scholarly journals ANALISA METODE MEDIAN PADA PENENTUAN TITIK TENGAH DI GOOGLE MAPS

Compiler ◽  
2014 ◽  
Vol 3 (1) ◽  
Author(s):  
Kurnia Rizki Novianto ◽  
Sumarsono Sumarsono ◽  
Yuliani Indrianingsih

Information technology to used facilitate the lives of humans in performing activities have come to the stage of the hand grip. The intent of this grip is a form of computer that is small and can be hand held adult human hand, for example in the form of smartphones, laptops, and tablets. This equipment can help people to access the internet that provide maps and location services on earth . With the internet user will easily dig resources with ease. Thus with the internet it is essential for human life until the source of the future. Problems that arise in the world of internet or computer network often arise and prevent the problem. Limitations of resources based on google maps is very necessary for a person to get the intended location. This system will help a person in getting the distance of the intersection to a point latitude and longitude coordinates by calculating the midpoint of the user, and then calculate the distance between the midpoint of the location suggested by the system so that the user gets close location to conduct meetings. To specify the system location data using Google Place API to obtain complete data locations along the coordinates of latitude and longitude of a location .

2020 ◽  
Vol 8 (4) ◽  
pp. 445
Author(s):  
Desak putu Sekar merta Putri ◽  
I Komang Ari Mogi

The internet is one part that can not be released in human life today. Every year internet users both in Indonesia and in the world have increased. This increase in internet users causes the availability of IP to decrease. That is because users who will use the internet must have an IP. The availability of IPv4 is currently decreasing. To overcome these problems, IPv6 was made which was announced to replace the existence of IPv4. But another solution that can be taken is using subnetting. With subnetting, IP can be used optimally according to the needs of the host or can make efficient use of IP. And subnetting also functions to avoid congestion resulting from too many hosts on the physical network. And to connect between subnets, routing will be done.


2017 ◽  
Vol 3 (2) ◽  
pp. 261-273
Author(s):  
Rico Septiandi ◽  
Siti Madinah Ladjamuddin ◽  
Ewin Suciana

urrently the development of information technology plays a very important role in various aspects of life, the Internet is a global computer network around the world as a medium of communication and modern information that can provide and display various information and data to the public. Website security system with the configuration file.Htacces built with the aim to to protect the website from the theft of information that often occur at this time. This security system is very useful to protect information from cracker attacks. Because data theft on the Internet can not be known if the cracker is taking information without damaging the system. Another case with the theft of information that often occurs in the real world. The design of webste security system is made with the configuration file.Htaccess and Notepad ++. Not a few websites that use a lot of authentication system penetrated by the crackers, they are eyeing this website for allegedly storing confidential information. Need a special way in securing a website like this. With the website security system using the configuration file.htaccess this is one means to secure the website page.


Author(s):  
J. Paynter

Historically, information and services can only be obtained through narrow, one to one, phones, and agency-specific shop fronts (Caffrey, 1998). Information technology, especially the Internet, opens possibilities of using methods to distribute information and deliver services on a much grander scale. The Internet provides a foundation for a variety of communications media. The Web is one of the most important media built upon the Internet. It can be accessed from almost anywhere in the world by means of computers and electronic devices; it is possible to elicit more information, establish platforms for online payment, online consultation and e-voting. Security concerns can be overcome by data-authentication technologies. It can deliver government services and encourage greater democracy and engagement from citizens. Governments around the world are exploring the use of Web-based information technology (Grönlund, 2002). Attention has focused on the design and delivery of portals as a major component of government electronic service infrastructures. The N.Z. government portal site (http://www.govt.nz/en/home/) or the Local Government Online Ltd (LGOL) Web site, (www.localgovt.co.nz/AboutCouncils/Councils/ByRegion/) are examples. Since the mid-1990s governments have been tapping the potential of the Internet to improve and governance and service provision. “In 2001, it was estimated that globally there were well over 50,000 official government Web sites with more coming online daily. In 1996 less than 50 official government homepages could be found on the world-wide-Web” (Ronaghan, 2002). Local governments are faced with growing demands of delivering information and services more efficiently and effectively and at low cost. Along with the rapid growth of technological developments, people demand high quality services that reflect their lifestyles and are accessible after normal office hours from home or work. Thus, the goals of delivering electronic government services are to simplify procedures and documentation; eliminate interactions that fail to yield outcomes; extend contact opportunities (i.e., access) beyond office hours and improve relationships with the public (Grönlund, 2002). Having an effective Web presence is critical to the success of local governments moving to adopt new technologies. Of equal importance is the evaluation of Web sites using different manual and automated methodologies and tools. In this study an evaluation of local authority Web sites was conducted to gain a practical understanding of the impact of the Internet on local governments in New Zealand using a tailor-made model specific to local governments. Issues studied focused on the information and services provided by the local authority Web sites. What is more important is whether the local government operations can or are able to support the expectations for speed, service, convenience, and delivery that the Web creates. Through identification of best practice Web sites and a set of evaluation methods and tools, this paper will provide a set of design guidelines to local authorities that would benefit and better meet the needs of their local communities.


Author(s):  
Soraj Hongladarom

The problem of global digital divide, namely disparity in Internet access and use among the various regions of the world, is a growing concern. Even though, according to some reports, the gap is getting narrower, this does not mean that the problem is disappearing, because the problem does not just consist in getting more people to become “wired,” so to speak. This chapter investigates the various relationships among the global digital divide, global justice, cultures and epistemology. Very briefly stated, not getting access to the Internet constitutes an injustice because the access is a social good that can lead to various other goods. Furthermore, as information technology is a second-order technology, one that operates on meaning bearing symbols, access to the technology is very much an issue of social epistemology, an attempt to find out the optimal way to distribute knowledge across the social and cultural domains.


Author(s):  
Stephan Kudyba ◽  
Richard Hoptroff

The world of commerce has undergone a transformation since the early 1990s, which has increasingly included the utilization of information technologies by firms across industry sectors in order to achieve greater productivity and profitability. In other words, through use of such technologies as mainframes, PCs, telecommunications, state-of-the-art software applications and the Internet, corporations seek to utilize productive resources in a way that augment the efficiency with which they provide the most appropriate mix of goods and services to their ultimate consumer. This process has provided the backbone to the evolution of the information economy which has included increased investment in information technology (IT), the demand for IT labor and the initiation of such new paradigms as e-commerce.


2002 ◽  
Vol 111 (12) ◽  
pp. 1139-1143 ◽  
Author(s):  
Dimitrios G. Balatsouras ◽  
Dimitrios Kandiloros ◽  
Antonis Kaberos ◽  
Eleftherios Ferekidis ◽  
Stavros G. Korres ◽  
...  

During recent years, the Internet has evolved into the largest computer network in the world, allowing access to vast amounts of information and services. Medical information is increasingly available to both patients and professionals, and ever more biomedical resources are becoming available on-line to assist in research, clinical medicine, and education. The Internet has always provided useful resources to otolaryngologists, implemented at various academic departments and national organizations or by specialists or specific medical web sites offering technical, scientific, and biomedical information. The purpose of this article is to provide as complete a list as possible of the World Wide Web sites accessible through the Internet that are of interest to otolaryngologists. It summarizes different types of resources available, including educational material, audiology sites, outcomes research, discussion lists, research laboratories, publications, medical libraries, news and medical conferences, organizations, academic departments, otolaryngological and medical resources, medical and surgical equipment and suppliers, and miscellaneous other sites of interest to otolaryngologists. This review is intended to present the wealth of the accessible information on the Internet and to promote the use of the network to otolaryngologists who do not have extensive experience in computers or telecommunications.


Author(s):  
A. J. Pitman ◽  
M. Gosper ◽  
D. C. Rich

<span>The design of a first year course with enrolments of about 400 students which is delivered using information technology via the Internet or Intranet is reviewed. The course is composed of a variety of information technology based applications including course materials, bulletin boards, email, quizzes, access to the World Wide Web and multimedia packages linked together using a single Internet browser interface. Access statistics through the entire course were collected hourly over the sixteen weeks of semester and separated on the basis of gender and final grade. Statistical analysis is presented which shows that different groups of students access the course in different ways. Performance in the course is statistically related to the number of times the student accesses the package. We find no evidence that males are advantaged or disadvantaged compared to females through the use of information technology although females appear to use the communications part of the course more than males. Based on the access statistics, we make recommendations on the components which seem to be well received by students and we note some components which will require more careful integration into a teaching program. Overall, the delivery of a first year course via information technology works well provided the components are carefully integrated into the course framework.</span>


2019 ◽  
Vol 22 (3) ◽  
pp. 60-70
Author(s):  
Demush Bajrami ◽  
Arburim Iseni ◽  
Anesa Topko

Subversion! Is it the symbol of invisibility, or the symbol of the secret power? What does it represent, the ability to carry the messages secretly, or the power to change the world? What are the ideas or objects that subversion challenges? The authority, people, tradition, institution, or the whole of humanity. Can it be considered as a way to brainwash or as a means to manipulate the thoughts and opinions of people? Is the power used by people to hide their feelings from others, be subversive? Is it the point where the change and progress meet? There are a lot of numerous and different questions that can be born from just a simple word subversion. At first glance, we think it is something simple, but its true meaning has power and many methods of expression. The whole idea and aim of subversion are to overthrow the existing state or situation and bring a functioning or desired change. It also supports the idea of staying behind and moving by one's own beliefs and choices. One of the common ways that we are exposed to subversive messages is through advertisements for different products, and the messages they carry on. Because of them, our subconscious mind is made to believe and desire things that we do not truly need or want. In the age of information technology and social media, subversive messages are carried much easier and shaped based on the characteristics of target audiences. Nowadays, advertisement and political campaigns directly respond to the individual requirements of target audiences, making their messages much more acceptable and influential.


2020 ◽  
Vol 2 (1) ◽  
pp. 59-68
Author(s):  
Rodianto ◽  
Muhammad Abduh Robbani ◽  
Nora Dery Sofya

In the world of education the utilization of information technology is something that must be implemented, one of which is the use of the internet which can be used as a medium for disseminating information. Informatic Study Program of Sumbawa University of Technology is a study program that has graduated many alumni, but so far there is no portal that can manage information regarding the whereabouts of its alumni. This causes the study program difficulties in getting the latest information of the alumni when needed. Therefore, in this research a website-based alumni information system was designed which aims to facilitate the Informatic Study Program of Sumbawa University of Technology in managing and searching for information related to alumni data. In building this system researchers used the PHP programming language with CodeIgniter Framework and MySQL as the database. Then for the development of this software is using Waterfall model. It is hoped that when this system is implemented it can be used by study programs and alumni in managing alumni information, making it easier and faster to conduct data collection and reporting of existing alumni data.


Author(s):  
I Ketut Sudaryana ◽  
Hadi Sanjaya ◽  
Ricky Tjong

The development of this age in the world is characterized by information technology. For a long time, humans can not be separated from technology. The development of Internet information technology effected the creation of the internet. The Internet sends people to communicate and search for information about anyone. How to find existing information is to open websites that exist on the internet. Website is a system where information in the form of text, images, sound, and others are presented in hypertext form. One of the websites that contain information is Versaillus. Versaillus is a website that contains information about a game called Mobile Legends and the manifold of Versaillus is a wiki’s site, but the website is not crowded by people. Therefore, the author will researching the site versaillus by using PIECES method. The results of this study can change the site versaillus to be better and better from PIECES method.


Sign in / Sign up

Export Citation Format

Share Document