Friday, October 3, 2008

Macs now have 8% of computer market

Apple's OSX cutting into Windows' dominance


Apple is celebrating a new milestone after a research company reported that Macs have now taken an 8% market share in computing for the first time.

Net Applications conducted a survey on 40,000 sites, and came to the conclusion that 8.2% of computers accessing the web were using Apple's OSX – although this does of course fail to take into consideration computers that do not access the web.

September is a traditionally strong month for Apple – who actively targets US students going back to college – but the gains, which have come against Microsoft Windows PCs will encourage the Cupertino-based company.

9 out of 10 cats...

Net Applications say that 90.3% of people are still using Windows machines – which is a drop of nearly half a per cent on August figures.

The rise of Linux powered netbooks and, of course, Macs is believed to have accounted for the shift.

Over the past two years, computers using Mac OSX have risen by 3%.

By Patrick Goss

Source:
http://www.techradar.com/news/software/macs-now-have-8-of-pc-market-472692

Thursday, October 2, 2008

Corsair's Latest 64GB Voyager Flash Drive, Yours for under 200 Bucks

Ever since the first product from this family arrived in stores, Corsair's Voyager drives have been quite renowned for providing fairly large storage capacities in a very tough and shock-resilient body. And that is also the case with the company's latest product, which packs no less than an amazing 64 GB of flash memory and can be purchased at a surprisingly low price point.

And if you were wondering what you could ever do with a flash drive providing such a huge amount of storage space, consider the following figures: 19,840 6-megapixel digital photos, 26 hours and 40 minutes of MPEG-2 videos at 30 fps and 5 Mbps or up to 304 hours of MPEG-4 videos at 15 fps and 284 Kbps, or an amazing 16,000 songs in MP3, 128 Kbps format.

In addition, Corsair 64GB USB Flash Voyager drives are bootable, which means users can actually store full versions of operating systems and applications in order to quickly “re-create” the necessary software environments to troubleshoot system problems. Practically, since Corsair's flash drivers typically provide quite a high level of reliability, you won't even need a HDD anymore, so you can go ahead and purchase that netbook you've been dreaming about without having to pay a premium for additional storage.

"Corsair is always developing new and exciting flash products, and the 64GB USB Flash Voyager is no exception," said John Beekley, Vice President of Applications at Corsair, when talking about the company's latest product. "With more storage space than most laptops, we can offer a full suite of features – whether it be backing up data, building a portable media library, or simply transporting huge amounts of data," he added.

The official pricing for this thing is of around 250 US dollars, but word on the street (well, word on the Internet) is that you'll actually be able to find it for under 200 bucks, which is actually a very good deal.

We are just a few, but there are many of you, Softpedia users, out there. That's why we thought it would be a good idea to create an email address for you to help us a little in finding gadgets we missed. Interesting links are bound to be posted with recognition going mainly to those who submit. The address is.

Source :
http://www.softpedia.com/

Wednesday, October 1, 2008

Larry Page


Larry Page was Google's founding CEO and grew the company to more than 200 employees and profitability before moving into his role as president of products in April 2001. He continues to share responsibility for Google's day-to-day operations with Eric Schmidt and Sergey Brin.

The son of Michigan State University computer science professor Dr. Carl Victor Page, Larry's love of computers began at age six. While following in his father's footsteps in academics, he became an honors graduate from the University of Michigan, where he earned a bachelor's degree in engineering, with a concentration on computer engineering. During his time in Ann Arbor, Larry built an inkjet printer out of Lego™ bricks.

While in the Ph.D. program in computer science at Stanford University, Larry met Sergey Brin, and together they developed and ran Google, which began operating in 1998. Larry went on leave from Stanford after earning his master's degree.

In 2002, Larry was named a World Economic Forum Global Leader for Tomorrow. He is a member of the National Advisory Committee (NAC) of the University of Michigan College of Engineering, and together with co-founder Sergey Brin, Larry was honored with the Marconi Prize in 2004. He is a trustee on the board of the X PRIZE, and was elected to the National Academy of Engineering in 2004.

Source :
http://www.google.com/corporate/execs.html

http://infolab.stanford.edu/pub/papers/google.pdf

Monday, September 29, 2008

Idul Fitri 1 Syawal 1429 H


Jika HARTA adalah RACUN, ZAKAT lah penawarnya, Jika UMUR adalah DOSA, maka TAQWA & TAUBAT lah Obatnya, Jika seluruh BULAN adalah NODA maka RAMADHAN lah pemutihnya. “Selamat Idul Fitri 1429 H”, Mohon Maaf Lahir & Batin.

Andai jemari tak berjabat, mata tak bertatap, salam tak terucap, untuk hati yang penuh prasangka, Allahu akbar..3X, beriring gema takbir tulus hati.. JIHAD… memohon maaf, harapkan kefitrahan jiwa… S’LAMAT IDUL FITRI 1429 H. MINAL AIDIN WAL FAIDZIN

Definition of Information Technology

Information technology has been defined by the Information Technology Association of America, or the ITAA as being the study, design, development, implementation support and/or management of any computer based information systems. This relates particularly to software applications and computer hardware. Information technology deals with using electronic computers and software to convert, store, protect, process, retrieve with security or transmit any information. What began many years ago as a term that many had no awareness of to a term that has skyrocketed to include several aspects of computing and technology. IT is a wide based term and encompasses many areas. Professionals in information technology may perform a wide variety of tasks that range from installing computer applications to designing widely complex computer networks and information databases.

Everything from data management, networking, engineering computer hardware, software design, database design and management and administration of systems is included in the term of information technology. When covering the aspects of IT as a whole, the use of computers and information are typically associated.

The history of IT goes back several years. In order to perform the functions associated with the field of technology the modern field will use computers, servers, database management systems and cryptography.

It was not very long ago that the field of IT only consisted of a single computer operator who stored data on a magnetic tape and then placed it in storage. Times have changed drastically in the field of technology from its inception several years ago. The field today typically includes a Chief Information Officer and several individuals who work together to achieve their goals. Years ago there was simply a single operator who performed all the tasks related to this form of technology.

Today the job outlook for people interested in this field is very good. With data security and server specialists among the highest paid in the field, those with the needed skills and a keen interest in IT stand to earn a substantial annual income.

With the increasing concern for data storage and management, along with the security issues that most companies and corporations are facing, a career in IT is an excellent choice for those who possess mathematical and strategic planning skills.

Since 1961 the Information Technology Association of America has been working to enhance the interests of US technology and electronics industries. This association provides leadership training in areas relating to business development, public policy, market forecasting and standards of development to a large number of corporations. The ITAA provides a grassroots approach to global networking for companies, market and government from the smallest local level to a global audience.

It currently represents more than 16,000 information technological related companies throughout the world. Based in Washington, DC, the Information Technology Association of American is the only organization of its kind that helps to unite local, state, national and global businesses in the area of technology.

While technology today encompasses a wide range of individual focuses, it is becoming increasing clear that the IT field of the future will include many more topics and more demand than ever before. For those interested in becoming part of this rapidly growing field the time is now. Getting in on new developments could prove to be a very exciting and lucrative choice.

Source :
http://EzineArticles.com/?expert=Steve_Hill
,
http://ezinearticles.com/?Definition-of-Information-Technology&id=1109986

Sergey Brin

Sergey Brin (Co-Founder & President, Technology), Sergey Brin, a native of Moscow, received a bachelor of science degree with honors in mathematics and computer science from the University of Maryland at College Park. He is currently on leave from the Ph.D. program in computer science at Stanford University, where he received his master's degree. Sergey is a recipient of a National Science Foundation Graduate Fellowship as well as an honorary MBA from Instituto de Empresa. It was at Stanford where he met Larry Page and worked on the project that became Google. Together they founded Google Inc. in 1998, and Sergey continues to share responsibility for day-to-day operations with Larry Page and Eric Schmidt.

Sergey's research interests include search engines, information extraction from unstructured sources, and data mining of large text collections and scientific data. He has published more than a dozen academic papers, including Extracting Patterns and Relations from the World Wide Web; Dynamic Data Mining: A New Architecture for Data with High Dimensionality, which he published with Larry Page; Scalable Techniques for Mining Casual Structures; Dynamic Itemset Counting and Implication Rules for Market Basket Data; and Beyond Market Baskets: Generalizing Association Rules to Correlations.

Sergey has been a featured speaker at several international academic, business and technology forums, including the World Economic Forum and the Technology, Entertainment and Design Conference. He has shared his views on the technology industry and the future of search on the Charlie Rose Show, CNBC, and CNNfn. In 2004, he and Larry Page were named "Persons of the Week" by ABC World News Tonight.

Name :
Sergey Mikhailovich Brin


Born :
Moscow, Soviet Union, 21 Agust 1973


Occupation :
Co-founder and President of Technology of Google


Referensi:

Matrix Effect

Step. 1
Create a new document 980 x 100 with a white background

Step. 2
And then choose Filter > Texture > Grain
Use the below settings

Step. 3
Set your foreground colour to a bright green, and your background colour to black.


Step. 4
And then choose Filter > Artistic > Neon Glow
Use the below settings

Step. 5
And then choose Filter > Stylise > Glowing Edges

Step. 6
Your image should look like below!!!

Sunday, September 28, 2008

Melihat Kebaikan dalam Segala Hal

Segala sesuatu yang diciptakan pasti memiliki tujuan dan nilai tersendiri. Tugas kita sebagai manusia adalah beribadah untuk mendapat ridha Allah. Bila kita dapat belajar melakukannya, kita dapat belajar mengasuh jiwa kita. Sangat mudah melihat kebaikan Allah dalam indahnya matahari terbit, gemerlapnya bulan dan bintang, senyum manis adik kita, pegunungan yang indah, atau deburan ombak yang menerpa karang dan pantai berpasir. Namun, dapatkah kita belajar menemukan kesucian dalam situasi yang tidak mengenakkan? Melalui cobaan hidup yang berat, tragedi keluarga, atau cobaan hidup?

Sebuah kisah yang dimuat surat kabar nasional menuturkan tentang perjuangan seorang ibu yang anaknya menderita penyakit Autis. Autis adalah gangguan perkembangan khususnya terjadi pada masa anak-anak, yang membuat seseorang tidak mampu mengadakan interaksi sosial dan seolah-olah hidup dalam dunianya sendiri. Sang ibu sangat marah, frustasi, dan kecewa saat tahu anaknya menderita Autis. Namun, dia segera sadar bahwa apa yang dilakukannya itu tidak akan menyelesaikan masalah. Kemudian dia mulai mempelajari masalah-masalah yang terkait dengan penyakit Autis. Mulai dari uji pendengaran BERA, EEG, sampai ke CT scan. Dengan penuh kegigihan, dia membawa anaknya itu ke Australia.

Tak ingin ditaklukan keadaan, pencariannya juga merambah ke dunia maya. Lewat internet, ia berkonsultasi dengan pakar Autis di luar negeri. Berbagai terapi dijalani; terapi wicara, terapi okupasi, terapi pendidikan khusus, sampai terapi diet. Dia juga berhasil menyabet gelar master Health Counseling dari Curtin University dan berhasil menulis tiga buah buku tentang Autis. Kejadian itu juga membuatnya untuk lebih dekat dengan anaknya dan juga mensyukuri nikmat yang telah diberikan-Nya.

Dari hasil telaahnya, anak Autis memiliki kelemahan dalam pendengaran, tetapi memiliki kelebihan dalam penglihatan. Gayatri – si ibu – kemudian mengeksplorasi kelebihan tadi. Bersama suami, ia memperkenalkan berbagai profesi berdasarkan kelebihan dalam penglihatan. Di kelas enam, Ananda – anaknya yang menderita Autis – mulai menekuni dunia fotografi. Kelak, ia ingin menjadi seorang fotografer. Ananda kini juga sudah mahir berbahasa Inggris.

Sahabatku, betapa agungnya Allah menciptakan semua ini. "(Allah) Yang menciptakan tujuh langit berlapis-lapis. Kamu sekali-kali tidak melihat pada ciptaan Tuhan Yang Maha Pemurah sesuatu yang tidak seimbang. Maka lihatlah berulang-ulang, adakah kamu lihat sesuatu yang tidak seimbang? Kemudian pandanglah sekali lagi niscaya penglihatanmu akan kembali kepadamu dengan tidak menemukan sesuatu cacat dan penglihatanmu itu pun dalam keadaan payah." (QS. al-Mulk: 3-4).

Bila hidup diisi dengan rasa rindu untuk melihat kesucian setiap hari, hal ajaib akan mulai terjadi. Suatu perasaan damai merekah. Bila kita sadar dunia ini hadir karena kekuasaan Allah, itu saja sudah memunculkan sesuatu yang istimewa. Bila kita ingat fakta spiritual ini ketika menghadapi orang yang sedang ditimpa kesulitan, hal ini akan memperluas sudut pandang kita. Ini akan selalu membantu kita untuk selalu mengingat Allah, baik dalam keadaan sempit maupun lapang. Kita benar-benar diberkahi untuk melakukan apa yang kita kerjakan.

Di suatu tempat, di dalam kepala kita, cobalah untuk mengingat bahwa ada kebaikan Allah dalam segala hal. Kenyataan bahwa kita tidak bisa melihat keindahan di dalam suatu hal bukanlah berarti keindahan itu tidak ada di dalamnya. Sebaliknya, itu berarti kita tidak cukup cermat mencarinya atau tidak memiliki sudut pandang yang cukup luas untuk melihatnya.

About Me


Nama:
Ahmad Musthofa (Thofa)

Tempat, Tgl Lahir:
Semarang, 03 Desember 1987

Alamat:
Banjardowo Baru - Genuk - Semarang 50117

Email:
thofu_shofura@yahoo.com, shofura.comp@gmail.com

Yahoo Messenger:
thofu_shofura

Weblog:
http://shfind.blogspot.com

Thursday, March 13, 2008

Kamus IT

Hallo Sobat ....

Banyak orang yang pandai memperbaiki komputer, banyak orang pandai memperbaiki jaringan, banyak orang yang pandai trouble shoot jaringan LAN/WAN. Tetapi dari semua orang itu, hanya segelincir orang yang tahu apa maksud, arti dan kepanjangan suatu istilah IT. Karena banyak orang yang bisa memperbaiki komputer, jaringan LAN/WAN, dll dari pengalaman. Memang betul kalau pengalaman itu merupakan guru terbaik dari semua yang ada.

Tetapi kita tentunya juga tidak melupakan dengan istilah-istilah atau arti yang ada di dunia IT. Nah ... Alhamdulillah maka di dunia maya banyak sekali ditemukan kamus IT, baik itu berbasis web atau berupa file yang bisa di download.

Salah satu kamus IT yang saya suka, adalah kamus IT (download di sini). Karena kamus IT tidak berbasiskan web, melainkan berbasiskan file *.chm, sehingga file ini sangat kecil ukuran sizenya, Bisa di bawa kemana-mana dan tidak perlu lagi terhubung ke Internet. Enak kan.

Silakan kalau mau download aja disini.

Wednesday, March 12, 2008

Remote Desktop Connection

Sebuah kasus, seorang karyawan yang bekerja memonitoring semua traffik pemakaian jasa interenet. Pada saat tertentu, ia dikejutkan dengan telp yang intinya ada suatu network yang trouble. Karena ia berada di luar kantor ia g bisa memonitoring langsung traffiknya. Akhirnya malam-malam ia harus datang ke kantor untuk mengecek traffiknya. Hal ini justru akan merepotkan kita, Bayangkan aja, tengah malam harus datang ke kantor untuk mengecek data, traffik di monitoring kantor. Alangkah lebih baik kalau hal itu bisa kita kerjakan di rumah, kita bisa mengoperasikan komputer di kantor tanpa harus datang ke lokasi ? Betul g ?

Penasaran ga’ gimana caranya kita di rumah bisa meremot komputer di kantor, g usah bingung-bingung banyak sekali aplikasi remot dekstop tersebar di dunia maya, ada yang free, free trial, bahkan ada yang berbayar, Namun kali ini shfind akan membahas aplikasi remot dekstop yang free dan tidak perlu instaal aplikasinya, karena emang dari sananya sudah ada di dalam Windows XP.

Remote Dekstop Connection merupakan Aplikasi bawaan Windows XP, setiap kali install Windows XP, Remote Dekstop pasti sudah terinstall. Hal ini memudahkan untuk melakukan remote komputer dari tempat jauh. Dengan ini kita bisa mengoperasikan langsung komputer di kantor. Se akan-akan kita berada di depan langsung komputer kantor, padahal posisi kita di rumah. Penasaran caranya gimana …. ? Gini caranya :

Pastikan komputer yang akan diremot, sudah diaktifkan services remote dekstop connectionnya. Untuk mengaktifkannya, klik kanan pada mycomputer à pilih propertis, maka akan tampil window System Properties à pilih tab remote. Nah ada dua pilihan yang pertama Allow Remote Assistance invitations … pastikan opsi ini di pilih. Serta Allow users to connect remotely … pastikan opsi ini juga dipilih.

Jika sudah semua, sekarang bisa meremot komputer tersebut. Buka aja di start menu à Accessories à Communication à Remote Desktop Connection. Nah dari ini masukkan aja IP kompute yang akan di remote. Trus kita masukkan username password untuk bisa login ke komputer yang diremot.

Selamat Mencoba

Tuesday, March 11, 2008

Map Network Drive ..

Mapping Drive

Penulis menulis postingan ini, karena penulis merasa kesulitan jika ingin mengambil file data dari komputer lain. Mungkin bisa dikerjakan dengan simple, dengan cara mengcopy langsung ke disket, flasdisk, atau sejenisnya. Tetapi semua itu butuh waktu yang cukup lama. Kita harus cari dulu disket, flasdisknya, kemudian kita ke komputer yang akan diambil filenya untuk mengcopy data ke flasdisk, dan dicopy lagi ke komputer yang baru. Gimana hal ini butuh waktu yang cukup lama kan ?

Nah ada cara yang lebih mudah, cepat dan efisien. Dengan memanfaatkan Kabel UTP, kita bikin LAN ( Local Area Network ). Kalau sudah tersambung di LAN, komputer yang akan di copy datanya, tinggal di share aja foldernya.

Klik kanan pada folder yang ingin di share, dan pilih Sharing and Security ..
Nah di sini terserah mo kita set share full ( orang lain dapat menambah, merubah atau menghapus data ) atau hanya dishare ( user tidak dapat menambah, merubah atau menghapus data ).

  • Share this folder on network ( jika hanya memilih pilihan ini, maka user hanya dapat melihat file ytang ada)
  • Allow network users to change my files ( jika disertai memilih pilihan ini, maka user dapat menambah, merubah, menghapus data)

Nah sekarang, kita bikin Map Network Drive … Maksudnya kita ciptakan partisi baru di windows kita, biasanya partisi drive didapat dari partisi hardisk, namun kali ini bisa membuat partisi dari LAN, dan penyimpanannya pun enggak di hardisk kita, namun di hardisk komputer yang di share sebelumnya.

  • Windows Explorer
  • Pilih My Network Places
  • Pilih Entire Network
  • Pilih Microsoft Windows Network
  • Cari komputer yang akan kita jadikan partisi baru, misal gambar di bawah ini.

Kalau sudah ketemu, tinggal di klik kanan, pilih Map Network Drive … kalau sudah, kita cek aja di Windows Explorer kita, maka akan muncul partisi driver yang baru. Jadi kita g perlu lagi pake flasdisk untuk copy antar komputer, tinggal buka windows explorer, udah terlihat deh semua file2 di komputer lain.

Selamat mencoba


Tuesday, March 4, 2008

Cisco Commands

Perintah (command) pada cisco devices terdiri dari Router Commands (Usermode commands, Privilegemode commands, Global configuration mode commands, Interface subconfiguration mode commands, Line subconfiguration mode commands, Subnterface subconfiguration mode commands, IP routing protocol subconfiguration mode commands).

ROUTER COMMANDS

Usermode Commands

1. disconnect, hapus sesi telnet dan logout
2. enable, masuk ke privilegemode
3. ping
4. traceroute

Privilegemode Commands

1. clear arp-cache, hapus cache arp
2. configure terminal, masuk ke global configuration mode
3. copy running-config startup-config, simpan konfigurasi sekarang
4. copy startup-config running-config, load konfigurasi yang tersimpan
5. debug ip packet, debug paket dari tcp/ip
6. disable, kembali ke privilegemode dari global configuration mode
7. disconnect
8. erase startup-config, hapus file konfigurasi dari router
9. logout, keluar dari privilegemode
10. ping
11. reload, load kembali startup-config
12. resume , konek kembali setelah diskonek
13. show access-list, memperlihatkan semua access-list dari semua protokol pada router
14. show banner, memperlihatkan banner
15. show cdp, memperlihatkan status CDP router
16. show cdp interface, memperlihatkan interface CDP
17. show cdp neighbor
18. show cdp traffic
19. show clock
20. show flash, memperlihatkan IOS image dan file yang tersimpan di flash memory
21. show frame-relay lmi, memperlihatkan statistik detail LMI
22. show frame-relay map
23. show frame-relay pvc
24. show history, memperlihatkan semua perintah yang telah di eksekusi
25. show hosts, memperlihatkan static host yang disimpan
26. show interfaces, memperlihatkan interface yang dimiliki (semua) secara detail
27. show interfaces ethernet 0
28. show interfaces serial 0
29. show interfaces loopback 0
30. show ip arp
31. show ip eigrp neighbors
32. show ip eigrp neighbors detail
33. show ip eigrp topology
34. show ip eigrp traffic, memperlihatkan traffic statistik dari protokol eigrp
35. show ip interface
36. show ip interface brief, verify konfigurasi ip
37. show ip ospf database
38. show ip ospf interface
39. show ip ospf neighbor detail
40. show ip route, memperlihatkan konfigurasi routing
41. show protocols, memperlihatkan protokol routing yang telah dikonfigurasi dan sedang berjalan
42. show running-config, memperlihatkan konfigurasi global yang sedang berjalan
43. show sessions, memperlihatkan sesi yang ada sekarang
44. show startup-config, memperlihatkan konfigurasi yang tersimpan pada flash
45. show version, memperlihatkan informasi hardware dan firmware
46. telnet
47. traceroute
48. vlan database, mengakses vlan database atau masuk ke konfigurasi VTP
49. write erase
50. write memory
51. write terminal

Global configuration mode Commands

1. access-list {permit|deny}
2. access-list {permit|deny}
3. access-list {permit|deny}
4. access-list {permit|deny}
5. banner motd
6. cdp advertise-v2
7. cdp holdtime , mengubah nilai holdtime cdp
8. cdp run
9. cdp timer , mengubah nilai cdp timer
10. config-register
11. dialer-list protocol ip permit
12. enable password , set password untuk masuk ke mode privilege
13. enable secret , set enkripsi untuk password yang disimpan
14. end, kembali ke mode privilege
15. hostname , set nama host
16. interface ethernet 0, masuk ke subconfiguration interface ethernet 0
17. interface fastethernet 0, masuk ke subconfiguration interface fastethernet 0
18. interface serial 0, masuk ke subconfiguration interface serial 0
19. interface vlan , masuk ke subconfiguration vlan
20. ip default-gateway , set default gateway
21. ip default-network
22. ip host , set static hostname lain
23. ip name-server , set DNS router
24. ip route {next-hop-ip-addr|interface-type}
25. ip route 0.0.0.0 0.0.0.0 , set defaut gateway / static route
26. ip route , set static route
27. ip routing
28. ipx routing
29. isdn switch-type
30. line aux
31. line console 0, masuk ke konfigurasi console nomer 0
32. line vty 0 4, masuk ke konfigurasi vty untuk 5 buah vty
33. no banner motd, menghapus banner
34. no ip routing, menghapus ip routing
35. no router igrp, menghapus konfigurasi route igrp
36. no router ospf, menghapus konfigurasi route ospf
37. no router rip, menghapus konfigurasi route rip
38. no vlan , menghapus vlan nomer ke sekian
39. router eigrp , masuk ke konfigurasi routing menggunakan eigrp
40. router ospf , masuk ke konfigurasi routing menggunakan ospf
41. router rip, masuk ke konfigurasi routing menggunakan rip
42. snmp-server enable traps vtp
43. username password , set username dan passwordnya

Interface subconfiguration mode Commands

1. bandwidth , set bandwidth yang akan dilalui interface ini dalam kilobits
2. cdp enable
3. clock rate , set clock rate dalam bits/s
4. compress stac in

Line subconfiguration mode Commands

1. exec-timeout [detik], pilihan detik opsional
2. login synchronous
3. password , set passwordnya

Subinterface subconfiguration mode Commands

1. description , set deskripsi dari subinterface

IP Routing Protocol subconfiguration mode Commands

1. network , set ip network

Wednesday, February 27, 2008

Mencegah Inputan Kosonsg

Banyak website yang menyediakan fasilitasn bukutamu, contact us, registrasi, dan yang lainnya. Tetapi ada suatu hal kecil yang menyebabkan website itu kacau. Banyak orang yang iseng mengisikan karakter kosong, ketika mengisikan bukutamu, contact us, dll. Kalau hal ini dibiarkan terus-menerus, bisa-bisa database penuh dengan karakter kosong, menyebalkan bukan ???

Bagi seorang webmaster, pasti sudah tahu mengenai hal ini, dan pasti tahu caranya mencegah inputan kosong pada form isian. Untuk mencegah inputan kosong bisa menggunakan javascript.
scriptnya :
Javascript
<script>

function cekinput(){

var doc = document.tracer;

if (doc.field.value==""){

alert ("Anda belum mengisi");

doc.field.focus();

return false;

}

return true;

}



HTML
<form action="" onSubmit="return cekinput();" method="post" name="tracer">

<input name="field" type="text" class="field" id="nis" size="30">

<input name="input" type="submit" id="input" value=" Input ">

</form>

NIC (Network Interface Card)


NICs are considered Layer 2 devices because each individual NIC throughout the world carries a unique code, called a Media Access Control (MAC) address. This address is used to control data communication for the host on the network. You will learn more about the MAC address later. As the name implies, the NIC controls the host's access to the medium.

In some cases the type of connector on the NIC does not match the type of media that you need to connect to. A good example is your Cisco 2500 router. On the router you will see AUI (Attachment Unit Interface) connectors and you need to connect the router to a UTP Cat5 Ethernet cable. To do this a transceiver (transmitter/receiver) is used. A transceiver converts one type of signal or connector to another (e.g. to connect a 15-pin AUI interface to an RJ-45 jack, or to convert electrical signals to optical signals). It is considered a Layer 1 device, because it only looks at bits, and not at any address information or higher level protocols.

NICs have no standardized symbol. It is implied that whenever you see networking devices attached to network media, there is some sort of NIC or NIC-like device present even though it is generally not shown. Wherever you see a dot on a topology, there is either a NIC or an interface (port), which acts like at least part of a NIC.

Tuesday, February 19, 2008

Pawon Coklat


Hi Guys .... Sorry kalau posting ini terlambat, seharusnya posting ini beredar tanggal 14 Februari. Tapi no problem, karena ini masih bulan Februari. kamu-kamu semua pasti tahu ada apa dengan tanggal 14 februari ( Hari Valentine gituuuu ). Valentine biasanya identik dengan cokelat. Pasti tahu kan yang namanya Cokelat.

Nah ... kebetulan nie ... aku punya teman yang ngejual berbagai macam cokelat. Jadi ga usah bingung deh ... kalau mo pesen coklat. Tinggal telp atau email aja bisa kok. Lokasinya tu ada di Batang ( tepatnya di Jl. Tentara Pelajar Kalisalak Batang Telp. 02854494312 ), tetapi kala temen-temen di Semarang juga masih bisa kok pesennya, telp aje ke 081514408881. Kalau mo lihat site nya, liat aja di sini "http://pawoncoklat.blogspot.com". Selamat menikmati.

Monday, February 18, 2008

Network ??? What this .... ?

A computer network is an interconnection of a group of computers. Networks may be classified by what is called the network layer at which they operate according to basic reference models considered as standards in the industry such as the four-layer Internet Protocol Suite model. While the seven-layer Open Systems Interconnection (OSI) reference model is better known in academia, the majority of networks use the Internet Protocol Suite (IP) as their network model.

Computer networks may be classified according to the scale: Personal area network (PAN), Local Area Network (LAN), Campus Area Network (CAN), Metropolitan area network (MAN), or Wide area network (WAN). As Ethernet increasingly is the standard interface to networks, these distinctions are more important to the network administrator than the end user. Network administrators may have to tune the network, based on delay that derives from distance, to achieve the desired Quality of Service (QoS). The primary difference in the networks is the size.

Personal Area Network (PAN)
A personal area network (PAN) is a computer network used for communication among computer devices close to one person. Some examples of devices that may be used in a PAN are printers, fax machines, telephones, PDAs or scanners. The reach of a PAN is typically within about 20-30 feet (approximately 6-9 Meters). PANs can be used for communication among the individual devices (intrapersonal communication), or for connecting to a higher level network and the Internet (an uplink).

Personal area networks may be wired with computer buses such as USB[3] and FireWire. A wireless personal area network (WPAN) can also be made possible with network technologies such as IrDA and Bluetooth.

Local Area Network (LAN)
A network covering a small geographic area, like a home, office, or building. Current LANs are most likely to be based on Ethernet technology. For example, a library will have a wired or wireless LAN for users to interconnect local devices (e.g., printers and servers) connect to the internet. All of the PCs in the library are connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol through a system of interconnection devices and eventually connect to the internet. The cables to the servers are on Cat 5e enhanced cable, which will support IEEE 802.3 at 1 Gbps.

All interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colors). Those inside the library, which have only 10/100 Mbps Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. It would be more correct to call them access routers, where the router at the top is a distribution router that connects to the Internet and academic networks' customer access routers.

The defining characteristics of LANs, in contrast to WANs (wide area networks), include their much higher data transfer rates, smaller geographic range, and lack of a need for leased telecommunication lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data transfer rate. IEEE has projects investigating the standardization of 100 Gbit/s, and possibly 40 Gbit/s. Inverse multiplexing is commonly used to build a faster aggregate from slower physical streams, such as bringing 4 Gbit/s aggregate stream into a computer or network element with four 1 Gbit/s interfaces.

Campus Area Network (CAN)
A network that connects two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, or a military base. A CAN, may be considered a type of MAN (metropolitan area network), but is generally limited to an area that is smaller than a typical MAN.

This term is most often used to discuss the implementation of networks for a contiguous area. For Ethernet based networks in the past, when layer 2 switching (i.e., bridging (networking) was cheaper than routing, campuses were good candidates for layer 2 networks, until they grew to very large size. Today, a campus may use a mixture of routing and bridging. The network elements used, called "campus switches", tend to be optimized to have many Ethernet-family (i.e., IEEE 802.3) interfaces rather than an arbitrary mixture of Ethernet and WAN interfaces.

Metropolitan Area Network (MAN)
A Metropolitan Area Network is a network that connects two or more Local Area Networks or Campus Area Networks together but does not extend beyond the boundaries of the immediate town, city, or metropolitan area. Multiple routers, switches & hubs are connected to create a MAN

Wide Area Network (WAN)
A WAN is a data communications network that covers a relatively broad geographic area (i.e. one city to another and one country to another country) and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.

Saturday, February 16, 2008

Bitmap Graphics


Bitmap graphics are made up of colored pixels. Pixels are very small rectangles (usually square, although in some video applications they are wider than they are tall) of varying colors that once put together give you an image. You can see from the example below that zooming in on a bitmap image reveals the pixels that make up the image when viewed at 100%.

Bitmap graphics are usually (but not always) photographic in nature, capable of subtle graduated tones - often in the range of millions of colors per image. The problem with bitmap graphics is that they don't enlarge well as Photoshop needs to guess what color the extra pixels should be - this can result is loss of definition and a dramatic lowering in quality, depending on how much you enlarge the image. Common file formats for bitmap image data include GIF, JPEG and PNG for Internet usage and TIFF for print usage. As you can see from the example below, physically enlarging an image will degrade quality.

Pixels are also used to display the image on your computer screen. Common pixel dimensions of computer displays are 1024 wide by 768 high and 1600 wide by 1200 high. The size of a bitmap graphic when viewed on your computer screen is defined by the number of pixels that make up the image - so an image that is 50 pixels wide will look very small on your screen at 100% viewing percentage, whereas an image that is 4000 pixels wide will be larger than your screen at 100% viewing percentage.

The printable dimensions of an image are defined by the DPI (dots per inch) - this information is invisibly embedded in the image file. Digital cameras often embed information such as this, that may include the conditions the image was taken in, and even the camera model used. This information is not actually visible in the image, and requires software such as Photoshop to read it.

You should not confuse the output DPI of your printer with this figure, which may range from 600-2400DPI - this refers to the density of the dots of ink laid down on the page by the printer. You don't have to prepare your images to 2400 DPI to get the best results - in fact doing so will significantly slow down printing as your file could potentially be huge! Often an image DPI in the range of 175-250 will give very good results on home printers. Images prepared for high quality commercial print are usually prepared at 300 DPI for up to A3 in size; whereas very large images (for instance on billboards) can be as low as 50 DPI, as they are not made to be viewed as closely as a magazine or small poster. There is no need to go above 300 DPI when creating images as you will yield virtually no improvement in output quality, only increasing the size of your file when saved.

It is easy to understand the relationship between pixel dimensions and DPI - put simply, the DPI is how many pixels will be printed in an inch - so you could actually think of DPI as PPI (pixels per inch). Indeed, many experts believe this to be the true definition of DPI, and that Photoshop should refer to it as such. However, the term DPI is used throughout the professional print industry, so this is why it is referred to as DPI in Photoshop, not PPI.

Friday, February 15, 2008

Learning PHP - Hypertext Preprocessor

PHP is a powerful server-side scripting language for creating dynamic and interactive websites.

PHP is the widely-used, free, and efficient alternative to competitors such as Microsoft's ASP. PHP is perfectly suited for Web development and can be embedded directly into the HTML code.

The PHP syntax is very similar to Perl and C. PHP is often used together with Apache (web server) on various operating systems. It also supports ISAPI and can be used with Microsoft's IIS on Windows.

What is PHP?

* PHP stands for PHP: Hypertext Preprocessor
* PHP is a server-side scripting language, like ASP
* PHP scripts are executed on the server
* PHP supports many databases (MySQL, Informix, Oracle, Sybase, Solid, PostgreSQL, Generic ODBC, etc.)
* PHP is an open source software (OSS)
* PHP is free to download and use

What is a PHP File?

* PHP files may contain text, HTML tags and scripts
* PHP files are returned to the browser as plain HTML
* PHP files have a file extension of ".php", ".php3", or ".phtml"

What is MySQL?

* MySQL is a database server
* MySQL is ideal for both small and large applications
* MySQL supports standard SQL
* MySQL compiles on a number of platforms
* MySQL is free to download and use

PHP + MySQL

* PHP combined with MySQL are cross-platform (means that you can develop in Windows and serve on a Unix platform)

Why PHP?

* PHP runs on different platforms (Windows, Linux, Unix, etc.)
* PHP is compatible with almost all servers used today (Apache, IIS, etc.)
* PHP is FREE to download from the official PHP resource: www.php.net
* PHP is easy to learn and runs efficiently on the server side

Where to Start?

* Install an Apache server on a Windows or Linux machine
* Install PHP on a Windows or Linux machine
* Install MySQL on a Windows or Linux machine

Global Configuration (Config)

To configure any feature of the router, you must enter configuration mode. This is the first sub-mode of the parent mode. In the parent mode, you issue the command config.

Router#config
Router(config)#

As demonstrated above, the prompt changes to indicate the mode that you are now in.

In connfiguration mode you can set options that apply system-wide, also refered to as "global configurations." For instance, it is a good idea to name your router so that you can easily identify it. You do this in configuration mode with the hostname command.

Router(config)#hostname ExampleName
ExampleName(config)#

As demonstrated above, when you set the name of the host with the hostname command, the prompt immediately changes by replacing Router with ExampleName. (Note: It is a good idea to name your routers with an organized naming scheme.)

Another useful command issued from config mode is the command to designate the DNS server to be used by the router:

ExampleName(config)#ip name-server aa.bb.cc.dd
ExampleName(config)#ctrl-Z
ExampleName#

This is also where you set the password for privileged mode.

ExampleName(config)#enable secret examplepassword
ExampleName(config)#ctrl-Z
ExampleName#

Until you hit ctrl-Z (or type exit until you reach parent mode) your command has not been put into affect. You can enter config mode, issue several different commands, then hit ctrl-Z to activate them all. Each time you hit ctrl-Z you return to parent mode and the prompt:

ExampleName#

Here you use show commands to verify the results of the commands you issued in config mode. To verify the results of the ip name-server command, issue the command show host.

Suara itu Menggetarkan Jiwa

Seringkali kita mendengarkan suara, seperti suara kendaraan bermotor,
suara kereta, juga suara kekasih yang terdengar merdu namun berbeda
dengan suara dari jiwa yang masih suci yaitu suara anak-anak kita yang
mampu menggetarkan jiwa. Suara tangisnya, suara tawanya bahkan
teriakan-teriakanny a seolah mampu membelah bumi.

Begitu juga Hana, putri saya. Setiap Hana memanggil saya, "ayah.."
suara itu menggetarkan jiwa, suaranya mampu mengiris hati. Terbayang
Hana yang masih bayi, mulai tumbuh merangkak, berjalan sampai pernah
jatuh dari meja karena saya lalai menjaganya dan jidatnya menjadi
benjol. Ibunya marah-marah karena tidak tega melihat tangisnya Hana
yang sakit. Hati saya terasa perih mendengar Hana menangis yang kesakitan.

Keperihan hati seorang ayah adalah wujud cinta dan kasih sayang kepada
putrinya. Ikatan batin seorang ayah dengan putrinya begitu indah,
seindah wujud kasih sayang itu sendiri. Saya teringat satu kisah Nabi
SAW, ketika Nabi di Thaif, sekelompok anak anak kecil dan juga orang
dewasa berlomba menimpuki Nabi dengan batu dan kotoran unta, Fathimah
yang masih sangat belia tampil dengan perangai seorang ibu yang cemas
dengan putranya.

Dibersihkan kotoran dan darah yang berada pada pada wajah ayahnya.
Air mata Nabi tak mampu beliau sembunyikan ketika melihat putri
tercintanya. Seorang anak yang sepatutnya sedang asyik bermain dengan
teman seusianya sekarang justru berada dipangkuan ayahnya, menghalangi
siapapun yang akan melukai ayahnya. Fathimahpun menangis, dengan
suara bergetar penuh keharuan nabi menyeka tiap butiran air mata yang
mengalir di pipi mungil putrinya sambil berkata, ' habibati Fathimah
la tabki',' belahan jiwaku Fathimah janganlah engkau menangis'.

Begitulah ucapan Nabi ketika tangan suci putrinya menyeka darah yang
mengalir dikeningnya. Ummu Abiha, ibu dari ayahnya adalah gelar yang
Rasulullah peruntukkan kepada putrinya. Satu satunya gelar yang belum
pernah ada dalam sejarah kecuali untuk Fathimah Azzahra as. Duka dan
kesedihan selalu mengiringi kehidupan keluarga nabi, akan tetapi
Fathimah senantiasa menyembunyikan kedukaannya selama sang ayah berada
disampingnya. Kecintaan assayyidah Fathimah begitu tinggi terhadap
ayahnya dan begitu pula Rasul SAW kepada putrinya hingga beliau
bersabda, "Fathimah adalah belahan jiwaku, siapapun yang mencintai
Fathimah berarti dia mencintaiku. "

Wednesday, February 13, 2008

VSAT (Very Small Aperture Terminal)


VSAT Systems uses a satellite connection as a high-speed digital link between a customers location and the US Internet backbone. The data travels from the satellite equipment at the customers location to the satellite, and then to the teleport for routing to the Internet.

VSAT was originally intended for sporadic store-and-forward data communications but has evolved into real-time internet services. VSAT uses existing satellite broadcasting technology with higher powered components and antennas manufactured with higher precision than conventional satellite television systems. The satellite antenna at the customer's location includes, in addition to the receiver, a relatively high-powered transmitter that sends a signal back to the originating satellite. A very small portion of a transponder is used for each VSAT return path channel. Each VSAT terminal is assigned a frequency for the return path which it shares with other VSAT terminals using a shared transmission scheme such as time division multiple access.

An innovative feature of VSAT is that the technology has evolved to the point that something that previously could only be done with large, high-powered transmitting satellite dishes can now be done with a much smaller and vastly lower-powered antenna at the customer's premises. In addition, several return-path channels can co-exist on a single satellite transponder, and each of these return-path channels is further subdivided using to serve multiple customers.

In the system used by WildBlue, 31 different spot beams are used to serve the continental United States instead of the one beam used by conventional satellites. Thus, the same Ka-band transponders and frequencies are used for different regions throughout the United States, effectively re-using the same bandwidth in different regions.

The return path is transmitted from the customer's receiver in the L-band to a device called a low-noise block upconverter. There it is converted into the much higher frequency satellite transmission frequency, such as Ku-band and Ka-band, and amplified. Finally the signal is emitted to the dish antenna which focuses the signal into a beam that approximately covers the satellite with its beam. Because the transmission cannot be precise in these smaller dishes there is some effort to use frequencies for the uplink that are not used by adjacent satellites otherwise interference can occur to those other satellites.

Another satellite communications innovation, also used by satellite trucks for video transmission, is that only a small portion of a single satellite transponder is used by each VSAT channel. Previously a single transponder was required for a single customer but now several customers can use one transponder for the return path. This is in addition to time-based subdivision.

Monday, February 11, 2008

Monitoring Traffic "showtraffic"

Hi Friend, You all surely have at soybean cake which its name of virus ? So now I attacked by virus resulting dead LAN Office. Just because a virus in one of the computer LAN Office, as a result all dead LAN Office. Most really disturbing once

Initially I don't know, usually that virus attack system or attack data. But after there is software " Showtraffic" I know its cause ? In the reality this virus every second deliver big enough data package out. As a result LAN Office traffik only fulfilled by big packages, and other Computer don't get traffik to access to internet.

If friends wish to try this application, please download here. In fact this application many kok in internet, live in search later then download. With this application is we can know late traffik in LAN Office ethernet interface. Become we can know, which computer is which deliver factious data package, automatically mean the the computer there is which don't all right, He he He

Congratulation Try and Error ... Useful hopefully.

Wednesday, February 6, 2008

Configuring Cisco router interfaces

"Media type" refers to the type of media that the port is an interface for, such as Ethernet, Token Ring, FDDI, serial, etc. Slot numbers are only applicable for routers that provide slots into which you can install modules. These modules contain several ports for a given media. The 7200 series is an example. These modules are even hot-swapable. You can remove a module from a slot and replace it with a different module, without interrupting service provided by the other modules installed in the router. These slots are numbered on the router.

Port number refers to the port in reference to the other ports in that module. Numbering is left-to-right, and all numbering starts at 0, not at one.

For example, a Cisco 7206 is a 7200 series router with six slots. To refer to an interface that is the third port of an Ethernet module installed in the sixth slot, it would be interface ethernet 6/2. Therefor, to display the configuration of that interface you use the command:

ExampleName#show interface ethernet 6/2

If your router does not have slots, like a 1600, then the interface name consists only of:

media type port#

For example:

ExampleName#show interface serial 0

Here is an example of configuring a serial port with an IP address:

ExampleName#config
ExampleName(config)#interface serial 1/1
ExampleName(config-if)#ip address 192.168.155.2 255.255.255.0
ExampleName(config-if)#no shutdown
ExampleName(config-if)#ctrl-Z
ExampleName#

Then to verify configuration:

ExampleName#show interface serial 1/1

Note the no shutdown command. An interface may be correctly configured and physically connected, yet be "administratively down." In this state it will not function. The command for causing an interface to be administratively down is shutdown.

ExampleName(config)#interface serial 1/1
ExampleName(config-if)#shutdown
ExampleName(config-if)#ctrl-Z
ExampleName#show interface serial 1/1

In the Cisco IOS, the way to reverse or delete the results of any command is to simply put no infront of it. For instance, if we wanted to unassign the IP address we had assigned to interface serial 1/1:

ExampleName(config)#interface serail 1/1
ExampleName(config-if)#no ip address 192.168.155.2 255.255.255.0
ExampleName(config-if)ctrl-Z
ExampleName#show interface serial 1/1

Configuring most interfaces for LAN connections might consist only of assigning a network layer address and making sure the interface is not administratively shutdown. It is usually not necessary to stipulate data-link layer encapsulation. Note that it is often necessary to stipulate the appropriate data-link layer encapsulation for WAN connections, such as frame-relay and ATM. Serial interfaces default to using HDLC. A discussion of data-link protocols is outside the scope of this document. You will need to look up the IOS command encapsulation for more details.

Monday, February 4, 2008

High-Speed Downlink Packet Access (HSDPA)

High-Speed Downlink Packet Access (HSDPA) adalah sebuah protokol telepon genggam dan kadangkala disebut sebagai teknologi 3.5G. Teknologi ini dikembangkan dari WCDMA sama seperti EV-DO mengembangkan CDMA2000. HSDPA memberikan jalur evolusi untuk jaringan Universal Mobile Telecomunications System (UMTS) yang dapat memberikan kapasitas data lebih besar, bisa mencapai 14,4 Mbit/detik. HSDPA merupakan evolusi standar WCDMA dan dirancang untuk meningkatkan kecepatan transfer data 5x lebih tinggi.

Nah, ngomong masalah HSDPA jangan bingung-bingung deh, mendingan kita tengok aja di site http://indosatm2.com. Yuuuk kita sama-sama tengok ke site ini, Harganya ya lumayanlah ... sebanding dengan produk yang dijual dengan speed bisa mencapai 1.6 Mbps "Klik aja di sini". Saya sudah merasakan sendiri koneksinya 3.5 G IM2 "Dasyaaaat Meeen". Aku rasa koneksinya sangat cepat kalau dipake untuk personal, kemarin ada pameran di DP Mall, di sana ternyata koneksi 3.5 G dishare ke 1 PC dan disebar pake Hotspot. Dan ternyata walaupun dalam kondisi share, koneksinya pun masih "High Speed".

Memang sih, kalau masalah harga, lumayan juga sekitar 350rb untuk paket 1,2 Gb per bulan. Tapi kita bisa ngedapetin koneksi yang super cepat. Yang lebih saya suka ... menggunakan 3.5 IM2 adalah sistem billing administrasinya. Ternyata user 3.5 G IM2 ga hanya digunakan di 3.5 G aja lo ...

Kata CS nya bisa digunakan di Hotspot IM2, ama CDMA. Setelah saya praktikkan ternyata emang bisa kok. Wah enak nih .... kalau butuh koneksi cepet bisa pake 3.5 G. Tapi pas di luar kota ga ada sinyal 3.5 G saya masih bisa konek yang speed yang lumayan pake CDMA. Billingnya fleksibel.

OK d ... ini dulu yach .....

Sunday, February 3, 2008

IP Address - Network Numbering

ven without subnetting (explained later), hosts on the Internet or any other IP network are assigned a network number. Network numbering allows a group of hosts (peers) to communicate efficiently with each other. Hosts on the same network may be computers located in the same facility or all computers used by a workgroup, for example. Multi-homed hosts, that contain multiple network adapters, can belong to multiple networks, but each adapter is assigned exactly one network number.

Network numbers look very much like IP addresses, but the two should not be confused. Consider for example the host IP address 10.0.0.1, an address commonly used on private networks. Because it is a Class A address, with no subnetting employed, its leftmost byte (eight bits) by default refer to the network address and all other bits remain set at zero. Thus, 10.0.0.0 is the network number corresponding to IP address 10.0.0.1.

The portion of the IP address that does not refer to the network refers instead to the host address - literally, the unique identifier of the host on that network. In the above example, the host address becomes '0.0.0.1' or simply '1'. Also note that a network address becomes a reserved address that should not be assigned to any actual host. Configuring a live host at 10.0.0.0 in the example above could impact communications for all hosts on that network.

The table below illustrates the default numbering scheme for Class A, B, and C networks.

  • Clas A | 0.0.0.0 - 127.255.255.255 | x.0.0.0 | 255.0.0.0
  • Clas B | 128.0.0.0 - 191.255.255.255 | x.x.0.0 | 255.255.0.0
  • Clas C | 192.0.0.0 - 223.255.255.255 | x.x.x.0 | 255.255.255.0
In general, a network address uses the leftmost byte of its hosts' addressing if the hosts fall within the Class A range, the leftmost two bytes for hosts in Class B, and the leftmost three bytes for hosts in Class C. This algorithm is applied in practice through the use of a network mask. The above table shows the decimal representation of the default network masks that is commonly used by network operating systems. Note that the decimal value '255' corresponds to one byte that has all bits set to one (11111111).

Hallo Everybody

Dear All,

Gw seneng banget, karena akhirnya gw bisa bikin ini blog, Mungkin temen-temen pada ga tahu kenapa ini blog gw beri nama "SHFind". Sebenarnya gw juga bingung mo berinama apa ini blog.
But i can idea from my occupation. Yach gw punya punya usaha kecil-kecilan di Rumah, yach usaha kecil-kecilan gw berinama Shofura Computer. So from here, i can idea for the name this blog.

SHF = Shofura
ind = Indonesia

Jadi sekarang sudah tahu kan, kenapa gw berinama SHFind. Karena gw tinggal di Indonesia, dan gw cinlok (cinta lokal) alias cinta dalam negeri, gw tambahin aja Indonesia, biar tambah keren dan g kepanjangan, gw singkat aja, jadi SHFind.

Thank's you ....