Tuesday, December 22, 2009

Choosing Online Business Tips Make The Newbie

Maybe this is a topic often discussed by internet marketing experts, but this paper is an idea of where I personally based on my personal experience that only a few months to try the online business world. I was moved to write about this topic because my concern with the increasingly widespread elements online business that provides high sounding promises that are often absurd. You'll often come across sites that promise to generate hundreds of millions in a short time even in a matter of days. But the end-they just ujungngnya selling ebook or some kind of itu.Tidak surprised if many feel cheated.
Now, Therefore, this article may be used as reading material for those interested to start your online business. If you are interested in doing business online is a good idea to consider the following matters are:

1. Choose a business that is not deceptive. This is very important because so many elements that are responsible not justify any means to get money! Do not until you become a victim! To check whether a site / business to fraud or not you can do the following things:

a. Look at that site does have a clear address or not and if the available phone numbers
you can try to check it out.

b. If the site displays the testimonials make sure the person who gave testimony has telfon number or email that can be reached.

c.You can join in the forum related and you can throw a topic about the business. If a business is usually fraud forum members will tell you.

d. You can check the level of trust in www.mywot.com site. The higher level of trust from the site then your site is worthy of trust.

2. Select Business Internet On Line is already Proven And Tested! Try where you choose? Join the business start-up 3 months or who have existed for 8 years? Of course you will be sure to join the business-2 is not it? A business that can survive, exist and grow over the years especially in the Internet business world shows that business really make money? If not, maybe he will shut down in the first few months!

3. If you want to join an affiliate business, then my advice choose a business that member or members so much! Which do you choose? Join the business that its members could be counted on fingers or join a business that its members reach hundreds of thousands of people? Obviously you will choose the business-2 is not it? As the points above 2 .. If a business is followed by hundreds of thousands of people would not that mean the business is actually making money, really good and deserve to be followed! If businesses do not make money they will not be dong hundreds of thousands of people want to join? Makes sense right?

Consider a simple analogy like this: Product A is a product that sold well (best seller), its brand is well known by the public, has purchased millions of people because they will be quality products are good, affordable, and has existed for 10 years. Meanwhile, while product B is a slow-moving products not sold alias, perhaps because the quality of products that are less good and the price is too expensive, this new product stand 3 months. Where do you try choose? Product A or Product B?

4. Choose a business that many recommended by experts in their fields! Yes .... You need expert advice from an expert in his field! You must be more confident and confident running / choose a business that is recommended by many experts.

5.Last but not least, you should be able to respond to an ad or a site intelligently. Use your common sense. Do not be lulled into a delusion to be a millionaire in one day. To Remember! There is no instant way to become rich. Everything needed processes. In addition to other factors, to learn, diligent, patient and willing to work hard is the key to success in business

So, hopefully useful to you. Good business. Good luck!

Monday, December 21, 2009

Free Local Counter Stats

In online business, in addition to optimizing learning SEO, you would need a tool to determine the number of visitors coming to your site. It is useful to determine what steps will you do to revenue dollar / rupiah you up.

To determine the level of traffic, the number of visitors your site we usually use the services of statistical calculation or stats counter. There is much we can use. One of them is popular enough google analytics stats counter.

A few days ago when he was blogwalking, I find stats counter service is pretty cool. Features provided quite interesting. And I am sure you would be interested as well to try it.
And what makes me more of kesemsem again this service was made in Indonesia. Yes .. right. a local counter stats service.

But honestly, I admit that this feature is not inferior to those made by :

Name of service: Indostats.com

What features provided by this indostats.com?

Let us both clay skill (I learned directly from its web information)

Real Time
No need to wait for 1 or 24 hours to analyze your site. With Indostats, you will know more quickly than other web stats, because every visitor who came to be viewed on the pages directly report on the spot without any delay.

Accurate, Without Boundaries
Got a site with 100,000 pageview per day? not a problem. For whatever your site, keep Indostats will save all the data completely and accurately.

Self 1 Account
Only need 1 account to monitor everything, so list all your sites in Indostats. Add, edit, reset and delete dapatdilakukan sites quickly and easily at the member's area pages.

Ranking Sites
When he joined the Indostats, your site will be included in the ranking system. You will know how your site diposisi are among other sites. And you will get a lot of new visitors of this feature.

Easy and Quick
Report an easy navigation and quick access to would make anyone easily understand your site statistics. Forget the confusing menus, Indostats made to make things clearer, not vice versa.

40 Report
Visitors, search engines, keywords, referral sites, browsers, OS, city. That's only part of the dozens of reports that will be given when you joined the Indostats.

all Free
And even more interesting for you (and me .. he.he) all of these services are Free. Nothing at all costs that you spend.

So what are you waiting? Only need 30 seconds to get started.

source : indostats.com

Monday, December 7, 2009

How To Improve Alexa Rank

•Flaunt your URL in webmaster forums. Webmasters usually have the toolbar installed. You’ll get webmasters to visit your website and offer useful feedback. It’s also a good way to give back to the community if you have useful articles to share with others.

•Post in Asian social networking websites or forums. Some webmasters have suggested that East Asian web users are big Alexa toolbar fans, judging by the presence of several Asia-based websites in the Alexa Top 500. I suggest trying this only if you have the time or capacity to do so.

•Get Dugg or Stumbled. This usually brings massive numbers of visitors to your website and the sheer amount will have a positive impact on your Alexa Rank. Naturally, you’ll need to develop link worthy material.

•Use PayperClick Campaigns. Buying advertisements on search engines such as Google or Exact Seek will help bring in Traffic. Doubly useful when your ad is highly relevant to webmasters.

•Buy banners and links for traffic from webmaster forums and websites. A prominent and well displayed ad will drive lots of webmaster traffic to your website, which can significantly boost your rank.

•Optimize your popular posts. Got a popular post that consistently receives traffic from the search engines? Include a widget/graph at the bottom of the post, link to your Alexa post or use Alexa redirection on your internal URLs.

•Hire forum posters to pimp your website. Either buy signatures in webmaster forums or promote specific articles or material in your website on a regular basis. You can easily find posters for hire in Digital Point and other webmaster forums.

•Use MySpace . This is a little shady so I don’t recommended it unless you’re really interested in artificially inflating your Alexa Rank. Use visually attractive pictures or banners and link them to your redirected Alexa URL. This will be most effective if your website has content that is actually relevant to the MySpace Crowd.

•Get friends to review and rate your Alexa website profile. Not entirely sure of its impact on rankings but it might help in some way.

•Create a webmaster tools section on your website. This is a magnet for webmasters who will often revisit your website to gain access to the tools. Aaron Wall’s webpage on SEO Tools is a very good example.

•Try Alexa auto-surfs. Do they work? Maybe for brand new sites. I think they are mostly suitable for new websites with a very poor Alexa rank. Note that there be problems when you try to use auto surfs alongside contextual ads like Adsense. They aren’t also long term solutions to improving your Alexa Rank so I suggest using with caution.

Sunday, December 6, 2009

Definitions and History Blog

BLOG DEFINITIONS
Blog is short for Weblog, a term first used by Jørn Barger in December 1997. Jørn Barger use the term to describe a group Weblog personal website is always updated continuously and contains links to other websites that they find interesting along with the comments of their own.
Broadly speaking, Weblogs may be summarized as a collection of personal websites that allow the manufacturer to display different types of content on the web with ease, such as paper, a collection of Internet links, documents (Word files, PDF, etc.), pictures or multimedia.
Makers blog called Blogger. Through Blognya, Blogger personality becomes easily recognizable based on what topic you like, what a response to the links in the select and the issues therein. Therefore it is very personal blog.
Another development is the Blog Blog includes stories about what a Blogger thinking, feeling, so what he did every day. Blogs and Online Diary also be located on the Internet. The only thing that distinguishes blog from the Diary or journal that we usually have is that the blog created to read others.

HISTORY BLOG
Probably the first blog is the page "What's New" on the Mosaic browser created by Marc Andersen in 1993. If we still remember, Mosaic was the first browser before the Internet Explorer even before Netscape.
Then in January 1994 Justin Hall started his personal website "Justin's Home Page" which later changed to "Links from the Underground" which might be called the first blog as we know it today.
Until the year 1998, the number of blog that there was very little. This is because the time required expertise and specialized knowledge of website creation, HTML, and web hosting to create a blog, so that only those who engaged in Internet, System Administrator or Web Designer who later in his spare time creating a blog-blog of their own.
But this time, we do not need to be a programmer to be a Blogger, because we can display the entire contents of the Web with ease via the menu editor that has been provided.
The advantage of the use of Weblogs among others:
Through weblogs, we can expand relationships friends / acquaintances that can form a large community.
Weblog exceed electronic mail (email), because a blog post that you mentioned, can be read by visitors unlimited blogs. Unlike email which can only be read by people who we send. In addition, blog visitors can also quickly respond to blog posts through comments that can be directly written on the blog.
As the development of weblogs from time to time, understanding the weblog will also evolve with ideas - ideas and wishes of the Blogger.


Source: bukukita.com

Monday, November 30, 2009

Free Tool for Tightening Your Computer Security

which can be used to protect, clean, maintain your Windows computer. In today's Internet world, everyone is vulnerable to infiltration and the most secure sites can have hidden dangers. Communication with friends, share photos, download songs, view videos, and shopping is now easier. However, it is also easier for the thieves to install malware that secretly run itself on your PC. You can be a victim of malware simply by visiting one site. Once the malware installed, actions and your personal data will be revealed.

Secunia Personal Software Inspector
This is probably the most useful free applications and important that you should install on your computer. You can use it to scan all the installed applications on the PC to determine which programs are not updated or patched. This tool by examining files on your computer (primarily. Exe,. Dll, and. Ocx). This file contains information that is provided by software vendors. This is the same for all users and comes from a program installed on your computer instead of the configu-ration them. After checking all the fi le, the data collected is sent to Secunia servers and matched against the Secunia File Signatures engine (https: / / psi.secunia.com /) to determine the actual application installed on your system. That information is then used to give a report on the security update that does not exist on your computer. Secunia PSI can also be used to mark the dangerous software / usage and find out the download links to missing security updates. Secunia PSI can detect more than 4700 applications.

OpenDNS
OpenDNS is a service that you should use to speed up Web surfing, typing errors fix domain name quickly, and protect yourself from the dangers of phishing. All you do is change your DNS settings to the OpenDNS servers: 208.67.222.222 and 208.67.220.220. OpenDNS also offers parental controls keyboard shortcuts, and other fi tour to help provide a safe browsing and reliable.

Haute Secure
Haute is a browser plug-in for Microsoft Internet Explorer is a real-time blocking of downloads done by malware. These tools include algorithms ProFI ling into the browser to identify and intercept suspicious fi le in real-time.

LinkScanner Lite
Exploit Prevention Labs' LinkScanner Lite supports IE and Firefox. This tool is integrated with a search engine for you warn of the possibility of a threat in the search results, including exploitation, phishing, and dihacked page.

GMER anti-rootkit
Rootkit-scanning tool built by Polish experts Windows is widely recognized as one of the best in finding hidden rootkits on your PC. GMER can find hidden processes hidden services hidden, hidden files, hidden registry keys, hidden drivers, and all kinds of driver hooking. It can also serve as a process explorer to monitor the manufacturing process, the loading of drivers and libraries, the functions fi and registry entries. Besides GMER, there are also anti-rootkit scanner free options, such as DarkSpy AntiRootkit, TrenMicro Rootkit Buster and McAfee's Rootkit Detective.

Netcraft Toolbar
Driven by the online community, Netcraft Toolbar called "big siskamling" that helps you find phishing and other identity theft. He gives a direct glimpse into the hosting location and Risk Rating of each site you visit. Netcraft Toolbar can also suspicious URLs and forcing the display of the browser navigation controls at the time the pop-up window trying to hide them.

File Shredder
File Shredder is a privacy tool that you must have. This tool can wipe out all the documents that can not be restored. With File Shredder, you can choose the algorithm used shredder to delete files forever.

CCleaner
Optimization and privacy tool removes fi le is not used by your system, speed up Windows and free up space on your hard disk. In addition, CCleaner to delete temporary files, historical URL, and cookies from IE Firefox, and Opera. You can also use it to delete temp fi le and fi le list of recently used for all third-party applications found in your PC.

PC Decrapifi er
Er delete Decrapifi PC that comes when Crapware prainstalasi. This program will not delete Crapware from the old computer, but suitable for a new computer that comes with trialware. There is a list of products that will be found and removed, including QuickBooks Trial, NetZero Installer, Earthlink Setup Files, Google Desktop, and applications of various antivirus trialware.

NoScript for Firefox
This Firefox extension to block suspicious script, and only allows JavaScript, Java, and other materials from sites you trust. NoScript for Firefox also allows you to block Flash and other plug-ins.

Monday, November 23, 2009

Hacker and Security System

If you see the title above will be remembered by the term Hacker, Cracker or even Carder. Many movies, novels or articles in magazines / newspapers that they will be reviewing it, actually who are they? Why now we need to concern about their eye out? Bbrp coincidence last week I was asked to fill out a seminar you know about Hacking & Networking on Linux in Jogja Expo Center.
The word itself is often caused hacking means different, although the original is an activity to find out the weaknesses of a system and even how to improve the ability of a good system software or hardware. So take a particular skill, such as good programming skills or understanding of electronic hardware ttg great. Whereas in the film and the novel is described only as an activity to be breaking into a system to take an advantage. Perhaps the most appropriate description for the hacking is in the movie The Matrix Reloaded, where Trinity is using a tool nmap (Network Mapper). In addition, many movies are just playing with the animation for describing hackers. Too many do-just use another tool for artificial people through a system, without great effort, we often categorize them as just œScript Kiddiesâ â € €?? or children who play with a script someone else. Actually, to be a good hacker, many hrs do business better understand TCP / IP, learn programming etc..

So why now we need to protect information systems in your company / organization we? Used at the time of the information system is still Closed Network and technology used its proprietary (pd specific certain companies), security threats are not so worry. Once we use the standard protocol TCP / IP (yg notebene elderly and simple), a network connected to the Internet, that's when our system becomes an easy target for mischievous orang2 out there. But such conditions it requires, for example banks hrs open Internet Banking services, hotels or travel agents to provide Online Reservation, a company must provide an e-commerce site for customer convenience, etc..

For that, I could not help the company must prepare a Security System (Security System) which according to the needs. One example is the firewall, such as self-employed security guard. Every guest went into an office, the guard will ask for the purpose, ask ID Card, then they will be recording our presence. The firewall will check every incoming access and compare with the policy, whether access is allowed or not. But it was not enough, then in the company must have installed CCTV Camera for supervising the activities inside. So although guests are allowed in, not necessarily that he did not do aneh2, for example, plant the bomb inside, steal something for take out, etc.. Usually Firewal addition, we will install IDS (Intrusion Detection System) which will oversee the data traffic, if any anomalies / peculiarities the IDS will alert could even get close the firewall for access connections at tsb.

Also, still needed more Authentication system ensures access to-be who, whatever may be inside, and recording their activity. For securing the line in order not bugged, required encryption technologies (encryption) so that the data are not easily read by anyone. And also required a centralized system for supervising / configure all security systems, such as space-equipped security guard monitors and Button2 lot for various activities.

Even more important is to teach to every user on the system for our company always careful when accessing a service exit. Type of attack-called Social Engineering Attack is an attack that utilizes user weaknesses. For example an email with the sender address for all users manager-it@apa.com request for to reply with include username and password, the reason will be upgraded to the new system. Or email asking us click to a website for downloading the latest antivirus demo, pdhl it is a virus or worm.

So in securing a system, many things must be considered reply. Not just buying software or security devices and then just installed. Wow, so busy is also yes if a connected system exit. Hence there is a mantra in the world that the Security â € œThe most secure system is unconnected Systema €?? Â € |. or even if ya want to secure all follow his motto of Andrew S. Intel's Grove is the founder of â € œOnly The Paranoid Surviveâ €??, Although it is actually more to the business strategy. Udahan dulu deh, meet again in another story.

source : dagdigdug.com

Basic Computer System Security

Written by Carter McNamara, MBA, PhD, Authenticity Consulting, LLC. Copyright 1997-2008.

There are two kinds of security: data and break-in. Data security is addressed by having a good backup system (see next section on computer security). Break-in security is often a matter of using passwords to files or systems where possible, locking systems in offices and managing modem dial-in. Have the modem on only when sending or receiving.

1. To avoid losing information stored on your computers when, e.g., a disk breaks (or "crashes"), ensure that computer files are regularly backed up to another media, e.g., backed up onto magnetic tapes, "zip" disk, CD-ROM, etc. Store the media offsite, that is, in a facility other than at your organization. If a disk crashes, you can repair the disk or get a new one and then restore the information from the backup media onto the new disk.Or, if backup media cannot be afforded (most are only a few hundred dollars), ensure files are stored on at least two different media devices, e.g., stored on an internal hard disk and then also on a diskette. Using a diskette as backup simply requires the computer user to occasionally save away his or her file to the diskette in addition to the hard disk. The same diskette can be used to backup files. Label the diskette with the time period during which files were backed up to it. Note that the major software applications themselves (Word, Excel, etc.) do not have to be backed up because the organization usually has the software application's master diskettes. The most important items to backup are usually database files, spreadsheet files and large documents written by users. Conducting regular backups is more a matter of managerial policy than technical limitations.

2. Use electrical surge protectors to ensure your computers will not experience sudden surges of electricity, e.g., during storms, if the quality of your electricity in your building is poor, or is the computer is turned off and on.

3. Protect unauthorized access to computer files by using passwords to log-on to your system, if possible. Critical files can be copied onto two different diskettes (with one as a backup for the other) and both stored in locked drawers. Be sure to label the diskettes such that you'll recognize them later by the name on the diskette label.

4. Ensure that computers remain working as much as possible (that is, maximum their uptime) by recording and testing detailed procedures for all routine, but critical, tasks performed by staff on the computers and associated peripherals, e.g., for computer backups and restores, fixing recurring problems, etc. Locate and label the procedures in a central location of which all staff are aware.

5. Develop competent internal technical support personnel who can help others to conduct basic activities on the computers and who can call outside consultants for troubleshooting when needed. Have one or two internal people who are designated as technical support contacts for other staff members.

6. Instruct staff to report all problems to the internal technical support people. That way, the internal people are aware of all problems and are more likely to detect oncoming problems as early as possible. They also become better trained at detecting and diagnosing problems.

7. Record all important phone numbers for technical support consultants or contacts, and ensure staff can find these numbers when needed.

8. Keep all software documentation, such as manuals and guides, stored in a central location where staff can find them. Post a sheet on the wall so they can check documents out and for control to ensure they are returned.

9. Promptly register all new software with the vendor to ensure you receive notification of regular software version updates and your eligibility to call the vendors for technical support if needed.

10. Keep the serial numbers of all software packages in a clearly visible place for ease of reference when calling the software vendor's technical support. (The vendor usually will ask you for the serial number to verify that you indeed purchased the software.)

11. Note that if you dissemble your computer hardware, you risk losing coverage of your warranty. During your warranty period (which often covers labor during the first 90 days and hardware during the first one or two years), always call the vendor as soon as you suspect any problems. Problems usually occur during the first several weeks if they occur at all.

12. Be sure to install a virus detector on your system. The detector should automatically check any new data brought into your system, for example, from diskettes, downloaded from the Internet, etc.

13. Develop a disaster recovery plan. The plan should address contingencies. It should include procedures to respond to, e.g., if a disk crashes, if the computer quits working, if the network is down, if the building is somehow destroyed, etc.

source : http://managementhelp.org

Wednesday, November 11, 2009

Five-Steps IT Strategy Formulation

1. Business strategy
Business Strategy is a document that should be the primary foundation rests in the manufacture of I / T strategy as mentioned in the document's vision and mission and performance targets of each function in the organizational structure. Within this document also emphasized the role of information technology in accordance with corporate strategy (remember that for every kind of enterprise, information technology positions may be different), so the philosophy used in the development of I / T strategy should be in accordance with it.

2. Business Trend
Business Trends is everything related to the tendency of business patterns that will occur in the future in relation to a particular industry. For example in the financial industry such as banking, insurance, and securities. There is a tendency that in the future, the three business entities will be used to separate merged into a financial company in which multi-functional products and services provided may vary. Another example is the tourism industry involving transportation companies (land, sea, and air), hotels, tourist sites, amusement parks and so forth. Currently, each company is in line its own business, but with the advancement in information technology and the phenomenon of the formation of strategic partnerships (strategic alliances) among several firms, the trend in the future will form a type of service company which combines the services usually done in companies the tourism industry.

3. Competitor Analysis
Competitor Analysis is an activity that must be remembered that the strategy was basically created because of the competition. The purpose of the development of information technology is to improve the performance of companies that can produce a product or service cheaper, better, and faster than the products or services produced by competitors. Thus clear that the purpose of holding the competition analysis of the business is to see how cheap, how well and how quickly the products and services offered by other companies so that it can be the benchmark targets.

4. I / T Trend
Destination studied the I / T trend is to avoid mistakes in choosing the technology applied and developed in the company. Not all products classified as information technology well. With so many products on offer, more of us fail to survive in the market than successful.
Companies must be able to do the sorting of any technology that is still in experimental stages or introduction (Infancy / emerging), the development (growth), stable (mature), and starting left (facing out).
In addition to the above-mentioned objectives, see the trend in the development of information technology means that learning opportunities (opportunities) that can only enhance the company's performance in the future, both in increased revenue, decreased costs, or the possibility of new business development.

5. (Existing I / T).
The main reason is because in essence the development of information technology in the future is built on the infrastructure owned by the current (baseline), rather than create something completely new (at least if it was decided to not use the existing infrastructure, it still needed a strategy for facing out).

(by: Fernando Sitindaon)

Tuesday, November 10, 2009

Viruses And Other Wildlife

MALICIOUS CODE

Viruses
- A program that has the ability to 'break away' and to'copy 'into the program / other systems
- Depending on other programs.
- Be active when 'something' that contains a virus run.
- Usually within one operating system, although there are different operating systems
- Infect: Memory and storage

Worms
- Does not depend to a program.
- Reproduce themselves by themselves mencopy from 1 computer to another computer.
- Using the network / Network.
- Did not attack the program.
- Does not change the program.
- Not corrupt the data.
- But dangerous.
- Utilize network resources.

Trojan Horse
- A fragment program that hide in the program and has a special function
- Often hidden in programs that attract users
- For example an interesting program, a new game.
- Usually used to tap one's password.
- Trojan horse programs clever:
Not leave a trace presence
Can not be detected
Programmed to destroy himself before it was detected

Bombs
- Like the Trojan Horse
- Often combined with viruses, worms and programs that attack the system.
- Works by date, time or under certain conditions
- There are 2 kinds of bombs: time and logic
- Who work on a particular time is called time bomb (a bomb)
- Who worked on the incident / circumstances called logic bomb (logic bomb)

Back Doors
- A technique used by the programmer to enter into a system.
- Is a secret way to enter into a system.
- Its function is to provide to the programmer to enter into a system through the 'back door'.
- Sometimes programmers let trap door in the program to monitor pengetasan a program or operation.

OTHER WILDLIFE
Bacteria
A program that does nothing but reproduce themselves
Usually beralokasi in memory, disk or other storage media.

Rabbits
Another name of the program that produced very quickly.

Crabs
Programs that attack / disrupt the data display on the screen.

CREEPERS
A program, such as worms, which menyerbar from other terminals to the network in the ARPANET (1970s) while displaying the message "I'm the Creeper, catch me if you can" to this program will be liquidated by "The Reaper".

Salamis
A program that attacks the values of the money in the bank transaction files, especially the value of fractional
Value fractions (cents) from the interest taken and transferred to the account of another person

Friday, November 6, 2009

The Legend of Hacker

The development of computers and the Internet not only deliver a variety of facilities in various fields, but also invite various acts of burglary system backed by a variety of motivations. As excerpted in the movie Hackers Outlaws & Angel.
Hackers Outlaws & Angles who told about the ins and outs of the legendary hacker, Captain Zap (Ian Murphy). Many differences of opinion about the term pendifinisian hacker, someone said that people who break into and destroy someone else's system can not be called a hacker, there are also different from that which defines a system capable of breaking into other people could be called a hacker. We do not need to argue things like that, which obviously a hacker is someone who wants to learn and keep learning to deepen their knowledge. Hackers could also be interpreted as the people who tried to break through the access control system by taking advantage of existing security gaps in the system. Activities become a serious threat of information system security.

Like other hackers who have a second name in cyberspace, Ian Murphy, Captain Zap name as its name taken from comic characters in the era of the 80s. Piercing done by changing the hours of AT & T to make the cost of phone bills will be cheaper and disrupt pewaktunya system. Ulahnya result, the system was busy at the time stated is not busy, and then sebaliknya.Ia captured 18 months later. According to Allan while the Brill (Head of Hi-Tech Investigations Kroll Associates) Ian was the first to know the bad things that can be done with a computer. Ian Murphy after undergoing his sentence he was then set up a security consulting firm IAM / Security Data Systems.

According to Wired magazine piracy at AT & T by Captain Zap was the best piracy ever. How not with minimal equipment at the time he was able to break into a big company. Salute to Captain Zap (The Legend of Hacker)

Source : Task MKSI courses Univ. Budi Luhur Salemba

Thursday, November 5, 2009

PENETRATION AND ENGINEERING THROUGH INTERNET MARKETING STRATEGY

1.Market Research
Market Research aims to find out how much market share for products or services you sell. Your business will not work best when limited market share. Major indicator / small share of this market can you find out the Google Keyword Tool.
Example:
If you sell a product "Muslim fashion," then look at the Google Keyword Tool is
analysis
The larger "search volume" of the word / phrase associated with "Muslim fashion"
greater share of existing markets, and vice versa. The word / phrase is what is called "keywords"
"No matter what business you are in, you must know what words people use when they search for your products online."
You should know that "keywords" what people type in "search box" search engines when looking for products like you're selling. Keywords that you should note that you will need it at the time to optimize your website and your product packaging.
Knowledge of these keywords is the main capital in the SEO (search engine optimization).

2. Competitor Analysis
After knowing the existing market share, then you have to "learn" from your competitors. Visit the site at least 10 of which appear on the first page of Google search results that sell similar products. Consider the following a few important things:
- Design website (user-friendly website recommended)
- Photos + wording / text
- Corporate identity (credibility + trust)
- Product presentation (categorized)
- Pricing (packages, discount / promo etc.)
- Booking terms, payment method, delivery options
- Website branding
- SEO aspects
- Uniqueness is most important - so do NOT copy!

Now look at your website, make sure you do not do too much mistakes 9 in designing the website as follows:
- Not to include information "Contact"
- Many "broken links"
- Information that is not up-to-date
- Too many fonts and colors yg different - different
- Not include "HOME" on the page in
- Button "Back" disabled
- Opening a new window (target_blank) each opened a new page
- Loading is slow
- Apply advanced technology that has not been popular

3. Market penetration and Win Competition
"What makes you different to your Competitors?"
The question should be can I answer any product or service pack, if I do not know her answers - I'm not going to sell it.
[i] Unique Product
If you pack your product exactly what the majority of your competitors, then you will be hard to penetrate / penetrate the market. If the product is exactly what the reason for turning to Customer you? Yes, you already know the answer, "lower prices" - the most popular steps and shortcuts to simply survive.
Business practices "not healthy" to always be "sacrificed" prices will damage the business climate
and competition. If prices continue to cut, then you have to press the cost of production
gradually reducing the product quality is difficult to disappoint customers
get repeated customer orders decreased by reducing the employee's business
all the limitations and waiting for a good reason to be "shut down". ".... so, be unique "
Because if you packed your product is different, then the price was supposed to be different. Even better if your product is exclusive (not imitate someone else) - then this will be the main reason for customers to find you.

4. Internet marketing strategy
More than 80% of internet users rely on search engines as a means of information seekers (based on research from Georgia Tech's GVU Center). This amount will continue to grow given the search engine is the easiest and fastest in the search for information. More importantly, your information will fall on the right person, because a search on the search engine tailored to the keyword / keywords and grouping system is highly structured directory.



Source : fernandositindaon

Hacker understanding based on age

The word "Hacker" has a unique history, Hacker said even with a positive means, even war hackers have happened throughout the world, korbanpun falling, would know what the history of Hacker? please read my post below.
Early 1960
At this year are still in the computer giant, stored refrigerated in a closed room and only the institutions are state-owned 60-memilikinya.Pada era Hacker's very positive sense, so-called hacker is someone who has a high programming skills and could be to hack a program so they could walk more than the specifications they have. One of the hacker era work programs of the 60 are still revered to this day is the UNIX operating system. Duo who gave birth to this OS is Dennis Ritchie and Ken Thompson.

Early 1970.
At this year's famous phreaks terms, namely that hackers can break through the phone line to access remote melepon for free. Started by John Drapper, he discovered that the whistle prize Cap'n Crunch cereal foods can produce the right tone with 2600 megahertz.Hanya blew the whistle on the telephone receiver remote telephone access to the communications network AT & T will open. Steve Jobs and Steve Wozniak made equipment to hack the phone, called the "Blue boxes". The two men later was the founder of Apple Inc.

Year 1980-1991.
IBM launched a computer "stand-alone" complete with CPU, memory and software in 1981. In 1983 came the film that revealed the hacker's life, entitled War Games.Film shows the American public about the dangers of hackers that can break through all this period komputer.Selama system, the defense department's network ARPANET Americans slowly began to turn into the Internet. In this era of birth Two big hacker group, the Legion of Doom is located in the United States and the Chaos Computer Club in Germany. In this era there is also a great hacker war, the two groups are vying with each other to destroy all computer systems, internet and telephone.

Year 1986-1994.
Because of the increasing attacks by hackers in 1986 the U.S. Congress issued the Law on the crimes of this era komputer.Pada formed Computer Emergency Response Team (CERT) that investigated the attacks via the Internet. The man who became the first victim for violating laws on computer crime was Robert Morris, he admitted that he intentionally did not release the worm into the Internet. Worm tanggan work of Robert Morris 6000 has crippled computer. As punishment he was prosecuted 10,000 USD. In the same year there was a hacker named Kevin Mitnick is through company-owned network of Digital Equipment Company and stole some software. He was sentenced to 1 year in prison. after escape from punishment Kevin Mitnick is not too sour, he repeated perbuatannnya with stealing 20,000 credit card data and were arrested in 1995 because of the help of a hacker named Tsutomu Shimomura.Operasi Sundevil launched by the U.S. government failed to roll up a hacker group Legion of Doom, but they managed to catch some members of the hacker group Masters of Deception.

Year 1994-1998.
In 1994 a Russian hacker named Vladimir Levin managed to break into Citibank's computers and to transfer money from customer accounts totaled 10 million USD. Citibank raised the most money back tersebut.Pada this era of hackers increasingly bold in conducting such serangannya.Situs U.S. government justice department, air force, CIA, NASA etc. korban.Para hackers had been announced that they managed to break into Pentagon computer network and threatening to sell military satellite software that had been stolen to the terrorists.

1999 to present
In the year 2000 computer event of mass destruction in 2000 at 00.00 or better known as Y2K greater. In February of 2000 the Internet community was shocked by the attack "denial of service" (DoS) against several sites such as CNN, Yahoo and E-Bay. Denial is a hacker attack that makes as if millions of surfers accessing a site simultaneously. Servers that "confusion" to serve the millions of surfers will collapse fictitious alias crash. In the same year in May appears exactly I Love You virus that helped mark the beginning of the era Worm.

Traffic Optimization

01. So puppeteer
Role behind the scenes is like a casting director what the company needs to be done. Ideas and input from members of the community should be allowed to flow.
02. Know When to Act
How to do the monitoring? Actually the community has the ability Correcting good self. But the company must be sensitive when there are flamers or those who disrupt the continuity of community

03. Critical Mass
Communities must achieve a minimum number of members to be functioning optimally. Key positions in the critical mass is also important to ensure the community can live. These key positions include positions as a motivator, as Conector, and leader. When the community is large enough, it can say they can make good content, and improve the content of existing fault

04. Admit Mistakes
When a mistake is made in the community should never be covered. Admit it, apologize sincerely and do not repeat.

05. Say Thanks
Brand / company should give rewards to those who have been willing to offer an opinion or contribute to the community / brand

06. Long Term Relationship
Communities take time to develop. Along with the development community, the brand must continue to experiment with content and a way to generate discussion and ways to attract members to be active.

Sorce : Fernando Sitindaon

Characteristics of the Digital Economy

1. Knowledge
Knowledge factor (knowledge) to companies that are the most important type of resources that must be owned organization. Given that the knowledge inherent in the human brain, the factors of intelligence from human resources the company is determining whether the organization's success in achieving objectives. Collective knowledge which is the value of the company in the process of creating products and services. Thus the concept of knowledge management will be key to the success of a company in this era.

2. Digitization
Digitazion is a process of transformation of various forms of information into formats digits "0" and "1" (based on number two). Although the concept seems simple glance, but its existence has produced a breakthrough and major changes in the world of business transactions.

3. Virtualization
Model that allows one to start a business with a simple device and can reach all potential customers in the world. In the virtual world, a customer simply dealing with an Internet site as an enterprise (business to consumer), as well as relations between the various companies that want to cooperate with each other (business to business). In this relationship, a process that occurs over the transaction is the exchange of data and information virtually, without the physical presence of the parties or individuals who conduct transactions. In other words, the business can be done anytime and anywhere as long as 24 hours per day and 7 days a week on-line and real time.

4. Molecularization
Organizations that will survive in the era of digital economy is successfully applied molecular shape. Molecular shape is a system where the organization can easily adapt to any dynamic changes that occur in the environment surrounding the company.

5. Internetworking
Efforts to develop the concept of cooperation with other companies. There is no company that can work alone without work jointly with other parties, so one of the prerequisites to succeed in cyberspace. Based on the chosen business model, associated companies must determine its core activities (core activity), and collaborates with other institutions to help implement the processes of supporting (supporting activities). Examples of parties who generally serve as a partner is technology vendors, content partners, merchants, suppliers (suppliers), etc..

Source : www.fernandositindaon.info

Blog Definition, Social Network, Portal




Blog :
Blog merupakan singkatan dari “web log” adalah bentuk aplikasi web yang menyerupai tulisan-tulisan (yang dimuat sebagai posting) pada sebuah halaman web umum. Tulisan-tulisan ini seringkali dimuat dalam urutan terbalik (postingan terbaru dahulu baru diikuti postingan yang lebih lama), meskipun tidak selamanya demikian. Situs web seperti ini biasanya dapat diakses oleh semua pengguan internet sesuai denagn topic dan tujuan dari si pengguna blog tersebut.
Contoh : Blogger.com, Wordpress.com, dll.

Social Network :
Social Networking merupakan sebuah bentuk layanan internet yang ditujukan sebagai komunitas online bagi orang yang memiliki kesamaan aktivitas, ketertarikan pada bidang tertentu, atau kesamaan latar balakang tertentu. Social networking lazim disebut sebagai jaringan pertemanan.
Layanan social network biasanya berbasis web, dilengkapi dengan beragam fitur bagi penggunanya agar dapat saling berkomunikasi dan berinteraksi. Contoh : Facebook, Twitter, MySpace, Magnolia, Friendster. Dll.

Portal :
Website tipe Portal adalah sebuah website yang memberikan bermacam macam informasi dalam satu domain. Informasi yang diberikan ini bisa spesifik seputar satu topik saja, misalnya portal games, portal berita, ataupun yang bersifat general. Umumnya sebagian besar informasi yang diberikan oleh Portal ini bersifat searah, dari webmaster kepada user, walaupun pada perkembangannya banyak yang mulai menyajikan user generated contents. Pendapatan utama website tipe Portal adalah dari Iklan. Contoh website portal yang kita kenal diantaranya adalah, Yahoo.com, KapanLagi.com, Plasa.com, EraMuslim.com, Detik.com dan masih banyak lainnya.

Brief explanation of Enterpreneurship, Technopreneurship, Cyberpreneurship

Enterpreneurship
According to a French economist, Richard Cantillon entrepreneur is the "agent who buys means of production at certain prices in order to combine them" (agents who buy the production equipment at a certain price in order to combine them). entrepreneur comes from French meaning entreprendre take steps to enter a particular activity or an enterprise; or welcome the challenge. In the original sense of the word entrepreneur in the can three important things, namely creativity, innovation, opportunity creation, and calculated risk-taking. Three main elements of this is that there is at all any entrepreneur.

In a time not too long, another French economist, Jean Baptista Say Cantillon add definition to the concept of the entrepreneur as a leader. I declare that the entrepreneur is someone who brings people together to build a productive organs. If translated into Indonesian known as entrepreneurs or self-employed. Based on its etymological art, is entrepreneurial notion of courage, virtue, or fortitude in trying to rely on their own strength.
The meaning of 'force alone' is not a business activity carried out alone, but rather refers to the mental attitude that does not depend on others. In solving the problems faced, he relied more on their own strength rather than ask for help from others. Thus, the notion of 'using their own power' can be worn on their own business or work as an employee.

Technopreneurship
is a process in the formation of new businesses that see technology as a base, with the hope that the creation of strategies and innovations that can be put right later on technology as a factor for national economic development.
Technoprenerurship concepts as disclosed above basically integrate the technology with entrepreneurial skills (Enterpreneurship skills). In this Technopreneurship base concept entrepreneurship development starts from the invention and innovation in technology.

Cyberpreneurship
is a business activity and increased business using computer technology, especially the Internet, in this business and business promoted using known electronic brochures with the homepage on the Internet. Sales of products and services also use electronic mail on the Internet.

Tuesday, November 3, 2009

The concept of Digital Economy

Knowledge
Knowledge factor (knowledge) to companies that are the most important type of resources that must be owned organization. Given that the knowledge inherent in the human brain, the factors of intelligence from human resources the company is determining whether the organization's success in achieving objectives. Collective knowledge which is the value of the company in the process of creating products and services. Thus the concept of knowledge management will be key to the success of a company in this era.

Digitization
Digitazion is a process of transformation of various forms of information into formats digits "0" and "1" (based on number two). Although the concept seems simple glance, but its existence has produced a breakthrough and major changes in the world of business transactions.

Search Engine Optimization

Bagi Anda yang telah malang melintang di dunia Internet Marketing Indonesia tentu SEO atau Search Engine Optimization ini tentu sudah tak asing lagi. Bagi Anda yang sedang belajar internet marketing dan kebetulan Anda termasuk orang Indonesia yang senang membaca (karena banyak orang Indonesia yang tidak suka baca, hehe..) tentu posting tentang SEO yang satu ini akan bermanfaat.
Ok, sebelum saya lanjutkan, saya ingin berbagai informasi kepada Anda tentang Kontes Menulis Kliksaya.com yang saat ini sedang berlangsung dan berhadiah Rp 200.000 per Artikel yang menang. Info lengkapnya ada disini: Peserta Kontes Menulis KlikSaya.Com Periode 2
Tulisan ini pun saya ikutkan dalam lomba menulis tersebut, dan pada periode yang lalu saya menang 2 Topik yang bisa Anda baca di posting pengumuman pemenang di sana (Kliksaya.com).
Nah, topik tentang SEO ini sendiri pada prinsipnya merupakan suatu cara berpromosi yang berlawanan dengan konsep kliksaya bagi (Pemasang Iklan atau Advertiser). SEO adalah tentang cara promosi jalur pelan dan gratis tapi PASTI, sedangkan Kliksaya.com adalah konsep promosi jalur cepat dan berbayar terbaik untuk Pemasang Iklan. Nah, jika Anda adalah pelaku internet marketing Indonesia yang menjalankan PPC (sebagai Publisher) di kliksaya.com maka SEO adalah wajib bagi anda untuk meramaikan website Anda dalam jangka panjang, sehingga terus menerus kwalified di Kliksaya.com. Jadi, Strategi SEO sangat erat hubungannya dengan partisipasi Anda sebagai Publisher Kliksaya.com juga.
Ok, mari kita lanjutkan.
Dengan menguasai SEO dan menang dalam persaingan SEO, maka Anda akan dibantu oleh banyak robot-robot seach engine untuk mendatangkan pengunjung ke blog Anda. Mereka akan bekerja siang dan malam tanpa henti membantu Anda, dengan setia, tanpa minta upah. Jika website Anda ramai dan Anda pandai pula untuk mengolah pengunjung yang datang tersebut menjadi pembeli maka Anda akan menjadi salah satu pemain internet marketing Indonesia yang sukses dan kaya. Anda mau begitu kan?
Namun, ada berita buruknya juga, bagi Anda pemain internet marketing Indonesia yang kurang mampu untuk bersabar maka strategi SEO ini mungkin bukan pilihan. SEO memerlukan kerja yang lumayan keras, waktu yang bukan sehari semalam, dibutuhkan kesabaran dan konsistensi yang tinggi untuk suskes melalui jalur ini. Tapi jangan pesimis dulu, jika Anda punya strategi yang memang jitu, maka pekerjaan Anda dapat dikerjakan orang lain, tanpa Anda sendiri melakukannya dengan suka rela.
Ketika Anda berhasil melakukan strategi SEO ini, baik melalui waktu dan tenaga Anda sendiri atau orang lain maka seperti diatas tadi, anda seperti punya karyawan yang setiap yaitu search engine tadi seperti Google, Yahoo dan sebagainya, untuk membantu Anda sukses dalam menjalankan internet marketing. Sudah banyak pemain internet marketing Indonesia yang berhasil melakukannya.

Apa itu Search Engine?
Lantas Apa itu Search Engine? Search Engine adalah istilah yang digunakan untuk website tempat orang mencari (mesin pencari) seperti Google.com misalnya. Di Mesin Pencari seperti Google, ada ribuan bahkan orang mencari informasi dengan mengetikkan kata atau beberapa kata yang ingin mereka temukan informasi lebih detailnya.
Anda sudah sering mencari di Google? Jika belum, Anda bisa mencobanya dengan masuk ke website Google.com kemudian ketikkan “belajar bisnis” misalnya, maka ribuan index informasi akan Anda temukan, kemudian klik saja pada judul-judul pada hasil pencarian tersebut untuk menuju ke halaman website yang membahas topik yang anda carai tadi dalam hal ini “belajar bisnis”.
Sekarang Anda sudah tau apa itu Search Engine. Search Engine atau mesin pencari ini juga ada yang spesifik untuk Indonesia, misalnya untuk Google adalah Google.co.id sedangkan untuk Yahoo Indonesia adalah id.Yahoo.com. Pemain Internet Marketing Indonesia yang menarget pasar lokal seperti Indonesia akan mencoba untuk memenangkan persaingan di Local search engine tersebut, sedangkan pemain internet marketing global akan menarget search engine global pula.
Demikianlah apa itu Search Engine (SE) atau mesin pencari. Nah, kalau ditamah O menjadi SEO apa pula itu?

Apa itu SEO?
SEO adalah singkatan dari Seach Engine Optimization. Artinya adalah suatu kegiatan yang dilakukan untuk meng-OPTIMALKAN website Anda dimata search engine tadi. Suatu website yang optimal di search engine akan menang dan berada di posisi atas hasil pencarian di search engine seperti Google tadi. Kalau website Anda menang maka website Anda akan seperti diatas tadi. Jutaan orang mencari di Google misalnya, Website Anda ketemu terus, Orang klik pada website anda yang ketemu tersebut, maka banyak pengunjung ke blog Anda. Artinya search engine telah bekerja siang dan malam tanpa henti membantu Anda, dengan setia, tanpa minta upah. Anda mau begitu kan?. Jika Ya, maka Anda dapat mempelajari caranya.
Secara garis besar, kegiatan SEO ada 2:
Yang Pertama adalah mendesign website Anda Internally agar Search Engine friendly. Artinya website Anda harus didesign yang bersahabat dengan Google. Agar nanti website Anda disenangi search engine tersebut. Itu akan meliputi navigasi (menu) yang baik, selalu ada minimal satu link untuk ke halaman yang anda buat, tidak juga terlalu banyak link yang berulang-ulang, website anda cepat loadingnya, Website Anda konsisten topiknya (kesesuaian antara Judul, Isi artikel, keywords dan description). Ini tidak sulit, bagi mereka yang sudah tau rahasianya. Banyak sekali pemain internet marketing Indonesia yang telah menguasai hal ini. Kegiatan yang pertama ini sifatnya internal di website Anda, karena itulah sering juga disebut sebagai ON-PAGE Seo (kegiatan di halaman-halaman yang anda buat di website anda).
Yang Kedua adalah kegiatan OFF-PAGE Seo, artinya adalah kegiatan diluar web Anda, bagaimana agar website Anda banyak dibicarakan diluar sana, sehingga Search Engine menganggap website Anda sebagai “penting”.
Jika website anda sudah internallay didesign bersahabat dengan search engine, dan juga banyak dibicarakan diluar (misalnya blog lain yang membicarakan website Anda) maka Search engine akan MENAIKKAN posisi webiste Anda di hasil pencarian oleh orang dengan kata kunci yang telah Anda buat diwebsite Anda. Misal orang mencari “belajar bisnis” dan topik tersebut ada di web Anda yang sudah SEO ready tadi maka website Anda akan berpotensi untuk berada di halaman-halaman depan hasil pencarian.
Di posisi berapa Anda akan berada? rangking satu, dua atau tiga? atau di halaman 2, 3, dsb? Tergantung seberapa optimal website Anda di mata search engine tadi. Tergantung juga seberapa banyak saingan website yang juga optimal seperti milik Anda. Siapa yang paling OPTIMAL dialah yang akan menjadi nomor satu.

Seperti Apa saja kegiatan diluar website (OFF-Page) optmization itu?
Kegiatan diluar website ini akan terkait erat dengan kegiatan promosi, yang membuat website Anda banyak dibicarakan di luar. Promosi ini ada 2 macam:
Yang pertama adalah oleh Anda sendiri, Anda yang membicarakan website anda di luar web yang ingin Anda SEO-kan tadi di website lain. Misalnya dengan memasang website anda di iklan baris, web directory, atau dengan menulis di luar dan memasang link balik ke website Anda yang ingin diperjuangkan agar menang SEO tadi. Pemain internet marketing Indonesia banyak sekali yang senang memasang iklan baris, tetapi lebih sedikit yang senang menulis.
Yang kedua adalah orang lain dengan suka rela membicarakan website Anda, karena website anda memang bagus dan orang lain merasa senang dengannya, jadi mereka tanpa disuruh membicarakan website anda, memasang link ke website anda.
Sebetulanya intinya adalah bagaimana agar banyak LINK yang menuju ke website Anda. Isilah untuk hal ini adalah bagaimana mendapatkan banyak BACKLINK. Jika Anda promosi diluar tentu anda akan membuat backlink ke website anda, atau orang lain yang membicarakannya maka mereka juga biasanya akan membuat backlink agar bisa masuk ke website Anda. Semakin banyak backlink (backlink yang berkualitas tentu saja) maka seperti semakin banyak pintu masuk ke website Anda.
Sudah websitenya internally didesign dengan standard SEO (On-Page SEO) atau SEO-ready, dan keren di mata manusia juga, plus website anda dibicarakan diluar dan menjadi buah bibir maka pastilah berarti website Anda PENTING. Search Engine seperti Google itu juga pintar, dia tau website anda dari website lain, karena search engine itu berkeluyuran juga ke website orang lain, bukan hanya ke website Anda saja. Nah, jika dia sering temukan web Anda maka search engine akan anggap website anda juga penting. Jika website Anda dianggap penting oleh search engine maka peringkatnya akan naik jika orang mencari sesuatu yang berhubungan dengan apa yang anda tuliskan di website Anda.
Coba saja misalnya orang Indonesia yang cantik, tetapi hanya di rumah saja, tidak menjadi sampul majalah, tidak pernah naik panggung, tidak ada fotonya tersebar, tidak kenal dan tidak dikenal oleh banyak orang, maka apakah mungkin pada posisi itu dia bisa menjadi ratu sejagad ? Demikian pula dengan website yang indah mempesona, namun hanya pemiliknya saja yang tau atau sebagian kecil saja dari teman-teman pemiliknya, maka website itu tidak akan dianggap penting oleh search engine, dengan demikian tidak pula website itu pada tahap ini dapat disebut sebagai Jagoan SEO. Setelah dia dikenal orang luar, dipuji dan disanjung, menjadi buah bibir, maka barulah website Anda akan PENTING dimata search engine.
Sekarang Anda sudah faham bagaimana 2 langkah utama untuk menang dalam persaingan di mesin pencari atau search engine yaitu On-Page SEO dan Off-Page SEO. 2 kegiatan besar itulah yang disatukan menjadi istilah SEO (Search Engine Optimization).
Tentu saja sekedar faham saja tak cukup bukan? Yang paling penting adalah mempraktekkan ilmu ini, Action!. Seperti posting yang lalu tentang Belajar Jurus La La La.

Apa yang harus dikerjakan sekarang untuk mempraktekkan ilmu SEO ini?
Yang pertama adalah buatlah website Anda sendiri, designlah agar SEO ready, dengan content yang menarik, dapat dipercaya, kalau bisa isi yang sensasional! agar menjadi buah bibir. hehe.. Jika Anda ingin membuat website dalam 5 menit saja, baca disini
Yang kedua adalah rajin-rajinlah mempromosikan website Anda. Boleh baca yang satu ini: Kuasailah Strategi Promosi. Atau berusahalah agar website Anda menjadi buah bibir, sehingga orang lain mempromosikan website Anda dengan suka rela.
Jika ilmu gratis yang saya posting ini belum cukup untuk Anda, maka sudah waktunya sekarang Anda belajar internet marketing dengan modul yang telah disusun sangat lengkap dan secara sangat detail, secara bertahap, yang bisa anda lakukan kapan saja Anda mau, dengan biaya terjangkau, oleh guru internet marketing kelas dunia. Ia mengajarkan Internet Marketing dalam bahasa Indonesia di Asian Brain Internet Marketing Indonesia disini:
Ambil Modul Pertama Internet Marketing Indonesia Gratis klik disini kemudian Langsung Mendaftar Full Member Sekolah Internet Marketing Indonesia AsianBrain klik disini
Demikianlah pelajaran singkat tentang SEO kali ini, semoga bermanfaat untuk Anda ya, khususnya pemain bisnis PPC berbahasa Indonesia yang sangat keren seperti Kliksaya.com
Saya ulangi sekali lagi, Jika Anda adalah pelaku internet marketing Indonesia yang menjalankan PPC seperti kliksaya.com maka SEO adalah wajib bagi anda untuk meramaikan website Anda dalam jangka panjang, sehingga terus menerus kwalified di Kliksaya.com. Apalagi jika Anda punya beberapa website, akan sulit bagi Anda untuk membuat website Anda kwalified semuanya di kliksaya.com tanpa strategi SEO ini. Jadi, Strategi SEO sangat erat hubungannya dengan partisipasi Anda sebagai Publisher Kliksaya.com juga.

Terimakasih banyak telah membaca, semoga sukses

source : www.fernandositindaon.info

Wednesday, October 28, 2009

History of Information Technology and System

• Four basic periods
Characterized by a principal technology used to solve the input, processing, output and communication problems of the time:
1. Premechanical,
2. Mechanical,
3. Electromechanical, and
4. Electronic


A. The Premechanical Age: 3000 B.C. - 1450 A.D.


1. Writing and Alphabets--communication.
1. First humans communicated only through speaking and picture drawings.
2. 3000 B.C., the Sumerians in Mesopotamia (what is today southern Iraq) devised cuniform
3. Around 2000 B.C., Phoenicians created symbols
4. The Greeks later adopted the Phoenician alphabet and added vowels; the Romans gave
the letters Latin names to create the alphabet we use today.
2. Paper and Pens--input technologies.
1. Sumerians' input technology was a stylus that could scratch marks in wet clay.
2. About 2600 B.C., the Egyptians write on the papyrus plant
3. around 100 A.D., the Chinese made paper from rags, on which modern-day papermaking is
based.
3. Books and Libraries: Permanent Storage Devices.
1. Religious leaders in Mesopotamia kept the earliest "books"
2. The Egyptians kept scrolls
3. Around 600 B.C., the Greeks began to fold sheets of papyrus vertically into leaves and bind
them together.
4. The First Numbering Systems.
1. Egyptian system: The numbers 1-9 as vertical lines, the number 10 as a U or circle, the
number 100 as a coiled rope, and the number 1,000 as a lotus blossom.
2. The first numbering systems similar to those in use today were invented between 100 and
200 A.D. by Hindus in India who created a nine-digit numbering system.
3. Around 875 A.D., the concept of zero was developed.
5. The First Calculators: The Abacus.

One of the very first information processors.

B. The Mechanical Age: 1450 - 1840
1. The First Information Explosion.
1. Johann Gutenberg (Mainz, Germany)
Bulleted List - Invented the movable metal-type printing process in 1450.
2. The development of book indexes and the widespread use of page numbers.

2. The first general purpose "computers"
- Actually people who held the job title "computer: one who works with numbers."
Slide Rules, the Pascaline and Leibniz's Machine.
- Slide Rule.

Early 1600s, William Oughtred, an English clergyman, invented the slide rule
- Early example of an analog computer.

Concept and History of Information Technology



INTRODUCTION TO INFORMATION TECHNOLOGY
Information technology is a manifestation of public & private investment in science & engineering (S&E) that is enabling broad and significant changes in society. Many observation, compare the rapid development and expansion of information technology to the industrial revolution in terms of its potential scope & impact on society. Few other modern advances in technology have the capacity to affect so fundamentally the way people work live, learn and govern themselves. As with the industrial revolution, both the time and direction of many changes are difficult to predict.
The relationship between IT& science & engineering has two aspects. In addition to being a product of science and engineering, IT enabling change in S&E. IT has become on important part of the Indian economy for example S&E make extensive use of computer modeling & simulation and large share of database advances in networking facilitate global collaboration in research and product development, implement the results of academic research and conduct significant amounts of applied R&D, IT also influences the pipeline for S&E through its affects on the demand for people with technical skills and through its use in education at all levels.
Information technology reflects the combination of three technologies, digital computing, data storage and ability to transmit digital signal through telecommunication network. Rapid change in semiconductors technology, information storage & networking, combined with advance in software, has enabled new application, cost reduction and widespread diffusion of IT. The expanding array application makes IT more useful & further fuels the expansion of IT.


CONCEPT OF INFORMATION TECHNOLOGY
Information is a resource which has no value until it is extracted, processed and utilized. Information technology deals with information system, data storage, access, retrieval, analysis and intelligent decision making. Information technology refers to the creation, gathering, processing, storage, presentation and dissemination of information and also the processes and devices that enable all this to be done.
Information technology is affecting us as individual and as a society. Information technology stands firmly on hardware and software of a computer and tele-communication infrastructure.

Make Money

Your Ads Here