XML
XML stands for Extensible Markup Language
• XML is a markup language much like HTML
• XML was designed to carry data,
• XML tags are not predefined.
• XML is designed to be self-descriptive.
• XML is a W3C Recommendation
HTML
HTML - short for Hypertext Markup Language
It provides a means to describe the structure of text-based information in a document by
denoting certain text as headings, paragraphs, lists, and to supplement that text with interactive
forms, embedded images, and other objects.
• Publish online documents with headings, text, tables, lists, photos,
• Retrieve online information via hypertext links, at the click of a button.
• Design forms for conducting transactions with remote services, for use in searching
for information, making reservations, ordering products.
• Include spread-sheets, video clips, sound clips, and other applications directly in
their documents.
Source: http://www.geekinterview.com/question_details/63835
COMPUTER SCIENCE
All about Computer Tehnology
Search This Blog
Translate
Tuesday, October 23, 2012
What is the difference between the HTM and HTML extensions?
Practical Differences
Practically speaking, there is no difference between the two extensions. Both denote that the file contains HTML. This is really a matter of convention and is not an absolute, but most realize that a file whose extension is htm or html contains HTML.
On most, if not all, servers either file will be sent with a MIME type of text/html by default. This can usually be changed by the server's administrator(s), but is, more often then not, left alone.
On most, if not all, browsers, either file will be displayed as intended (i.e. rendered according to the browser's default manner of displaying HTML documents). This last is due more to the MIME type sent by the server then by the file's extension, but that's a matter for another FAQ.
Generally, the use of htm over html, or vice versa, is left to the author's personal preferences.
Technical Differences
Technically speaking there are few to no important differences. An obvious difference is the addition of the letter "L" in the html extension. The technical difference that the additional letter will make to the operating system is better left to a different discussion but in the context of a web author, the additional "L" will make no difference.
The technical difference that the additional letter will make to an http server (a "web server") is minimal. Usually, a server will use a file's extension to figure out what MIME type to send back to the requesting client. Most servers are configured by default to send back the text/html type when the requested file ends in an htm or html extension. This can be changed by the server's administrator(s) in such a way that one of the above extensions returns a different MIME type then the other, however, this is not a very common practice.
It is a common misconception that a file ending in an htm extension had to have been created on a DOS/Windows 3.x platform. This is because those operating environments limit filenames to a 3 letter extension. However, it is very simple to create a file with a 3 letter extension on most other platforms, as well. Even those that allow longer file extensions.
Default Filenames
The one situation in which there may be a difference between the two extensions is that of a server's default filenames. When a URL that does not specify a filename is requested from a server, such as http://www.domain.dom/dirname/, the server returns a file from the requested URL that matches a default filename. Examples of common default filenames include "index.html," "index.htm," "welcome.html," "welcome.htm," "default.html," "default.htm," etc. However, an administrator can make the server's default filename anything he/she so desires.
In the case of a default file, the author's filename must be exactly the same as the server's default filename. In other words, if your server is configured to use "index.html" as the default filename, your file must be named "index.html" and not "index.htm."
Source: http://www.sightspecific.com/~mosh/WWW_FAQ/ext.html
Practically speaking, there is no difference between the two extensions. Both denote that the file contains HTML. This is really a matter of convention and is not an absolute, but most realize that a file whose extension is htm or html contains HTML.
On most, if not all, servers either file will be sent with a MIME type of text/html by default. This can usually be changed by the server's administrator(s), but is, more often then not, left alone.
On most, if not all, browsers, either file will be displayed as intended (i.e. rendered according to the browser's default manner of displaying HTML documents). This last is due more to the MIME type sent by the server then by the file's extension, but that's a matter for another FAQ.
Generally, the use of htm over html, or vice versa, is left to the author's personal preferences.
Technical Differences
Technically speaking there are few to no important differences. An obvious difference is the addition of the letter "L" in the html extension. The technical difference that the additional letter will make to the operating system is better left to a different discussion but in the context of a web author, the additional "L" will make no difference.
The technical difference that the additional letter will make to an http server (a "web server") is minimal. Usually, a server will use a file's extension to figure out what MIME type to send back to the requesting client. Most servers are configured by default to send back the text/html type when the requested file ends in an htm or html extension. This can be changed by the server's administrator(s) in such a way that one of the above extensions returns a different MIME type then the other, however, this is not a very common practice.
It is a common misconception that a file ending in an htm extension had to have been created on a DOS/Windows 3.x platform. This is because those operating environments limit filenames to a 3 letter extension. However, it is very simple to create a file with a 3 letter extension on most other platforms, as well. Even those that allow longer file extensions.
Default Filenames
The one situation in which there may be a difference between the two extensions is that of a server's default filenames. When a URL that does not specify a filename is requested from a server, such as http://www.domain.dom/dirname/, the server returns a file from the requested URL that matches a default filename. Examples of common default filenames include "index.html," "index.htm," "welcome.html," "welcome.htm," "default.html," "default.htm," etc. However, an administrator can make the server's default filename anything he/she so desires.
In the case of a default file, the author's filename must be exactly the same as the server's default filename. In other words, if your server is configured to use "index.html" as the default filename, your file must be named "index.html" and not "index.htm."
Source: http://www.sightspecific.com/~mosh/WWW_FAQ/ext.html
Monday, October 15, 2012
Ancaman Database
ANCAMAN TERHADAP KEAMANAN DATABASE DAN INFORMASI
Banyak hal bisa terjadi dengan database kita. Beberapa hal yang dapat dikategorikan
dalam hal ancaman database misalnya :
1. Bencana Alam (Natural Disaster)
a. Geologis: Gempa, aktivitas gunung berapk, tsunami, longsor.
b. Meteorologis: Badai, tornado, hujan lebat, dan petir
c. Lain-lain: Salju longsor, kebakaran, banjir, jatuhnya meteorit, gerhana matahari
d. Kesehatan: Wabah yang menyebar
2. Man made disaster (Kesalahan Manusia)
a. Tenaga kerja: kerusuhan, pemogokan. Keduanya akan memperlambat pekerjaan
sehingga akan mengganggu layanan dan pasokan barang.
b. Sosial politik: perang, terorisme, sabotase, vandalisme, civil unrest, unjuk rasa
c. Sebab material: kebakaran, ketidak hati-hatian dalam penggunaan materi
d. Utilitas: Kegagalan daya listrik, komunikasi yang terhenti
Source: Info Komputer Oktober 2012
Banyak hal bisa terjadi dengan database kita. Beberapa hal yang dapat dikategorikan
dalam hal ancaman database misalnya :
1. Bencana Alam (Natural Disaster)
a. Geologis: Gempa, aktivitas gunung berapk, tsunami, longsor.
b. Meteorologis: Badai, tornado, hujan lebat, dan petir
c. Lain-lain: Salju longsor, kebakaran, banjir, jatuhnya meteorit, gerhana matahari
d. Kesehatan: Wabah yang menyebar
2. Man made disaster (Kesalahan Manusia)
a. Tenaga kerja: kerusuhan, pemogokan. Keduanya akan memperlambat pekerjaan
sehingga akan mengganggu layanan dan pasokan barang.
b. Sosial politik: perang, terorisme, sabotase, vandalisme, civil unrest, unjuk rasa
c. Sebab material: kebakaran, ketidak hati-hatian dalam penggunaan materi
d. Utilitas: Kegagalan daya listrik, komunikasi yang terhenti
Source: Info Komputer Oktober 2012
Thursday, October 11, 2012
SECURITY PASSWORD
10 Tips Cara Mengamankan Kata Kunci (Password)
Menurut Gildas, agar password pengguna selalu aman, pengguna diharapkan selalu mengingat
dan menerapkan langkah ini saat membuat password.
1. Pilih Password yang UNIK
Jangan gunakan kata kunci yang sama untuk beberapa akun.
Jika kata kunci dari sebuah akun diketahui pihak lain, akun-akun lainnya tetap aman.
Ingat: Administrator sistem yang jahat atau penjahat dunia maya dapat mengambil kata kunci kita
dalam bentuk terenkripsi dan membongkarnya dalam kurun waktu tertentu.
2. Gunakan Kata yang PANJANG
Makin panjang sebuah kata kunci, makin sulit untuk ditebak.
Menggunakan kalimat kunci (passphrase) merupakan pilihan tepat.
misal: "Saya Bersyukur bisa buang air kecil"
3. Pilih Password KOMPLEKS
Jangan menggunakan kata kunci yang sering dipakai orang.
Misal: merek, nama sistem, nama anda, nama kota, tanggal lahir, warna dan banyak lagi.
Sebaliknya, gunakan kombinasi angka, huruf dan karakter khusus.
Misal; "$@y@ 83r$yukur"
4. Gunakan di komputer yang aman
Pastikan komputer yang digunakan aman, seperti telah dilengkapi antivirus (lebih tepat
antimalware) dan dilengkapi dengan perangkat lunak yang selalu terbarui (up to date).
5. Gunakan Enkripsi Jaringan
Hidari login di sistem yang tidak menggunakan enkripsi jaringan. Tidak semua sistem
menggunakan enkripsi jaringan saat pengguna memasukan kata kunci.
6. Jangan abaikan peringatan keamanan
Banyak sistem, seperti peramban, memberikan security warning. 90% lebih penghuni dunia maya
mengabaikan hal ini dengan memilih YES atau Continue atau Accept. Jika anda termasuk yang
sering mengabaikan peringatan keamanan ini dan tidak ingin berubah, janganlah menyalahkan
siapapun jika akhirnya anda menjadi korban kejahatan dunia maya.
7. Matikan fungsi Password Reset dengan Password Hint
Banyak sistem yang menyediakan fasilitas untuk mengubah kata kunci atau membantu kita
mengingat kata kunci dengan menanyakan informasi yang pasti kita ingat, seperti warna kesukaan
nama hewan kesayangan. Salah satu hal yang meningkatkan kerawanan di dunia maya adalah
situs sosial. Saat ini, amat mudah mengumpulkan informasi yang dahulu dianggap privat.
Nonaktifkan fungsi ini dengan memberi informasi sampah, seperti "%^&!782w", tanggal lahir
palsu dan informasi palsu lainnya.
8. Seringlah Mengganti Password
Makin sering kata kunci diganti, makin amanlah akun kita.
9. Jangan Mencatat kata kunci tanpa Proteksi
Kata kunci yang disimpan dalam file atau address book ponsel atau ditulis di kertas sangat
rentan pencurian. Buatlah cara sederhana untuk mengingat.
Contoh: ingatlah 6 digit PIN dari ATM bernomor 4321 1234 5678 1234
Jika tahun anda adalah 1982, gunakan tahun lahir dan angka pertama dari setiap bagian nomor
kartu misalnya PIN = 82 4 1 5 1
10. Gunakan Perangkat Lunak Manajemen Password secara aman
Makin banyak kata kunci, makin banyak yang lupa. Makin sering ganti kata kunci, makin sering
lupa. Karena itu, sebagai solusinya kita bisa menggunakan perangkat lunak khusus untuk
manajemen kata kunci yang mudah, aman dan dapat dipercaya.
Menurut Gildas, agar password pengguna selalu aman, pengguna diharapkan selalu mengingat
dan menerapkan langkah ini saat membuat password.
1. Pilih Password yang UNIK
Jangan gunakan kata kunci yang sama untuk beberapa akun.
Jika kata kunci dari sebuah akun diketahui pihak lain, akun-akun lainnya tetap aman.
Ingat: Administrator sistem yang jahat atau penjahat dunia maya dapat mengambil kata kunci kita
dalam bentuk terenkripsi dan membongkarnya dalam kurun waktu tertentu.
2. Gunakan Kata yang PANJANG
Makin panjang sebuah kata kunci, makin sulit untuk ditebak.
Menggunakan kalimat kunci (passphrase) merupakan pilihan tepat.
misal: "Saya Bersyukur bisa buang air kecil"
3. Pilih Password KOMPLEKS
Jangan menggunakan kata kunci yang sering dipakai orang.
Misal: merek, nama sistem, nama anda, nama kota, tanggal lahir, warna dan banyak lagi.
Sebaliknya, gunakan kombinasi angka, huruf dan karakter khusus.
Misal; "$@y@ 83r$yukur"
4. Gunakan di komputer yang aman
Pastikan komputer yang digunakan aman, seperti telah dilengkapi antivirus (lebih tepat
antimalware) dan dilengkapi dengan perangkat lunak yang selalu terbarui (up to date).
5. Gunakan Enkripsi Jaringan
Hidari login di sistem yang tidak menggunakan enkripsi jaringan. Tidak semua sistem
menggunakan enkripsi jaringan saat pengguna memasukan kata kunci.
6. Jangan abaikan peringatan keamanan
Banyak sistem, seperti peramban, memberikan security warning. 90% lebih penghuni dunia maya
mengabaikan hal ini dengan memilih YES atau Continue atau Accept. Jika anda termasuk yang
sering mengabaikan peringatan keamanan ini dan tidak ingin berubah, janganlah menyalahkan
siapapun jika akhirnya anda menjadi korban kejahatan dunia maya.
7. Matikan fungsi Password Reset dengan Password Hint
Banyak sistem yang menyediakan fasilitas untuk mengubah kata kunci atau membantu kita
mengingat kata kunci dengan menanyakan informasi yang pasti kita ingat, seperti warna kesukaan
nama hewan kesayangan. Salah satu hal yang meningkatkan kerawanan di dunia maya adalah
situs sosial. Saat ini, amat mudah mengumpulkan informasi yang dahulu dianggap privat.
Nonaktifkan fungsi ini dengan memberi informasi sampah, seperti "%^&!782w", tanggal lahir
palsu dan informasi palsu lainnya.
8. Seringlah Mengganti Password
Makin sering kata kunci diganti, makin amanlah akun kita.
9. Jangan Mencatat kata kunci tanpa Proteksi
Kata kunci yang disimpan dalam file atau address book ponsel atau ditulis di kertas sangat
rentan pencurian. Buatlah cara sederhana untuk mengingat.
Contoh: ingatlah 6 digit PIN dari ATM bernomor 4321 1234 5678 1234
Jika tahun anda adalah 1982, gunakan tahun lahir dan angka pertama dari setiap bagian nomor
kartu misalnya PIN = 82 4 1 5 1
10. Gunakan Perangkat Lunak Manajemen Password secara aman
Makin banyak kata kunci, makin banyak yang lupa. Makin sering ganti kata kunci, makin sering
lupa. Karena itu, sebagai solusinya kita bisa menggunakan perangkat lunak khusus untuk
manajemen kata kunci yang mudah, aman dan dapat dipercaya.
Wednesday, October 10, 2012
What is exactly different in a NETBOOK,NOTEBOOK, and a LAPTOP ?
Notebooks
- laptops that are generally in the 13 - 14 inch range - these are
often designed for those in the business industry - people who want to
take their work with them but need a big enough screen to be able to
scroll through long documents easily. Portable with a lot of usability.
Netbooks - very small, 10 - 11 inch, laptops that are designed to be highly portable and to be used virtually anywhere, something that you can just pull out of your bag on the train or on the bus. Netbooks are mainly designed for those who want to access the internet while traveling, people who want/need to be constantly connected.
Laptops - the word laptop applies to both netbooks and notebooks although the word is often associated with larger laptops, 15 - 17 inch screens. These are designed to be portable enough to carry around but are designed to be used on desks rather than in cafes Laptops are often designed for those who move around a lot, from office to office, they are designed to be used on stable surfaces rather than used on ones' lap (although they can be).
Chromebooks - Chromebooks are essentially larger netbooks but their sole purpose is for browsing the Internet, although this could include using Google Docs which means that the screen is slightly larger than a netbooks (Chromebooks often have 12.1 inch screens). Chromebooks also run Chrome OS which is an operating system that is designed to look and feel like Google Chrome but with all the functionality of Windows or Linux operating systems.
source:
http://lockergnome.net/questions/171610/what-is-exactly-different-in-a-netbook-notebook-and-a-laptop
Netbooks - very small, 10 - 11 inch, laptops that are designed to be highly portable and to be used virtually anywhere, something that you can just pull out of your bag on the train or on the bus. Netbooks are mainly designed for those who want to access the internet while traveling, people who want/need to be constantly connected.
Laptops - the word laptop applies to both netbooks and notebooks although the word is often associated with larger laptops, 15 - 17 inch screens. These are designed to be portable enough to carry around but are designed to be used on desks rather than in cafes Laptops are often designed for those who move around a lot, from office to office, they are designed to be used on stable surfaces rather than used on ones' lap (although they can be).
Chromebooks - Chromebooks are essentially larger netbooks but their sole purpose is for browsing the Internet, although this could include using Google Docs which means that the screen is slightly larger than a netbooks (Chromebooks often have 12.1 inch screens). Chromebooks also run Chrome OS which is an operating system that is designed to look and feel like Google Chrome but with all the functionality of Windows or Linux operating systems.
source:
http://lockergnome.net/questions/171610/what-is-exactly-different-in-a-netbook-notebook-and-a-laptop
Monday, February 11, 2008
HMM/GMDH hybrid model
Customer credit scoring based on HMM/GMDH hybrid model
Ge-Er Teng · Chang-Zheng He · Jin Xiao ·Xiao-Yi Jiang
Abstract :
Hidden Markov model (HMM) has made great achievements in many fields
such as speech recognition and engineering. However, due to its assumption of state condi-
tional independence between observations, HMM has a very limited capacity for recogniz-
ing complex patterns involving more than first-order dependencies in customer relationships
management. Group Method of Data Handling (GMDH) could overcome the drawbacks
of HMM, so we propose a hybrid model by combining the HMM and GMDH to score cus-
tomer credit. There are three phases in thismodel: training HMMwithmultiple observations,
adding GMDH into HMM and optimizing the hybrid model. The proposed hybrid model is
compared with other exiting methods in terms of average accuracy, Type I error, Type II error
and AUC. Experimental results show that the proposed method has better performance than
HMM/ANN in two credit scoring datasets. The implementation of HMM/GMDH hybrid
model allows lenders and regulators to develop techniques to measure customer credit risk.
Ge-Er Teng · Chang-Zheng He · Jin Xiao ·Xiao-Yi Jiang
Abstract :
Hidden Markov model (HMM) has made great achievements in many fields
such as speech recognition and engineering. However, due to its assumption of state condi-
tional independence between observations, HMM has a very limited capacity for recogniz-
ing complex patterns involving more than first-order dependencies in customer relationships
management. Group Method of Data Handling (GMDH) could overcome the drawbacks
of HMM, so we propose a hybrid model by combining the HMM and GMDH to score cus-
tomer credit. There are three phases in thismodel: training HMMwithmultiple observations,
adding GMDH into HMM and optimizing the hybrid model. The proposed hybrid model is
compared with other exiting methods in terms of average accuracy, Type I error, Type II error
and AUC. Experimental results show that the proposed method has better performance than
HMM/ANN in two credit scoring datasets. The implementation of HMM/GMDH hybrid
model allows lenders and regulators to develop techniques to measure customer credit risk.
Sunday, February 3, 2008
How Graphics Cards Work
by Tracy V. Wilson and Jeff Tyson
The images you see on your monitor are made of tiny dots called pixels. At most common resolution settings, a screen displays over a million pixels, and the computer has to decide what to do with every one in order to create an image. To do this, it needs a translator -- something to take binary data from the CPU and turn it into a picture you can see. Unless a computer has graphics capability built into the motherboard, that translation takes place on the graphics card.
A graphics card's job is complex, but its principles and components are easy to understand. In this article, we will look at the basic parts of a video card and what they do. We'll also examine the factors that work together to make a fast, efficient graphics card.
Graphics Card Basics
Think of a computer as a company with its own art department. When people in the company want a piece of artwork, they send a request to the art department. The art department decides how to create the image and then puts it on paper. The end result is that someone's idea becomes an actual, viewable picture.
A graphics card works along the same principles. The CPU, working in conjunction with software applications, sends information about the image to the graphics card. The graphics card decides how to use the pixels on the screen to create the image. It then sends that information to the monitor through a cable.
The Evolution of Graphics Cards
Graphics cards have come a long way since IBM introduced the first one in 1981. Called a Monochrome Display Adapter (MDA), the card provided text-only displays of green or white text on a black screen. Now, the minimum standard for new video cards is Video Graphics Array (VGA), which allows 256 colors. With high-performance standards like Quantum Extended Graphics Array (QXGA), video cards can display millions of colors at resolutions of up to 2040 x 1536 pixels.
Creating an image out of binary data is a demanding process. To make a 3-D image, the graphics card first creates a wire frame out of straight lines. Then, it rasterizes the image (fills in the remaining pixels). It also adds lighting, texture and color. For fast-paced games, the computer has to go through this process about sixty times per second. Without a graphics card to perform the necessary calculations, the workload would be too much for the computer to handle.
The graphics card accomplishes this task using four main components:
1.A motherboard connection for data and power
2.A processor to decide what to do with each pixel on the screen
3.Memory to hold information about each pixel and to temporarily store completed
pictures
4.A monitor connection so you can see the final result
The images you see on your monitor are made of tiny dots called pixels. At most common resolution settings, a screen displays over a million pixels, and the computer has to decide what to do with every one in order to create an image. To do this, it needs a translator -- something to take binary data from the CPU and turn it into a picture you can see. Unless a computer has graphics capability built into the motherboard, that translation takes place on the graphics card.
A graphics card's job is complex, but its principles and components are easy to understand. In this article, we will look at the basic parts of a video card and what they do. We'll also examine the factors that work together to make a fast, efficient graphics card.
Graphics Card Basics
Think of a computer as a company with its own art department. When people in the company want a piece of artwork, they send a request to the art department. The art department decides how to create the image and then puts it on paper. The end result is that someone's idea becomes an actual, viewable picture.
A graphics card works along the same principles. The CPU, working in conjunction with software applications, sends information about the image to the graphics card. The graphics card decides how to use the pixels on the screen to create the image. It then sends that information to the monitor through a cable.
The Evolution of Graphics Cards
Graphics cards have come a long way since IBM introduced the first one in 1981. Called a Monochrome Display Adapter (MDA), the card provided text-only displays of green or white text on a black screen. Now, the minimum standard for new video cards is Video Graphics Array (VGA), which allows 256 colors. With high-performance standards like Quantum Extended Graphics Array (QXGA), video cards can display millions of colors at resolutions of up to 2040 x 1536 pixels.
Creating an image out of binary data is a demanding process. To make a 3-D image, the graphics card first creates a wire frame out of straight lines. Then, it rasterizes the image (fills in the remaining pixels). It also adds lighting, texture and color. For fast-paced games, the computer has to go through this process about sixty times per second. Without a graphics card to perform the necessary calculations, the workload would be too much for the computer to handle.
The graphics card accomplishes this task using four main components:
1.A motherboard connection for data and power
2.A processor to decide what to do with each pixel on the screen
3.Memory to hold information about each pixel and to temporarily store completed
pictures
4.A monitor connection so you can see the final result
Subscribe to:
Posts (Atom)



