You can get what you want; games, movie,software, template, applications, e-book and others in this blog

Wednesday, July 29, 2009

Create E-Commerce web by using opensource software osCommerce

About osCommerce


osCommerce is an online shop e-commerce solution that offers a wide range of out-of-the-box features that allows online stores to be setup fairly quickly with ease, and is available for free as an Open Source based solution released under the GNU General Public License.

osCommerce was started in March 2000 and has since matured to a solution that is currently powering 14,120 registered live shops around the world.

Today, osCommerce has been taken to the next level, moving towards an e-commerce framework solution that not only remains easy to setup and maintain, but also making it easier for store administrators to present their stores to their customers with their own unique requirements.

The success of osCommerce is secured by a great and active community where members help one another out and participate in development issues reflecting upon the current state of the project.

You are more than welcome to contribute to the success of osCommerce by helping out in the realization of the project, by participating in the forums, by donating to the team developers and sponsoring the project, or just by spreading the word!

osCommerce Online Merchant
Showcases
Visit the Demonstrations page for online demonstrations.

Visit the Live Shops Directory site for a list of worldwide online shops powered by osCommerce.
osCommerce Online Merchant v2.2 Release Candidate 2a
osCommerce Online Merchant is a complete online store solution that contains both a catalog frontend and an administration tool backend which can be easily installed and configured over a web-based installation procedure.

Catalog Screenshots
Administration Tool Screenshots

Downloads:
osCommerce Online Merchant v2.2 Release Candidate 2a
oscommerce-2.2rc2a.zip (2,359,052 bytes; md5: 31bb9f5f2bd93d18666f8e41c8283147)

Release Announcements
osCommerce Online Merchant v2.2 RC2 Released
osCommerce Online Merchant v2.2 RC2a Released
Server Requirements
PHP v3+ (PHP v5+ recommended)
MySQL v3+ (MySQL v5+ recommended)


osCommerce Online Merchant v3.0 Alpha 5
oscommerce-3.0a5.zip (3,803,184 bytes; sha1: 4a35e809849a596b886a485002767542c353097d)

Server Requirements
PHP v5.2.0+ (with MySQLi extension)
MySQL v4.1.13+ or v5.0.7+

Tuesday, June 16, 2009

Product reviews and price comparisons

Appliances
------------------------------------------------------------------------
Beauty
------------------------------------------------------------------------
Cameras
------------------------------------------------------------------------
Cell phones
------------------------------------------------------------------------
Computers
------------------------------------------------------------------------
Electronics
------------------------------------------------------------------------
GPS
------------------------------------------------------------------------
MP3
------------------------------------------------------------------------
Players
------------------------------------------------------------------------
TVs
------------------------------------------------------------------------
Video Games
------------------------------------------------------------------------
Movies
------------------------------------------------------------------------
»More


Ciao is a multi-million-strong online community that critically reviews and rates millions of products and services for the benefit of other consumers. Available free of charge to consumers in local language versions in major western European and North American markets, Ciao combines unbiased consumer reviews and up-to-date price information from hundreds of online retailers to make it the most comprehensive source of intelligent shopping on the web. Testimony to Ciao's success, more than 38 million consumers visit the site every month, making it one of the largest shopping portals in North America and Europe.


How can I take an active part in Ciao?
You can register free and it's easy. As soon as your Ciao account has been activated (this usually only takes a few minutes), you can start to actively participate in Ciao and earn money!


Does taking part cost anything?
No, participating in Ciao costs you nothing and is completely obligation free – and in fact, by actively participating on Ciao, you can even earn money


What can Ciao do for users?
Ciao is the most comprehensive source of intelligent shopping on the web. Ciao presents users with a range of valuable information on consumer goods and services on the market, including authentic reviews by other users and a comparison of the prices available at the most competitive online shops. Whether you're looking for the best DVD player, the most reliable electricity provider, or the best price for a particular model of cell phone, you can be sure to find the information you need on Ciao.


What can Ciao do for businesses?
Ciao offers a highly effective marketing environment for merchants and advertisers, where they can access well-informed customers in the critical moment when they are taking purchase decisions. Of the more than 38 million monthly visitors (Source: Omniture Dec 2006) to the platform, more than 2 million move on to merchants and buy. Businesses who would like to get in touch with us should visit our corporate website for an overview of our services.


How does Ciao earn money?
Ciao earns money from online advertising with retailers who pay to have their online stores linked from the site. We never sell our members' e-mail addresses or earn money from member data in any way. To find out more about how Ciao uses your data, please read our Privacy Policy.

Friday, May 29, 2009

The Impact of Information Technology Application to the Enterprise Design Factors and Competitive Advantage of Manufacturing Industries in Indonesia

Oleh: SUTRISNO, JOKO
Email: library@lib.unair.ac.id; library@unair.ac.id
Post Graduate Airlangga University
Dibuat: 2007-01-29 , dengan 1 file(s).

Keywords: Information technology, enterprise design factors, competitive advantage of information technology, manufacturing industry.

Subject: STRATEGIC PLANNING; INFORMATION TECHNOLOGY

The current globalization era will bring manufacturing industries to a sharper global competition. The one who win in the competition, are those having competitive advantage. The competitive advantages of manufacturing industries are characterized by having operation efficiency, suitable products, quality products and opportunity to spawn new business. The manufacturing industries, those are not efficient and less competitive, they will soon disappear and out of market.

This study is assessing the application of Information Technology in manufacturing industries to increase its competitive advantage. The application of Information Technology in this study is defined in the form of computer integrated manufacturing (CIM) system, which will cover the following activities (1) office automation (2) manufacturing resources planning system (3) manufacturing communication (4) computer aided product design and (5) manufacturing process system.

Application of Information Technology in manufacturing process will leverage the competitive advantage of manufacturing industries, as it will increase business operation efficiency, faster products differentiation, products quality improvement, and spawning new business,

However investment in information technology is considered costly, require long-term preparation and need strong coordination in all aspect of the manufacturing organization. Information Technology investment should be well planned and calculated accordingly to avoid the unnecessary kit due to the disability in operating the Information Technology based equipment system

Enterprise design factors of manufacturing industries such as training, business process re-engineering, system design, technology management and production planning as part of the integrated system of manufacturing industries will support and intensify the utility of Information Technology based equipments to bring about the competitive advantage of manufacturing industries in Indonesia.
It is suggested that full and thorough understanding to the role of Information Technology based equipment will enable enterprise in reducing risk and cost involved in Information Technology investment and increase the enterprise efficiency, products quality and provide capacity in spawning new related business

Friday, May 15, 2009

Hot spot security

If we make e-banking transactions by using the hotspot of Internet,not at home, will it to be a problem?. I have heard that using the E-Banking in Warnet or computer of office is very dangerous, so when using the laptop to make a personal E-Banking using in Hotspot also to be dangerous? why?

the issues are exactly in the level of security, good security and personal security of the network. if we make a transaction of e-banking through a network such as HP or telkom, the security level is also not different from their employer.

but if we do it via the cafe or hotspot, it’s security is sometimes ignored, even though not all there so that even more secure than large companies. admin warnet often fraudulent see the customer’s data. This is not actually the correct ethica. or sometimes because of the speed so the security level is revealed.

sometimes the customers themselves also make sure to logout something that is not important that make their security of their file is easily to break.


In each free hot spot, anyone can have someone that act as a "man in the middle," that resoluble retrieve any data from you via the access point.

Some banks are already adding token pin with random algorithms do, but you can imagine that if this scenario happens you, your username and password was successfully taken by someone, and he successfully log in to your internet banking. The thief tried to buy an item online, automated system will ask the bank security pin verification, the skeleton has 3 times the chance to hit the pinnya, and the third one so that your account terblokir itself.

As we do, how difficult and complex the procedures to re-enable an account lock. I once account lock that happened cause my own carelessness and take 3 DAYS to return.

Can you imagine if this happens more than 1 time, how much opportunity and the time you do terbuang only to manage the account.

Bank Permata spent U.S. $ 15 Million for IT

Jakarta - PT Bank Permata Tbk allocates it’s capital expenditures for the development of information technology (IT) in 2009 of $ 15 million.

"Our IT Expenditure this year is not different from the last year, such as $ 15 million," said Director of IT & Operations Bank Permata J. Giorgino Godong, after demo PonselPay in Permata Building, Jakarta, Thursday (14/5/2009).

He breaks down, the composition of the largest IT spending of funds intended for the procurement of machinery and devices such as servers, computers, including software (software). It’s remain spent for component of communication include telephone and internet as well as the procurement of automatic teller machines (ATM).

He also explained, for given period, computer as one of the main device for their services is also improved it’s capacity.

Currently, the number of permata’s customers is about one million accounts. According Georgino, 300,000 of them actively using mobile banking services with the number of transactions up to 300,000 traffic times.

He also estimates, the number of permata’s users on mobile banking will continues increase as fast as the increasing of the ease of transaction and efficiency of the time of transaction that if it is done by it.

Bank Permata has a number of 549 ATM units and the number of branch offices reached 277 offices in 55 cities. While the ATM network of cooperation with the national banking sector reached 17,000 ATMs. (Rou / faw)

IT Internship Program for SMEs

Jakarta - the financial crisis makes small medium business (SMEs) strict the budget for technology information(IT). Therefore they are very happy with the IT internship program.

The Internship program titled Industry Attachment Program (IAP) was initiated by Senada and Cisco. In Jakarta, a number of students from the University of Bina Nusantara (BiNus) get internship opportunities in a number of SMEs.

the SMEs also seem happy with this program. For example Multichem Indojasa Artaprima PT, a firm metal services penyepuhan, says that they doesn’t know how to manage their limited IT budget.

"Maybe later, if students have internships in our firm, we can manage our budget IT and spend it well. Exactly, we do not know about what IT products that we need," said Ula Fauzi, Director of Marketing Multichem Indojasa Artaprima the told to detikINET on the sidelines of the event conference kick-off in the IAP Campus BiNus Syahdan, Jakarta, Tuesday (23/12/2008).

Ula also confess, that their company is in the domino effect of the crisis that is happening at this time. The decline in orders from customers to reach 20 percent.

By this internship program,Ula said, the company is to be able to operate well. "The Students of the program can help us help us to create a company database, and payroll, and network internal.

Senior Advisor ICT Industry Farid Maruf also says that SMEs need to be encouraged to optimize the utilization of IT that can support their business activities. Meanwhile, for students, Farid hope they can replicate the program in the future.
(Wsh / wsh)

'70% IT expenditure in firm just for maintenance

Jakarta – A research by VMWare’s (a virtualization technology solutions company)shows, 70% of technology information budget expenditure was spent only for treatment (maintenance).

"it is right. More than 70% of the company out of money just to ensure that IT systems run well," said Regional Director, ASEAN MWare, Koh Eng Kheng, in a press meet in Interkontinental Hotel, Jakarta, Thursday (14/5/2009).

He breaks down, 70% of the cost includes the cost of application maintenance (30%) and maintenance for infrastructure (42%). While the rest, 23% for new investment applications and 5% for infrastructure investment.

In the middle of a crisis situation such as this, IT got clear challenges. Especially in the budget is not increased but the demand to maximize the company's IT business as a means of supporting the more increased.

"That's why we offer a virtualization solution as a way out. With virtualization solutions, and the operational budget can be pressed up to 50% without reducing the features and functions of IT is required," continued Koh Eng Kheng.

VMWare just released its own new operating system virtualization product VShpere 4. This solution is considered effective to build a “cloud computing” computing system that is affordable, even for middle-class companies (SMEs).

Koh Eng Kheng rate virtual computing solutions market in Indonesia is still high potensial. Quote from Gartner research, virtual absorption of the solution in the industry market is estimated to touch a new number 15%.
(Rou / faw)

Saturday, May 9, 2009

Facebook History

History
http://en.wikipedia.org/wiki/FaceBook

The advent of Facebook came about as a spin-off of a Harvard University version of Hot or Not called Facemash.[9] Mark Zuckerberg, while attending Harvard as a sophomore, concocted Facemash on October 28, 2003. Zuckerberg was blogging about a girl and trying to think of something to do to get her off his mind.[10]


The Facebook on February 12, 2004According to The Harvard Crimson, Facemash "used photos compiled from the online facebooks of nine Houses, placing two next to each other at a time and asking users to choose the “hotter” person." To accomplish this, Zuckerberg hacked into the protected areas of Harvard's computer network and copied the house's private dormitory ID images. "Perhaps Harvard will squelch it for legal reasons without realizing its value as a venture that could possibly be expanded to other schools (maybe even ones with good-looking people ... )," Zuckerberg wrote in his personal blog. "But one thing is certain, and it’s that I’m a jerk for making this site. Oh well. Someone had to do it eventually ... "[11] The site was quickly forwarded to several campus group list-servers but was shut down a few days later by the Harvard administration. Zuckerberg was charged by the administration with breach of security, violating copyrights and violating individual privacy and faced expulsion, but ultimately the charges were dropped.[12] The following semester, Zuckerberg founded "The Facebook", originally located at thefacebook.com, on February 4, 2004.[13] “Everyone’s been talking a lot about a universal face book within Harvard,” Zuckerberg told The Harvard Crimson. “I think it’s kind of silly that it would take the University a couple of years to get around to it. I can do it better than they can, and I can do it in a week.”[14] Membership was initially restricted to students of Harvard College, and within the first month, more than half the undergraduate population at Harvard was registered on the service.[15] Eduardo Saverin (business aspects), Dustin Moskovitz (programmer), Andrew McCollum (graphic artist), and Chris Hughes soon joined Zuckerberg to help promote the website. In March 2004, Facebook expanded to Stanford, Columbia, and Yale.[16] This expansion continued when it opened to all Ivy League and Boston area schools, and gradually most universities in Canada and the United States.[17] In June 2004, Facebook moved its base of operations to Palo Alto, California.[16] The company dropped The from its name after purchasing the domain name facebook.com in 2005 for $200,000.[18] Facebook launched a high school version in September 2005, which Zuckerberg called the next logical step.[19] At that time, high school networks required an invitation to join.[20] Facebook later expanded membership eligibility to employees of several companies, including Apple Inc. and Microsoft.[21] Facebook was then opened on September 26, 2006 to everyone of ages 13 and older with a valid e-mail address.[22][23] In October 2008, Facebook announced that it was to set up its international headquarters in Dublin, Ireland.[24]

UNCOVERING THE INTELLECTUAL CORE OF THE INFORMATION SYSTEMS DISCIPLINE

By Anna Sidorova, Nicholas Evangelopoulos,Joseph S. Valacich, Thiagarajan Ramakrishnan (MIS Quarterly,2008)


This study uses latent semantic analysis to examine a
large body of published IS research in order to address this
question. Specifically, the abstracts of all research papers
over the time period from 1985 through 2006 published in
three top IS research journals—MIS Quarterly, Information
Systems Research, and Journal of Management Information
Systems—were analyzed. This analysis identified five core
research areas: (1) information technology and organizations;
(2) IS development; (3) IT and individuals; (4) IT and
markets; and (5) IT and groups. Over the time frame of our
analysis, these core topics have remained quite stable.
However, the specific research themes within each core area
have evolved significantly, reflecting research that has
focused less on technology development and more on the
social context in which information technologies are designed
and used. As such, this analysis demonstrates that the
information systems academic discipline has maintained a
relatively stable research identity that focuses on how IT
systems are developed and how individuals, groups,
organizations, and markets interact with IT.

Tuesday, January 13, 2009

Meta Analysis

Meta-Analysis of Correlations
By. Dr. Andy Field

Meta analysis is a statistical technique by which information from independent studies is assimilated. Traditionally, social science literatures were assimilated through discursive reviews. However, such reviews are subjective and prone to reviewer-biases such as the selective inclusion studies, selective weighting of certain studies, and misrepresentation of findings (see Wolf, 1986). The inability of the human mind to provide accurate, unbiased, reliable and valid summaries of research created the need to develop more objective methods. Meta-analysis arguably provides the first step to such objectivity (see Schmidt, 1992), although it too relies on subjective judgments regarding study inclusion (and so is still problematic because of biased selections of studies, and the omission of unpublished data-the file drawer problem). since the seminal contributions of glass (1976), Hedges and Olkin (1985), Rosenthal and Rubin (1978) and Hunter, Schmidt and Jackson (1982) there has been a meteoric increase in the use of meta analysis. Field (2001) reports that over 2200 published articles using or discussing meta-analysis were published between 1981 and 2000. of these, over 1400 have been published since 1995 and over 400 in the past year. Clearly, the use of meta-analysis is still accelerating.

Basic Principles

To summarise, an effect-size refers to the magnitude of effect observed in a study, be that the size of a relationship between variables or the degree of difference between group means. There are many different metrics that can be used to measure effect size: the Person product moment correlation coefficient, r; the effect-size index, d; as well as odds ratios, risk rates, and risk differences. of these the correlation coefficient is used most often (Law, Schmidt, & Hunter, 1994) and so is the focus of this study. Although various theorists have proposed variations on these metrics (for example, Galss's delta, cohen's d, and Hedges's g are all estimates of Thou), conceptually each metric represents the same thing: a standardized from of the size of the observed effect. Whether correlation coefficients or measures of differences are calculated is irrelevant because either metric can be converted into the other, and statistical analysis procedures for different metrics differ only in how the standard errors and bias correlations are calculated (Hedges, 1992).

In meta-analysis, the basic principle is to calculate effect sizes for individual studies, convert them to a common metric, and then combine them to obtain an average effect size. Studies in a meta-analysis are typically weighted by the accuracy of the effect size they provide (i.e. the sampling precision), which is achieved by using the sample size (or a function of it) as a weight. Once the mean effect size has been calculated it can be expressed in terms of standard normal deviations ( a Z score) by dividing by the standard error of the mean. A significance value (i.e. the probability, p, of obtaining a Z score of such magnitude by chance) can then be computed. Alternatively, the significance of the evarage effect size can be inferred from the boundaries of a confidence interval constructed around the mean effect size.

Johnson, Mullen and Salas (1995) point out that meta-analysis is typically used to address three general issues: central tendency, variability and prediction. Central tendency relates to the need to find the expected maginitude of effect across many studies (from which the population effect size can be inferred). this need is met by using some variation on the average effect size, the sinificance of the this average or the confidence interval around the average. The issue of variability pertains to difference between effect sizes acrosss studies and is generally adressed using tests of the homogenity of effect sizes. The question of prediction relates to the need to explain the variability in effect size across studies in terms of moderator variables. This issue is usually addressed by comparing study outcomes as a function of differences in characteristics that vary over all studies. As an example, differences in effect sizes could be moderated by the fact that some studies were carried out in the USA whereas others were conducted in the UK.

Saturday, January 10, 2009

My GIS Project

Peta Penggunaan Lahan



Note: This is just an example (in jpg format)

Saturday, January 3, 2009

GIS

Introduction to ArcGIS

By Kardi Teknomo, PhD.

GIS is abbreviation of Geographic Information system. Aside from buzzwords and much hype about it, GIS in a very simple term is just a combination of Maps and database. In other words, GIS is a spatial database .

Map is a very useful geographical tool to show the location of places. You may have learned about the world map with many countries in it.

You may have recognized city map with district boundary and road and railway as shown below.

For those of you who do not even know what a database is, you can imagine a database as relational tables .

Database is more than a simple table because in it you can do some query (search back for some data) and make relationship between one table and the other tables.

GIS is a combination of Maps and Database. Depending on how we represent the map, every element in the map may have an association or connection with some database table. For example, selecting a country in the world map that has an association with a table will show all the attributes data related to that selection.

Maps in GIS can be separated into several layers. Each layer map can be viewed in combination with some other layers, or it can be seen as a separate layer. You may extract some information based on these layers. For instance, you may search for some location based on several criteria, or find some pattern over several years map, query features that near to some other feature, and so on. Later in this series of GIS tutorial, you may learn further query, analysis, and modeling and enhance decision support system using the power of GIS.

My choice of ArcGIS (I am using version 8, version 9 may be slightly different in menu) is simply because its availability and my own familiarity with this software. Even if you do not have ArcGIS, you may browse this tutorial to gain understanding on what you can do using GIS. I also provide a list of other GIS software both commercial and free version in the GIS Resources page.

ArcGIS is a product of ESRI. The latest version is available in three different editions under three different names:
-ArcView (simple, Standard edition)
-ArcEditor (functional, Professional edition)
-ArcInfo (advance; Enterprise edition)

Do not be confused with the name of the editions. The three editions above share the same architecture and have the same way on how to use. The differences are prices and more tools/functions.

If you open the menu in ArcGIS, you may see many icons. The first question is, perhaps, which one to use?
Regardless your editions, ArcGIS will contain at least three main softwares
ArcCatalog,
ArcMap, and
ArcToolbox

ArcCatalog is similar to Windows Explorer. With ArcCatalog you may preview your GIS data in term of geography (map) or table. If your data contain 3D scene, you can use ArcCatalog to preview the content. You can create file, folder and meta-data of your GIS data using this software. If your data is a map file, you can double click to open it in ArcMap, otherwise, you can do drag and drop of your GIS data into ArcMap.

ArcMap is the main software that you use for GIS. Using ArcMap you can create and edit your map, layers, and charts. You may perform some analysis and query on your GIS data using ArcMap.

ArcToolbox is a collection of Analysis Tools (e.g. extract, overlay, proximity, statistics, surface cut and fill, volume and contour), Conversion Tools (i.e. import to / export from different type of files) and Data and Management Tools (e.g. Join tables, define projections, etc.)

If you ArcGIS contain ArcScene, it is useful for showing your map in 3 dimension. ArcScene is similar to ArcMap with more functional in 3D scene analysis, but you cannot create map in ArcScene.

The rest of this tutorial will cover only ArcCatalog and ArcMap since it is the main software of ArcGIS.

FREE keyword suggestion tool

Enter a starting keyword to generate up to 100 related keywords and an estimate of internet user daily search volume. Now...have the result. More information, click this link free keyword suggestion tool from Wordtracker

My Blog List

Have a nice day

The term "Sistem Informasi Keperilakuan" is firstly pointed and popularated by Jogiyanto Hartono Mustakini in his book "Sistem Informasi Keperilakuan" (2007), Publisher Andi Offset Yogyakarta Indonesia.

Please...give us any suggestions, critics, and whatever that are relevant to this blog for improving its quality..thanks

Note:For the best appearance, use opera or IE as browser

Alfitman; Pamenan Mato Nan Hilang; Ikhlas Hati

About Me

Padang, West Sumatra, Indonesia
I wish I can do my best in human's life