Programming

Explain about J2ME, PHP, HTML, CSS, Delphi, C++, C#, Pascal, etc.

eBook

Free Download Ebook

Software

Gratis Download Software Premium

Artikel

Berbagi ilmu dan informasi seputar dunia komputer

Fans Page

Bergabunglah di halaman facebook kami

Rabu, 27 Juni 2012

Free E-Book : Panduan Membuat Blog WordPress

Bagi rekan yang sedang belajar,  referensi buku adalah salah satu sumber inspirasi dalam belajar.. Kali ini saya berbagi sebuah referensi yang baik untuk anda pelajari. Bagi rekan-rekan yang suka dengan ngeblog, kini hadir E-Book yang mencoba memperkenalkan dan menuntun rekan untuk mahir dalam dunia blog terutama WordPress...

sedikit berteori ...Blog berasal dari kata “Web Log” atau “Logs” yang sebenarnya berarti catatan  singkat yang dipublikasikan dalam bentuk konten di dalam suatu situs web dan kemudian hari di singkat jadi “Blog”. Ide ngeblog sendiri bukan sesuatu yg baru. Kenyataannya, blog sudah ada sejak
awal berdirinya internet.

Nah,... Banyak sekali manfaat dari kita melakukan blogging...
Deskripsi Ebook :

galih library

Judul : Berkenalan Dengan Wordpress
Penulis : Rezki S
Jumlah Halaman : 39
Size : 2 Mb

Sekian .....
-----  Keep Sharing -----

Barcode Freeware Component untuk C++ Builder dan Borland Delphi

Rekan-rekan pasti sudah tahu apa itu barcode....
Disini saya akan mengulas sedikit tentang barcode :


Barcode pada dasarnya adalah susunan garis vertikal hitam dan putih dengan ketebalan yang berbeda, sangat sederhana tetapi sangat berguna, dengan kegunaan untuk menyimpan data-data spesifik misalnya kode produksi, tanggal kadaluwarsa, nomor identitas dengan mudah dan murah, walaupun teknologi semacam itu terus berkembang dengan ditemukannya media magnetic, rfid, electronics tags, serial eeprom (seperti pada smart card), barcode terus bertahan dan masih memiliki kelebihan-kelebihan tertentu yaitu ,yang paling utama, murah dan mudah, sebab media yang digunakan adalah kertas dan tinta, sedangkan untuk membaca barcode ada begitu banyak pilihan di pasaran dengan harga yang relatif murah mulai dari yang berbentuk pena(wand), slot, scanner, sampai ke CCD dan bahkan kita dapat membuatnya sendiri. Jenis barcode sangatlah banyak mulai dari yang tradisional yaitu 1 dimensi sampai dengan barcode yang multi dimensi.

Nah pada kesempatan kali ini saya mencoba untuk berbagi sebuah Component untuk Borland C++ Builder 5, Borland C++ Builder 6, Borland Delphi 4, Borland Delphi 5, Borland Delphi 6, Borland Delphi 7 dan Borland Delphi 8. Yaitu Barcode freeware component.

galih library

galih library

Tertarik untuk mencoba Silahkan download dengan link di bawah ini :

sekian dan terima kasih.... selamat mencoba

Free E-Book Belajar Fotografi Pemula dari Adorama (LEGAL)

APA ITU FOTOGRAFI ????

Ya... fotografi terdiri dari 2 kata yaitu Photos artinya "cahaya", dan Graphos artinya "menulis". Nah secara singkatnya fotografi dapat diartikan sebagai teknik "menulis/melukis dengan cahaya". Kenapa demikian??? menurut ilmu fisika setiap benda memantulkan cahaya, setiap cahaya tersebut dapat difokuskan melalui lensa dan membakar medium penangkap cahaya (film) atau direkam melalui sensor digital.

Bagi rekan-rekan yang ingin belajar teknik fotografi bagi pemula. Berikut ini adalah 3 referensi yang patut dicoba oleh anda.

galih library
 Tuh kan.... terdapat 3 Ebook yang tersedia. Masing-masing membahas 3 permasalahan yang berbeda. berikut ini isi secara keseluruhan dari ketiga ebook tersebut :

1. What are Continuous Light Sources?
2. What are Monolights?
3. Portraits Without a Studio
4. What Color Is Your Seamless Background?
5. TEACHING CHILDREN TO TAKE PICTURES
6. WHAT TO LOOK FOR IN A COMPACT DIGITAL CAMERA


dan masih banyak lagi... So bagi rekan yang ingin mendapatkan ebook ini secara gratiss dan legal tentunya silahkan klik link ini :


Selasa, 26 Juni 2012

Ribbon Hero 2 : Game Belajar Microsoft Office

Tahukah rekan-rekan sekalian sebenarnya kita tak perlu repot-repot belajar dengan serius tentang Microsoft Office yang terdiri dari Microsoft Office Word, Microsoft Office Excel, Microsoft Office Power Point, Microsoft Office Access dan lain-lain.

Ternyata Microsoft telah membuat sebuah permainan yang diperuntukkan kepada rekan-rekan yang ingin belajar Microsoft Office. Game ini sangatlah menarik dan user friendly serta GRATISSSS. Berikut ini contoh tampilan game tersebut :
Game


Game
Seperti pada tampilan di atas bahwa game tersebut langsung terhubung dengan microsoft Office yang ada pada Sistem komputer kita. Game Ribbon Hero 2 tersebut hanya support pada Microsoft Office 2007 atau 2010.. Tetapi game ini dapat berjalan di Windows XP, Vista, dan 7.

Penasaran mau coba.....
silahkan download :          Ribbon Hero 2 : Clippy's Second Chance

E-Book : AutoCAD 2010 Essentials

Bagi rekan-rekan yang bergelut dalam dunia IT pasti sudah tidak asing lagi dengan software CAD satu ini yaitu AutoCAD. Perlu rekan ketahui AutoCAD adalah sebuah perangkat lunak komputer CAD untuk menggambar objek 2 dimensi atau 3 dimensi. Nah.. pada umumnya di dunia saat ini AutoCAD adalah software CAD yang paling banyak digunakan oleh para user.

Nah.. ada berita lain bahwa AutoCAD ini hanya berjalan dan dikeluarkan untuk operating system Windows saja. AutoDesk sebenarnya pernah mengeluarkan versi untuk UNIX dan MACHINTOS pada tahun 1980-an dan 1990-an, namun seiring dengan perkembangan tidak dilanjutkan. Tapi tenang saja AutoCAD masih bisa berjalan di emulator seperti virtual PC dan WINE.

Bagi rekan yang ingin belajar AutoCAD ini, saya akan berbagi sebuah E-Book yang sangat bagus untuk dijadikan referensi belajar rekan semua.

Judul : AutoCAD 2010 Essentials
Penulis : Munir M. Hamad
Jumlah Halaman : 369
Size : 10 Mb.

Selamat belajar....

-----   Keep Sharing ------

Ebook : Android Essentials - Membuat Aplikasi Android

Sudah tidak asing lagi bagi kita tentang Android. Android identik dengan Smart phone, Tablet dan lain-lain. Ya.... Android adalah salah satu sistem operasi yang berbasis LINUX untuk smart phone atau komputer tablet. Android menyediakan platform terbuka bagi para pengembang untuk menciptakan aplikasi mereka sendiri untuk digunakan oleh bermacam peranti bergerak. Kabarnya Android ini bersifat open source sampai tahun 2015...

Sampai saat ini sudah beberapa kali android muncul dengan beberapa versinya seperti :
1. Android Versi 1.1
2. Android Versi 1.5 ( Cupcake)
3. Android Versi 1.6 (Donut)
4. Android Versi 2.1/2.0 (Eclair)
5. Android Versi 2.2 (Froyo)
6. Android Versi 2.3 (GingerBread)
7. Android Versi 3.0/3.1 (Honeycomb)
8. Android Versi 4.0 (ICS : Ice Cream Sandwich )
9. Android Versi 5.0 (Jelly Bean).


Nah... berikut ini adalah salah satu referensi kita untuk belajar Bagaimana Membuat Aplikasi Android.


Ebook kali ini menjelaskan tentang seluk beluk  sistem operasi android ini, serta dilengkapi dengan bagaimana cara membuat sebuah aplikasi android.

 Judul : Android Essentials
Penulis : Chris Haseman
Jumlah Halaman : 116

Jika anda tertarik dengan  Ebook ini silahkan download (download).

E-Book : SEO Made Easy

SEO (Search Engine Optimization) atau biasa orang indonesia kenal optimisasi mesin pencari yang hanya bisa serangkaian prosesnya dilakukan secara sistematis atau terus menerus, ditujukan untuk meningkatkan kapasitas volume dan kualitas lalulintas yang bagus atau trafik dari mesin pencari menuju alamat situs web yang diinginkan, dengan memanfaatkan segalala mekanisme kerja alami algoritma si mesin pencari tersebut. Tujuan inti SEO ialah memposisikan suatu alamat situs web pada posisi teratas di mesin pencari (atau kuranglebih pada halaman pertama) hasil pencarian berdasarkan subyek tertentu. Secara logis, alamat situs yang menempati posisi teratas hasil pencarian memiliki peluang lebih besar untuk mendapatkan pengunjung.

Banyak sekali cara untuk melakukan teknik-teknik SEO. Oleh karena itu kita harus mengenal teknik-teknik itu. Berikut ini adalah salah satu referensi yang bisa anda gunakan untuk lebih mengenal apa itu SEO ?.

 Judul :Search Engine Optimization.
Penulis : Brad Callen.
Jumlah Halaman : 90 

Jika anda ingin mendapatkan Ebook tersebut klik (download).

Selamat Belajar

-----  Keep Sharing ----

Senin, 11 Juni 2012

History Of Operating System : The Fourth Generation

The Fourth Generation (1980-Present) : Personal Computers.

With the development of LSI (Large Scale Integration) circiuts, chpis containing thousands of transistors on a square centimeter of silicon, the age of the personal computer dawned. In terms of architecture, personal computers were not that different from minicomputers of the PDP-11 class, but in terms of price they certainly were different. Where the minicomputer made it possible for a department in a company or university to have its own computer, the microprocessor chip made it posibble for a single individual to have his or her own personal computer. The most powerful computers used by businesses, universities, and goverment installations are usually called workstations, but they are really just large personal computers. Usually, they are connected together by a network.

The widespread availability of computing power, especially highly interactive computing power usually with excellent graphics, led to the growth of a major industry producing software for personal computer. Much of this software was userfriendly meaning that it was intended for users who not only knew nothing about computers but furthermore had absolutely no intention whatsoever of learning. This was certainly a major change from OS/360, whose job control language, JCL, was so arcane that entire books were written about it (e.g., Cadow, 1970).

Two operating systems initially dominated the personal computer and workstation scene : Microsoft's MS-DOS and UNIX. MS-DOS and UNIX. MS-DOS was widely used on the IBM PC and other machines using the Intel 8088 CPU and its successors, the 80286, 80386, and 80486 (which we will refer to henceforth as the 286, 386, and 486, respectively), and later the Pentium and Pentium Pro. Althoughthe initial version of MS-DOS was relatively primitive, subsequent versions have included more advanced features, including many taken from UNIX. Microsoft's successor to thana true operating system is WINDOWS NT, which is compatible with WINDOWS 95 at a certain level, but a complete rewrite from scratch internally.



The other major contender is UNIX, which is dominant on workstations and machines powered by high-performance RISC chips. These machines usually have the computing power of a minicomputer RISC chips. These machines usually have the computing power of minicomputer, even though they are dedicated to a single user, so it is logical that they are equippped with an operating system originally designed for minicomputers, namely UNIX.



An interesting development that began taking place during the mid-1980s is the growthof networks of personal computer running network operating systems and distributed operating systems (Tanenbaum, 1995). In a network operating system, the users are aware of the existance of multiple computers and can log on to remote machines and copy files from one machine to another. Each machines runs its own local operating system and has its own local user (or users).

Source : Book - "Operating Systems : Design and Implemetation"
By Andrew S. TanenBaum and Albert S.Woodhull

Minggu, 10 Juni 2012

The Role of SQL

SQL is not itself a database management system, nor is it a stand-alone product. You
cannot go into a computer store and "buy SQL." Instead, SQL is an integral part of a
database management system, a language and a tool for communicating with the DBMS.
Figure 1 shows some of the components of a typical DBMS, and how SQL acts as the
"glue" that links them together.

The Role SQL
Figure 1 . Components of a typical database management system

The database engine is the heart of the DBMS, responsible for actually structuring,
storing, and retrieving the data in the database. It accepts SQL requests from other
DBMS components, such as a forms facility, report writer, or interactive query facility,
from user-written application programs, and even from other computer systems. As the figure shows, SQL plays many different roles:

SQL is an interactive query language. Users type SQL commands into an interactive
SQL program to retrieve data and display it on the screen, providing a convenient,
easy-to-use tool for ad hoc database queries.

SQL is a database programming language. Programmers embed SQL commands into
their application programs to access the data in a database. Both user-written
programs and database utility programs (such as report writers and data entry tools)
use this technique for database access.

SQL is a database administration language. The database administrator responsible
for managing a minicomputer or mainframe database uses SQL to define the database
structure and control access to the stored data.

SQL is a client/server language. Personal computer programs use SQL to
communicate over a network with database servers that store shared data. This
client/server architecture has become very popular for enterprise-class applications.

SQL is an Internet data access language. Internet web servers that interact with
corporate data and Internet applications servers all use SQL as a standard language
for accessing corporate databases.

SQL is a distributed database language. Distributed database management systems
use SQL to help distribute data across many connected computer systems. The
DBMS software on each system uses SQL to communicate with the other systems,
sending requests for data access.

SQL is a database gateway language. In a computer network with a mix of different
DBMS products, SQL is often used in a gateway that allows one brand of DBMS to
communicate with another brand.


SQL has thus emerged as a useful, powerful tool for linking people, computer programs,
and computer systems to the data stored in a relational database.


Source :
Book "SQL: The Complete Reference"
by James R. Groff and Paul N. Weinberg

Sabtu, 09 Juni 2012

History Of Operating Systems : The Third Generation (1956-1980)


The Third Generation (1965-1980): ICs and Multiprogramming.

By the early 1960s, most computer manufactures had two distinct, and totally incompatible, product lines. On the one hand there were the word-oriented, large-scale scientific computers, such as the 7094, which were used for numerical calculations in science and engineering. On the other hand, there were the character-oriented, commercial computers, such as 1401, which were widely used for tape sorting and printing by banks and insurance companies.

Developing and maintaining two completely different product lines was an expensive proposition for the manufacturers. In addition, many new computer customers initially needed a small machine but later outgrew it and wanted a bigger machine that would run all their old programs, but faster.

IBM attempted to solve both of these problems at a single stroke by introducing the system/360. The 360 was a series of software-compatible machines ranging from 1401-sized to much more powerful than the 7094. The machines differed only in price and performance (maximum memory, processor speed, number of I/O devices permitted, and so forth). Since all the machines had the same architecture and instruction set, programs written for one machine could run both scientific and commercial computing. In subsequent years, IBM has come out with compatible successors to the 360 line, using more modern technology, known as the 370, 4300, 3080, and 3090 series.

 Figure 1. System/360 model 91 was taken by NASA

The 360 was the first major computer line to use (small-cable). Integrated Circiuts (ICs), thus providing a major price/performance advantage over the second-generation machines, which were built up from individual transistors. It was an immediate success, and the idea of a family of compatible computers was soon adopted by all the other major manufacturers. The descendants of theses machines are still in use at scattered computer centers today, but their use is declining rapidly.

The greatest strength of the "One family" idea was simultaneously its greatest weakness. The intention was that all software, including tha operating system, had to work on all models. It had to run on small systems, which often replaced 1401s for copyingcards to tape, and on very large systems, which often replaced 7094s for doing weather forecasting and other heavy computing. It had to be good on systems with few peripherals and in scientific environments. Above all, it had to be different for all of these uses.

There was no way that IBM (or anybodd else) could write a piece of software to meet all those conflicting requirements. The result was an enormous and extraordinaryly complex operating system, probably two to three orders of magnitude larger than FMS. It consisted of millions of lines of assembly language writen by thousands of programmers, and contained thousands upon thousands of bugs, which necessitated a continuous stream of new releases in an attempt to correct them. Each new release fixed some bugs and introduced new ones, so the numberof bugs probably remained constant in time.

One of the designers of OS/360, Fred Brooks, subsequently wrote a witty and incisive book (Brook, 1975) describing his experiences with OS/360. While it would be imposibble to summarize the book here, suffice it to say that the cover shows a herd of prehistoric beasts stcuk in a tar pit. The cover of Silberschatz and Galvin's book (1994) makes a similiar point.

Despite its enormous size and problems, OS/360 and the similar third-generation operating systems produced  by other computer manufacturers actually satisfied most of their customers reasonably well. They also popularized several key techniques absent in secong-generation operating systems. Probablythe most important of these was multiprogramming. On the 7094, when the current job paused to wait for a tape or other I/O operation to complete, the CPU simply sat idle until the I/O finished. With heavily CPU-ound scientific calculations, I/O is infrequent, so this wasted time is not significant. With commercial data processing, the I/O wait time can often be 80 or 90 percent of total time, so something had to be done to avoid having the CPU be idle so much.

The solution that evolved was to aprtition memory into several pieces, with a different job in each partition, as shown in Figure 2. While one job was waiting for I/O to complete, another job could be using the CPU. If enough jobs could be held in main memory at once, the CPU could ne kept requires special hardware to protect each job againts snooping and mischief by the other ones, but the 360 and other third-generation systems were equipped with this hardware.

HIstory of Operating System
Figure 2 A multiprogramming system with three jobs in memory.

Another major feature present in third-generation operating systems was the ability to read jobs from cards onto the disk as soon as they were brought to the computer room. Then, whenever a running job finished, the operating system could load a new job from the disk into the now-empty partition and run it. This technique is called spooling (from simultaneous Peripheral Operation On Line) and was also used for output. With spooling, the 1401s were no longer needed, and much carrying of tapes disappeared.

Although third-generation operating systems were well-suited for big scientific calculations and massive commercial data processing runs, they ere still basically batch systems. Many programmers pined for the first-generation  days when they had the machine all to themselves for a few hours, so they could debug their programs quickly. With third-generation systems, the time between submitting a job and getting back the output was often several hours, so a single misplaced comma could cause a compilation to fail, and the programmer to waste half a day.

This desire for response time paved the way for timesharing, a variant of multiprogramming, in which each user has an on-line terminal. In a timesharing system, if 20 users are logged in and 17 of them are thinkingor talking or drinking coffee, the CPU can be allocated in turn to the three jobs that want service. Since people debugging programs usually issue short commans (e.g., compile a five-page procedure) rather than long ones (e.g., sort a million-record file), the computer can provide fast, interactive service  to a number of users and perhaps also work on big batch job in the background when the CPU is otherwise idle. Although the first serious timesharing system (CTSS) was developed at M.I.T on a specially modified 7094 (Corbato et al., 1962), timesharing did not really become popular until the necessary protection hardware became widespread during the third generation.

Source : 
Book - "Operating Systems : Design and Implemetation"
By Andrew S. TanenBaum and Albert S.Woodhull

MEMORY MANAGEMENT



The needs of users can be met best by a computing environment that supports modular
programming and the flexible use of data. System managers need efficient and
orderly control of storage allocation.The OS, to satisfy these requirements, has five
principal storage management responsibilities:

Process isolation: The OS must prevent independent processes from interfering
with each other’s memory, both data and instructions.
Automatic allocation and management: Programs should be dynamically allocated
across the memory hierarchy as required. Allocation should be transparent
to the programmer. Thus, the programmer is relieved of concerns relating
to memory limitations, and the OS can achieve efficiency by assigning memory
to jobs only as needed.
Support of modular programming: Programmers should be able to define
program modules, and to create, destroy, and alter the size of modules
dynamically.
Protection and access control: Sharing of memory, at any level of the memory
hierarchy, creates the potential for one program to address the memory space
of another.This is desirable when sharing is needed by particular applications.
At other times, it threatens the integrity of programs and even of the OS itself.
The OS must allow portions of memory to be accessible in various ways by
various users.
Long-term storage: Many application programs require means for storing information
for extended periods of time, after the computer has been powered
down.

Typically, operating systems meet these requirements with virtual memory and
file system facilities.The file system implements a long-term store, with information
stored in named objects, called files. The file is a convenient concept for the programmer
and is a useful unit of access control and protection for the OS.

Virtual memory is a facility that allows programs to address memory from a
logical point of view, without regard to the amount of main memory physically
available.Virtual memory was conceived to meet the requirement of having multiple
user jobs reside in main memory concurrently, so that there would not be a hiatus
between the execution of successive processes while one process was written
out to secondary store and the successor process was read in. Because processes
vary in size, if the processor switches among a number of processes, it is difficult to
pack them compactly into main memory. Paging systems were introduced, which
allow processes to be comprised of a number of fixed-size blocks, called pages. A
program references a word by means of a virtual address consisting of a page number
and an offset within the page. Each page of a process may be located anywhere
in main memory. The paging system provides for a dynamic mapping between the
virtual address used in the program and a real address, or physical address, in main
memory.

With dynamic mapping hardware available, the next logical step was to eliminate
the requirement that all pages of a process reside in main memory simultaneously.
All the pages of a process are maintained on disk. When a process is
executing, some of its pages are in main memory. If reference is made to a page that
is not in main memory, the memory management hardware detects this and
arranges for the missing page to be loaded. Such a scheme is referred to as virtual
memory and is depicted in Figure 1.

The processor hardware, together with the OS, provides the user with a “virtual
processor” that has access to a virtual memory.This memory may be a linear address
space or a collection of segments, which are variable-length blocks of contiguous addresses.
In either case, programming language instructions can reference program
and data locations in the virtual memory area. Process isolation can be achieved by
giving each process a unique, nonoverlapping virtual memory. Memory sharing can
be achieved by overlapping portions of two virtual memory spaces. Files are maintained
in a long-term store. Files and portions of files may be copied into the virtual
memory for manipulation by programs.

Operating Systems
 Figure 1. Virtual Memory Concepts

Figure 2 highlights the addressing concerns in a virtual memory scheme.
Storage consists of directly addressable (by machine instructions) main memory
and lower-speed auxiliary memory that is accessed indirectly by loading blocks into
main memory. Address translation hardware (memory management unit) is interposed
between the processor and memory. Programs reference locations using virtual
addresses, which are mapped into real main memory addresses. If a reference is
made to a virtual address not in real memory, then a portion of the contents of real
memory is swapped out to auxiliary memory and the desired block of data is
swapped in. During this activity, the process that generated the address reference
must be suspended.The OS designer needs to develop an address translation mechanism
that generates little overhead and a storage allocation policy that minimizes
the traffic between memory levels.

Figure 2. Virtual Memory Addressing

Source :
"Fifth Edition Operating Systems : internal and design principles".
By William Stallings





















Jumat, 08 Juni 2012

What Are FAT, FAT32, and NTFS ?

www.galih-afm.com


FAT (or FAT16) dates back to DOS 3.0, and FAT32 was introduced with the OSR2 update to Windows 95. NTFS (NT file system) is a more mature version of FAT32 that was originally designed for use with Windows NT and Windows 2000 for server applications. Each partition on a hard disk and each removable disk must be formatted with FAT, FAT32, or NTFS, but it's possible (and often desirable) to have some disks with one format and some with the other format on the same system.

Here are some facts about each of the file systems:

FAT Partitions are limited to 4GB. Files are limited to 2GB. Works on floppy disks. Readable by DOS, OS/2, and all versions of Windows. Does not work with domains (server-based network security). Not recommended unless you need to share data with a DOS, OS/2, or Windows 95 system.

FAT32 Partitions can be from 512MB to 2 terabytes, although Windows XP can format a FAT32 only as large as 32GB. Files are limited to 4GB. Readable by Windows 95 OSR2, 98, Me, NT, 2000, and XP. Does not work with domains. Recommended for home systems with no security needs, and for systems that need to share data with a Windows 98 or Me system.

NTFS Partition size can be from 520MB to 2 terabytes (larger sizes are possible, but not recommended). Files are limited only to the size of the partition. Can't be used on floppy disks. Readable by Windows 2000 and XP, and by Windows NT 4.0 with Service Pack 4 or later. Required for domains. Enables encrypted folders and files, permissions for individual folders and files, and disk quotas by user. Windows XP uses NTFS 5.0 (it was called 5.1 during product testing), a very slight upgrade from the version used in Windows 2000. Recommended for systems with security needs, large hard disks, and LAN connections.

Both FAT32 and NTFS are designed for large partitions and disks and offer no significant benefits when used on smaller disks. However, with XP's rather significant system requirements it will be unlikely to see a system available with less than 10GB of hard drive space, making FAT16 largely useless.


NTFS 5.0 was introduced with Windows 2000. The original NTFS that was used by Windows NT does not have the same features as NTFS 5.0. Partitions made with Windows NT need to be converted for Windows XP to use them. Windows XP automatically converts Windows 2000 to the slightly updated version of NTFS that it uses. Older versions of some partitioning utilities (like PartitionMagic version 6) don't work with Windows XP' NTFS partitions: be sure to get the latest versions.


NTFS 5.0 offers all of the advantages of FAT32 as well as the following:
More efficient use of space NTFS can allocate as little as 2K of disk space to a file, reducing wasted disk space.
On-the-fly compression Individual files can be compressed and decompressed as needed. Entire drives can be reduced in size without affecting overall performance.
Encryption Files and folders can be encrypted with a user's password.


Source :

 "Windows XP The Complete Reference"
By John R. Levine, Margaret Levine Young, Rima Regas, Douglas Muder, and Alison Barrows

Selasa, 05 Juni 2012

History Of Operating Systems : The Second Generation (1955-1965)

The second Generation (1955-1965) Transistors and Batch Systems.

The introduction of the transistor in the mid-1950s changed the picture radically. Computers became reliable enough that they could be manufactured and sold to paying customers with the expectation that they would continue to function long enough to get some useful work done. For the first time, there was a clear separation between designers, builders, operators, programmers, and maintenance personnel.

These machines were locked away in specially air conditioned computer rooms, with staffs of professional operators to run them. Only big corporations, or major goverment agencies or universities could afford the mulitimillion dollar price tag. To run a job (i.e., a program or set of programs), a programmer would first write the program on paper (in FORTRAN or assembler), then punch it on cards. He would then bring the card deck down to the input room and hand it to one of the operators.

When the computer finished whatever job it was currently running, an operator would go over to the printer and tear off the output and carry it over to the output room, so that the programmer could collect it later. Then he would take one of the card decks that had been brought from the input room and read it in. If the FORTRAN compiler was needed, the operator would have to get it from a file cabinet and read it in. Much computer time was wasted while operators were walking around the machine room.

Given the high cost of the equipment, it is not surprising that people quickly looked for ways to reduce the wasted time. The solution generally adopted was the batch system. The idea behind it was to collect a tray full of jobs in the input room and then read them onto a magnetic tape using a small, (relatively) inexpensive computer, such as the IBM 1401, which was very good at reading cards, copying tapes, and printing output, but not at all good at numerical calsulations. Other, much more expensive machines, such as the IBM 7094, were used for thereal computing. This Situation is shown in this Figure.
Operating system
After about an hour of collecting a batch of jobs, the tape was rewound and brought into the machine room, where it was mounted on a tape drive. The operator then loaded a special program (the ancestor of today's operating system), which read the first job from tape and ran it. The output was written onto a second tape, instead of being printed. After each job finished, the operating system automatically read the next job from the tape and began running it. When the whole batch was done, the operator removed the input and output tapes, replaced the input tape with the next batch, and brought the output tape to a 1401 for printing off line (i.e., not connected to the main computer).

History of Operating systems
The Structure of a typical FMS job.


It started out with a $JOB card, specifying the maximum run time in minutes, the account number to be charged, and the programmer's name. Then came a $FORTRAN card, telling the operating system to load the FORTRAN compiler from the system tape. It was followed by the program to be compiled, and then a $LOAD card, directing the operating system to load the object program just compiled. (Compiled programs were often written on scratch tapes and had to be loaded explicitly). Next came the $RUN card, telling the operating system to run the program with the data following it. Finally, the $END card marked the end of the job. These primitive control cards were the forerunners of modern job control languages and command interpreters.

Large secong-generation computers were used mostly for scientific and engineering calculations, such as solving partial differential equations. They were largely programmed in FORTRAN and assembly language. Typical operating systems were FMS (the Fortran Monitor System) and IBSYS, IBM's operating system for the 7094.

Source : Book - "Operating Systems : Design and Implemetation"
By Andrew S. TanenBaum and Albert S.Woodhull

History of Operating Systems : The First Generation (1945-1955)

Operating systems have been evolving through the years. In the following sections we will briefly look at this development. Since operating systems historically have been closely tied to the architecture of the computers on which they run, we will look at successive generations of computers to see what their operating systems were like. This mapping of operating system generations to computer generations is crude, but it does provide some structure where there would otherwise be none.
Analytical Engine

The first true digital computer was designed by the English mathematician Charles Babbage (1792-1871). Although Babbage spent most of his life and fortune trying to build his "analytical engine", he never got it working properly because it was purely mechanical, and the technology of his day could not produce the required wheels, gears, and cogs to the high precision that he needed. Needless to say, the analytical engine did not have an operating system.
Charles Babbage


As an interesting historical aside, Babbage realized that he would need software for his analytical engine, so he hired a young women, named Ada Lovelace, who has the daughter of the famed British poet, Lord Byron, as the world's first programmer. The programming language Ada is named after her.


THE FIRST GENERATION (1945-1955) : VACUUM TUBES AND PLUGBOARDS

After babbage's unsuccessful efforts, little progress was made in constructing digital computer until World War II. Around the mid-1940s, Howard Aiken at Harvard, John von Neumann at the Institute for Advanced Study in Princeton, J. Presper Eckert and William Mauchley at the University of Pennsylvania, and konrad Zuse in Germany, among others, all succeeded in building calsulating engines using vacuum tubes. These machines were enormous, filling up entire rooms with tens of thousands of vacuum tubes, but were much slower than even the cheapest personal computer available today.

In these early days, a single group of people designed, built, programmed, operated, and maintained each machine. All programming was done in absolute machine language, often by wiring up plugborads to control the machine's basic functions. Programming languages were unknown (not even assembly language). Operating systems were unheard of. The usual mode of operation was for the programmer to sign up for a block of time on the signup sheet on the wall, then come down to the machine room, insert his or her plugboard into the computer, and spend the next few hours hoping that none of the 20,000 or so vacuum tubes would burn out during the run. Virtually all the problems were straightforward numerical, calculations, such as grinding out tables of sines and cosines.

By the early 1950s, the routine had improved somewhat with the introduction of punched cards. It was now possible to write programs on cards and read them in, instead of using plugboards; otherwise the procedure was the same.

Source : Book - "Operating Systems : Design and Implemetation"
By Andrew S. TanenBaum and Albert S.Woodhull

Senin, 04 Juni 2012

The SQL Language

The SQL language and relational database systems based on it are one of the most important foundation technologies in the computer industry today. Over the last decade, the popularity of SQL has exploded, and it stands today as the standard computer database language. Literally hundreds of database products now support SQL, running on computer systems from mainframes to personal computers and even handheld devices. An official international SQL standard has been adopted and expanded twice.
Virtually every major enterprise software product relies on SQL for its data management, and SQL is at the core of the database products from Microsoft and Oracle, two of the largest software companies in the world. From its obscure beginnings as an IBM research project, SQL has leaped to prominence as both an important computer technology and a powerful market force.

SQL is a tool for organizing, managing, and retrieving data stored by a computer database. The name "SQL" is an abbreviation for Structured Query Language. For historical reasons, SQL is usually pronounced "sequel," but the alternate pronunciation "S.Q.L." is also used. As the name implies, SQL is a computer language that you use to interact with a database. In fact, SQL works with one specific type of database, called a relational database.

The computer system in the figure has a database that stores important information. If the computer system is in a business, the database might store inventory, production, sales, or payroll data. On a personal computer, the database might store data about the checks you have written, lists of people and their phone numbers, or data extracted from a larger computer system. The computer program that controls the database is called a database management system, or DBMS.

SQL Language

When you need to retrieve data from a database, you use the SQL language to make the request. The DBMS processes the SQL request, retrieves the requested data, and returns it to you. This process of requesting data from a database and receiving back the results is called a database query—hence the name Structured Query Language.

The name Structured Query Language is actually somewhat of a misnomer. First of all, SQL is far more than a query tool, although that was its original purpose and retrieving data is still one of its most important functions. SQL is used to control all of the functions that a DBMS provides for its users, including: 

Data definition. SQL lets a user define the structure and organization of the stored
data and relationships among the stored data items.

Data retrieval. SQL allows a user or an application program to retrieve stored data
from the database and use it.

Data manipulation. SQL allows a user or an application program to update the
database by adding new data, removing old data, and modifying previously stored
data.

Access control. SQL can be used to restrict a user's ability to retrieve, add, and modify
data, protecting stored data against unauthorized access.

Data sharing. SQL is used to coordinate data sharing by concurrent users, ensuring
that they do not interfere with one another.

Data integrity. SQL defines integrity constraints in the database, protecting it from
corruption due to inconsistent updates or system failures.

SQL is thus a comprehensive language for controlling and interacting with a database management system. Second, SQL is not really a complete computer language like COBOL, C, C++, or Java.
SQL contains no IF statement for testing conditions, and no GOTO, DO, or FOR statements for program flow control. Instead, SQL is a database sublanguage, consisting of about forty statements specialized for database management tasks. These SQL statements can be embedded into another language, such as COBOL or C, to extend that language for use in database access. Alternatively, they can be explicitly sent to a database management system for processing, via a call level interface from a language such as C, C++, or Java.

Finally, SQL is not a particularly structured language, especially when compared to highly structured languages such as C, Pascal, or Java. Instead, SQL statements resemble English sentences, complete with "noise words" that don't add to the meaning of the statement but make it read more naturally. There are quite a few inconsistencies in the SQL language, and there are also some special rules to prevent you from constructing SQL statements that look perfectly legal, but don't make sense.

Source : Book "SQL: The Complete Reference"
by James R. Groff and Paul N. Weinberg 

What Is a Network?

Jaringan Komputer, Networking
A network is nothing more than two or more computers connected by a cable (or in some cases, by a wireless connection) so that they can exchange information. Of course, computers can exchange information in other ways besides networks. Most of us have used what computer nerds call the sneakernet. That’s where you copy a file to a diskette and then walk the disk over to someone
else’s computer. (The term sneakernet is typical of computer nerds’ feeble attempts at humor, and why not? As a way to transfer information, sneakernetwas pretty feeble.)


The whole problem with the sneakernet is that it’s slow — plus, it wears a trail in your carpet. One day, some penny-pinching computer geeks discovered that connecting computers together with cables was actually cheaper than replacing the carpet every six months. Thus the modern computer network
was born.

You can create a computer network by hooking all the computers in your office together with cables and installing a special network interface card (an electronic circuit card that goes inside your computer — ouch!) in each computer so you have a place to plug in the cable. Then you set up your computer’s


If you don’t want to mess with cables, you can create a wireless network instead. In a wireless network, each computer is equipped with a special wireless network adapter that has little rabbit-ear antennas. Thus, the computers can communicate with each other without the need for cables.

Computer networking has its own strange vocabulary. Fortunately, you don’t have to know every esoteric networking term. Here are a few basic buzzwords

1. to get you by: Networks are often called LANs. LAN is an acronym that stands for localarea
network. It’s the first TLA, or three-letter acronym, that you see in this
book. You don’t really need to remember it, or any of the many TLAs that
follow. In fact, the only three-letter acronym you need to remember is TLA.

2.You may guess that a four-letter acronym is called an FLA. Wrong! A fourletter
acronym is called an ETLA, which stands for extended three-letter
acronym. (After all, it just wouldn’t be right if the acronym for four-letter
acronym had only three letters.)

3. Every computer connected to the network is said to be on the network.
The technical term (which you can forget) for a computer that’s on the
network is a node.

4. When a computer is turned on and can access the network, the computer
is said to be online. When a computer can’t access the network, it’s offline.
A computer can be offline for several reasons. The computer can be
turned off, the user may have disabled the network connection, the
computer may be broken, the cable that connects it to the network can
be unplugged, or a wad of gum can be jammed into the disk drive.

5.When a computer is turned on and working properly, it’s said to be up.
When a computer is turned off, broken, or being serviced, it’s said to be
down. Turning off a computer is sometimes called taking it down. Turning
it back on is sometimes called bringing it up.


Source :
Book: "NetWorking For Dummies" by Doug Lowe

What is Operating Systems ?

Operating System


An operating system is a program that manages the computer hardware. It also provides a basis for application programs and acts as an intermediary between the computer user and the computer hardware. An amazing aspect of operating systems is how varied they are in accomplishing these tasks. Mainframe operating systems are designed primarily to optimize utilization of hardware. Personal computer (PC) operating systems support complex games, business applications, and everything in between. Operating systems for handheld computers are designed to provide an environment in which a user can easily interface with the computer to execute programs. Thus, some operating systems are designed to be convenient, others to be efficient, and others some combination of the two.

We begin our discussion by looking at the operating system's role in the overall computer system. A computer system can be divided roughly into four components: The Hardware, The Operating System, The Application Program, and The Users.

The Hardware -- the central processing unit (CPU), the memory, and the input/output (I/O) devices-- provides the basic computing resources for the system.

The Application programs -- such as word processors, spreadsheets, compilers, and web browsers -- define the ways in which these resources are used to solve users' computing problems. The operating system controls and coordinates the use of the hardware among the various application programs for the various users.

We can also view a computer system as consisting of hardware, software, and data. The operating system provides the means for proper use of these resources in the operating of the computer system. An operating system is similar to a government. Like a government, it performs no useful funstion by itself. It simply provides an environment within which other programs can do useful work.

Source :
Book : "Operating System Concepts" By Silberschatz