komputer bagi saya merupakan hal ter penting dalam kehidupan saya. dimana shar i hari cuma pc dan nootebook yang ada di hadapan saya....
oleh sebab itu saya mengatakan bahwa computer sangat lah penting dalam dunia informatika...
oleh sebab itu saya mengajak anda anda semua untuk serius belajar tentang informasi dimana informasi adalah hal terpenting di dunia ini, untuk mendapatkan informasi kita harus memerlikan suatu media, dimana media yang paling bagus dan banyak tentang informasi adalah computer dan internet, andaikan kita punya computer tetapi kita tidak mempunyai suatu jaringan akses internet maka infomasi juga tidak mudah di dapatkan, oleh sebab itu saya menyarankan agar aanda mengunakan computer dan jaringan akses internet,
dan saat ini telah di mulaiteknologi nyang sangat cnagih dalam dunia computer contohnya pada saat ini masi banyak computer di kerjakan dengan tangan maksud disini kita sebagai user masih mengunakan 10 jari namun di dalam artikel yang pernah saya baca
yaitu
"Lidah tidak hanya untuk mengontrol rasa makanan dan berbicara, ataupun hanya membantu mengunyah dan memerangi kuman, namun juga dapat menambah kemampuannya sebagai otot mulut dan membuatnya menjad pad kontrol computer. Peneliti dari Georgia Tech percaya dengan apa yang disebut magnetic, sistem power lidah yang dapat mentransformasikan sebuah mulut seseorang ke dalam computer virtual, gigi ke keyboard dan lidah ke kunci yang dapat memanipulasi semuanya.
“Anda dapat memiliki kontrol penuh atas lingkungan Anda hanya dengan menggerakkan lidah Anda.”, kata Maysam Ghovanloo, assistant professor Georgia Tech yang memimpin penelitian ini. Grup yang dinamakan Tongue Drive System dapat membuat lidah sebagai joystick, yang dapat mengatur computer. Sistem lidah tersebut bukan hal pertama yang mengontrol elektronik dengan pergerakan wajah.
Sebuah teknik "sip and puff" berupa command yang dapat membuat user menarik napas dan mengeluarkannya ke dalam tube. Sistem kontro berbentuk pad yang digunakan untuk mengukur leher dan pergerakan kepala juga telah diluncurkan, namun menggunakan hardware tersebut dapat melelahkan, terutama pada barang yang lebih kecil, seperti computer.
Lidah akan fleksibel, sensitive, dan cepat lelah. Seperti otot lainnya, yang bila mendapat kecelakaan, maka akan berakibat pada sepanjang hidup tubuhnya, terutama karena lidah terhubung ke otak. Studi lainnya mengenai lidah, bahwa sebuah kamera yang dapat mengaktifkan elektroda lidah dalam bentuk sebuah object, untuk membantu orang buta merasakan gambar. newAbilities Systems Inc., sebuah perusahaan baru di Palo Alto, California, telah siap untuk mendesain sembila tombol keypad yang ditempatkan di atas mulut untuk mengontrol alat elektronik.
Pergerakan magnet akan terlacak oleh sensor dari setiap sisi pipi, yang kemudian mengirimkan data ke receiver di kepala. Proses tersebut kemudian dilanjutkan oleh software yang akan men-convert pergerakan ke command untuk alat elektronik. Setelah sistem on, user dapat membangun enam command, yakni kiri, kanan, forward, backward, single-click dan double-click. Ghovanloo mengatakan bahwa display sangatlah impresif, sehngga gigi dapat menempel di keyboard dan pipi ke computer console. Ghovanloo menambahkan, user dapat mengontrol kursi, TV, computer, dan seluruh hidup user dengan satu sistem. (h_n)"
semoga dapat bemanfaat...
trimakasih atas di bacanya
Selengkapnya...
Tuesday, December 23, 2008
komputer artikel
Friday, November 28, 2008
http://en.wikipedia.org/wiki/Image:Asus_Eee_proportions.png
Netbook PCs bersifat komputer portabel kecil di a "clamshell" desain, yang dirancang terutama untuk komunikasi nirkabel dan akses kepada Internet. Mereka secara umum banyak tongkang/geretan dan lebih murah dibanding subnotebooks, dan mempunyai suatu tampilan yang lebih kecil, antara 7" dan 9", dengan suatu resolusi layar antara 800x600 dan 1024x768. Sistem Operasi dan aplikasi-aplikasi di mereka biasanya secara khusus dimodifikasi sehingga mereka dapat dengan nyaman digunakan di suatu layar sized yang lebih kecil, dan OS itu sering didasarkan pada Linux, walaupun beberapa Netbooks juga menggunakan Windows XP. Beberapa Netbooks menggunakan yang dibuat mereka di dalam laju tinggi Wireless keterhubungan ke(pada offload sebagian dari software aplikasi mereka ke(pada server-server Internet, melalui prinsip dari komputasi Cloud, seperti(ketika kebanyakan Netbooks mempunyai sistem penyimpanan status(negara padat kecil sebagai ganti hard-disk-hard-disk. Kapasitas penyimpanan biasanya di dalam 4 sampai 16 cakupan GB. Salah satu [dari] contoh-contoh yang pertama dari sistim yang demikian adalah EEE PC yang asli.
Selengkapnya...
Thursday, October 30, 2008
Hardware
- Main article: Computer hardware
A typical hardware setup of a desktop computer consists of:
- computer case with power supply
- central processing unit (processor)
- motherboard
- memory card
- hard disk
- video card
- visual display unit (monitor)
- optical disc (usually DVD-ROM or DVD Writer)
- keyboard and pointing device
These components can usually be put together with little knowledge to build a computer. The motherboard is a main part of a computer that connects all devices together. The memory card(s), graphics card and processor are mounted directly onto the motherboard (the processor in a socket and the memory and graphics cards in expansion slots). The mass storage is connected to it with cables and can be installed in the computer case or in a separate case. This is the same for the keyboard and mouse, except that they are external and connect to the I/O panel on the back of the computer. The monitor is also connected to the I/O panel, either through an onboard port on the motherboard, or a port on the graphics card.
Several functions (implemented by chipsets) can be integrated into the motherboard, typically USB and network, but also graphics and sound. Even if these are present, a separate card can be added if what is available isn't sufficient. The graphics and sound card can have a break out box to keep the analog parts away from the electromagnetic radiation inside the computer case. For really large amounts of data, a tape drive can be used or (extra) hard disks can be put together in an external case.
The hardware capabilities of personal computers can sometimes be extended by the addition of expansion cards connected via an expansion bus. Some standard peripheral buses often used for adding expansion cards in personal computers as of 2005 are PCI, AGP (a high-speed PCI bus dedicated to graphics adapters), and PCI Express. Most personal computers as of 2005 have multiple physical PCI expansion slots. Many also include an AGP bus and expansion slot or a PCI Express bus and one or more expansion slots, but few PCs contain both buses.
[edit] Computer case
- Main article: Computer case
A computer case is the enclosure that contains the main components of a computer. Cases are usually constructed from steel, aluminium, or plastic, although other materials such as wood, plexiglas or fans[10] have also been used in case designs. Cases can come in many different sizes, or form factors. The size and shape of a computer case is usually determined by the form factor of the motherboard that it is designed to accommodate, since this is the largest and most central component of most computers. Consequently, personal computer form factors typically specify only the internal dimensions and layout of the case. Form factors for rack-mounted and blade servers may include precise external dimensions as well, since these cases must themselves fit in specific enclosures.
Currently, the most popular form factor for desktop computers is ATX, although microATX and small form factors have become very popular for a variety of uses. Companies like Shuttle Inc. and AOpen have popularized small cases, for which FlexATX is the most common motherboard size.
Selengkapnya...Netbook
- Main article: Netbook
Netbook PCs are small portable computers in a "clamshell" design, that are designed specifically for wireless communication and access to the Internet. They are generally much lighter and cheaper than subnotebooks, and have a smaller display, between 7" and 9", with a screen resolution between 800x600 and 1024x768. The operating systems and applications on them are usually specially modified so they can be comfortably used with a smaller sized screen, and the OS is often based on Linux, although some Netbooks also use Windows XP. Some Netbooks make use of their built in high speed Wireless connectivity to offload some of their applications software to Internet servers, through the principle of Cloud computing, as most Netbooks have small solid state storage systems instead of hard-disks. Storage capacities are usually in the 4 to 16 GB range. One of the first examples of such a system was the original EEE PC.
Selengkapnya...Laptop
- Main article: Laptop
A laptop computer or simply laptop, also called a notebook computer or sometimes a notebook, is a small personal computer designed for mobility. Usually all of the interface hardware needed to operate the laptop, such as parallel and serial ports, graphics card, sound channel, etc., are built in to a single unit. Most laptops contain batteries to facilitate operation without a readily available electrical outlet. In the interest of saving power, weight and space, they usually share RAM with the video channel, slowing their performance compared to an equivalent desktop machine.
One main drawback of the laptop is that, due to the size and configuration of components, relatively little can be done to upgrade the overall computer from its original design. Some devices can be attached externally through ports (including via USB), however internal upgrades are not recommended or in some cases impossible, making the desktop PC more modular.
A subtype of notebooks, called subnotebooks, are computers with most of the features of a standard laptop computer but smaller. They are larger than hand-held computers, and usually run full versions of desktop/laptop operating systems. Ultra-Mobile PCs (UMPC) are usually considered subnotebooks, or more specifically, subnotebook Tablet PCs (see below). Netbooks are sometimes considered in this category, though they are sometimes separated in a category of their own (see below).
Desktop replacements, meanwhile, are large laptops meant to replace a desktop computer while keeping the mobility of a laptop.
Selengkapnya...Wednesday, October 29, 2008
Things We Hate About Apple
It's high time we unloaded on the high-and-mighty Mac maker.
Narasu Rebbapragada and Alan Stafford, PC World
The company formerly known as Apple Computer and now called simply Apple, Inc. is unique in many ways--including in its ability to drive even folks who admire it positively batty. It makes great products (usually), yet its secretiveness about them borders on paranoia, and its adoring fans can be incredibly irritating. Of course, its fans have to put up with some irritations, too: Simply being a member of the club still means you must endure unending jabs from the other side of the socio-political-techno aisle. But do they have to wear their suffering as a badge of honor?
Today, we--that's us, Narasu and Alan, veteran Mac users both--are going to get some stuff off our chests. We've enumerated ten things we hate about Apple (or its followers, or simply about the experience of using its products). But in the interest of fair play (not to be confused with FairPlay, Apple's DRM technology) we're also publishing another list--Ten Things We Love About Apple.
Use the Comment link at the end of this article to add your own gripes about Apple--or to defend it.
And so, with protective helmets in place, off we go:
1: Free Speech, Anyone?
Even if you're no Apple fan, this particular issue might not rise to the top of your own personal gripe list--but hey, we're journalists. So sue us.
Er, that's probably not the right turn of phrase to use, considering that in December 2004, Apple filed a lawsuit against the AppleInsider, O'Grady's PowerPage, and Think Secret Web sites for posting information about upcoming technologies that Apple had shared with outsiders under nondisclosure agreements. In the case of O'Grady, the news was of a FireWire interface for GarageBand. In the words of O'Grady himself: "yawn."
Apple pressured the sites to reveal their sources, and even worse, pressured the sites' ISPs. In May 2006, a California court said no way, ruling that online journalists enjoy the same First Amendment rights as "legitimate" offline journalists. Seems silly in today's world, doesn't it? Recently, the court ordered Apple to pay the sites' legal fees--about $700,000.
2. More Secretive Than Homeland Security
Those feds are secretive, but they're no match for Apple reps' infuriating stock answer: "We don't comment on future product plans." Being an Apple adherent means never knowing for sure if the shiny new MacBook or iPod you just bought is about to be rendered obsolete by a Steve Jobs keynote.
Of course, Apple is merely the most famous secretive Silicon Valley company, not the only hush-mouthed one. And tight lips make for explosive buzz when the company does decide to drop a bombshell. But contrast Apple's secrecy with Microsoft's lack thereof--Bill Gates, Steve Ballmer, and company love to talk about their company's upcoming products, and they still get their fair share of buzz. Even though many of those plans have a tendency to not actually come true.
3. Ain't Too Proud to Blame
When Apple shipped iPods containing a worm last year, instead of issuing a humble mea culpa, Apple took a swipe at Microsoft, saying, "As you might imagine, we are upset at Windows for not being more hardy against such viruses, and even more upset with ourselves for not catching it." As you can imagine, that didn't fly with security experts. How about an apology to the folks who were unlucky enough to buy the infected iPods, period?
4. iHate iAnythingApple first floated the idea of product names with a leading lowercase letter in 1994 with eWorld, an ill-conceived online service that went belly-up after a year and a half. But when it introduced the original iMac in 1998, it hit on a phenomenal success--and prompted hundreds of third-party manufacturers to follow with sickeningly cute Bondi Blue products with names that also began with a lowercase "i." Now dozens of Apple and third-party product names begins with "i." Their manufacturers are all jumping on the bandwagon, hoping that a single letter will sway us to buy their stuff. Meanwhile, you can't even start sentences with the products' names.
Is it any wonder that we're inclined to like Apple TV in part because it turned out not to be iTV? Or that we're kind of sorry that Apple was able to strike a deal with Cisco to share the name iPhone?
Engineered bacteria become the first living computers
cientists have built the first living computer and tasked it with solving an important problem: flipping pancakes.
In this experiment, the engineered bacteria computed the equivalent of two stacked pancakes as a proof of concept, but Haynes says the researchers are now scaling it up to work for more pancakes. The researchers are also designing the bacteria to light up with a green fluorescent protein upon solving the puzzle, and the team is adapting the technique to work for other, related math problems.
How to avoid getting your information stolen via wireless connections
Yesterday, I wrote about how the FBI is warning us that personal details can be stolen (i-jacked) when using public computers. This occurs using crimeware, previously installed on a public computer, logs the keys you are stroking and sends the information (electronically) to criminals.
It can be dangerous to look at any of your online financial information on these (public access) machines.
When writing about this phenomenon, I remembered that even using your personal computer at a public place with a wireless connection can expose a person's personal and sometimes, financial details.
Just the other day, Martin Bosworth, over at Consumer Affairs, wrote an excellent piece covering this danger, where he stated:
Sending unencrypted information over any unfamiliar network can turn your computer into an open book -- with pages full of your personal information.
Many of these connections are appear to be legitimate connections because they are spoofed (camouflaged to appear as if they are a trusted connection).
Spoofing a connection, or site isn't very hard to do. They simply copy and transpose pictures and statements (words) from legitimate sites to their own. The Artists Against website has a portal, where you can see fake websites that are up and running on the Internet, here.
Martin's article contains some excellent tips on how to navigate the murky waters of public hot spots, safely.
They can be viewed, here.
Interestingly enough, wireless technology, isn't only used to compromise individuals. In the recent TJX data breach, where some are saying 200 million records were stolen since 2003, reports are saying the data was stolen, using wireless technology.
It's being reported that this was accomplished from a car with a laptop. Driving around with a laptop, using other people's wireless connections, is sometimes referred to as "war-driving," which is my new word for the day.
Joseph Pereira (Wall Street Journal) wrote about this (courtesy of the Northwest Florida Daily News), here.
Selengkapnya...
Pencarian (search)
Intel® Centrino® 2 Processor Technology
jumlah pengunjung
Powered by web statistics software program. |