Sabtu, 29 Desember 2012

History of koi

Koi fish is one type of ornamental fish carp. Fish goldfish or carp (Cyprinus carpio) is a freshwater fish that is worth economically important and widespread in Indonesia. In Indonesia, goldfish have a few titles of the kancra, tikeu, tombro, king, rayo, ameh or other names according to the endemic area.
In Japan, the fish is called Nishikigoi (Cyprinus carpadie). That is, the colorful fish. Goi itself means carp. Koi is derived from Chinese.

The origins of Koi fish

According to the Reuters, the fish is said to have originated from Persia, brought to Japan through China and Korea. And growing rapidly since about 160 years ago. The emergence of colorful koi fish are hybrids and cultivated for hundreds of years. At first, farmers in Japan could only produce a single color varieties of koi, black koi yakji (Karasugoi, Sumigoi), white (Shiromuji), red (Akagoi, Benigoi, and Higoi), yellow (Kigoi), golden (Kingoi), and silvery white (Gingoi).
From one color, then comes koi two colors, namely Kohako (white and red), and Shiro Shiro Utsuri bekko (black and white). Then, the next emerging koi three colors, namely Taisho Sanke and Showa Sanshoku (red, black, white). And next, multi-colored koi melahirnya like Goshiki, composed of elements of the base color blue splotches of red, black, dark blue, and white.
Then, from crosses with German carp called non scaly carp (goi Kagami) around the year 1904, producing koi partly scaly and some do not. The fish is called Ditsu Nishikigoi. To date, it is estimated more than 18 major varieties of koi fish.  
source : jendelakamu.blogspot.com 

Autofocus


An autofocus (or AF) optical system uses a sensor, a control system and a motor to focus fully automatic or on a manually selected point or area. An electronic rangefinder has a display instead of the motor; the adjustment of the optical system has to be done manually until indication. The methods are named by the used sensor: Active, passive and hybrid.

There are 3 method :
Active focus

Active AF systems measure distance to the subject independently of the optical system, and subsequently adjust the optical system for correct focus.

There are various ways to measure distance, including ultrasonic sound waves and infrared light. In the first case, sound waves are emitted from the camera, and by measuring the delay in their reflection, distance to the subject is calculated. Polaroid cameras including the Spectra and SX-70 were known for successfully applying this system. In the latter case, infrared light is usually used to triangulate the distance to the subject. Compact cameras including the Nikon 35TiQD and 28TiQD, the Canon AF35M, and the Contax T2 and T3, as well as early video cameras, used this system.

An exception to the two-step approach is the mechanical autofocus provided in some enlargers, which adjust the lens directly.

Passive focus

Passive AF systems determine correct focus by performing passive analysis of the image that is entering the optical system. They generally do not direct any energy, such as ultrasonic sound or infrared light waves, toward the subject. (However, an autofocus assist beam of usually infrared light is required when there is not enough light to take passive measurements.) Passive autofocusing can be achieved by phase detection or contrast measurement.

Hybrid focus
In a hybrid autofocus system, focus is achieved by combining two or more methods, such as:

  1.     Active and passive methods.
  2.     Phase detection and contrast measurement.

The double effort is typically used to speed up and improve AF function. In July, 2010, Fujifilm announced a compact camera, the F300EXR, which included a hybrid autofocus system consisting of both phase-detection and contrast-based elements. The sensors implementing the phase-detection AF in this camera are integrated into the camera's Super CCD EXR. Currently it is used by Fujifilm FinePix Series, Ricoh, Nikon 1 series and Canon EOS 650D/Rebel T4i.

source : wikipedia.org

Compare between full frame camera and crop camera

Have you heard about full frame camera and crop camera?,how is difference?.Now i wil explain the different of full frame camera and crop camera.
As you know, the digital camera is the development of film cameras. And in the days of film SLR cameras only know one film size: 24mm x 36mm. SLR digital era, the camera uses sensors to replace the function of a piece of film. What often makes bingun is, the size of the sensor used in DSLR cameras vary. DSLR camera has two main versions: a full frame camera and crop camera (APSC and Four Third).

Full Frame DSLR Camera
CONTAX is the first time you try to make a DSLR camera with the same sensor size to the size of the film (24 x 36mm) with CONTAX N Digital. Since sales did not meet expectations, CONTAX finally stopped production of this camera. Canon followed a year later, in 2002, with their full frame DSLR cameras; Canon EOS 1Ds a different sales disegi fate with CONTAX
.
 

DSLR camera or APS-C Crop

At its core is a crop DSLR cameras that use sensor size smaller than the size of the film by a factor of cutting (crop factor) of 1.5 or 1.6 for APS-C class or 2 times for Four Third grade.
 


Advantages Compared Camera Full Frame Full Frame Camera

By using sensors more big physical size, there are several advantages of a full frame camera, including:

  1. Photo of a full frame camera less noise, a trivial way: full frame camera with a larger sensor has more light-sensitive components, and therefore are more sensitive then the darkness they saw more clearly than cameras with smaller sensors.
  2. Full frame camera has a lot more detail photo, it is due to more light-sensitive components as described above.
  3. Full frame camera has a narrower sharp, sharp space aka depth of field (DOF) has an inverse relationship with the size of the sensor, so the camera has an full frame DOF is narrower than the crop camera for the same focal length. Narrow DOF that allows us to create images with more bokeh okay (see photo this dibanwah).
  4. Having viewfinder bigger and brighter, almost all cameras have full frame viewfinder bigger and brighter than the crop camera. This allows us to rearrange photos.
  5. Full frame better when shooting wide, 10mm lens when used on a full frame camera 10mm still lens, but when used on camera crop would be a 15mm lens (crop 1.5 times), so it can not be as wide as in full frame
source : belajarfotgrafi.com  

Did you know about your images sensor?(CMOS)

This time i will explain one kind of images sensor,yes it is CMOS.You already know,there's 2 kind of images sensor that usually used,CCD and CMOS.
Both CCD and CMOS sensors, both long enough although initially developed CMOS quality is less than the CCD. Then it's CCD initially preferred for use in digital cameras while CMOS is only intended for use in a camera gadget. Gradually, the research has been successful in improving the quality of CMOS sensors in hopes could match the quality of a CCD sensor. CCD sensor itself is now just beginning to be developed for a camera gadget, otherwise an increasingly refined CMOS sensor was implemented in digital cameras. A cross marks the difference was no longer significant in terms of image quality between the two. Now in DSLR cameras and upper middle class are now using CMOS sensors, while still using CCD DSLR economical. Most of the non-DSLR cameras still use CCD sensors.
practical sensor chip includes ADC circuit (camera on a chip)
The advantages of this sensor are :
  1.      thanks to power-saving integrated system
  2.      responsive processes speeds (thanks parralel readout structure)
  3.      each pixel has its own transistor thus avoid the problem of smearing or blooming
The advantages of this sensor are :

  1. technology maturation process (to match the quality of the CCD need to be expensive)
  2. pixels with a transistor in it lowers the sensitivity of pixels (light receiving area is reduced) 
  3. pixel is able to issue its own voltage poor performance in terms of uniformity (uniformity)  

 

Did you know about your images sensor?(CCD)

Did you know about your images sensor?.Do you have a camera?.Theres two kind of images sensor that used on camera that usually used,they are CMOS and CCD.Whats that? and how theys work?,let me explain.
An image sensor is a device that converts an optical image into an electronic signal. It is used mostly in digital cameras, camera modules and other imaging devices.A CCD image sensor is an analog device. When light strikes the chip it is held as a small electrical charge in each photo sensor. The charges are converted to voltage one pixel at a time as they are read from the chip. Additional circuitry in the camera converts the voltage into digital information.
The advantages of this sensor are :
1. Mature technology 
2. Simple sensor design (cheaper)
3. High sensitivity (including dynamic range)
4. Each pixel has the same performance (uniform)

 The disvantages of this sensor are :
1. Overall system design (CCD plus ADC) to be more complicated and wasteful power
2. Overall processing speed is slower than CMOS
3. Sensitive to smearing or blooming (leaking pixels) while capturing the light brighter
This is how ccd works :




Source :
wikipedia.org
kamera-gue.web.id

Sabtu, 24 November 2012

inquiry letter

 Definition of inqury letter

A letter of request, also known as a letter or letters of interesting candidates, will be sent to the companies. Letter of request is a letter from a prospective buyer to the seller requesting information about the products offered. With the offer of the seller will potential buyers will know the price, and the sale and purchase, and a description of the goods or services to be purchased. This is the purpose of the prospective buyer a written request to the seller.
When a prospective buyer has to know the condition of the goods / services following the price and terms of sale and purchase, of course he did not need to ask for a quote from the seller. Letter of inquiry required in formal trade demand formal procedures in writing. Letter of inquiry is often an early stage of the business transactions. Through a letter of inquiry to ask a potential buyer or to request information about the goods or services to be purchased. In reaction, the seller explained the things he wanted to know the buyer, the buyer did finally order and business transactions as the top buying and selling process.

Six tips for writing an inquiry letter:

• Begin your letter by stating who you are and giving your status or
position.
• Clearly state what it is that you are inquiring about and what you would
like the recipient of your letter to do. Make your inquiry as specific as
possible.
• You might want to briefly explain the purpose of your letter or what you
hope to accomplish.
• Include the date by which you need the information, services, etc. that you
are requesting, and indicate that you await the reader’s response.
• Thank the person for his/her time.
Elements of

Elements of Business Letter:

1. Sender’s Address and Date- give the following information: house number,
street, area code, place, country, telephone.
• Sender's address below the date:
2. Recipient’s Address- starts two lines below the sender's address.
3. Salutation in a Business Letter
A: If you know the person’s name:
B: If you don’t know the person’s name:
C: Punctuation: Use colon
4. Subject Line - English, the subject line can also be placed
between the recipient's address and the salutation
(with a blank line in between).
5. Body of the letter- Capitalize and indent the first word of the
text. The next text is left justified. And a space is put
after each paragraph.
CONTENT:
A: 1st paragraph - Introduction and reason for writing.
B: Following paragraphs - Explain the reason in details
and background information, etc.
C: Last paragraph – Summarize your reasons and make
clear what you want the recipient to do.
6. Greeting in Business letter: Use “sincerely”. Write the greeting two lines
below the last paragraph. Leave 4 blank lines after the greeting (space for
the signature) and write the sender's name below that space.

Example of inquiry letter


The Virtual Community Group, Inc.
17 Park Road
Rural Town, NH
January 2, 2011
Jane Smith, Executive Director
Xavier Foundation
555 S. Smith St.
Washington, D.C. 22222
Dear Ms. Smith,
I am writing to inquire whether the Xavier Foundation would invite a proposal from the Virtual Community Group, Inc., requesting an investment of $50,000 per year over two years to support our Enterprise 2000 initiative. This grant would provide part of the funds needed for us to train at least 1200 low-income entrepreneurs in rural New Hampshire in the computer skills they need to create sustainable businesses as we enter the twenty-first century. Your literature indicates that the Xavier Foundation is searching for innovative ideas to improve the lives of the rural poor; we believe Enterprise 2000 falls well within your area of interest.
Information technologies are a promising solution to one of the primary obstacles facing the small rural enterprise: the geographic distances which inhibit networking with other businesses, and which segregate them from a larger marketplace. The Internet and other networks are now making it possible for entrepreneurs even in the most remote locations to communicate and do business on a region-wide, national, or even international basis. Working in conjunction with other organizations, Enterprise 2000 gives program participants technical skills training adapted to individual need; and, in collaboration with organizations which recondition and redistribute used computers, we also assure that they obtain the necessary computer hardware, at low or no cost.
We believe that broadly-implemented technical skills programs such as Enterprise 2000 have the potential to transform the lives of many struggling entrepreneurs, and change the economic landscape of impoverished rural communities. Unlike many poverty alleviation initiatives, all of the Virtual Community Group programs are predicated on the assumption that these entrepreneurs already have 90% of what it takes to compete in the marketplace -- intelligence, ambition, initiative, and talent. After two years of experimentation and program development, the Virtual Community Group has fashioned a superb, easily replicable model in Enterprise 2000, and established a high degree of credibility among community groups, policy makers, and funders. With your support, we can make that 10% difference in the lives of these hard-working people and the future of our rural communities.
Please feel free to call me with any questions. I look forward to hearing from you soon.
Sincerely,
Executive Director
(This sample letter of inquiry was created for AGM by Molly Clark Associates.)

Example reply of inqury letter


Dear Sirs
Yours enquiry of dec,12th,  which we welcome, is receiving our attention, and we thank you for your interest in our products.
A copy of our illustrated export catalogue will be sent to you today, together with a range of samples of the various skins used in the manufacture of gloves and shoes. We think the colors will be just what you want for the fashionable trade, and the beauty and elegance of our designs, coupled with the superb workmanship, should appeal to the discriminating buyer.
Our representative, Mr, Fiel, will be in New York next week and lie will be pleased to call on you with a full range of samples of our handmade lines. He is authorized to discuss the terms of an order with you or to negotiate a contact.
It will be a pleasure to serve you.
Yours faithfully


 sumber : http://bagaskawarasan.wordpress.com/2012/11/11/inquiry-letter/
               http://raqheelcaze.wordpress.com
               http://www.english-bell.com
 

arrange complete bussiness letter


Minggu, 11 November 2012

virus komputer

Dalam dunia komputer kita sering kali mendengar istilah virus,tapi apa sih virus komputer itu?


Virus komputer merupakan program komputer yang dapat menggandakan atau menyalin dirinya sendiri dan menyebar dengan cara menyisipkan salinan dirinya ke dalam program atau dokumen lain. Virus komputer dapat dianalogikan dengan virus biologis yang menyebar dengan cara menyisipkan dirinya sendiri ke sel makhluk hidup. Virus komputer dapat merusak (misalnya dengan merusak data pada dokumen), membuat pengguna komputer merasa terganggu, maupun tidak menimbulkan efek sama sekali.
Berikut adalah jenis dan nama virus komputer :


  1. Virus Boot Sector
    Virus ini mempunyai cara kerja yaitu menginfeksi boot sector harddisk (boot sector merupakan sebuah daerah dalam hardisk yang pertama kali diakses saat komputer dihidupkan). Jika virus boot sector ini aktif, pengguna tidak akan bisa membooting komputernya secara normal.
  2. Virus File
    Virus ini mempunyai cara kerja yaitu menginfeksi aplikasi atau dokumen yang ada dalam komputer anda. Saat aplikasi yang terinfeksi tersebut dijalankan, maka virus ini akan menyebar dengan cara menginfeksi semua file atau dokumen yang diakses oleh aplikasi tersebut. 
  3. Virus Multipartite
    Virus ini mempunyai cara kerja yaitu menginfeksi file-file komputer sekaligus boot sector pada harddisk. Virus jenis ini akan menimbulkan banyak masalah karena menyebabkan kerusakan yang fatal.
  4. Virus E-mail
    Virus ini mempunyai cara kerja yaitu menyebar melalui e-mail (biasanya dalam bentuk file lampiran/attachment). Virus memiliki ciri khusus berupa ekstensi .scr, .exe, .pif, atau .bat.
    Apabila Virus ini aktif, maka dia akan mengirimkan dirinya sendiri ke berbagai nama alamat e-mail yang terdapat dalam buku alamat pengguna.
  5. Virus Polimorfis
    Virus ini mempunyai cara kerja yang unik yaitu virus ini dapat mengubah kode dirinya (berganti wujud) saat menyebarkan diri ke komputer lain.
    Virus jenis lebih sulit dideteksi karena mempunyai sifat seperti itu.
  6. Virus Siluman (stealth virus)
    Virus ini mempunyai cara kerja yaitu dia mampu Menyembunyikan dirinya dengan cara membuat sebuah file yang terinfeksi seolah-olah file tersebut tidak terinfeksi.
  7. Virus Makro
    Virus ini mempunyai cara kerja yaitu menginfeksi Aplikasi Microsoft Office, seperti Word dan Excel.
    Biasanya Dokumen yang terinfeksi oleh Virus Makro akan memodifikasi perintah yang ada di Microsoft Office seperti perintah “Save” untuk menyebarkan dirinya saat perintah tersebut dijalankan.
      

1. Virus Bagle.BC
Virus Bagle BC ini termasuk salah satu jenis virus yang berbahaya dan telah masuk peringkat atas jenis virus yang paling cepat mempengaruhi komputer kita. Beberapa jam sejak keluarnya virus ini, sudah terdapat 2 buah varian Bagle ( Bagle BD dan BE )yang menyebar melalui e-mail, jaringan komputer dan aplikasi P2P. Virus ini menyebar melalui e-mail dengan berbagai subyek berbeda. Menurut suatu penelitian dari Panda Software virus Bagle BC ini menyusup ke dalam e-mail dengan subyek antara lain : Re:, Re:Hello, Re:Hi, Re:Thank you, Re:Thanks. Attachment-nya juga bermacam-macam, antara lain : .com, .cpl, .exe, .scr. Virus Bagle BC juga mampu untuk menghentikan kerja program-program antivirus.
 

2. Backdoor Alnica
Virus yang juga berbahaya ini merupakan salah satu tipe virus Trojan Horse. Merupakan salah satu virus backdoor yang jika berhasil menginfeksi komputer akan mampu melakukan akses dari jarak jauh dan mengambil segala informasi yang diinginkan oleh si penyerang. Sistem operasi yang diserang oleh virus tersebut antara lain : Windows 200, Windows 95, Windows 98, Windows Me, Windows NT dan Windows XP. Virus ini berukuran sebesar 57.856 byte.

3. Trojan di Linux
Para pengguna linux Red Hat diharapkan untuk berhati-hati terhadap PATCH yang dikirm melalui e-mail dengan alamat "security@redhat.com" karena itu sebenarnya bukannya patch security tetapi virus Trojan yang bisa mengacaukan sistem keamanan. E-mail peringatan dari Red Hat biasanya selalu dikirim dari alamat "secalert@redhat.com" dan ditandatangani secara digital. Virus ini juga pernah menyerang sistem keamanan Windows tahun 2003 dengan subyek menawarkan solusi keamanan.

4. Virus: Trojan.Lodear
Trojan Horse menyerang apabila kita mendownload data dari internet. Virus ini akan menginjeksi file. dll ke internetexplorer.exe yang menyebabkan ketidakstabilan sistem.

5. Virus: W32.Beagle.CO@mm
Adalah virus yang mengirimkan email massal terhadap situs yang mempunyai tingkat keamanan rendah. Virus ini dapat menghapus kunci-kunci registry dan bagian-bagiannya dan mungkin memblok akses ke jaringan keamanan website.

6. Virus: Backdoor.Zagaban
Virus trojan yang satu ini menginjeksi komputer tertentu untuk digunakan sebagai tempat berlindung untuk merusak network atau jaringan terkait.

7. Virus: W32/Netsky-P
Virus ini mampu menyebarkan email massal dengan sendirinya kepada alamat email yang diproduksi oleh suatu file pada PC / local drive.

8. Virus: W32/Mytob-GH
Virus penyebar email massal dan merupakan Trojan untuk IRC pada komputer berbasis Windows. Pesan-pesan dikirimkan oleh virus ini dengan judul yang dipilih secara acak dari list yang sudah ada seperti : peringatan pembatasan suatu akun, suspensi akun email, ukuran keamanan, member support, peringatan penting.

9. Virus: W32/Mytob-EX
Virus yang menyebarkan email massal dan Trojan IRC yang mirip dengam W32-mytob-gh. W32/mytob-ex terus menerus di belakang layar, menyediakan pintu belakang bagi server yang untuk menjangkau komputer lain via IRC channel. Virus ini menyebar dengan sendirinya terutama kepada attachments email address.

10. Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER
Keluarga virus ini mempunyai karasteristik yang sama atas apa yang mereka lakukan. Mereka menyebarkan email massal yang bisa dikendalikan melalui Internet Relay Chat (IRC) network. Sebagai tambahan, mereka bisa menyebarkan email melalui bermacam-macam sistem operasi komputer yang lemah seperti LSASS (MS04-011).

11. Virus: Zafi-D
Meupakan virus pengirim email massal dan peer-to-peer yang membuat salinan sendiri kepada folder sistem windows dengan nama file nortonupdate. exe. Virus ini dapat membuat sejumlah file di folder sistem windows dengan nama file terdiri dari 8 random karakter-karakter dan ekstensi DLL. w32/zafi-d menyalin sendiri ke folder dengan nama yang berisikan share, upload, atau musik sebagai icq 2005anew! . exe atau winamp 5.7 new! . exe. W32/zafi-d juga akan menampilkan kotak pemberitahu error yang menipu dengan judul ” crc: 04f6Bh” dan teks ” Error in packed file! ” .

12. Virus: W32/Netsky-D
Virus ini juga mengirimkan serangan melalui IRC backdoor yang berfungsi juga menginfeksi komputer yang lemah.

13. Virus: W32/Zafi-B
Virus ini menyerang peer-to-peer (P2P) dan email virus akan dicopy dengan sendirinya pada sistem folder windows yang akan diberi nama otomastis secara acak.

14. Virus Bagle.BC
Virus Bagle BC ini termasuk salah satu jenis virus yang berbahaya dan telah masuk peringkat atas jenis virus yang paling cepat mempengaruhi komputer kita. Beberapa jam sejak keluarnya virus ini, sudah terdapat 2 buah varian Bagle ( Bagle BD dan BE )yang menyebar melalui e-mail, jaringan komputer dan aplikasi P2P. Virus ini menyebar melalui e-mail dengan berbagai subyek berbeda. Menurut suatu penelitian dari Panda Software virus Bagle BC ini menyusup ke dalam e-mail dengan subyek antara lain : Re:, Re:Hello, Re:Hi, Re:Thank you, Re:Thanks. Attachment-nya juga bermacam-macam, antara lain : .com, .cpl, .exe, .scr. Virus Bagle BC juga mampu untuk menghentikan kerja program-program antivirus.


15. Melissa
Virus ini berada di dalam sebuah file yang bernama List.DOC, yang berisi password untuk akses 80 situs porno.
Ketika seorang pengguna membuka pesan
e-mail tersebut, lampiran Word yang terinfeksi dengan virus Melissa akan dikirim ke 50 nama pertama dalam buku alamat pengguna secara otomatis.

16. Code Red
worm ini memanfaatkan kerentanan buffer overflow dalam server Microsoft IIS untuk mereplikasi diri dengan memanfaatkan kerentanan yang sama di server IIS Microsoft lain. Sampai 19 Juli 2001, lebih dari 400.000 komputer telah terinfeksi oleh virus tersebut.
Buffer overflow terjadi apabila komputer tidak dapat menangani terlalu banyak informasi yang diterimanya sehingga menyebabkan shutdown.
Virus ini cukup sulit untuk dihapus karena mampu menginfeksi kembali sistem yang telah dibersihkan. Virus ini mampu menyebabkan masalah
overload dan penolakan akses ke situs di seluruh dunia.

17. ILOVEYOU
Virus ini mengakses nama kontak dari daftar Outlook Anda. Jika Anda melihat pesan e-mail "I LOVE YOU" dan membukanya, ia akan mereplikasi diri dan mengirimkan pesan lagi ke kontak Anda. Penerima yang tidak tahu apa yang terjadi akan membuka dokumen tersebut yang mengakibatkan sebagian besar file mereka ditimpa.

18. MyDoom
MyDoom cukup efektif untuk menyebar diri karena penerima akan menerima e-mail peringatan tentang kegagalan dalam mengirim satu e-mail dan penerima tanpa sadar akan membukanya sehingga memicu virus tersebut. MyDoom mengakibatkan beban yang signifikan terhadap mesin pencari seperti Yahoo dan Google dan ia juga memblokir akses ke situs Microsoft dan situs antivirus yang populer.

19. Storm Worm
virus Storm merupakan kuda Trojan jahat yang muncul pada Januari 2007.
E-mail yang terinfeksi worm tersebut mengandung file executable. Setelah dibuka, malware tersebut secara otomatis akan terinstal, dan komputer yang terinfeksi akan menjadi bagian dari botnet (jaringan PC yang dapat dikontrol dari jarak jauh).

sumber : http://www.centralartikel.com,http://ahmadyunus.com,http://id.wikipedia.org