Warung Bebas

Senin, 09 Desember 2013

Cara Merawat Komputer Agar Tetap Awet Dan Tidak Rusak

cara merawat komputer agar tetap awet dan tidak rusak
Cara Merawat komputer Agar Awet Dan Tidak Mudah Rusak - Jika Anda sering bekerja dengan menggunakan komputer, pasti Anda sangat menginginkan komputer Anda awet dan tidak mudah rusak. Banyak sekali kerusakan pada komputer yang ditimbulkan jika Anda tidak pintar merawat komputer. Untuk itu saya akan membagikan bagaimana cara merawat komputer agar tetap awet dan tidak mudah rusak. simak ulasannya.

 

1. Bersihkan Cpu Komputer


Jika komputer Anda ingin tetap awet bersihkanlah pc komputer dengan runtin maksimal dalam jangka 6 bulan sekali, karena jika CPU Anda tidak dibersihkan, kotoran debu dalam CPU akan menumpuk, dan akan berdampak pada kerusakan pada temperatur atau suhu pada komputer Anda. Caranya dengan membuka casing PC kmudian Bersihkan debu yang ada di motherboard peripheral lainnya. Pembersihan bisa menggunakan sikat halus (kuas cat). Lakukan ini selama enam bulan sekali.

2. Jangan Gunakan Internet Saat Hujan Lebat


Biasanya koneksi internet sangat berpengaruh pada cuaca, Dikhawatirkan jika Anda menggunakan internet pada komputer Anda disaat hujan, dapat mengakibatkan jaringan komputer akan tersambar petir, dan ini akan berdampak pada komputer Anda nantinya. Tentu saja hal ini sangat berbahaya.

3. Aktifkan System Restore Komputer


Mengaktifkan system restore juga sangat berpengaruh untuk komputer Anda agar tidak mudah rusak, caranya dengan klik kanan pada icon my desktop computer, lalu klik properties > Tab system Restore > Cari tulisan Turn Off System Restore On All Drives, lalu hilangkan tanda centang pada sebelah kiri tulisan tersebut.

4. Matikan Komputer Sesuai Aturan


Jangan pernah mematikan komputer dengan cara yang tidak wajar seperti langsung  mencabut kontak listrik pada komputer, biasakanlah mematikan komputer dengan menggunakan shutdown. Gunakan stavolt untuk menghindari mati listrik tiba-tiba. atau jika kamu terlalu lama menggunakan komputer restar lah terlebih dahulu, biar semua system komputer kembali normal, biasanya jika terlalu lama digunakan system komputer akan melemah.

5. Uninstal Program Yang Tidak Berguna

Biasanya ruang hardisk yang terlalu banyak tersita akan memperlambat proses read/write harddisk sehingga beban kerjanya akan lebih berat sehingga harddisk akan cepat rusak. Biasanya akan muncul warning juga space hardisk kita sudah penuh. System operasi windows sudah mendukung akan hal yang seperti ini.

6. Perhatikan Ventilasi Dan Pendingin Komputer

Ventilasi yang kurang baik akan menyebabkan panas yang berlebihan sehingga dapat membuat komponen dalam komputer akan cepat panas sehingga akan memperpendek usia komponen tersebut. Maka dari itu usahakan jarak antara komputer dan dinding minimal 40 Cm. Agar lebih baik lagi anda bisa measang AC didalam ruangan dan gunakan cooling fan ekstra didalam Cpu.

7. Pasang kabel Ground


Jika casing komputer saat disentuh terdapat aliran listrik, ambil kabel dengan panjang seperlunya, ujung satu dihubungkan dengan badan CPU (pada casing) sedangkan ujung yg lain ditanam dalam tanah. Hal ini akan dapat menetralkan arus listrik yg “nyasar” sehingga dapat membuat komponen elektronik lebih awet.

Tips Penunjang Agar Komputer Awet

  • Hindarkan komputermu dari alat yang dapat memancarkan medan magnet.
  • Jauhkan dari benda-benda yang bersifat magnet
  • Lakukan scan virus manual setiap satu minggu sekali
  • Defrag selalu harddiskmu. Supaya proses read maupun write jadi lebih ringan karena filenya berurutan.
Saran saya agar Anda bisa menyayangi komputer anda sebagaimana mestinya, memang perlu kesadaran untuk merawat komputer. Karena biasanya pengguna hanya tahu menggunakannya saja, tanpa pernah memperhatikan kesehatan komputer. ikutilah beberapa tips diatas agar komputer anda terhindar dari kerusakan. Sekian Tips dari Cara Merawat Komputer Agar Tetap Awet Dan Tidak Mudah Rusak.

[#CSEdWeek] My favorite software

Happy Computer Science Education Week. I did my part! I debugged a memory leak with a pre-literate child sitting next to me, wanting to punch the meta-key in emacs. I can't remember if he realized we needed an extra * or I did, but all I can say is that if pointers are so simple a five year old can explain 'em, no grumbling allowed, undergrads.

Anyhow, to kick off CS Ed Week, I'd like to talk about some of my favorite programs. These are small utilities most of you have probably never heard of, but they fill me with great joy.

1. DTerm (OS X)

This, is, hands down, the piece of software I have been waiting for my whole life. It's basically a "command line anywhere" sort of program. See, for some bizarre reason, OS X doesn't allow you to, say, create a text file in the Finder here , like Windows or even some versions of Linux does. I have no idea why, but this was a gross oversight.

DTerm saves me tons of effort. Old way: Launch terminal window, cd tab-tab-tab-tab-tab (or drag from finder), touch foo.txt. New way: Dtermshortcut: touch foo.txt. Done!

2. Quicksilver (OS X)

Along those lines, Quicksilver is also super useful and has accelerated my workflow. Instead of trying to find things (which I'm terrible at), I just type command-period, type the first two letters of the application name, email address, text file, whatever, and boom - there it is. I am so used to this now I have to install it on new machines, or else I can't use them. (Sad but true).

3. F.lux (OS X, Android, iOS, Windows, Linux)

This program is very clever - it dims your monitor/screen to help simulate getting ready for sleep. For someone who ends up foolishly doing work at 11pm or 5am, and who travels through way too many time zones than is healthy, it's nice to give the 'ol hypothalamus a break.

4. Instapaper (All OSes, web-based)

This is the best piece of software ever written. It lets you save a webpage, from anywhere, for all time. (Removing all ads and annoying stuff). It's shareware, but if you give the developer $3, you can also search through your clippings. It's beautiful, well designed, and wonderful for reading lots of news/journal articles on long airplane rides.

I think that's it for now. I've been trying to be like Beki and stop using my inbox as a TODO list, but I'm still experimenting with applications for that. It's my New Year's Resolution. I'll leave you with a CSEdVideo from Obama (h/t CCC blog). Enjoy!


Cara Simpel Mengubah Font Di Android

Unik Informatika - Kebanyakan dari kita sering bosan dengan tampilan gadget kita, apalagi untuk OS Android. Mungkin muncul keinginan untuk mengubah jenis Font yang kita gunakan untuk screen gadget kita, bisa saja dengan Aplikasi FontInstallerRoot, aplikasi ini dapat diunduh secara gratis pada PlayStore. Namun perlu diingat bahwa aplikasi ini hanya bisa berjalan untuk ponsel yang  telah sudah di Root. Jadi, pastikan bahwa  Androidmu sudah diroot.  Apabila belum dan tidak mengerti apa itu Root sebaiknya hentikan sekarang juga karena dapat menimbulkan kerusakan system apabila droiders tidak memiliki dasar tentang Root.

Setelah terinstall, bukalah FootInstallerRoot. Aplikasi ini memiliki dua  opsi dalam menginstall Font baru. Menginstall font yang telah droiders download sebelumnya dan berada dalam penyimpanan lokal android atau langsung mendownload dari server aplikasi tersebut.

Install melalui data lokal.
1. Pilih Tab Lokal dan carilah  font yang telah  droiders download sebelumnnya.


2. Pilih  file font tersebut. Jika droiders  ingin melihat  previewnya sebelum menginstall, pilih Preview. Jika tidak, langsung saja pilih Install.


3. Selanjutnya akan muncul pop up yang meminta konfirmasi droiders. Selain itu juga berisi peringatan bahwa sebelum melakukan penginstalan, droiders direkomendasikan untuk melakukan  Android backup (backup system) agar sewaktu-waktu terjadi error droiders dapat dengan mudah memperbaikinya. Jika droiders ingin membackup font yang ada, pilih backup, jika tidak, langsung saja pilih Continue.

4. Jika droider memilih backup, maka font tidak langsung terinstall. Disini droiders perlu melakukan cara yang sama seperti sebelumnya. Maka akan terjadi proses instalasi Font baru. Setelah instalasi selesai akan muncul pemberitahuan bahwa droiders harus merestart Android. Pilih Yes jika droiders ingin segera merestartnya atau No jika droiders ingin merestart nanti.

Install melalui server Font Installer Root.
1. Pilih menu Server. Lalu pilihlah font yang droiders inginkan. Sama seperti nomor satu, pilih preview  jika droiders ingin melihat-lihat dahulu atau  pilih  Install jika droiders  ingin langsung menginstallnya. 

2. Akan muncul pemberitahuan bahwa droiders diharuskan merestart Android agar  instalasi Font memberikan efek.


Sekali lagi saya ingatkan untuk melakukan backup  baik itu  Android backup ataupun backup lainnya yang diperlukan agar apabila terjadi hal yang  tidak diinginkan, kita dapat mengembalikan keadaan menjadi seperti semula. Saya tidak bertanggung jawab apabila terjadi kerusakan baik secara Software maupun Hardware.
Berani berbuat berani bertanggung jawab, do on your own risk !!!
sumber : android-indonesia.com

Daily Blog #169: Sunday Funday 12/8/13 Winner!

Hello Reader,
            Another Sunday Funday come and gone, an interesting change this week that I'm curious on your feedback for. For the first time I themed this weeks Sunday Funday to topics discussed in this weeks Forensic Lunch. I was hoping this would give many of you a leg up in getting started so please in comments let me know what you thought, is this something you'd like to see done again?

With that said here is this weeks winning answer!

The Challenge:
You have a Windows 2008 system with two partitions, one system and one data partition for file storage and sharing. You recovered a application compatibility cache entry showing that setmace.exe ran but don't know what was changed. You need to answer the following questions:

1. How can you detect timestamp manipulation via setmace on the system disk
2. How can you detect timestamp manipulation via setmace on the data disk
3. How can you recover what files setmace was pointed at
4. How can you recover what commands were executed

The Winning Answer:
 Anonymous

I tried to answer them in order but the answers quickly got mixed together as I thought it would be better to explain my process in order.

1. How can you detect timestamp manipulation via setmace on the system disk
2. How can you detect timestamp manipulation via setmace on the data disk
3. How can you recover what files setmace was pointed at
4. How can you recover what commands were executed

According to your blogpost #130 on Detecting Fraud, "setmace cannot access the physical disk of any system volume, but it can access the physical disk of non system volumes" on Windows Vista/7/8. I would imagine that this is true for Windows 2008 as well as its based on Windows NT 6.x. As a result there wouldn't be any timestamp manipulation via setmace on the system disk.

I would first examine userassist and prefetch to determine if and when setmace has been run.

I would run a keyword search for setmace in an attempt to determine any potential artefacts in slack space. I would examine the pagefile/hiberfil and (hopefully) RAM dump using the processes shown in "Extracting Windows Command Line Details from Physical Memory" and "Restoring Windows CMD sessions from pagefile.sys". This may provide me with clues as to which files were modified. 

I would then create a timeline of activity and look for the low hanging fruit; files with created times when the computer was off, prior to OS or after seizure. This may allow me to determine if setmace has been run on the data disk (as there would be a reference to the drive letter in the command) and may tell me the files that the program was run across.

I am also able to examine the shell artefacts in jumplists/lnk files/shellbags and compare their values with the files on the disk. Any derivations will raise flags as to the accuracy of the timestamps. I would then compare volume shadow copies of the files that have been flagged. I am also able to look for anomalies regarding file access prior to the file being created on the system.


Let's get back to  USN Journal analysis tomorow!

Sickness in the Information Technology Sector: Technical problems, discord plagued Maryland health care site

Eye-opening, ground-level, no-holds-barred accounts of IT mismanagement and mayhem are too rare, considering the stakes in 2013.  The behind-the-scenes crap that goes on needs a great deal of sunlight. Below is such an account of great merit, in the Baltimore Sun.

First, I note physicians and nurses are generally able to collaborate to take care of sick patients.  They are natural "team players"; taking care of patients is their professional calling.  I did it all the time in my patient care years, especially in critical care settings, where lack of collaboration with colleagues could lead to dead patients.

IT personnel are another species entirely.  It's all about territory, competition, self-promotion, empire-building, drinking from the ever-flowing fountain of money, etc.; process matters more than results; and to hell with the end users, let alone patients.

Here is, in macro form, the Fifty Shades of Mass Dysfunction I've often encountered when my professional work intersected with IT personnel, whether in hospitals or industry.  And I was supposed to simply "shut up" about this crap - i.e., go along to get along:

Technical problems, discord plagued Maryland health care site
http://www.baltimoresun.com/health/bs-hs-exchange-woes-20131207,0,6559272.story 

By Meredith Cohn and Andrea K. Walker, The Baltimore Sun 10:50 p.m. EST, December 7, 2013

Although state officials have provided the public scant detail about the troubled launch of Maryland's version of Obamacare, emails and documents show that the project was beset behind the scenes for months by an array of technical issues, warring contractors and other problems.

Since Maryland's online health exchange opened Oct. 1 for people to buy insurance under the Affordable Care Act — and immediately crashed — the two main companies in charge of the website have taken their fight to court, a corporate project manager was replaced and a high-powered consulting firm was quietly brought in to restore order. Though state officials initially said the crash of the online exchange was an unexpected and fixable problem, emails and documents obtained by The Baltimore Sun through state open-records laws outline serious issues before and after the launch.

The revelations came just days before Rebecca Pearce, the head of the exchange, resigned. State officials announced that move Friday night and pulled Carolyn Quattrocki from the governor's health reform office to serve as an interim replacement

I am going to reproduce some paragraphs that show just how chaotic are the processes - in any health IT endeavor, whether they be for the exchanges that are essential to getting insured, or to the hospital IT systems that are essential to getting out of the hospital in something other than a pine box.

Emphases mine:

Just two weeks before the launch, Pearce visited the prime contractor's Linthicum headquarters and found a room of empty seats. She fired off an email questioning the company's commitment to resolve problems and reminding the contractors of what was at stake: "Tonight, I am begging. I don't know how else to say it: we have got to make this a reality."

Despite her proddings, in-fighting between contractor Noridian Healthcare Solutions and a key subcontractor, EngagePoint Inc., disintegrated amid finger-pointing and accusations in court papers. At one point, after Noridian severed contractual ties between the companies but continued to ask for help, EngagePoint CEO Pradeep Goel emailed Noridian officials: "Are you people on crack cocaine?"

Contractors, subcontractors, all offering "solutions" in healthcare and all likely to have not a single soul on board with anything beyond a merchant-computing background.

And nice, friendly questions amongst the friendly, collaborative finger-pointing and accusations typical of the IT world when mass mayhem occurs.

And a begging boss?  How lovely.

... Pearce, who was hired in 2011 at a salary of $175,000, declined to comment on problems surrounding the exchange or her resignation.  [If I were her I would have resigned out of disgust with these idiots.  Oh wait - I did leave IT positions for reasons, in part, like that  - ed.]

The emails provided by the state covered the two weeks before and after the website launch. They give only a limited behind-the-scenes view of creating and launching the exchange. Officials withheld an unknown number of emails, saying state law exempts them from disclosure because they involved the decision-making process of high-ranking executive officials.

The troubles in Maryland mirror problems faced by other state exchanges, as well as the federal portal providing insurance options to consumers in 36 states.

 Emails withheld under claims of legal privilege means we'll never know all the dirt.

... In Maryland, Sharfstein said the complexity was compounded because of an aging state Medicaid computer system that needed to be integrated into the exchange. Officials also chose to customize existing technology that proved tougher to retrofit than expected, he said.

"Unlike buying a book online from Amazon, this process is more akin to applying for a passport, buying a home, and receiving an individually calculated tax credit all through a single web portal," O'Malley said Friday night. "We had more user glitches and user problems than we had hoped.

"A longer testing period might have allowed us to prioritize and address more of these problems before the launch date. Time and ultimate success will tell whether the decision to purchase off-the-shelf software and employ multiple contractor entities were good or bad decisions."


"Hope" is not a proper project management technique of which I am aware, especially in a project of the admitted complexity as this one.

"Tougher to retrofit than expected?" Expected by whom?  IT "experts" who believe in unicorns and the tooth fairy?  I point out that in medicine, such mistakes are called "malpractice."

A longer testing period might have allowed us to address more problems?  But they went live anyway?

... In early 2012, the state gave a $71 million contract to develop the website to a Noridian-led team that included Curam Software, IBM and Connecture. To save time in creating the exchange, the Maryland legislature exempted the contract from the normal procurement process, and North Dakota-based Noridian outscored three other bidders.

Sharfstein said Noridian will likely remain at work in its Linthicum offices beyond its contract's year-end expiration. The company has already been paid about $57 million but the state contract allows penalties for delays. State officials declined to comment on whether any penalties will be sought.

Noridian is ultimately responsible for delivering the system, Sharfstein said. EngagePoint, which is based in Calverton, was not included in the original contract and appeared to have been hired without the exchange's knowledge, officials said.

The state first learned of the companies' "deep strains" in the three months before the website launched, according to documents in U.S. District Court in Baltimore. The issues disputed included accounting, project management, intellectual property and payment.

Emails offer a glimpse at how their differences affected efforts to build the site and then fix post-launch problems. Pearce repeatedly questioned the contractors' commitment to the project after Gov. Martin O'Malley announced on national TV that Maryland's site would go live on time.

On Sept. 22, after Sen. Barbara Mikulski echoed the governor in publicly applauding Maryland's readiness, Pearce wrote the contractors: "It's time to get this right. Now. Period."

Noridian was also criticizing the subcontractor it hired. On Sept. 25, Noridian's project manager wrote to Goel, complaining that EngagePoint refused to perform critical work: "EngagePoint is responsible for 'designing and implementing [an exchange] system,'" the project manager wrote.

The 8 a.m. launch was supposed to allow the estimated 800,000 uninsured Marylanders to sign in and browse 45 plans from six insurers. Officials had warned of "bumps in the road," but the site crashed in minutes.

... "As the executives in charge of this program, I would like to understand from you exactly what is happening with the project and what you are doing to address the issues," she wrote to the contractors at 7:56 a.m. on Oct. 2. By 4:10 p.m., she questioned why 85,000 people had hit the "get started" button, but there fewer than 500 accounts had been created.

About a half-hour later, she wrote to the contractors, "Can you please provide an update on what is going on right now? Who is on site? What has anyone learned?"

Some of the companies' emails focused on achievements rather than dwelling on worsening problems.

Noridian CEO Tom McGraw wrote to state officials on Oct. 4, "We have seen increases in all aspects of the system performance over the last several hours and anticipate that these will start showing in the next report."

But four days later McGraw notified state officials that the project manager was being replaced.

Conflict, favoritism, fighting, "it's not my job", lies, spin, stonewalling, strife ... chaos.

"Efforts to build the site and then fix post-launch problems" is also typical of the IT world.  In health IT, especially clinical IT, those harmed or killed during the "fixing" process are considered a necessary sacrifice, a "bump in the road."

... Paul von Ebers, CEO of Noridian Mutual Insurance Co., Noridian's parent company, wrote on Oct. 10 that the consultants "expressed concern with ongoing coordination issues between the Noridian and EngagePoint teams." He requested a meeting to resolve "working differences" between the companies.

This was days before Noridian fired EngagePoint, sparking the angry email exchanges and dueling lawsuits between the companies. Noridian then sought to hire EngagePoint workers; EngagePoint sued and was met with a counter-suit.

"We are expected to do piecemeal work for Noridian after contract termination because you just woke up and decided you don't know what you are doing?" Goel wrote Oct. 26. "We are not going to respond to ridiculous emails from Noridian demanding our team members show up for work after being escorted out of the office."


That's the path to progress:  firing subcontractors and attempting to steal their employees, and lawsuits and countersuits.

I could go on, but read the entire postmortem account (itself rare in large IT projects) at the Baltimore Sun link above.

Some of the de-identified cases at my academic site on health IT difficulties reflect this type of discord; some are mine personally such as at http://cci.drexel.edu/faculty/ssilverstein/cases/?loc=cases&sloc=clinical%20computing%20problems%20in%20ICU , http://cci.drexel.edu/faculty/ssilverstein/cases/?loc=cases&sloc=Cardiology%20story and http://cci.drexel.edu/faculty/ssilverstein/cases/?loc=cases&sloc=Cultures%20of%20mismanagement%20toxic%20to%20healthcare%20quality.

I was expected to "go along to get along" with this BS, and was deemed "not a team player" when I spoke up for enduser (clinician) and ultimate customer (patient) rights.

In summary, the IT world is demonstrably dysfunctional, with the types of conflict as in the Baltimore Sun story more the rule than the exception, especially where healthcare is concerned.  Good, relatively brief resources for better understanding these issues are the following papers:

Social Informatics.  An introductory essay entitled “Learning from Social Informatics” by R. Kling at the University of Indiana can be found at this link (PDF).  The book “Understanding And Communicating Social Informatics” by Kling, Rosenbaum & Sawyer, Information Today, 2005 (Amazon.com link here) was based on this essay.

Pessimism, Computer Failure, and Information Systems Development in the Public Sector.  (Public Administration Review 67;5:917-929, Sept/Oct. 2007, Shaun Goldfinch, University of Otago, New Zealand).  Cautionary article on IT that should be read by every healthcare executive documenting the widespread nature of IT difficulties and failure, the lack of attention to the issues responsible, and recommending much more critical attitudes towards IT.  linkto pdf

Defensive climate in the computer science classroom” by Barker et al., Univ. of Denver.  Link here(subscription required).  May help explain the control-seeking culture of IT personnel.   As part of an NSF-funded IT workforce grant, the authors conducted ethnographic research to provide deep understanding of the learning environment of computer science classrooms. Categories emerging from data analysis included 1) impersonal environment and guarded behavior; and 2) the creation and maintenance of informal hierarchy resulting in competitive behaviors. These communication patterns lead to a defensive climate, characterized by competitiveness rather cooperation, judgments about others, superiority, and neutrality rather than empathy.

If a person thinks this technology will "revolutionize" healthcare anytime soon, considering the "people issues" involved let alone the technical ones, then that person is either hopelessly naïve, or needs a mental health evaluation (colloquially, "needs their head examined").

-- SS
 

ZOOM UNIK::UNIK DAN UNIK Copyright © 2012 Fast Loading -- Powered by Blogger