Cloud Computing Assists Understand Cloud Forests

30 Desember 2014 oleh Asep Sudiyono
Their appropriately called Cloud Forest Task has both preservation and useful objectives, as it looks for to comprehend the best ways to secure among Brazil’s biggest forested locations while learning how to handle access to water and other natural deposits better.

 

The scientists wish to untangle the effect of micro-climate variation in the cloud forest environment. Basically, they wish to comprehend how the forest works– how co2, water, nitrogen, and other nutrients cycle through plants, animals, and microbes in this complex environment. To do so, they’ve placed some 700 sensing units in 15 forest plots, finding the gadgets at levels throughout the forest, from below the soil to the top of the canopy.

 

The job researchers have actually teamed up with Microsoft Study to handle the information with aid from the Microsoft Azure for Research. Consider it as cloud to cloud: cloud forest information being handled and evaluated through the power of cloud computing. Basically, it’s a parallel procedure with some scientists establishing the sensing units, power materials, and information circulation in the cloud forest, others dealing with computer systems to establish receptacles for those huge inbound information streams, and everybody aiming to reach a level of self-confidence that brand-new understandings can be found and checked out through the information.

 

The combination of such a huge variety of sensing unit information streams postures challenging difficulties. Prior to the analysts can evaluate the information, they need to figure out the dependability of the gadgets, so that they can remove information from malfunctioning ones. They likewise have to equate clinical concerns into evaluation of the time-series information streams– a procedure a lot more advanced than the conventional “open all the information in Excel spreadsheets” strategy.

 

The project scientists have collaborated with Microsoft Research to manage the data with help from the Microsoft Azure for Research project. Think of it as cloud to cloud: cloud forest data being managed and analyzed through the power of cloud computing. Essentially, it’s a parallel process with some researchers developing the sensors, power supplies, and data flow in the cloud forest; others working with computers to set up receptacles for those massive incoming data flows; and everyone striving to reach a level of confidence that new insights can be discovered and explored through the data.

 

Reliance on cyber infrastructure built on the Microsoft Azure cloud platform frees the researchers from purchasing and maintaining physical computers, saving time and money and eliminating the aggravation of learning how to be a computer system administrator. The cloud-based system gives researchers the power to combine interrelated data to create “virtual sensors” that quantify things that can not be measured readily by one type of sensor. Measuring fog is expensive and difficult with just one sensor, but the presence of fog can be inferred by combining data from sunlight, temperature, and humidity sensors.

 

Comparable cloud-computing benefits are readily available in nearly any study task that includes the collection, management, and evaluation of huge information. If that explains your study, you’ll wish to have a look at the Microsoft Azure for Research, particularly its award program, which provides considerable grants of Microsoft Azure calculate resources to competent jobs. Your study may not include a cloud forest, however if it requires a forest of information, the Microsoft Azure cloud could be your ticket to a more efficient and less expensive job.

One minute Overview of Comprehending the Supply Chain AnalyticsContinuum

29 Desember 2014 oleh Asep Sudiyono
Analytics are now an important part of any supply chain info management system. Modern computing power and advances in analytical software application have actually made effective analytics not just possible, however useful for the majority of companies sitting on top of a cornucopia of supply chain information. Analytics run the gambit from historic information discards to designs that recommend the very best strategy based upon a set of likely results.

Report
The least mature and simplest type of data analytics comes from simply accessing historical data and presenting it as a “report”. Static reports also allow the memorialization of data such as those found in financials. When data is presented in static reports, it often raises more questions than it answers.

 

Analysis
New tools for data visualization have revolutionized and matured data analysis within the supply chain. Using dashboards and other interactive tools, users can ask and answer their own questions regarding historical data series and learn from past performance.

 

Monitoring
More mature supply chain applications make rapid choices based upon exactly what they see taking place in real time. Devices, weather condition, transport fleets, and activity of products can all be kept an eye on and examined in modern-day company knowledge systems. Business establish actionable metrics and KPIs empowering individuals to make better company choices that favorably influence business leading and fundamental numbers.

 

Predictive
These types of analytics rely on a series of advanced designs that run on top of existing historic databases. In essence, predictive modeling takes historic information and, using analytical solutions, it identifies the relationship in between variables in the information set and makes use of the very same relationship to forecast exactly what will certainly occur in the future.

 

Prescriptive
The most fully grown element of analytics today is classified as authoritative analytics. Authoritative analytics function by not just expecting exactly what will certainly take place however likewise proposing choice alternatives on just how to take benefit of a future chance or reduce a future threat along with the ramification of each choice choice.

Android Version History

2 Desember 2014 oleh Asep Sudiyono
Android Version History
Android Version History
So many people using the android operating system on their smartphones, but do they know the history and the version of the operating system they have use. Maybe they know it, but for some people it is not important, and there are also some people who want to know the history and android version they are using.

 

Android is a mobile operating system (OS) based on the Linux kernel and currently developed by Google. Android’s source code is released by Google under open source licenses, although most Android devices ultimately ship with a combination of open source and proprietary software.

 

Overall, we can describe the android version as follows :

Android Alpha (1.0)
Android Beta (1.1)
Android Cupcake (1.5)
Android Donut (1.6) The world’s information is at your fingertips – search the web, get driving directions… or just watch cat videos.
Android Eclair (2.0) Make your home screen just how you want it. Arrange apps and widgets across multiple screens and in folders. Stunning live wallpapers respond to your touch.
Android Froyo (2.2) Voice Typing lets you input text, and Voice Actions let you control your phone, just by speaking.
Android Gingerbread (2.3) New sensors make Android great for gaming – so you can touch, tap, tilt, and play away.
Android Honeycomb (3.0) Optimized for tablets, this release opens up new horizons wherever you are.
Android Ice Cream Sandwich (4.0) Android comes of age with a new, refined design. Simple, beautiful and beyond smart.
Android Jelly Bean (4.1) Android is fast and smooth with buttery graphics. With Google Now, you get just the right information at the right time.
Android KitKat (4.4) Smart, simple, and truly yours. A more polished design, improved performance, and new features.
Android Lollipop (5.0) A sweet new take on Android. Get the smarts of Android on screens big and small – with the right information at the right moment.

summarized from :
http://www.android.com/history/
http://en.wikipedia.org/wiki/Android_version_history

How to Resolve the Shortcut Virus

22 November 2014 oleh Asep Sudiyono
Tips How to Resolve the Shortcut Virus is advanced tips of Tips to Prevent Malware Exposed Shortcut (Shortcut Virus), after we can prevent or at least we have tried to keep the computer / laptop / notebook and our flash drive from infected by Autorun Virus. Remember, prevention is better than cure (the doctor said : D). So what steps should we do if we have a computer and the flash drive is indicated as well as the shortcut virus infection, or in other words how we will treat the Personal Computer a.k. Computer or notebook (laptop) that have been exposed to infectious diseases autorun and has been a member of spreading the virus / malware shortcut?

 

To overcome the virus shortcut for some people who have advanced IT will be very easy to do, but for us who have not advanced IT then this will be a little tricky, Why like that? only god knows the answer hehehe. As before, tool or application that will be used to eradicate the virus autorun / shortcut to the host / parent is CCleaner Free version, owned by piriform.com, you can get it in https://www.piriform.com/CCLEANER and for antivirus as virus scanners and blockade against shortcut and other viruses that I recommend is Avast Internet Security belongs avast.com.

 

Once we get the applications, the next step to eradicate the autorun virus on our computer are is:
1. Install Avast Internet Security.
2. Install CCleaner.
3. Run the CCleaner application, go to the Tools tab, select the Startup menu.

Here we should be careful and observant in the search for genes or stem from autorun virus, the name a startup and file names usually memorandum or random unclear. If we can find, then right-click on the startup list and select Open Containing Folder. After explorer open and we find the host file then delete the file using the Shift key and the Delete button (pressed simultaneously). Close the explorer and go back to CCleaner, right-click again on the list of startup which we suspect to be virus host and select Open in RegEdit …, not long after Regedit will open and right click and delete the registry of the startup trigger autorun virus genes and close regedit.
4. Perform Scan using Avast Internet Security for Users directory or folder on your system drive.
To establish please scan the entire drive that is on your computer by using the Boot-time scan. Restart your PC and wait for the scan is in progress.
With these measures will autorun virus can not take place on our PC.

 

To eradicate the virus autorun on flash drive or flash drive, scan your flash drive using Avast internet security and to restore the folders and files that have hidden We can use Total Commander belongs http://www.ghisler.com/ applications. Open Total Commander, select Configuration, select Options, on the Display menu, please check the Show hidden / sytem files (for experts only), go to the Operation menu select Left mouse button, and then click OK. Navigate Flashdik Total Commander to drive us, then folders and files we will terhidden visible, to restore the file and folder attributes are simply select the folder and the file and click the Files menu and select Change Attributes. After the Change Attributes window opens, check / uncheck Recurse subdirectories, leave it as the attribute a, uncheck / or do not check and make sure the checklist r (read-only) empty colorless, so did the attributes h (hidden) and s (system file), then click OK !. And We will return the files.

How to Prevent Affected by Shortcut Malware (Shortcut Virus)

20 November 2014 oleh Asep Sudiyono
Tips to Prevent Malware Exposed Shortcut (Virus Shortcut)

 Malware Shortcut or partially people say as virus Shortcut  and also there are some people who call him by the name infected by Autorun virus is already a few years into the most successful viruses infect thousands or even millions of people’s flash drive in Indonesia. Not only the flash drive, the virus is actually also aims to infect or transmit the virus to your computer or Personal Computer. Type of infected by Autorun Virus is included into the type of worm or worms.


Virus Shortcut exploit files are quite often used as a trigger autorun windows of plug and play devices are disk Autorun.inf, the Autorun.inf file is deliberately created by Windows (Windows XP or Windows can be 7 or even Windows 8) that has been infected by a virus autorun, autorun virus in addition to the file also create a folder that is usually called “RECYCLER” and fill it with some of the genes worm parent / parent virus shortcut and change the attributes of foder and files in the flash becomes + h (hidden) + s (system files) and create a link (.lnk) or a shortcut with the name and shape similar to the folders / files that already exist in the flash, the the flash drive is user expectations when the flash drive is plug in another computer AutoPlay feature it is not turned off then indirectly the computer users have made computer driven into the flash autorun virus and if a user opens a clone folders / files that are in the flash drive is so the user actually has run parent / autorun virus genes.
From the description at least we already know some of the things that cause your computer easier to acute autorun virus, why do I say acute? This can not be separated from the number of the flash drive is and computer are considered safe by the owner but when flashdisk plugged into the computer which has a super-capable Antivirus indicated that his FD has brought Worm gene stuck in Autorun.inf. So how we can avoid the maker Malware shortcut?

Well, the following steps must we do to our PC protected from viruses autorun :
1. Do not let your flash drive out into any hole

Hole, I mean in this case is the USB slot or USB port, so pluged in the flash drive in any PC is not good :), at least we ask first when we are going to pluged in the flash drive. Is the computer safe or not? .
2. Turn off AutoPlay feature or support belonging to the windows on the computer or laptop
To turn off this feature please enter the Control Panel, then select the small icons on the menu view by and click AutoPlay. Remove the check or Uncheck the checkbox “Use AutoPlay for all media and devices” then click save.

use the Navigation pane in explorer

 3. Always use the Navigation pane in explorer.
Use the Navigation pane to browse the contents of the drive and folder, it is useful to keep us in the running shortcut autorun virus that resembles a folder.
4. Use antivirus proven reliable and resilient
Use Anti Virus such as Avast (free Avast are always updated or can also Avast Internet Security), KIS (Kaspersky Internet Security), SmadAV, but may also SmadAV sometimes even participate as a shortcut virus spreader when the operating system on the computer has been infected by the autorun virus.
5. Use the additional explorer applications, such as Total Commander. </ p>

Maybe it’s just Tips to Prevent Malware Exposed Shortcut (Shortcut Virus)  for which I use. Next might be discussed how to restore files and folders terhidden by virus shortcut .

 

 

How to Optimize the Performance of Personal Computers

18 November 2014 oleh Asep Sudiyono
Speed Up Your PC, Optimize Performance Personal Computer or PC
Speed Up Your PC, Optimize Performance PC
How to Optimize Performance of Personal Computers. Advances in technology is something that will happen any time. It has become commonplace or not foreign to the human race. For example, technological advances have occurred in the computer world in general and the Personal Computer or PC in particular. Of the human era using the abacus as a tool to count, to super small calculator that can calculate the sum, addition, division and multiplication. That is one example of the growing technological advances that allow there will be a super-sophisticated calculators that can be integrated directly into the human mind or brain. Once we fantasize high enough that it feels will be contrary to the ability of our PC Computer or mediocre,

coupled with our habit of carelessly in store files and then performance and capabilities of our computers become increasingly slowed down, boot or boot windows system information when turned on slow or even windows on our computer virus. Well this time I will share how we can optimize the performance of our computers, especially computer or a PC running the Windows operating system (Windows XP and Windows 7 / Seven).

reduce the startup programs or applications that come directly executed when the computer is turned on
 1. Optimize Booting Windows on the computer when we turned
To optimize the speed of the computer at boot time or when the computer is turned on you can just starting to do with reducing the startup programs or applications that come directly executed when the computer is turned on. To do this you can use a software called CCleaner. Open CCleaner program, go to the tab or the Tools section, select the Startup tab and select the Windows tab and note any programs or applications that include application startup. Please select one of the applications that you think are less important, and then click Disable. To try feel the results please restart your computer.

 

2. Disable display Desktop gadgets and Icon on the desktop (on Windows 7)
I think this would be useful in readiness computer when a new entry into the display windows at the moment after the boot process. By not displaying Desktop gadgets and Desktop Icon on your desktop then this will cut a few seconds. To Disable Desktop gadgets and Icon display on the desktop you can do with a right click on the desktop and navigate to the menu view.

 

3. Set Performance Options
In this step we have to choose, what would we optimize on the computer or PC. If we choose the best Adjust the Appearance then we optimize our PC to hight graphic view or call Best Looking, If we select Adjust bes Performance then we choose the option that optimize the performance of your computer at any speed regardless best looking, and the Custom option then we can choose and any sort of visual effect option we will use any funds that effect would not be used. Of course it all can not be separated from the specification or capability hardware that installed on our computer.
To setup the performance on Windows 7 startmenu click, right click on Computer, select Properties, then click on Advanced System Settings, in part anvanced and groupbox Performance click the Settings button.

 

Try to put the files in a folder in the hard disk drive
 4. Try to put the files in a folder in the hard disk drive.
For this fourth step can accelerate the performance of Explorer or My Computer (on win xp) and the Computer menu in Windows 7 in the opening drive, for example, open the D drive on the hard drive in your PC. Why this may affect the speed performance of the Explorer? yes of course it affects the indexing process when we open the file in Explorer, the more files that are specified directly on the drive, then this will slow down the speed of the explorer at the time on the run. After I observed the C drive in Windows 7 (the drive that is used to install the operating system Windows 7), the drive is almost all of the files are in a directory or folder, and when we opened the Explorer then directed to the C drive then it will feel faster than we open another drive.

 

 5. Use CCleaner and clean the Temporary files or files contained in the Recycle bin.
Run CCleaner, Choose Clean menu, then click the Analyze button, after the analysis is completed, please click the Run Cleaner button.

 6. Use CCleaner to clean the registry that are not used.

Run CCleaner, Select Registry menu, then click Scan for Issues, after the scan is complete, please click the Fix Selected Issues, there is a dialog asking Jiks Backup your registry can choose yes to backup and select no to directly run the Fix.

 

Surely all back again to the hardware that installed on your PC. May be useful.

Tips Mengatasi Virus Shortcut

1 November 2014 oleh Asep Sudiyono

Tips Mengatasi Virus Shortcut merupakan tips lanjutan dari Tips Mencegah Terkena Malware Shortcut (Virus Shortcut), setelah kita dapat mencegah atau setidaknya kita telah berusaha untuk menjauhkan komputer / laptop / notebook dan flashdisk kita agar tidak terjangkit Virus Autorun. Ingat, Pencegahan lebih baik dari pada mengobati (kata dokter :D ). Lalu bagaimana langkah-langkah yang harus kita lakukan apabila komputer dan flashdisk kita telah terindikasi maupun terinfeksi virus shortcut tersebut, atau dengan kata lain bagaimana kita akan mengobati Personal Computer a.k. Komputer or notebook (Laptop) yang sudah terkena penyakit menular autorun ini dan telah menjadi anggota dari penyebar virus / malware shortcut?

Tips Mencegah Terkena Malware Shortcut (Virus Shortcut)

26 Oktober 2014 oleh Asep Sudiyono

Malware Shortcut atau sebagian besar orang mengatakannya sebagai Virus Shortcut dan juga ada sebagian orang yang memanggilnya dengan nama Virus Autorun ini memang sudah beberapa tahun menjadi virus yang paling sukses menginfeksi ribuan atau bahkan jutaan flashdisk milik orang indonesia. Tidak hanya flashdisk, virus ini sebenarnya juga bertujuan menginfeksi atau menularkan virusnya terhadap komputer atau Personal Computer. Jenis dari Virus Autorun ini termasuk kedalam jenis Worm atau cacing.

Memaksimalkan Kinerja Komputer Personal atau PC

24 Oktober 2014 oleh Asep Sudiyono

Kemajuan teknologi merupakan suatu hal yang akan terjadi setiap saat. Ini sudah menjadi hal biasa atau tidak asing lagi bagi umat manusia. Sebagai contoh saja kemajuan teknologi yang terjadi dalam dunia Komputer pada umumnya dan Komputer Personal atau PC pada khususnya. Dari jamannya manusia mengunakan sempoa sebagai alat bantu hitung, hingga kalkulator super kecil yang dapat menghitung penjumlahan, penambahan, pembagian maupun perkalian. Itu merupakan salah satu contoh kemajuan teknologi yang terus berkembang yang memungkinkan akan ada kalkulator yang super canggih yang dapat terintegrasi langsung kedalam pikiran atau otak manusia. Setelah kita berkhayal cukup tinggi rasanya itu akan bertolak belakang dengan kemampuan Komputer atau PC kita yang pas-pasan, ditambah lagi dengan kebiasaan kita yang sembarangan dalam menyimpan file sehinggan kinerja dan kemampuan komputer kita menjadi semakin melambat, booting sistem informasi atau booting windows pada saat dihidupkan lambat atau bahkan windows pada komputer kita terkena virus. Nah kali ini saya akan berbagi bagaimana kita dapat memaksimalkan kinerja komputer kita, khususnya Komputer atau PC yang menggunakan sistem operasi Windows (Windows XP dan Windows 7 / Seven).

Dunia maya dunia nyata

20 Oktober 2014 oleh Asep Sudiyono
Apa yang harus kupilih?
Dunia maya atau dunia nyata?
Dunia maya memberikan hasil nyata
Dunia nyata memberikan hasil maya

 

Apa yang harus kupilih? Dunia maya atau dunia nyata? Dunia maya memberikan hasil nyata Dunia nyata memberikan hasil maya  Bingung rek...............
Dunia maya memberikan hasil nyata
Dunia nyata memberikan hasil maya

Bingung rek……………

 

Tanpa Jejak

15 Oktober 2014 oleh Asep Sudiyono

Tanpa Jejak

Hujam-menghujam penuh ke ulu
Kata menyayat batinku
Berpaling sudah dariku jiwamu
Mendera bagai nyiar peluru menderu

Nomor Induk Siswa Nasional Ceker

11 Juli 2014 oleh Asep Sudiyono

Nomor Induk Siswa Nasional Ceker, untuk mengecek Nomor Induk Siswa Nasional dari halaman / web kemdikbud (http://nisn.data.kemdikbud.go.id/)

Semoga tetap berfungsi.
Untuk Download Aplikasi gratis Nomor Induk Siswa Nasional Ceker, Silahkan Klik disini