Rabu, 19 November 2014

64-bit microproccesor



Sixty-four-bit processors have been with us since 1992, and in the 21st century they have started to become mainstream. Both Intel and AMD have introduced 64-bit chips, the Mac G5 sports a 64-bit processor. Sixty-four-bit processors have 64-bit ALUs, 64-bit registers, 64-bit buses and so on.

One reason why the world needs 64-bit processors is because of their enlarged address spaces. Thirty-two-bit chips are often constrained to a maximum of 2 GB or 4 GB of RAM access. That sounds like a lot, given that most home computers currently use only 256 MB to 512 MB of RAM. However, a 4-GB limit can be a severe problem for server machines and machines running large databases. And even home machines will start bumping up against the 2 GB or 4 GB limit pretty soon if current trends continue. A 64-bit chip has none of these constraints because a 64-bit RAM address space is essentially infinite for the foreseeable future -- 2^64 bytes of RAM is something on the order of a billion gigabytes of RAM.

With a 64-bit address bus and wide, high-speed data buses on the motherboard, 64-bit machines also offer faster I/O (input/output) speeds to things like hard disk drives and video cards. These features can greatly increase system performance.

Servers can definitely benefit from 64 bits, but what about normal users? Beyond the RAM solution, it is not clear that a 64-bit chip offers "normal users" any real, tangible benefits at the moment. They can process data (very complex data features lots of real numbers) faster. People doing video editing and people doing photographic editing on very large images benefit from this kind of computing power. High-end games will also benefit, once they are re-coded to take advantage of 64-bit features. But the average user who is reading e-mail, browsing the Web and editing Word documents is not really using the processor in that way.

source: http://howstuffworks.com/microprocessor6.htm

Minggu, 16 November 2014

OSCILLOSCOPE










Oscilloscope is a measuring instrument which can show us the "shape" of the electrical signal by showing a graph of voltage versus time on the screen. It was like a voltmeter with extra function, how the voltage varies with time, a graticule every 1 cm grid allows us to make measurements of voltage and time on the screen (the screen).

Oscilloscope consists of two parts:  
Display
Display resembles display on a television screen. Oscilloscope display on the display serves as a test signal. On the Oscilloscope Display transverse stripes are vertical and horizontal form boxes called div. Horizontal axis represents time and the vertical axis represents voltage.
Control panel
The control panel contains buttons that can be used to adjust the display on the screen. The buttons on the panel of the oscilloscope, among others:

     Focus               : Used to adjust focus
     Intensity           : To adjust the brightness of the lines displayed on the screen
     Trace                : Adjusting the tilt axis line Y = 0 in the screen
     Volt / div          : Set the value of voltage is represented by a div on the screen
     Time / div         : Set the value of time is represented by a div on the screen
     Position            : To adjust the normal position of the X axis
     AC / DC           : Set the function of the coupling capacitor
 
However, if the button is placed on the DC position, the signal will be measured by its DC component :
     Ground           : Used to view the location of the ground position on the screen.
     Channel ½      : Select the channel / channels are used.

In general, the oscilloscope consists of two channels (Dual Trace) that can be used to view two different signals, for example, channel one is installed to see the input signal and channel two to see the output signal.

Minggu, 09 November 2014

The League of Extraordinary Gentlemen








The film adaptation of the comic is a classic film that tells the story of hero figures-but-not-famous superheroes and combine to form a group called, 'The League of Extraordinary Gentlemen'.

About the characters used :
Allan Quatermain, he was the hero of the UK with operations in South America. Afterward, they used to live in Africa because there father had divorced. Captain Nemo, he was captain of the famous ship, Nautilus. He is a prince from India who is a genius with a variety of technologies. He also hated the British soldiers because they killed the ship. Mina Harker, cross-eyed girl is a vampire and can turn into a bat that also cross-eyed. She is a widow lady and vampire blood is a curse given to him.Rodney Skinner, was human invisibility (invisible) who work for the government and assigned to look for a potion to make him invisibility. In the end he drank the potion for himself.Jekyll & Hyde, the main fact is Professor Henry Jekyll. But he suffered a breakdown of the personality so as to form a very different personality from her, namely Edward Hyde. In this film they can finally rely on each other.Dorian Gray is a handsome immortal beings (very handsome) - and narcissistic. Actually he is an ordinary man, but he then transformed himself become immortal with a painting of himself so that aging is the painting.Tom Sawyer, is a secret agent of the US envoy to help eradicate the evil of Allah et al (terror) that occurred. The only bad properties owned since childhood is sloppy. But he remains a hero who always wonder, and Mr.M, I do not really know much about this character, but certainly in this film it was he who made the league. At the end of the story can be seen that he actually has an antagonistic role.

The story is simple, the world is siteror by a group of criminals led by Fantom. It has advanced technology and a thirst for power. Therefore, he tried to lure a group to fight with Allan. Allan initially uncooperative with M, but because of the sudden attack that hit him he eventually joined. Starting with Skinner, Mina, and Nemo, the four of them went to recruit key people such as Dorian. Dorian at home, suddenly they are attacked by a group Fantom. But Dorian said that it was not his move. There too, they met with Tom Sawyer.

After that they were to Paris to catch the changing Jekyll into Hyde. Moments, they began to smell a traitor, because Nemo found dust from the camera in the steering his ship. After that continue to Skinner lost, until they find the real traitor.

They also raided a factory that made the Fantom. The war began with a fierce, coupled with the arrival Skinner proved that it was not he who was the traitor. Allan shared Sawyer against Fantom, Nemo and Jekyll united release of the hostages, destroy buildings Skinner, and Mina against Dorian who turns traitor. Fantom itself, it is Mr.M who wanted blood samples from Mina and Skinner, potion of Jekyll, and design technology of Nemo. While Dorian, wants to live longer and prosper. Although they succeeded in the end, but the hero is not a god. Allan Quatermain died from knife from Fantom and Fantom itself eventually killed by Sawyer. But at the end of the movie, the people of Africa do a ritual to the grave Allan. And it can be seen that a very loud vibrating grave Allan (allowing that Allan could not die, since the people of Africa have expressed promise that they will not let Allan die).

Well, how? Exciting is not it? Hehehe sorry if the review is a bit stiff and the bad, because I am also not so well anyway on their way wkwkwk But definitely this film a combination of several individual stories smoothly if you want their stories to be read one at a time hahaha: D
If curious, immediately wrote watch the movie! Guaranteed not gonna be disappointed! Seriousness ya!



QUESTION

1. who is the person that try to convince Allan Quaterman in Kenya ?
    answer :  
     Allan Quartermain is sought out in Kenya by a British agent sent to persuade

2. who are the member of that extradionary group? explain their special !
    answer :   
     Allan Quaterman is a former great hunter and adventurer in Africa, he's now an old 
     opium- addicted man.As the League's story moves on, his old passion and spirit for 
     adventure comes back to life.

3. discribe protogonis and antagonis character ?
    answer :
    protagonis : Allan Quartermain, , Captain Nemo, Mina Harker, Rodney Skinner, Tom  
                       Sawyer, Jekyll & Hyde
    antagonis  : Mr.M , Dorian Gray
    explanation of characters already exists in synopsis.

Senin, 20 Oktober 2014

shape (certain forms of the object)

SHAPE 


These nouns refer to the external outline of a thing.  
1. Form is the outline and structure of a thing as opposed to its substance: a brooch in the form of a  lovers' knot.  

2. Figure refers usually to form as established by bounding or enclosing lines: The cube is a solid geometric figure.

 3. Shape implies three-dimensional definition that indicates both outline and bulk or mass: He faced her, a hooded and cloaked shape.

4. Configuration stresses the pattern formed by the arrangement of parts within an outline: The map s5. hows the configuration of North America, with its mountains, rivers, and plains.

5. Nature : natural green is the character of the nation Indonesia  

6. Contour refers especially to the outline of a three-dimensional figure: I traced the contour of the bow with my finger.

7. Form : If you want in the teknokra, you must filling form. 

 8. Profile denotes the outline of something viewed against a background and especially the outline of the human face in side view: The police took a photograph of the mugger's profile.

9. Identy :  Identity similar to the character that discribe about things or a person that you can see in real.

10. Structure : every organization is always in need of structure as a profile of the organization. 

 


Jumat, 17 Oktober 2014

Cara Mengaktifkan Fitur Keamanan LG G3


LG Content Lock
Gunakan aplikasi LG Content Lock ini untuk smartphone LG G3 kesayangan anda, aplikasi tersebut memiliki fungsi sebagai pengaman konten yang terdapat pada Galary smartphone anda. Dengan menggunakan aplikasi tersebut, seluruh konten yang terdapat dalam dalam Galery anda akan lebih aman tanpa bisa dibuka oleh orang lain. Cara mengaktifkannya masuk pada menu “Setting” kemudian pilih “General”, lalu “Security” dan pilih “Content Lock”, lalu masukkan sandi yang anda kehendaki kemudian tekan “Lock”.
Tips dan Cara Mengaktifkan Fitur Keamanan LG G3

LG Knock Code
LG Knock Code merupakan sebuah fitur baru yang dihadirkan oleh LG Mobile untuk penggunanya. Diklaim fitur ini lebih aman dari pada fitur pengaman yang lainnya, karena Knock Code memiliki pola ketuk yang unik, yang hanya bisa diketahui oleh pemiliknya saja. Cara mengaktifkannya anda bisa masuk pada menu “Setting”, kemudia pilih “Display”, lalu “Lock Screen”, dan pilih “Screen lock”, kemudian pilih “Knock Code”. Selanjutnya silahkan anda pilih pola ketukan yang anda kehendaki.
Tips dan Cara Mengaktifkan Fitur Keamanan LG G3

LG Guest Mode
Saat smartphone anda dipinjam orang lain fitur Guest Mode ini berfungsi untuk pengaman content smartphone anda, karena setiap orang lain yang mengakses smartphone anda akan masuk pada Guest Mode dan hanya bisa mengakses beberapa aplikasi saja yang sebelumnya sudah ditentukan. Cara mengaktifkannya silahkan anda masuk pada menu “Setting”, kemudian “General”, pilih “Guest Mode”, lalu aktifkan “On” fitur ini. Maka otomatis aplikasi tersebut meminta anda memilih cara membuka kuncian layar, kemudian pilih Allowed App untuk menyediakan beberapa aplikasi yang bisa diakses oleh Guest nantinya.
Tips dan Cara Mengaktifkan Fitur Keamanan LG G3

Semoga info cara mengaktifkan fitur keamanan LG G3 diatas bisa bermanfaat buat anda semua dan bisa anda terapkan pada smartphone anda. Jika anda suka, share juga artikel cara mengaktifkan fitur keamanan LG G3 ini di jejaring sosial seperti Facebook, Twiter dan lain sebagainya.

Rabu, 24 September 2014

"3G TECHNOLOGY"




HISTORY 3G

3G technology is the result of research and development work carried out by the International Telecommunication Union (ITU) in the early 1980s. 3G specifications and standards were developed in fifteen years. The technical specifications were made available to the public under the name IMT-2000. The communication spectrum between 400 MHz to 3 GHz was allocated for 3G. Both the government and communication companies approved the 3G standard. The first pre-commercial 3G network was launched by NTT DoCoMo in Japan in 1998, branded as FOMA. It was first available in May 2001 as a pre-release (test) of W-CDMA technology.The first commercial launch of 3G was also by NTT DoCoMo in Japan on 1 October 2001, although it was initially somewhat limited in scope, broader availability of the system was delayed by apparent concerns over its reliability.

The first European pre-commercial network was an UMTS  network on the Isle Of Man by MANX TELECOM, the operator then owned by British Telecom and the first commercial network (also UMTS based W-CDMA) in Europe was opened for business by Telenor in December 2001 with no commercial handsets and thus no paying customers.
The first network to go commercially live was by SK Telecom in South Korea on the CDMA-based 1xEV-DO technology in January 2002. By May 2002 the second South Korean 3G network was by KT on EV-DO and thus the South Koreans were the first to see competition among 3G operators.
The first commercial United States 3G network was by Monet Mobile Network on CDMA-2000 1x EV-DO technology, but this network provider later shut down operations. The second 3G network operator in the USA was Verizon Wirelesss in July 2002 also on CDMA2000 1x EV-DO. AT and T mobility is also a true 3G UMTS network, having completed its upgrade of the 3G network to HSUPA.

The first pre-commercial demonstration network in the southern hemisphere was built in ADELAIDE South Australia by m.Net Corporation in February 2002 using UMTS on 2,100 MHz. This was a demonstration network for the 2002 IT World Congress. The first commercial 3G network was launched by Hutchison Telecommunications branded as Three or "3" in June 2003.
Emtel launched the first 3G network in Africa.



PATENTS
It has been estimated that there are almost 8,000 patents declared essential (FRAND) related to the 483 technical specifications which form the 3GPP and 3GPP2 standards.Twelve companies accounted in 2004 for 90% of the patents Qualcomm, Ericson, Nokia, Motorola, Philips, Matshusita, Mitsubishi.
Furthermore, the existing 3G PATENT PLATFROM PARTNERSHIP POOL has little impact on FRAND  protection, because it excludes the four largest patents owners for 3G.

FEATURES
  • Data rates
ITU does not actually clearly specify minimum required rates, nor required average rates, nor what modesof the interfaces qualify as 3G, so various data rates are sold as '3G' in the market. Compare with 3.5G and 4G. In India, 3G is defined by telecom service providers as minimum 2 Mbit/s to maximum 28 Mbit/s.
  • Security
3G networks offer greater security than their 2G predecessors. By allowing the UE (User Equipment) to authenticate the network it is attaching to, the user can be sure the network is the intended one and not an impersonator. 3G networks use the KASUMI block cipher  instead of the older A5/1 stream cipher. However, a number of serious weaknesses in the KASUMI cipher have been identified.

  • Applications of 3G
The bandwidth and location information available to 3G devices gives rise to applications not previously available to mobile phone users. Some of the applications are: 
1. global positioning system  
2. location-based services  
3. mobile TV 
4. telemedicine 
5. video conferencing
6. video on demand

    The standard applies to the use of 3G:
    1 W-CDMA
    2 CDMA2000
    3 CDMA2001
    4 TD-CDMA / TD-SCDMA
    5.-136 UWC (often implemented with EDGE
    6 DECT


    The main services offered by 3G technology are:
    1. Video Call
    2 Real Time Video Sharing
    3 VoIP (Voice Over Internet Protocol)
    4. Multiplayer Games
    5. Browsing6. Audio & Video Streaming
    7 Content Download