less than perfect without the support of intelligent machines capable analytic . The presence of increasingly sophisticated computing technology has changed human lifestyle and the demands on human competence . Now human life increasingly dependent on computers . Here are the things that describe the concept of computational intelligence technologies are supported by the application .
1 . Product -driven computer system
a. Smart car ( car smart )
b . Smart card ( smart card )
c . Smart house ( smart home )
d . Smart road ( street smart )
2 . The design of the product is managed by a computer
3 . The process is driven by a computer work
4 . Computers became an effective means of communication
5 . Computer as an information center
In addition to the structural impact on human livelihoods , technology also evokes cultural processes in society diterpanya . It is a symptom that by N. Postman called technopoly , which is described by him as follows :
” Technopoly is a state of culture . It is also a state of mind . It Consist in the deification of technology , the which means that the culture seeks it’s satisfactions in technology , and takes it’s orders from technology “
Thus , what matters is the extent to which a society ready to enter an age characterized by the supremacy of the power plant technology as a new culture without cause risk resilience own culture . Thus , it is not wrong to state that also technological dominance will continue with the blossoming of a new culture that gave birth to various new value also tends to be the benchmark of modern human behavior in a variety of patterns of interaction with others .
Trends in Mobile Computing
Mobile devices have a radical impact on the different routines of individuals from the modern era . The introduction of the phone itself to change the communication pattern in previous years and the technology continues to evolve , now leave marks on other parts as well . Mobile computing not only provides the basic functions of communication , but to help other users in performing everyday tasks such as arranging tasks , social sharing , taking pictures and other computing tasks .

Data capability , with the introduction of wireless networks , mobile devices are also provided in advanced . Mobile technology also adds a new variation and improvisation in order to improve the overall user experience of mobile . Some of the new trends that have been introduced in mobile computing , in recent years are :
    Smart -phone Computing: The third-party application development for various smartphone platforms such as iOS , Android , Windows mobile , etc. have improved graphics innovation and functionality in this application . Different concepts such as BYOD and mobility companies have introduced the use of smart-phone applications as enterprise application to different domains of industry .
    Security on mobile phones : With mobile phones becoming smarter every day , the data handling capabilities become an integral part of mobile computing . The device is also connected to the network at any time , so the need to secure data stored also appeared . Because the mobile security becomes an important component of mobile computing , because the purpose of the communication device has been developed from voice to data.
    Wireless Networking : different network technologies such as 4G and WiMAX are also introduced recently which raised computational tasks of data from devices and provide high speed accessibility of data from these devices . This is helpful for users who require large amounts of data transfer from their handheld devices .
    M – commerce : Online trading activities has become a common activity for the user , for the shopping experience a laxative . With the growing practice of mobile computing , users can now perform the same tasks using their hand-held mobile phone or tablet device that is . Different security parameters are taken care of in the event, which involves the processing of financial information . Unlike the mobile payment application has also been introduced to cement a strong foundation of m – commerce activity .
Another location -based mobile application service which uses a special system called the Global Positioning System , or GPS , which was introduced which allows users to gain access to the information from the various locations of their device .
Different maps like Google maps facility allows users to get turn-by – turn navigation from their source of travel to their destination address . Different camera apps also introduced the use of GPSs with Geo-tagging feature so that users can customize the map view them according to their needs .
Sumber:
http://ku2harlis.wordpress.com/komputasi-modern/http://sumbait.blogspot.com/2013/03/komputasi-bergerak-nirkabel-dan-perpasif.htmlhttp://ariwiyanto83.blogspot.com/http://arissetiawan-balangan.blogspot.com/2012/10/artikel-artikel-komputer-masyarakat.htmlhttp://berserkerdark.blogspot.com/
boser45.blogspot.com/2012/12/trends-in-mobile-computing.html

Senin, 17 Maret 2014

Layer Protocol dan Metode Komunikasi


1.      c.         Higher Level Layer
Di atas lapisan transport. OSI membedakan tiga lapisan tambahan. Dalam prakteknya, hanya lapisan aplikasi yang pernah digunakan. Bahkan, di suite internet protocol, segala sesuatu di atas lapisan transport dikelompokkan bersama-sama. Dalam menghadapi sistem middleware, akan kita lihat dalam bagian ini bahwa baik OSI maupun pendekatan internet benar-benar tepat. Dalam Higher Level Layer ini terbagi menjadi tiga lapisan tambahan yaitu:
1.      Sesi dan Presentasi Protokol
Lapisan sesi dasarnya merupakan versi yang disempurnakan dari lapisan transport. Menyediakan kontrol dialog, untuk melacak pihak mana saat berbicara, dan menyediakan fasilitas sinkronisasi. Sehingga jika terjadi kecelakaan, yang terakhir ini berguna untuk memungkinkan pengguna memasukkan pos-pos pemeriksaan dalam transfer yang panjang. Hal ini diperlukan untuk kembali hanya untuk pos pemeriksaan terakhir, daripada semua jalan kembali ke awal. Dalam prakteknya, beberapa aplikasi tertarik dalam lapisan sesi dan jarang didukung. Hal ini tidak hadir dalam acara suite protokol Internet.
Berbeda dengan lapisan bawah, yang prihatin dengan mendapatkan bit dari pengirim ke penerima andal dan efisien, lapisan presentasi berkaitan dengan arti dari bit. Pesan yang paling tidak terdiri dari string bit acak, tetapi informasi lebih terstruktur seperti nama orang, alamat, jumlah uang, dan sebagainya. Pada lapisan presentasi adalah mungkin untuk menentukan catatan yang berisi bidang-bidang seperti ini dan kemudian memiliki Sener memberitahukan penerima bahwa pesan berisi catatan tertentu dalam format tertentu. Hal ini memudahkan untuk mesin dengan representasi internal yang berbeda untuk berkomunikasi.
1.      Protocol Application
Menyediakan layanan untuk aplikasi misalnya transfer file, email, akses suatu komputer atau layanan. Lapisan aplikasi OSI awalnya dimaksudkan untuk menampung koleksi aplikasi jaringan standar seperti untuk surat elektronik, transfer file, dan emulasi terminal. Sampai saat ini telah menjadi wadah untuk semua aplikasi dan protokol yang dalam satu cara atau yang lain tidak masuk ke dalam salah satu lapisan yang mendasarinya. Dari perspektif model referensi OSI, hampir semua sistem terdistribusi hanya aplikasi.
Ada juga banyak tujuan umum protokol yang berguna untuk banyak aplikasi, tetapi yang tidak dapat dikualifikasikan sebagai protokol transport. Dalam banyak kasus, protokol seperti jatuh ke dalam kategori protokol middleware, yang akan kita bahas selanjutnya.
1.      Middleware Protocol
Middleware adalah sebuah aplikasi yang logis tinggal di lapisan aplikasi, tetapi yang mengandung banyak tujuan umum protokol yang menjamin lapisan mereka sendiri, independen lainnya, aplikasi yang lebih spesifik. Perbedaan dapat dibuat antara tingkat tinggi protokol komunikasi dan protokol untuk membangun layanan middleware berbagai.
Dibuat untuk menyediakan layanan layanan protokol yang seragam dan dapat digunakan oleh aplikasi-aplikasi yang berbeda-beda. Pada lapisan ini terdapat sekumpulan protokol komunikasi yang beragam yang memungkinkan berbagai macam aplikasi dapat berkomunikasi. Middleware juga memberi fasilitas marshalling dimana terdapat proses pengubahan data dalam komunikasi antar proses menjadi bentuk yang siap dikirim melalui jaringan sehingga dapat tetap konsisten sampai di si penerima data dan kebalikannya.
Middleware komunikasi protokol mendukung tingkat tinggi layanan komunikasi. Misalnya, di bagian dua berikutnya kita akan membahas protokol yang memungkinkan proses untuk memanggil prosedur atau invok obyek pada mesin remote dengan cara yang sangat transparan. Demikian juga, ada layanan komunikasi tingkat tinggi untuk menetapkan dan sinkronisasi aliran untuk mentransfer data real-time, seperti yang diperlukan untuk aplikasi multimedia. Sebagai contoh terakhir, beberapa sistem middleware menawarkan layanan multicast handal yang skala untuk ribuan penerima tersebar di wide area network.
Beberapa protokol komunikasi middleware yang sama bisa juga termasuk dalam lapisan transport, tapi mungkin ada alasan spesifik untuk menjaga mereka pada tingkat yang lebih tinggi. Misalnya, multicasting layanan yang handal Taht skalabilitas jaminan dapat diimplementasikan hanya jika persyaratan aplikasi diperhitungkan. Akibatnya, sistem middleware mungkin menawarkan yang berbeda (merdu) protokol, masing-masing pada gilirannya diimplementasikan dengan menggunakan protokol transport yang berbeda, tapi mungkin menawarkan antarmuka tunggal.
Ø  Metode Komunikasi pada Sistem Terdistribusi
Komponen-komponen pada sistem terdistribusi harus melakukan komunikasi dalam suatu urutan, yaitu : Infrastruktur jaringan (interkoneksi dan software jaringan) serta Metode dan Model komunikasi yang cocok. Metode Komunikasi : → Send → Receive → Remote Procedure Call Model Komunikasi : → Client – server communication : Pertukaran pesan antara dua proses, dimana satu proses (client) menggunakan / meminta layanan pada server dan server menyediakan hasil dari proses tersebut. → Groupmulitcast : Target dari pesan yang dikirimkan adalah gabungan dari proses, yang berasal dari suatu grup. 3. Performance and Scalability (Kinerja dan Ruang Lingkup) Ada beberapa faktor yang mempengaruhi kinerja (performance) dari pada sistem terdistribusi, yaitu : § Kinerja dari pada personal workstations § Kecepatan infrastruktur komunikasi § Fleksibilitas dalam membagi beban kerja. Contoh : apabila terdapat prosesor (workstation) yang idle maka dapat dialokasikan secara otomatis untuk mengerjakan tugas – tugas user. § Scalability : Sistem tetap harus memperhatikan efesiensi walaupun terdapat penambahan secara signifikan user atau sumber daya yang terhubung. § Cost (biaya) penambahan sumber daya (resources) harus reasonable. § Penurunan kinerja (performance) diakibatkan oleh penambahan user atau sumber daya harus terkontrol. 4. Heterogeneity (Keanekaragaman) Aplikasi yang terdistribusi biasa berjalan dalam keberagaman, yaitu : Ø Hardware : mainframes, workstations, PC’s, server Ø Software : UNIX, MS Windows, IMB OS/2, LINUX Ø Devices : teller machine, robot, sistem manufacturing Ø Network dan Protocol : Ethernet, FDDI, ATM, TCP/IP Melihat keanekaragaman di atas maka salah satu solusi yang bisa di terapkan adalah Middleware : berfungsi sebagai jembatan untuk komunikasi dan proses.

Sumber :



Selasa, 11 Maret 2014

Tantangan Dalam Membuat Sistem Terdistribusi

Ada empat alasan utama untuk membangun sistem terdistribusi, yaitu:
1.       Resource Sharing.  Dalam sistem terdistribusi, situs-situs yang berbeda saling terhubung satu sama lain melalui jaringan sehingga situs yang satu dapat mengakses dan menggunakan sumber daya yang terdapat dalam situs lain. Misalnya, user di situs A dapat menggunakan laser printer yang dimiliki situs B dan sebaliknya user di situs B dapat mengakses file yang terdapat di situs A.
2.       Computation Speedup.  Apabila sebuah komputasi dapat dipartisi menjadi beberapa subkomputasi yang berjalan bersamaan, maka sistem terdistribusi akan mendistribusikan subkomputasi tersebut ke situs-situs dalam sistem. Dengan demikian, hal ini meningkatkan kecepatan komputasi (computation speedup).
3.       Reliability.  Dalam sistem terdistribusi, apabila sebuah situs mengalami kegagalan, maka situs yang tersisa dapat melanjutkan operasi yang sedang berjalan. Hal ini menyebabkan reliabilitas sistem menjadi lebih baik.
4.       Communication.  Ketika banyak situs saling terhubung melalui jaringan komunikasi, user dari situs-situs yang berbeda mempunyai kesempatan untuk dapat bertukar informasi.

Tantangan-tantangan yang harus dipenuhi oleh sebuah sistem terdistribusi:
1.       Keheterogenan perangkat/multiplisitas perangkat.  Suatu sistem terdistribusi dapat dibangun dari berbagai macam perangkat yang berbeda, baik sistem operasi, H/W maupun S/W.
2.       Keterbukaan.  Setiap perangkat memiliki antarmuka (interface) yang di-publish ke komponen lain. Perlu integrasi berbagai komponen yang dibuat oleh programmer atau vendor yang berbeda
3.       Keamanan.  Shared resources dan transmisi informasi/data perlu dilengkapi dengan enkripsi.
4.       Penangan kegagalan.  Setiap perangkat dapat mengalami kegagalan secara independen. Namun, perangkat lain harus tetap berjalan dengan baik.
5.       Concurrency of components.  Pengaksesan suatu komponen/sumber daya secara bersamaan oleh banyak pengguna.
6.       Transparansi.  Bagi pemakai, keberadaan berbagai perangkat (multiplisitas perangkat) dalam sistem terdistribusi tampak sebagai satu sistem saja.



Referensi :


Rabu, 04 Desember 2013

Contoh dan Prosedur Pendirian Usaha

Contoh Akta Pendirian Usaha Dagang oleh Notaris


AKTA PENDIRIAN USAHA DAGANG
U.D. CAHAYA BAN
Nomor :  1

- Pada hari ini, Rabu, Tanggal 03 – 04 – 2013 -(tiga April dua –
ribu tiga belas), pukul 10.10 WIB(Sepuluh lewat sepuluh menit — 
Waktu Indonesia Bagian Barat) sampai dengan selsai.————–
- Menghadap kepada saya, SURYA ZULFIKAR IBRAHIM, Sarjana Hukum, -
Notaris di Surabaya, dengan dihadiri-—oleh saksi-saksi yang —–
saya, notaris kenal dan akan— disebutkan pada bagian akhir —- 
akta ini : ——————————————————
- Penghadap telah dikenal oleh saya, notaris. ——————-
1. Tuan Subiantoro, lahir di Lamongan, pada tanggal 10 – 03 – —–1953 (sepuluhpuluh Maret seribu Sembilan ratus limapuluh ——-
tiga),  Warga Negara Indonesia, Pekerjaan Swasta, Bertempat —– 
tinggal di Jalan Arif Rahman Hakim Nomor 10, Rukun Tetangga —– 
03,  Rukun Warga 03, Kelurahan Sidoharjo, Kecamatan Lamongan,—- 
Kabupaten Lamongan, Pemegang Kartu Tanda Penduduk Republik ——
Indonesia Nomor : 17.5001.600357.0009;—————————
- Penghadap menerangkan bahwa dirinya hadir bersama dengan istri- 
sah yaitu Sutianingsih.——————————————
- Penghadap menerangkan dengan ini ingin mendirikan suatu usaha -
dagang bernama U.D. Cahaya Ban Dengan tidak mengurangi ijin dari-
yang berwajib dan dengan memakai syarat-syarat dan aturan-aturan-
sebagai berikut :————————————————
———————- NAMA DAN TEMPAT KEDUDUKAN —————-
—————————— Pasal 1 ————————–
1. Usaha dagang ini bernama usaha dagang : ———————-
————————– U.D. Cahaya Ban ———————-
2. Berkedudukan di Kabupaten Lamongan, untuk pertama kalinya —-
berkantor di Jalan Andansari No 87, — Kabupaten Lamongan. ——
Dengan cabang-cabangnya/perwakilan  perwakilannya di tempat——
tempat lain — sebagaimana akan  ditetapkan oleh para – pesero -
secara musyawarah. ———————————————-
—————— MAKSUD DAN TUJUAN —————–
———————— Pasal 2 ———————
Maksud dan tujuan usaha dagang ini ialah : ———–
a. Menjalankan usaha-usaha dalam bidang perdagangan— pada umumnya, baik atas tanggungan sendiri maupun —atas tanggungan pihak lain secara komisi, termasuk — pula perdagangan ekspor, impor, interinsulair dan — lokal ; –———————————————
b. Menjalankan usaha-usaha sebagai grosir, ——leveransir  supplier dan agen dari segala macam—- barang-barang baik dalam maupun luar negeri ; ——-
c. Menjalankan usaha-usaha yang sifatnya memberikan –
bantuan dalam bidang jasa kecuali jasa dalam bidang –
hukum ;———————————————-
- segala sesuatu dalam arti kata yang seluas-luasnya dan tidak mengurangi ijin dari instansi-instansi —-
(pejabat-pejabat) yang berwenang bila diperlukan. —-
———————— WAKTU ———————-
———————— Pasal 3 ———————
Perusahaan ini dimulai pada tanggal sejak di —-keluarkan Akta Notaris ini dan didirikan untuk —-waktu yang tidak ditentukan lamanya. –—————
———————– MODAL ———————-
———————— Pasal 4 ———————
Modal usaha dagang tersebut disediakan sepenuhnya —-
oleh penghadap sendiri. —————————-
—————– PEMIMPIN PERUSAHAAN —————
———————— Pasal 5 ———————
Pemimpin perusahaan dipegang sendiri oleh penghadap –
dengan sebutan Direktur.—————————–
Direktur berhak mewakili perusahaan di dalam dan —- di luar Pengadilan, melakukan segala tindakan — pengurusan dan penguasaan milik, menerima dan — mengeluarkan uang untuk perusahaan dan singkatnya —- melakukan segala tindakan mengenai pengurusan —– dan pemilikan (penguasaan), tanpa pembatasan apapun — juga. ———————————————–
————– DEMIKIAN ATAS AKTA INI —————
Dibuat dan diselesaikan di Surabaya, pada hari, — tanggal, bulan dan tahun seperti tersebut pada —bagian  awal akta ini, dengan dihadiri oleh : ——–
1. Yanto Sumarlan
2. Ali Sadikin
keduanya pegawai kantor notaris, bertempat tinggal — di Surbaya, sebagai saksi-saksi. ———————
Setelah saya, notaris, membacakan akta ini kepada ——–
penghadap dan para saksi, maka segera penghadap, ———
para saksi dan saya, notaris, menandatanganinya. ———
Dibuat dengan tanpa adanya perubahan atau uraian tentang penambahan, pencoretan atau pengantian.


Surabaya, 03 April 2013



Surya Zulfikar Ibrahim S.H.
Notaris

prosedur & legalitas pendirian usaha


Dalam membangun sebuah badan usaha, kita harus memperhatikan beberapa prosedur peraturan perizinan untuk mendirikan badan usaha, seperti :

  1. Tahapan Pengurusan Izin Pendirian
    Bagi perusahaan skala besar hal ini menjadi prinsip yang tidak boleh dihilangkan demi kemajuan dan pengakuan atas perusahaan yang bersangkutan. Hasil akhir pada tahapan ini adalah sebuah izin prinsip yang dikenal dengan Letter of Intent yang dapat berupa izin sementara, izin tetap hinga izin perluasan. Untuk beberapa jenis perusahaan misalnya, sole distributor dari sebuah merek dagang, Letter of Intent akan memberi turunan berupa Letter of Appointment sebagai bentuk surat perjanjian keagenan yang merupakan izin perluasan jika perusahaan ini memberi kesempatan pada perusahaan lain untuk mendistribusikan barang yang diproduksi. Berikut ini adalah dokumen yang diperlukan, sebagai berikut :
    • Tanda Daftar Perusahaan
    • NPWP
    • Bukti Diri
Selain itu terdapat beberapa izin lainnya yang harus dipenuhi yaitu :
    • Surat Izin Usaha Perdagangan (SIUP) dikeluarkan oleh Dep. Perdagangan.
    • Surat Izin Usaha Indrustri (SIUI) dikeluarkan oleh Dep.Perindustrian
    • Izin Domisili
    • Izin Gangguan
    • Izin Mendirikan Bangunan (IMB)
    • Izin dari Dep.Teknis
  1. Tahapan pengesahan menjadi badan hukum
    Tidak semua badan usaha mesti ber badan hukum. Akan tetapi setiap usaha yang memang dimaksudkan untuk ekspansi atau berkembang menjadi berskala besar maka hal yang harus dilakukan untuk mendapatkan izin atas kegiatan yang dilakukannya tidak boleh mengabaikan hukum yang berlaku. Izin yang mengikat suatu bentuk usaha tertentu di Indonesia memang terdapat lebih dari satu macam. Adapun pengakuan badan hukum bisa didasarkan pada Kitab Undang-Undang Hukum Dagang (KUHD), hingga Undang-Undang Penanaman Modal Asing ( UU PMA ).
  2. Tahapan penggolongan menurut bidang yang dijalani
    Usaha dikelompokkan kedalam berbagai jenis berdasarkan jenis bidang kegiatan yang dijalani. Berkaitan dengan bidang tersebut, maka setiap pengurusan izin disesuaikan dengan departemen yang membawahinya seperti kehutanan, pertambangan, perdagangan, pertanian dsb.
  3. Tahapan mendapatkan pengakuan, pengesahan dan izin dari departemen lain.
    yang terkait Departemen tertentu yang berhubungan langsung dengan jenis kegiatan badan usaha akan mengeluarkan izin. Namun diluar itu, badan usaha juga harus mendapatkan izin dari departemen lain yang pada nantinya akan bersinggungan dengan operasional badan usaha misalnya Departemen Perdagangan mengeluarkan izin pendirian industri pembuatan obat berupa SIUP. Maka sebgai kelanjutannya, kegiatan ini harus mendapatkan sertifikasi juga dari BP POM, Izin Gangguan atau HO dari Dinas Perizinan, Izin Reklame, dll.

Surat Perjanjian Kontrak

Adalah Surat Perjanjian antara dua pihak yaitu Pihak Pemberi Tugas/Owner dengan Pihak Penerima Tugas/Pemborong sekurang-kurangnya memuat ketentuan sebagai berikut :

  • Para pihak yang menandatangani kontrak meliputi nama,jabatan dan alamat
  • Pokok pekerjaan yang diperjanjikan dengan uraian yang jelas mengenai jenis dan jumlah barang / jasa yang diperjanjikan.
  • Hak dan kewajiban para pihak yang terikat didalam perjanjian
  • Nilai atau harga kontrak pekerjaan serta syarat – syarat pembayaran.
  • Persyaratan dan spesifikasi teknis yang jelas dan terinci
  • Tempat dan jangka waktu penyelesaian / penyerahan dengan disertai jadual waktu penyelesaian / penyerahan yang pasti serta syarat-syarat penyerahannya.
  • Jaminan teknis/hasil pekerjaan yang dilaksanakan dan / atau ketentuan mengenai kelaikan.
  • Ketentuan mengenai cidera janji dan sanksi dalam hal para pihak tidak memenuhi kewajibannya
  • Ketentuan mengenai pemutusan kontrak secara sepihak
  • Ketentuan mengenai keadaan memaksa
  • Ketentuan mengenai kewajiban para pihak dalam hal terjadi kegagalan dalam pelaksanaan pekerjaan.
  • Ketentuan mengenai perlindungan tenaga kerja
  • Ketentuan mengenai bentuk dan tanggung jawab gangguan lingkungan
  • Ketentuan mengenai penyelesaian pekerjaan

Contoh Draft Kontrak Kerja :

KONTRAK PELAKSANAAN PEKERJAAN PEMBUATAN SISTEM INVENTORY GUDANG

antara
Griya Soft
dengan
IT Centre Computerindo (ICC)

_______________________________________________________________
Nomor : …………………….
Tanggal : …………………….
Pada hari ini ………, tanggal ……………kami yang bertanda tangan di bawah ini :
Nama : ………………………………………………………………………………
Alamat : ………………………………………………………………………………
Telepon : ………………………………………………………………………………
Jabatan : ………………………………………………………………………………
Dalam hal ini bertindak atas nama Griya Soft dan selanjutnya disebut sebagai Pihak Pertama.
dan
Nama : ………………………………………………………………………………
Alamat : ………………………………………………………………………………
Telepon : ………………………………………………………………………………
Jabatan : ………………………………………………………………………………
Dalam hal ini bertindak atas nama Pemilik atau Kuasa Pemilik dan selanjutnya disebut sebagai Pihak Kedua.
Kedua belah pihak telah sepakat untuk mengadakan ikatan Kontrak Pelaksanaan Pekerjaan Pembuatan Sistem Inventory Gudang untuk usaha yang dimiliki oleh Pihak Kedua yang terletak di ……………………………………………………………………………………
Pihak Pertama bersedia untuk melaksanakan pekerjaan pembuatan Sistem , yang pembiayaannya ditanggung oleh Pihak Kedua, dengan ketentuan yang disebutkan dalam pasal pasal sebagai berikut :
Pasal 1
Tujuan Kontrak
Tujuan kontrak ini adalah bahwa Pihak Pertama melaksanakan dan, menyelesaikan pekerjaan pembuatan system Inventory Gudang pada pihak kedua.

Pasal 2

Lain – Lain
Pihak Pertama dan Pihak Kedua akan bersama- sama mematuhi dengan baik dan bertanggung jawab terhadap seluruh kesepakatan kerja yang telah disetujui.
Demikian Kontrak Kerja ini telah di setujui dan di tanda tangani untuk dilaksanakan dengan sebagai mana mestinya tanpa adanya campur tangan dari pihak lain.

Pihak Pertama Pihak Kedua
( …………………. ) (…………………… )