scholarly journals Pelatihan Pemanfaatan Cloud Storage dan Weblog bagi SMA 11 Pulau Buluh

2020 ◽  
Vol 4 (1) ◽  
pp. 109
Author(s):  
Cosmas Eko Suharyanto ◽  
Alfannisa Annurrallah Fajrin

ABSTRACTTechnology has changed the way people communicate, interact and act in various tasks and activities. One of them is how people store digital data in a storage medium. Conventional storage media such as hard disks, flash disks, CD / DVDs have begun to be abandoned. One reason has begun to be abandoned is that important data is often lost along with the loss of the media. Technology, especially the internet, has become one of the solutions in the world of storage media, namely the presence of cloud technology through cloud storage. In addition to being the answer, the internet is also a means of communication through weblog media or often abbreviated as blogs. Almost the same as Cloud Computing technology, Weblog is a blog collaboration tool so that not only a user can do blogging activities, but is done together, from anywhere and at any time. Weblogs can be an effective media of information about an organization's activities. These two things are the background of the plan of Community Service activities at SMAN 11 Buluh Island Batam. For teachers, cloud storage technology has been introduced through lectures and hands-on training, while for the student council management has been trained on how to design a weblog in accordance with the needs of the school, especially the students. Teachers can take advantage of the benefits of cloud storage for various purposes. The management of OSIS SMAN 11 Buluh Islah Batam can have a means of communication and creativity event with webloging activities. ABSTRAKTeknologi telah merubah cara orang berkomunikasi, berinteraksi dan beraksi dalam berbagai tugas dan aktivitasnya. Salah satunya bagaimana orang menyimpan data-data digital dalam sebuah media penyimpanan. Media penyimpanan konvensional seperti hard disk, flash disk, CD/DVD telah mulai ditinggalkan. Salah satu alasan sudah mulai ditinggalkan yaitu data penting sering hilang bersamaan dengan hilangnya media tersebut. Teknologi khususnya internet telah menjadi salah satu solusi dalam dunia media storage yaitu hadirnya teknologi cloud melalui cloud storage. Selain menjadi jawaban tersebut, internet juga menjadi sarana komunikasi melalui media weblog atau sering disingkat dengan blog. Hampir sama seperti teknologi Cloud Computing, Weblog adalah sarana kolaborasi blog agar tidak hanya seorang user saja yang dapat melakukan aktivitas blogging, namun dikerjakan secara bersama-sama, dari mana saja dan kapan saja. Weblog dapat menjadi media informasi yang efektif tentang suatu kegiatan organisasi. Kedua hal tersebut yang melatar belakangi rencana kegiatan Pengabdian kepada Masyarakat di SMAN 11 Pulau Buluh Batam. Bagi para guru telah diperkenalkan teknologi cloud storage melalui ceramah dan pelatihan langsung, sedangkan bagi pengurus OSIS telah dilatih bagaimana mendesain sebuah weblog sesuai dengan kebutuhan sekolah khususnya para siswa-siswinya. Para guru dapat memanfaatkan berbagai keunggulan pengimpanan awan untuk berbagai keperluan. Pengurus OSIS SMAN 11 Pulau Buluh Batam dapat memiliki sarana komunikasi dan ajang kreatifitas dengan aktivitas webloging.

Author(s):  
Restu Maulunida ◽  
Achmad Solichin

At present, the need to access the data have been transformed into digital data, and its use has been growing very rapidly. This transformation is due to the use of the Internet is growing very rapidly, and also the development of mobile devices are growing massively. People tend to store a lot of files in their storage and transfer files from one media to another media. When approaching the limit of storage media, the fewer files that can be stored. A compression technique is required to reduce the size of a file. The dictionary coding technique is one of the lossless compression techniques, LZW is an algorithm for applying coding dictionary compression techniques. In the LZW algorithm, the process of forming a dictionary uses a future based dictionary and encoding process using the Fixed Length Code. It allows the encoding process to produce a sequence that is still quite long. This study will modify the process of forming a dictionary and use Variable Length Code, to optimize the compression ratio. Based on the test using the data used in this study, the average compression ratio for LZW algorithm is 42,85%, and our proposed algorithm is 38,35%. It proves that the modification of the formation of the dictionary we proposed has not been able to improve the compression ratio of the LZW algorithm.


Repositor ◽  
2020 ◽  
Vol 2 (2) ◽  
pp. 165
Author(s):  
Miftakhudin Kusuma Wijaya ◽  
Zamah Sari ◽  
Mahar Faiqurahman

ABSTRAKCloud storage merupakan salah satu bentuk dari cloud computing yang terpusat pada media penyimpanan data. Dalam cloud storage ada kemungkinan yang di alami seperti kehilangan data dengan sekala kecil maupun besar, ataupun tidak dapat di akses sama sekali. Kesalahan yang terjadi akibat bencana alam, kesalahan manusia, ataupun alat yang cukup usang. Dari permasalahan tersebut di lakukan backup dan sinkronisasi data untuk menanggulangi permasalahan yang ada. Replikasi adalah proses yang di gunakan untuk menyalin atau mendistribusikan data dari penyedia layanan ke perangkat backup. Replikasi yang di gunakan ada dua yaitu replikasi database MySql dan replikasi data Rsync, dan untuk menjaga agar cloud storage tetap menyediakan sumber daya untuk pengguna dengan menambahkan metode failover. Failover adalah peralihan dari sebuah perangkat penyedia layanan ke perangkat backup ketika mengalami permasalahan yang tidak di inginkan. Pada penelitian ini akan menjelaskan bagaimana cara membangun dan mengimplementasi infrastruktur cloud storage dengan replikasi untuk backup juga sinkronisasi data dan failover untuk memberikan ketersediaan sumber daya layanan untuk pengguna secara realtime.ABSTRACTCloud storage is one form of cloud computing but is centered on data storage media. In cloud storage there is the possibility of data loss with small or large scale or can not be accessed at all. It can happen from natural disasters, human error, or device oldness. From these problems we can do data backup and data synchronization to overcome these problems. Replication is a process that used to copy or distribute data from service providers to backup devices. This replication using two ways, there is replication database using MySql and data replication using Rsync. To keep cloud storage provide resource for user by adding failover. This failover is a transition from a service provider device when having problems to backup device. In this study will explain how to build and implementation cloud storage infrastructure with replication for backup as well as data synchronization and failover to provide real-time availability of service resources for users.


2020 ◽  
Vol 17 (4) ◽  
pp. 1590-1594
Author(s):  
V. Sathya ◽  
A. Shiny ◽  
S. Sajid Hussain ◽  
Ashutosh Gauda

Cloud computing is the movement of enlisting computing services like organization servers, accumulating databases, arranging, programming examination over the Internet. Companies offering these computing services are known as cloud providers and typically charge for cloud computing services based on usage, similar to how you are billed for water or electricity at home. It enables the companies to consume a compute resource, such as a Virtual Machine (VM), storage or an application, as a utility—just like electricity—rather than building and maintaining large computing materials in the house. Though servers are greatly protected against unauthorized access, there are incidents where classified data stored on servers are accessed by the maintenance staffs. So, the security plays a major role in cloud storage as when the user stores the data in the cloud, it stays there and anybody accessing it cannot be known at all. Hence, this paper mainly deals with the idea of storing data securely in the cloud using Symmetric and Asymmetric Cryptography algorithms including AES, 3DES, Blowfish, RSA along with modern Steganography LSB algorithm for wireless communication which hides the key inside the cover image.


Author(s):  
Hariyo Sasongko ◽  
T Yudi Hadiwandra

At this time, computer systems and networks are an essential part of human life. The number can see this of computer users in the office or on campus, and at school. This need has reached a relatively large number. To access data, many computer users in the network continue to increase, impacting the selection of servers, and large data storage media is necessary. Currently, the storage media that is often used to store data still uses physical media such as hard disks, flash disks that are virus-prone and easy to lose. Another problem also arises when physical storage has a relatively high price compared to cloud storage that can be accessed anywhere when needed.


Educational Institutions are storing their data and their transactions in the physical media such as registers, books, records and in digital media like hard disks and in cloud storage. These type of storage media are insecure and are prone to data tampering. Even when they are protected with a password, they can be altered if the user’s password has been hacked, which means the traditional methods of record keeping are insecure. Blockchain has a decentralized architecture which store and secure transactions transparently and there will be no central authority over those occurring transactions. So, a model is implemented which uses the core technology of the Block-chain to store and secure the institutional data which will be in the form of transactions. These transactions can be easily viewed by anyone in the connected network. Even if the data is tampered it can be detected easily. This model has the advantages of Block-chain minus the investments and risks associated with it.


The Information Technology is an essential discipline in our daily activities. We use our mobile phones often to communicate with our loved ones, research over the internet, and much more. Organizations and institutions today solely rely on computers configured over networks in their daily operations. Organizations prefer having their information backed up on virtual servers referred to as cloud computing. Cloud computing is among the safest measures to information security. We often share information either directly using storage media or over the internet. Information shared or stored over the internet is prone to attacks referred to as cyberattacks. Cyberattacks can result in total impairment of an organization’s data, blockage of part or the whole information in the form of a trojan. At this point, the attacker demands payment before they grant you access to your information. Cyberattacks have thus resulted in organizations encrypting their information. However, despite the use of advanced encryption technique, cyber attackers have gone beyond this level of technology to hack into the data by gaining access to the decryption key. Researchers have thus come up with cyber insurance, which offers security to organizations’ and businesses’ information. Cyber insurance uses high-level algorithms that are difficult for the attackers to understand. It minimizes cases of information compromisation.


Author(s):  
Mark Peffley ◽  
Alexander Denison ◽  
Travis N. Taylor

The chapter examines the current state of print, electronic, and social media in Europe and the US, and how its evolution has influenced mass behaviour, political representation, and democratic governance. We begin by surveying the dramatic changes that have taken place in the media environment—the shift in media technology from print to broadcast to the Internet, and how these changes influence the information environment and thus, the behaviour of citizens and elites. We then assess how various facets of the electronic media—that is, broadcast news, cable, partisan news, the Internet, and social media—influence political behaviour and representation. Despite a few exceptions, transformations in print, electronic, and social media in liberal democracies have tended to degrade the quality of representation in the last two decades, particularly in the US, where market forces are stronger and government regulations designed to buffer the market are weaker.


2021 ◽  
Vol 1 (2) ◽  
pp. 60-70
Author(s):  
Hindreen Rashid Abdulqadir ◽  
Subhi R. M. Zeebaree ◽  
Hanan M. Shukur ◽  
Mohammed Mohammed Sadeeq ◽  
Baraa Wasfi Salim ◽  
...  

The exponential growth of the Internet of Things (IoT) technology poses various challenges to the classic centralized cloud computing paradigm, including high latency, limited capacity, and network failure. Cloud computing and Fog computing carry the cloud closer to IoT computers in order to overcome these problems. Cloud and Fog provide IoT processing and storage of IoT items locally instead of sending them to the cloud. Cloud and Fog provide quicker reactions and better efficiency in conjunction with the cloud. Cloud and fog computing should also be viewed as the safest approach to ensure that IoT delivers reliable and stable resources to multiple IoT customers. This article discusses the latest in cloud and Fog computing and their convergence with IoT by stressing deployment's advantages and complexities. It also concentrates on cloud and Fog design and new IoT technologies, enhanced by utilizing the cloud and Fog model. Finally, transparent topics are addressed, along with potential testing recommendations for cloud storage and Fog computing, and IoT.


2019 ◽  
Vol 8 (4) ◽  
pp. 4163-4169

Recently, the growth of the internet is increased day by day also the digital data such as videos, images and audio availability to the public get increased rapidly. The society required intellectual property protection. To protect the media from other attack intruders and avoid business loss is the requirement of digital media produced. Introducing watermarks can be useful to safeguard copyright. In this review an effort is made to explore various aspects of watermarking, algorithms used, and to carry out a comparative study of these techniques based on their classifications.


2020 ◽  
Vol 16 (2) ◽  
pp. 217-227
Author(s):  
Xingzhi Zhao

AbstractWith the rapid development of digital media technology represented by the Internet and convergent media, human society entered the “meta-media age” at the end of the twentieth century. Regarded as the “media of media,” meta-media, or the terminal screens connected by the Internet, integrate all existing media forms and their communication patterns by translating, remodeling, and even re-forming their sign-texts. Accordingly, “remediation” has become the dominant way to construct the meaning of signs in meta-media. It should be noted that the remediation of meta-media changes not only the form of the existing media, but also the way we communicate with signs. Hence, from the perspective of the semiotics of communication, this paper considers the features and cultural influence of symbolic communication in the meta-media age based on Roman Jakobson’s six factors/functions of signs model.


Sign in / Sign up

Export Citation Format

Share Document