PairsAdvertisement PasangIklanoketrik PasangIklanoketrik PasangIklanoketrik PasangIklanoketrik PasangIklanoketrik

Monday, 14 February 2011

System Marketplace online

(e - Commerce)

The development of the Internet led to the formation of a new world that is commonly known as cyberspace. In this virtual world every individual has the right and ability to interact with other individuals without any restriction that could prevent him. So globalization has actually perfect running in a virtual world that connects all the digital community.

From all aspects of human life affected by the presence of the Internet, the business sector is the sector most affected by the development of information technology and telecommunications as well as the fastest growing. Through e-commerce, for the first time all humans on earth have an opportunity and equal opportunity to compete and succeed in business in cyberspace.

Definition of E-Commerce
E-commerce is a type of mechanism in electronic business that focuses on individual-based business transactions using the Internet (technology-based digital network) as a medium of exchange of goods or services between two institutions (business to business) and direct consumers (Business to consumer), through time and space constraints which have been the things that are dominant. It can also mean a way of shopping or a trade online or direct selling that utilize Internet facilities where there are websites that can provide the service "get and deliver". Ecommerce will change all marketing activities and also at the same cut operational biaya2 to trading activities (trading)
During the fierce competition in the era of globalization, then the real competition lies in how a company can utilize e-commerce to improve the performance and existence in the core business.
With e-commerce application, should the relationship between the company and other external entities (suppliers, distributors, suppliers, consumers) can be done faster, more intensive, and cheaper than conventional application of management principles (door to door, one-to- one relationship). So e-commerce is not just a mechanism for selling goods or services through the medium of the Internet, but also against the occurrence of a business transformation that changed the way companies conduct their business activities. Develop and implement an e-commerce system
is not an instant process, but a transformation strategy and business system continues to grow in line with corporate developments and technology. 


 A.1 The process contained in the E-Commerce are as follows: 



1. Presentation Electronis (Making Website) for products and services.


 
2. Direct booking and availability bill. 


3. Ririskiky automated customer account can be safely (both account numbers and credit card numbers). 


4. Payment is made directly (online) and transaction handling. 


A.2 The benefits obtained by using the transaction through the E-Commerce for a company are as
follows: 
 
1. Increase revenue by using online channel they cost less. 


2. Reduce costs associated with paper, such as letter postage, printing, reports, and so forth. 


3. Reduce delays by using tansfer electronic / on-time payments and can be directly checked. 


4. Speeding up service to customers, and more responsive service.


Examples of E-Commerce
A lot can be done through E-Commerce namely:
1. Purchase the book through online.
2. Electronic purchase via online.
3. Purchase of vehicles through online.
4. Purchase through an online clothing, etc.


Positive and Negative Impact of E-commerce 

In the world of E-Commerce would have a positive impact and negative consequences. 



Its positive impact, namely: 

 1. Revenue Stream (revenue stream) that may be new more promises that can not be met in a traditional transaction system. 

2. Can increase market exposure (market share).


3. Lower operating costs (operating cost).

4. Widen the range of (global reach). 

5. Increase customer loyality. 


6. Improve supplier management. 


7. Shorten production time. 


8. Increasing the value chain (the chain of revenue). 


Its negative impacts, namely: 

 
1. Loss of financial terms is directly due to fraud. A fraudster transfer money from one account to another account or he has to replace all the existing financial data.
2. Theft of confidential information that is valuable. Disorders that arise may disclose all such confidential information to parties who are not eligible and can result in big losses for the victim.
3. Loss of business opportunities due to disruption of service. This error
is non-technical errors such as electricity suddenly goes out.
4. The use of access to resources by unauthorized parties. Suppose a hacker who managed to break into a banking system. After that he moved a number of someone else's account into his own account.
5. Loss of trust from consumers. This is due to various factors such as work done on purpose by others who try to slander the reputation of the company.
6. Unexpected losses. Disturbance caused by deliberate, dishonesty, improper
business practices, human factor errors, human error or an error factor of the electronic system.

Most abuse comes from people in a dishonest course not from a sniffer on the loose on the Internet. The firewall itself is often used to enhance security, a firewall can be used as control of access to the system directly (firewall should digunakankan to control all access to the system, rather than simply to restrict access from outside into), another reason why a firewall is more difficult to access originating from outside than from within.

E-commerce is a process of supply,sale of of goods,ordering goods ,and purchase goods online. With the Internet, all can become more affordable and more practical. But in practice, there are concerns or risks that might occur, such as abuse of the trust account to saller buyer. Saller can use account no buyers for other things.

In addition, also at risk if it turns out Saller is only an empty site is not responsible, but this has got security handling of the LSS.

It should be noted also in Saller data security that can be uprooted by competitors or hackers to obtain sensitive data. It inibisadiantisispasidengan mounting internal and external firewalls.



Wednesday, 29 December 2010

ANDROID FOR SMART FUTURE

Android is the operating system for mobile phones based on Linux. Android provides an open platform to developers for creating their own applications for use by a variety of mobile devices. Initially, Google Inc.. bought Android Inc.., newcomers who make software for mobile phones. Then to develop Android, formed the Open Handset Alliance, a consortium of 34 companies for hardware, software, and telecommunications, including Google, HTC, Intel, Motorola, Qualcomm, T-Mobile, and Nvidia. There are several versions of android that has been issued by the company Google, namely:
 
1. Android version 1.1
This version was released on March 9, 2009, which came with an update on the aesthetics of the application, alarm clock, voice search (search sound), sending messages to Gmail, and email notification.

2. Android version 1.5 (Cupcake)
Cupcake or in free translation means the cup cake is the alias name of the Android operating system version 1.5. There are some updates and also the addition of several features in this version is the ability to record and watch video on the camera mode, upload videos to YouTube and pictures directly to Picasa, support Bluetooth A2DP, animated display, and keyboard on the screen.

3. Android version 1.6 (Donut)
Donut is also known as holey cake is used as an alias name from Android version 1.6. This version is released in September 2009 with the ability of the search process better than before, the use of battery indicator and control applet VPN. And there is an additional gallery feature that allows users to choose photos to be deleted. This version has been able to be integrated with CDMA / EVDO, 802.1x, VPN, Gestures, and Text-to-speech engine.
 
4. Android version 2.0/2.1 (Eclair)
On December 3, 2009 re Android operating system released a new version is the version 2.0/2.1 alias named Eclair. Eclair is a long-shaped eclairs with chocolate toping on it.
Changes in this version that is the optimization of hardware, improved Google Maps 3.1.2, change the UI with a new browser and support for HTML5, a new list of contacts, support for 3.2 MP camera flash, digital zoom, and Bluetooth 2.1.

5. Android version 2.2 (Froyo)
Froyo (Frozen yogurt) is a yogurt (milk made through bacterial fermentation) are frozen like ice cream. Froyo used as an alias name of the Android operating system version 2.2
This version is slid in May 2010 with an increase in performance and memory, integration with Chrome, USB tethering, WIFI Hotspot, Quick switching, voice dialing, and support for Adobe Flash 10.1.

6. Android version 2.3 (Gingerbread)
Gingerbread is a cake made from ginger, usually in the form of dolls are often presented sebangai friend for coffee.
Gingerbread is used as an alias name of the Android operating system version 2.3. Currently version 2.3 of Android is the latest version of the Android operating system. There are some promising improvements in this Gingerbread Android among other things:
  • NFC Application Support, Application gadget that allows manufacturers to create devices that can be used for wireless transactions (electronic wallet)
  • Support the front of the camera.
  • Mobile Internet or phone capability via the Internet, or Voice over IP without any additional applications which means users can make VoIP calls directly from the handset without the need to add additional applications.
  • Display a more tidy, Display interface android version 2.3 is more neat and easy to learn. Menus and corrected visual theme for easy navigation.
  • Management Applications, available shortcut to an application called Manage Applications. Here users can see how much memory is absorbed by each running applications.
  • Input text faster, the keyboard of Gingerbread Android promises to be better, with some changes in location and bentuk.Copy Paste, the ability to choose (select) and then do the Copy, Cut or Paste getting better and better.


Thursday, 23 December 2010

Solar Plant for a better life

Solar Plant is "Plants" that can change sunlight into electricity. Actually this device is the development of the existing solar technology into a more portable format. Limited charging shaped vase is capable of converting sunlight into electrical energy with the concept of photosynthesis. By combining the principles of nature and technology, maybe in the future we will change the world a better place than today.


Photosynthesis is done by using solar panels mounted on top as the energy collector and converted into electrical energy consumed ganget enough for you, quite simple and very friendly environment. Imagine if millions of people who use gadgets to switch to this technology, not how much renewable energy can be saved.

Tuesday, 21 December 2010

   The risk of using WIFI connection    

The most effective method to prevent interception of data via Wi-Fi is to use a VPN. However, VPN is too complicated because at present there is no solution to the VPN plug-and-play. For modern society, technology, Wi-Fi (Wireless-Fidelity) is a part of everyday life. In the big cities in Indonesia, Wi-Fi not only penetrated the office. But also shopping centers, restaurants, coffee shops, hotels, campuses, and even housing-housing. The main function is Wi-Fi wireless internet access.

In public places, there is Wi-Fi that are served free of charge and some are paid. In public places also, for example in shopping centers, plenty of options usually available access point. Access points were visible when the notebook users have to select the SSID (Service Set Identifier), the alias name you want to use the wireless network. When a notebook is connected with a particular SSID, the notebook that was already entered into a Wi-Fi network.
Malware Analyst, Kaspersky Lab warns Christian Funk, notebook users should be vigilant when accessing Wi-Fi in public places. Because, Funk asserted, access the Internet through Wi-Fi network extremely vulnerable to attack in the form of data piracy. To trap the victim, criminals generally create a wireless access point (hotspot) for free or copy the login page of the Wi-Fi service provider trusted. Furthermore, criminals are just waiting for the victim lured into dangerous networks.
"To perform this attack, the perpetrator does not need to have technical knowledge of high-end computing. Actors only need to create a fake access point in order to trap the victim. Once the victim is trapped, then the players can tap into typed data that the victim in the web pages opened via Wi-Fi , "said Funk.
Funk explained that the main target of this attack is to steal credit card information on the victim when the victim make transactions online using the Wi-Fi. However, criminals also steal information such as e-mail accounts as well as their passwords, as well as the accounts used by victims to access Internet sites, such as social networking sites.
Funk warned, data theft has serious consequences. For example, if criminals could steal credit card information of victims, the criminals could take advantage of the victims credit card for shopping. Spending bill that also fell into the victim. Though the victim have never committed expenditure.
Another example, if criminals are able to steal account and password of your e-mail the victim, the criminals can take advantage of e-mails offering to spread spam (unsolicited e-mail address.) These crimes can be done if the criminals could steal another account, such as accounts of social networking sites.
Funk emphasized that the most effective method to prevent piracy of data via Wi-Fi network is to use a VPN (Virtual Private Network). With VPN, the data from the notebook users are sent to the server through a virtual tunnel, and vice versa. As a result, the data can not intercepted. However, Funk admits, VPN technology is too complicated for most notebook users.

"Encryption of wireless data traffic is too complicated for users. At this time there has been no VPN solution that is plug-and-play (can be used without the need setting)," said Funk.

Without VPN, Wi-Fi users should not conduct financial transactions or access the internet banking. Also, users should be diligent, industrious change the password of the accounts owned. If you must conduct internet banking transactions in a mobile, Funk suggested, notebook users should use the 3G internet network.

"3G Internet becomes an attractive alternative because of the Wi-Fi and 3G data traffic is more difficult to plow. Also, 3G Internet network has wider coverage than Wi-Fi. speed 3G internet is also more than enough for most purposes mobile computing," said Funk .

RSS Subscribe