Blog campur-campur

Load Balancing

Fahmi Rizwansyah says:

From Wikipedia, the free encyclopedia

In computer networking, load balancing is a technique to spread work between two or more computers, network links, CPUs, hard drives, or other resources, in order to get optimal resource utilization, maximize throughput, and minimize response time. Using multiple components with load balancing, instead of a single component, may increase reliability through redundancy. The balancing service is usually provided by a dedicated program or hardware device (such as a multilayer switch).
It is commonly used to mediate internal communications in computer clusters, especially high-availability clusters.


For Internet services
One of the most common applications of load balancing is to provide a single Internet service from multiple servers, sometimes known as a server farm. Commonly load-balanced systems include popular web sites, large Internet Relay Chat networks, high-bandwidth File Transfer Protocol sites, NNTP servers and DNS servers.
For Internet services, the load balancer is usually a software program which is listening on the port where external clients connect to access services. The load balancer forwards requests to one of the "backend" servers, which usually replies to the load balancer. This allows the load balancer to reply to the client without the client ever knowing about the internal separation of functions. It also prevents clients from contacting backend servers directly, which may have security benefits by hiding the structure of the internal network and preventing attacks on the kernel's network stack or unrelated services running on other ports.
Some load balancers provide a mechanism for doing something special in the event that all backend servers are unavailable. This might include forwarding to a backup load balancer, or displaying a message regarding the outage.
An alternate method of load balancing which does not necessarily require a dedicated software or hardware node, is called round robin DNS. In this technique, multiple IP addresses are associated with a single domain name (i.e. www.example.org); clients themselves are expected to choose which server to connect. Unlike the use of a dedicated load balancer, this technique is not "transparent" to clients, because it exposes the existence of multiple backend servers. The technique has other advantages and disadvantages, depending on the degree of control over the DNS server and the granularity of load balancing which is desired.
A variety of scheduling algorithms are used by load balancers to determine which backend server to send a request to. Simple algorithms include random choice or round robin. More sophisticated load balancers may take into account additional factors, such as a server's reported load, recent response times, up/down status (determined by a monitoring poll of some kind), number of active connections, geographic location, capabilities, or how much traffic it has recently been assigned. High-performance systems may use multiple layers of load balancing.
In addition to using dedicated hardware load balancers, software-only solutions are available, including open source options. Examples of the latter include the Apache web server's mod_proxy_balancer extension and the Pound reverse proxy and load balancer.


Persistence
An important issue when operating a load-balanced service is how to handle information that must be kept across the multiple requests in a user's session. If this information is stored locally on one back end server, then subsequent requests going to different back end servers would not be able to find it. This might be cached information that can be recomputed, in which case load-balancing a request to a different back end server just introduces a performance issue.
One solution to the session data issue is to send all requests in a user session consistently to the same back end server. This is known as "persistence" or "stickiness". A large downside to this technique is its lack of automatic failover: if a backend server goes down, its per-session information becomes inaccessible, and sessions depending on it are lost.
Assignment to a particular server might be based on a username, client IP address, or random assignment. Due to DHCP, Network Address Translation, and web proxies, the client's IP address may change across requests, and so this method can be somewhat unreliable. Random assignments must be remembered by the load balancer, which creates a storage burden. If the load balancer is replaced or fails, this information can be lost, and assignments may need to be deleted after a timeout period or during periods of high load, to avoid exceeding the space available for the assignment table. The random assignment method also requires that clients maintain some state, which can be a problem, for example when a web browser has disabled storage of cookies. Sophisticated load balancers use multiple persistence techniques to avoid some of the shortcomings of any one method.
Another solution is to keep the per-session data in a database. Generally this is bad for performance since it increases the load on the database: the database is best used to store information less transient than per-session data. (Interestingly, to prevent a database from becoming a single point of failure, and to improve scalability, the database is often replicated across multiple machines, and load balancing is used to spread the query load across those replicas.)
Fortunately there are more efficient approaches. In the very common case where the client is a web browser, per-session data can be stored in the browser itself. One technique is to use a browser cookie, suitably time-stamped and encrypted. Another is URL rewriting. Storing session data on the client is generally the preferred solution: then the load balancer is free to pick any backend server to handle a request.

Load balancer features
Hardware and software load balancers can come with a variety of special features.

* Asymmetric load: A ratio can be manually assigned to cause some backend servers to get a greater share of the workload than others. This is sometimes used as a crude way to account for some servers being faster than others.
* Priority activation: When the number of available servers drops below a certain number, or load gets too high, standby servers can be brought online
* SSL Offload and Acceleration: SSL applications can be a heavy burden on the resources of a Web Server, especially on the CPU and the end users may see a slow response (or at the very least the servers are spending a lot of cycles doing things they weren't designed to do). To resolve these kinds of issues, a Load Balancer capable of handling SSL Offloading in specialized hardware may be used. When Load Balancers are taking the SSL connections, the burden on the Web Servers is reduced and performance will not degrade for the end users.
* Distributed Denial of Service (DDoS) attack protection: load balancers can provide features such as SYN cookies and delayed-binding (the back-end servers don't see the client until it finishes its TCP handshake) to mitigate SYN flood attacks and generally offload work from the servers to a more efficient platform.
* HTTP compression: reduces amount of data to be transferred for HTTP objects by utilizing gzip compression available in all modern web browsers
* TCP offload: different vendors use different terms for this, but the idea is that normally each HTTP request from each client is a different TCP connection. This feature utilizes HTTP/1.1 to consolidate multiple HTTP requests from multiple clients into a single TCP socket to the back-end servers.
* TCP buffering: the load balancer can buffer responses from the server and spoon-feed the data out to slow clients, allowing the server to move on to other tasks.
* HTTP caching: the load balancer can store static content so that some requests can be handled without contacting the web servers.
* Content Filtering: some load balancers can arbitrarily modify traffic on the way through.
* HTTP security: some load balancers can hide HTTP error pages, remove server identification headers from HTTP responses, and encrypt cookies so end users can't manipulate them.
* Priority queuing: also known as rate shaping, the ability to give different priority to different traffic.
* Content aware switching: most load balancers can send requests to different servers based on the URL being requested.
* Client authentication: authenticate users against a variety of authentication sources before allowing them access to a website.
* Programmatic traffic manipulation: at least one load balancer allows the use of a scripting language to allow custom load balancing methods, arbitrary traffic manipulations, and more.
* Firewall: Direct connections to backend servers are prevented, for security reasons

In telecommunications
Load balancing can be useful when dealing with redundant communications links. For example, a company may have multiple Internet connections ensuring network access even if one of the connections should fail.
A failover arrangement would mean that one link is designated for normal use, while the second link is used only if the first one fails.
With load balancing, both links can be in use all the time. A device or program decides which of the available links to send packets along, being careful not to send packets along any link if it has failed. The ability to use multiple links simultaneously increases the available bandwidth.
Major telecommunications companies have multiple routes through their networks or to external networks. They use more sophisticated load balancing to shift traffic from one path to another to avoid network congestion on any particular link, and sometimes to minimize the cost of transit across external networks or improve network reliability.

Relationship with failover
Load balancing is often used to implement failover — the continuation of a service after the failure of one or more of its components. The components are monitored continually (e.g., web servers may be monitored by fetching known pages), and when one becomes non-responsive, the load balancer is informed and no longer sends traffic to it. And when a component comes back on line, the load balancer begins to route traffic to it again. For this to work, there must be at least one component in excess of the service's capacity. This is much less expensive and more flexible than failover approaches where a single "live" component is paired with a single "backup" component that takes over in the event of a failure. In a RAID disk controller, using RAID1 (mirroring) is analogous to the "live/backup" approach to failover, where RAID5 is analogous to load balancing failover.

Network Load Balancing Services (NLBS)
is a proprietary Microsoft implementation of clustering and load balancing that is intended to provide high availability and high reliability, as well as high scalability. NLBS is intended for applications with relatively small data sets that rarely change (one example would be web pages), and do not have long-running-in-memory states. These types of applications are called stateless applications, and typically include Web, File Transfer Protocol (FTP), and virtual private networking (VPN) servers. Every client request to a stateless application is a separate transaction, so it is possible to distribute the requests among multiple servers to balance the load. One attractive feature of NLBS is that all servers in a cluster monitor each other with a heartbeat signal, so there is no single point of failure.

Configuration Tips:
* The network load balancing service requires for all the machines to have the correct local time. Ensure the Windows Time Service is properly configured on all hosts to keep clocks synchronized. Unsyncronized times will cause a network login screen to pop up which doesn't accept valid login credentials.
* The server console can't have any network card dialogue boxes open when you are configuring the "Network Load Balancing Manager" from your client machine.
* You have to manually add each load balancing server individually to the load balancing cluster after you've created a cluster host.
* To allow communication between servers in the same NLB cluster, each server requires the following registry entry: a DWORD key named "UnicastInterHostCommSupport" and set to 1, for each network interface card's GUID (HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\WLBS\Parameters\Interface\{GUID})
* NLBS may conflict with some Cisco routers, which are not able to resolve the IP address of the server and must be configured with a static ARP entry.

Cheers, frizzy2008.

Tren visitor

Fahmi Rizwansyah says:

Dunia maya memang keras ya sob...


Dasar memang modalku cuma blogwalking, jadi nasibnya ya seperti ini. Kalo lagi rajin dan konsentrasi, mestinya bisa dapat tinggi. Tapi waktu harus share dengan keluarga dan meninggalkan aktifitas blogging, tren visitor langsung menukik tajam.
Gak papa, teteup semangat, setelah ini aku akan menganalisa http://xsemua.blogspot.com/ dan http://jokosupriyanto.com/. Mengapa mereka bisa sebegitu hebat trafficnya di http://www.indotopblog.com/.
Harus belajar lagi ni!!! mohon bantuannya yaa para bloggerous.

Cheers, frizzy.

Pagerank from Google Official Site

Fahmi Rizwansyah says:

Technology Overview <--original posting, translated by google.
Tinjauan teknologi

We stand alone in our focus on developing the "perfect search engine," defined by co-founder Larry Page as something that, "understands exactly what you mean and gives you back exactly what you want."
Kami berdiri sendiri dalam kami fokus pada pengembangan "mesin pencari sempurna," ditetapkan oleh pendiri bersama Larry Page sebagai sesuatu yang "mengerti apa yang Anda maksud dan memberikan kembali apa yang Anda inginkan."
To that end, we have persistently pursued innovation and refused to accept the limitations of existing models.
Untuk itu, kami telah diikuti persistently inovasi dan menolak untuk menerima keterbatasan model yang ada.


As a result, we developed our serving infrastructure and breakthrough PageRank™ technology that changed the way searches are conducted.
Akibatnya, kami mengembangkan infrastruktur kami melayani dan terobosan teknologi PageRank ™ yang mengubah cara pencarian dilakukan.

From the beginning, our developers recognized that providing the fastest, most accurate results required a new kind of server setup.
Dari awal, kami mengakui bahwa pengembang menyediakan tercepat dan paling akurat hasil diperlukan baru jenis server.
Whereas most search engines ran off a handful of large servers that often slowed under peak loads, ours employed linked PCs to quickly find each query's answer.
Sedangkan kebanyakan mesin pencari berlari off segelintir dari server besar yang sering melambat di bawah beban puncak, kami bekerja terhubung ke komputer dengan cepat menemukan jawaban dari setiap pencarian.
The innovation paid off in faster response times, greater scalability and lower costs.
Inovasi yang dibayar di respon kali lebih cepat, lebih rendah biaya dan skalabilitas.
It's an idea that others have since copied, while we have continued to refine our back-end technology to make it even more efficient.
Ada ide yang lain ada sejak disalin, sementara kami telah berlanjut untuk memperbaiki kami kembali akhir teknologi agar lebih efisien.

The software behind our search technology conducts a series of simultaneous calculations requiring only a fraction of a second.
Perangkat lunak di balik teknologi pencarian kami melakukan serangkaian kalkulasi serentak hanya memerlukan beberapa detik.
Traditional search engines rely heavily on how often a word appears on a web page.
Tradisional mesin pencari sangat bergantung pada seberapa sering sebuah kata muncul di halaman web.
We use more than 200 signals, including our patented PageRank™ algorithm, to examine the entire link structure of the web and determine which pages are most important.
Kami menggunakan lebih dari 200 sinyal, kami termasuk paten algoritma PageRank ™, untuk memeriksa seluruh struktur link di web dan menentukan halaman yang paling penting.
We then conduct hypertext-matching analysis to determine which pages are relevant to the specific search being conducted.
Kami kemudian melakukan hypertext-matching analisis untuk menentukan halaman mana yang relevan dengan pencarian khusus yang dilakukan.

By combining overall importance and query-specific relevance, we're able to put the most relevant and reliable results first.
Dengan menggabungkan seluruh kepentingan dan relevansi permintaan khusus, kami dapat menempatkan yang paling relevan dan dapat dipercaya hasil pertama.

PageRank Technology: PageRank reflects our view of the importance of web pages by considering more than 500 million variables and 2 billion terms.
Teknologi PageRank: PageRank mencerminkan pandangan kami akan pentingnya halaman web dengan mempertimbangkan lebih dari 500 juta variabel dan 2 miliar istilah.
Pages that we believe are important pages receive a higher PageRank and are more likely to appear at the top of the search results.
Halaman yang kami percaya adalah penting halaman menerima PageRank yang lebih tinggi dan lebih mungkin untuk muncul di bagian atas hasil pencarian.

PageRank also considers the importance of each page that casts a vote, as votes from some pages are considered to have greater value, thus giving the linked page greater value.
PageRank juga mempertimbangkan pentingnya setiap halaman yang membuat suara, karena dinilai dari beberapa halaman dianggap memiliki nilai lebih besar, sehingga memberikan nilai lebih besar halaman yang terhubung.
We have always taken a pragmatic approach to help improve search quality and create useful products, and our technology uses the collective intelligence of the web to determine a page's importance.
Kami selalu melakukan pendekatan pragmatis pencarian untuk membantu meningkatkan kualitas dan menciptakan produk yang bermanfaat, dan kami akan menggunakan teknologi intelijen kolektif dari web untuk menentukan kepentingan halaman.

Hypertext-Matching Analysis: Our search engine also analyzes page content.
Hypertext-Pencocokan Analisis: Kami mencari mesin juga menganalisis konten halaman.
However, instead of simply scanning for page-based text (which can be manipulated by site publishers through meta-tags), our technology analyzes the full content of a page and factors in fonts, subdivisions and the precise location of each word.
Namun, daripada hanya sekadar membaca sepintas teks berdasarkan halaman (yang dapat dimanipulasi oleh penerbit situs melalui meta-tag), teknologi kami menganalisis keseluruhan konten halaman dan berbagai faktor berupa font, subdivisi, dan lokasi dari setiap kata.
We also analyze the content of neighboring web pages to ensure the results returned are the most relevant to a user's query.
Kami juga menganalisis konten halaman web di sekitarnya untuk memastikan hasil yang paling relevan dengan permintaan pengguna.

Our innovations don't stop at the desktop.
Inovasi kami tidak berhenti pada desktop.
To give people access to the information they need, whenever and wherever they need it, we continue to develop new mobile applications and services that are more accessible and customizable.
Untuk memberikan akses masyarakat ke informasi yang mereka butuhkan, kapanpun dan dimanapun mereka memerlukannya, kami terus mengembangkan aplikasi baru ponsel dan layanan yang lebih mudah dan dapat diatur.
And we're partnering with industry-leading carriers and device manufacturers to deliver these innovative services globally.
Dan kami bermitra dengan industri terkemuka operator dan produsen perangkat ini inovatif untuk memberikan layanan global.
We're working with many of these industry leaders through the Open Handset Alliance to develop Android, the first complete, open, and free mobile platform, which will offer people a less expensive and better mobile experience.
Kami bekerja dengan banyak pemimpin industri ini melalui Open Handset Alliance untuk mengembangkan Android, pertama selesai, terbuka, dan bebas platform mobile, yang akan menawarkan orang-orang yang lebih mahal dan kurang pengalaman mobile.

Life of a Google Query
The life span of a Google query normally lasts less than half a second, yet involves a number of different steps that must be completed before results can be delivered to a person seeking information.



Cheers, frizzy.

Selamat Hari Raya Imlek

Fahmi Rizwansyah says:


Selamat Hari Raya Imlek
Bagi sobat-sobat yang merayakannya.
Mari kita bersatu dengan semangat Bhinneka Tunggal Ika, bekerja keras bersama-sama menuju masyarakat adil makmur sejahtera kertaraharja.

Cheers, frizzy.

Review my blog, please...

Fahmi Rizwansyah says:

Mau minta tolong sama teman-teman blogger untuk mereview blogku. Mohon reviewnya ditulis di comment. Jenis reviewnya bebas bisa mencakup seperti di bawah ini:
  1. Design, mulai dari template, warna, layout, penempatan banner dll
  2. Content, mulai dari artikel, gambar, banner dll
  3. Attractiveness, mulai dari visitor interaction, reply response dll
  4. Dan semua yang bisa direview/dikomentari.
Review/comment yang telah disubmit tidak akan dihapus termasuk yang bersifat offensive, mengandung pornografi, mengandung SARA, kecuali yang bersifat kekanak-kanakan (resiko tanggung sendiri yaa).

Bagi teman-teman yang berminat aku review, hendaknya membuat judul posting yang sama atau mirip atau apa saja yang penting mengandung subject yang dikhususkan untuk review.
Tujuan saling mereview ini adalah untuk belajar membaca, mendengar dan menuliskan kembali apa yang ada dalam benak blogger, sekaligus berlatih untuk menjadi reviewer dalam rangka terjun ke dalam bisnis Paid To Review.
Semoga ide ini bisa diterima yaa. Kalau pun tidak? yaa namanya juga usaha...Peace!!! --slanker mode: on--

Lumayan buat ngisi waktu libur panjang, itu juga kalo gak direcokin oleh anggota keluarga yang lain.


Cheers, frizzy2008.

Microsoft Business Intelligence Conference 2009

Fahmi Rizwansyah says:

It's not just data anymore. It's a new form of energy.
Microsoft SQL Server 2008 and Microsoft Office PerformancePoint Server 2007



Seperti biasa sob, kalo tidak ada makan-makan, bisa-bisa aku gak jadi datang ke acara ini...hihihi


Cheers, frizzy2008.

Alcohol Treatment

Fahmi Rizwansyah says:

Alcohol Fact Sheet
Description/Overview
Alcohol (ethanol or ethyl alcohol) is one of the most commonly abused drugs in our society. Alcohol:
• Is a Central Nervous System depressant (slows down body reactions and general brain function)
• There are two kinds of alcohol:
o Ethyl - found in “beverage” alcohol (beer, wine, spirits and liquors). Ethyl is also present in “non-beverage” alcohol (rubbing alcohol, mouthwash, cooking wine)
o Methyl - found in solvents (paint removers, antifreeze, household products)

Short – Term Effects
• Sense of well being, euphoria and release of inhibitions and tension
• Drowsiness, dizziness and flushing
• Affected speech, balance, and vision
• At higher doses, the effects may be reversed (from euphoria to depression and suicidal behaviour)
• “Hangover” feeling (syndrome of fatigue, headache, nausea, vomiting, and shakiness)

Long – Term Effects
• Heavy drinking over a long period of time (more than 2 drinks per day) can lead to serious health problems such as:
o Stomach ulcers, disorders of the pancreas, liver damage/disease
o Sexual problems/impotence/reproductive problems
o Brain damage
o Certain types of cancer
o Heart disease
o Blackouts (loss of memory)
• Depression is common
• Disruptions in social, work and family life,
• Financial and legal problems

Dependence Potential
• Nervous system adapts to the presence of a chronic depressant and physical dependence develops
• Psychological dependence can also occur, in which users may experience anxiety and even panic when alcohol is not available
• Regular use leads to needing increased doses to produce the desired/same effect (tolerance)
• Regular users of alcohol may not appear to be drunk, but it still is not safe for them to drive a car or perform other tasks

Withdrawal
• Withdrawal effects may range depending upon severity of physical dependence:
• Withdrawal symptoms may include and progress over three stages:
1. Tremulousness (the shakes), irritability, nausea and vomiting, difficulty sleeping. These symptoms may occur a few hours after drinking stops and peak within 24 to 48 hours and then subside in 2 or 3 days. This is the stage where alcohol hallucinations can occur
2. Convulsions (seizures) can develop within 24 to 48 hours after stopping heavy drinking. Convulsions can last from 5 to 20 days
3. Delirium tremens (DTs) is the most serious stage of alcohol withdrawal. Occur 4 or 5 days after heavy/prolonged drinking stops. A person can become extremely confused, agitated and disoriented, with dilated pupils, fever and rapid heart rate

*Drinking during pregnancy can result in birth of FASD (Fetal Alcohol Spectrum Disorder) children

The Addiction Centre aims to:
* Bridge the gap between addiction and physical/ psychiatric treatment services.
* Provide a bio-psycho-social assessment.
* Provide a treatment and referral service that encourages patients to be active participants in their treatment and take responsibility for their overall well-being.
* Provide a multi-dimensional model of care to meet the needs of our patients.
* Teach and train health care professionals about concurrent disorders.
* Evaluate assessments and interventions using standardized evaluation tools.

Scope of Service:
* Hours of Operation: Monday to Friday 08:30 a.m. - 4:15 p.m.
* Assessment Clinics: Available at various times Monday to Friday.
* Individual and Group Therapy: Available at various times Monday to Friday.


Adult Programs (Age 18 and older)
Description of Services

The Adult Program specializes in the assessment and treatment of adults with substance related issues and/or behavioural addiction combined with a major psychiatric and/or physical disorder (eg. chronic pain).

Treatment
Each patient is provided with a case manager. The case manager meets with the patient at least once a week and coordinates the patient's treatment plan.
Treatment is multidisciplinary and may involve individual counselling, milieu therapy, group therapy, psychological assessment and testing, patient education about substance abuse and medications, pain assessment and management, social skills training, occupational assessment and counselling, recreation therapy, leisure counselling, and family therapy. Some medication treatment and monitoring is provided.

Treatment Includes:
Assessment Level I
Biopsychosocial assessment utilizing the Addiction Severity Index with case management and support by an interdisciplinary team. Outpatient Programs (Mon. to Fri.)
Groups are offered for individuals at varying levels of treatment readiness, from level II to level IV. Psychoeducational, insight-oriented cognitive behavioral, and support groups.
* Addiction Centre Level II Program Overview
* Addiction Centre Level III Program Overview
* Addiction Centre Level IV Program Overview

Specialized Groups
Addiction group therapy is offered for gambling, chronic pain, couples, nicotine dependence and open group for individuals experiencing a severe and persistent mental illness who can come to group as they please. Psychoeducational, insight-oriented cognitive behavioral, and support groups.

Individual and Family Psychotherapy
Therapy is supportive, cognitive behavioural, systemic, and uses motivational enhancement techniques.

Referral Service
After the assessment, treatment may include a referral to other appropriate community services (AADAC, Residential Programs, Detoxification & Stabilization, EFAP counselling and/or Psychiatric Services).

Claresholm Centre for Mental Health and Addictions
The Concurrent Disorders Residential Program at Claresholm is intended for individuals with concurrent disorders 18 and older who would benefit from residential treatment. For additional information click here

Addiction Network
The Addiction Network includes acute care and community based satellites. Each Addiction Network satellite provides enhanced consultation services to individuals presenting with a history of substance abuse/behavioural addiction concurrent with a significant psychiatric and/or medical diagnosis. Services are supported by a registered nurse, psychologist, and consulting family physician and/or psychiatrist.

Self Assessment
Question 1
In your life, which of the following substances have you ever used? (NON-MEDICAL USE ONLY) No Yes
a. Tobacco products (cigarettes, chewing tobacco, cigars, etc.)
b. Alcoholic beverages (beer, wine, spirits, etc.)
c. Cannabis (marijuana, pot, grass, hash, etc.)
d. Cocaine (coke, crack, etc.)
e. Amphetamine type stimulants (speed, diet pills, ecstacy, etc.)
f. Inhalants (nitrous, glue, petrol, paint thinner, etc.)
g. Sedatives or Sleeping Pills (Valium, Serepax, Rohypnol, etc.)
h. Hallucinogens (LSD, acid, mushrooms, PCP, Special K, etc.)
i. Opioids (heroin, morphine, methadone, codeine, etc.)
j. Other - specify:

Cheers, frizzy2008.

Charter Aircraft Average Pricing

Fahmi Rizwansyah says:

Mungkin ada yang butuh pelayanan charter pesawat, ini ada artikel buat overview.

Charter Aircraft Average Pricing

King Air
Turbo Prop
Rate: $1200/hr
Block Speed: 230 Kts.
No. Of Passengers: up to 9
Range: 500 - 1000 sm
Lavatory: Yes
Hot/Cold Catering: Both

All the comfort of an Executive Jet at half the cost, a great airplane for medium trips spacious cabin. Has the same short field runway capability as the piston twins.

Citation
Light Jet
Rate: $1,850/hr
Block Speed: 330 Kts.
No. Of Passengers: 4-6
Range: 1500 sm
Lavatory: Yes
Hot/Cold Catering: Both

Luxurious, economic, the light jet category is perfect for one-day business meetings. If efficiency is important, this is the perfect aircraft and it includes all the amenities.

Lear
Medium Jet
Rate: $2,650/hr
Block Speed: 360 Kts.
No. Of Passengers: 6-8
Range: 2,500 sm
Lavatory: Yes
Hot/Cold Catering: Both

Our medium jet category enables you to take your marketing team or your family on long trips. Increase your productivity or even hold a meeting on board Time is Money.

Gulfstream
Heavy Jet
Rate: $4,900/hr
Block Speed: 400 Kts.
No. Of Passengers: 12 to 15
Range: 4000 to 4900sm
Lavatory: Yes
Hot/Cold Catering: Both

The perfect airplane for coast-to-coast or global trips, New York to LA or New York to Europe Once you fly on One of these Jets you will never fly on the airlines again. Large spacious cabin ideal for setting up a mobile office, Along with the convenience of a personal flight attendant, you also will have access to on-board Flight Phone, Sat Phone, DVD, Internet and teleconferencing capabilities.

* The Above Hourly prices will vary up and down depending on the 135 operator, aircraft model and aircraft age including current fuel surcharges.

by http://www.privatejetcharters.com/Charterprices.htm
Cheers, frizzy2008.

Cloud Computing

Fahmi Rizwansyah says:

by some resources

Cloud computing provides a cost-effective architecture that has enabled new business models including Platform-as-a-Service (Paas) and Software-as-a-Service (SaaS). The financial crisis might spell good news for cloud providers up and down the stack. According recent articles, IDC predicts that the current economic crisis in the U.S. will contribute to cloud computing growth over the next five years and spending on IT cloud services will reach $42 billion by 2012. Frank Gens, senior vice president and chief analyst at IDC believes, "The disruptive vectors of the market will be among the highest growth sectors in 2009 as their advantages are magnified in a down economy, and suppliers who slow down their transformation will limit long-term viability and miss near-term growth."


John Horrigan at Pew Research offered this look at cloud adoption in the consumer space, which has been driving the growth of the big public platforms long before the economic downturn. As IT organizations are pressured to find yet more efficiency it will be interesting to see how quickly they find the confidence in providers to follow consumers to the cloud. At a snap poll of attendees conducted this week at Gartner’s Data Center Conference the results appear promising.

Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.

Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.

InfoWorld talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing. Based on those discussions, here's a rough breakdown of what cloud computing is all about:

1. SaaS
This type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS "desktop" applications, such as Google Apps and Zoho Office?

2. Utility computing
The idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera's AppLogic and Cohesive Flexible Technologies' Elastic Server on Demand. Liquid Computing's LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network.

3. Web services in the cloud
Closely related to SaaS, Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications. They range from providers offering discrete business services -- such as Strike Iron and Xignite -- to the full range of APIs offered by Google Maps, ADP payroll processing, the U.S. Postal Service, Bloomberg, and even conventional credit card processing services.

4. Platform as a service
Another SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider's infrastructure and are delivered to your users via the Internet from the provider's servers. Like Legos, these services are constrained by the vendor's design and capabilities, so you don't get complete freedom, but you do get predictability and pre-integration. Prime examples include Salesforce.com's Force.com, Coghead and the new Google App Engine. For extremely lightweight development, cloud-based mashup platforms abound, such as Yahoo Pipes or Dapper.net.

5. MSP (managed service providers)
One of the oldest forms of cloud computing, a managed service is basically an application exposed to IT rather than to end-users, such as a virus scanning service for e-mail or an application monitoring service (which Mercury, among others, provides). Managed security services delivered by SecureWorks, IBM, and Verizon fall into this category, as do such cloud-based anti-spam services as Postini, recently acquired by Google. Other offerings include desktop management services, such as those offered by CenterBeam or Everdream.

6. Service commerce platforms
A hybrid of SaaS and MSP, this cloud computing service offers a service hub that users interact with. They're most common in trading environments, such as expense management systems that allow users to order travel or secretarial services from a common platform that then coordinates the service delivery and pricing within the specifications set by the user. Think of it as an automated service bureau. Well-known examples include Rearden Commerce and Ariba.

7. Internet integration
The integration of cloud-based services is in its early days. OpSource, which mainly concerns itself with serving SaaS providers, recently introduced the OpSource Services Bus, which employs in-the-cloud integration technology from a little startup called Boomi. SaaS provider Workday recently acquired another player in this space, CapeClear, an ESB (enterprise service bus) provider that was edging toward b-to-b integration. Way ahead of its time, Grand Central -- which wanted to be a universal "bus in the cloud" to connect SaaS providers and provide integrated solutions to customers -- flamed out in 2005.

Another cloud computing resources:
  1. http://en.community.dell.com/blogs/cloudcomputing/default.aspx
  2. http://www.microsoft.com/presspass/press/2008/oct08/10-27PDCDay1PR.mspx
  3. http://www.microsoft.com/azure/default.mspx
  4. http://en.wikipedia.org/wiki/Cloud_computing
other resources can be found by searching with keyword "Cloud Computing"

Ini bukan gaya-gayaan sob, tapi ini adalah tren komputer ke depan, dimana kita harus bisa dan siap mengadopsinya.
Cheers, frizzy2008.

Gaul dan terminologinya

Fahmi Rizwansyah says:

Gue anak gaul nih --> konotasinya adalah anak muda yg mudah bergaul
Bergaullah dengan temanmu sebaik-baiknya --> nasehat orang tua pada anaknya waktu mau berangkat ke sekolah
Kita hidup dalam pergaulan modern --> pidato Presiden
Gaulilah istrimu/suamimu dengan sebaik-baiknya --> nasehat perkawinan

tapi gimana kalo begini yaa
Gue anak yang mudah digauli nih???
Gaulilah temanmu sebanyak-banyaknya????

Ada masukan gak sobbb, lagi mau gaul niiii...

Cheers, frizzy2008.

Dell - The Future of Computing Tour

Fahmi Rizwansyah says:

Pagi-pagi dah mampir ke Ritz Charlton, Pacific Place untuk menghadiri acara The Future of Computing Tour yang diselenggarakan oleh Dell Indonesia.
Seru banget acaranya, semua keynote speakernya berceramah dengan semangat mengenai produk-produk Dell untuk sistem komputasi masa depan.




Ok deh, habis kenyang makan-makan prasmanan gratis, balik kantor, meeting sama beberapa klien then posting the blog.

Cheers, frizzy2008.

Network Security Appliances Overview

Fahmi Rizwansyah says:

Network Monitoring
The purpose of network monitoring is the collection of useful information from various parts of the network so that the network can be managed and controlled using the collected information. Most of the network devices are located in remote locations and they usually don't have directly connected terminals. Hence specialized tools are required to facilitate the network management application to monitor their status easily.

Bandwidth management
Heavy downloading can take its toll on network performance. Congestion and lack of responsiveness are often the result of large amounts of traffic being used by a small number of users. Sometimes even a single user can bring an entire network to a crawl as the internet gateway gets flooded with network traffic. By using Bandwidth management tools, the administrator can have full control over the network using tools to allocate desired bandwidth to specified users for specified tasks.

Traffic Analysis
Traffic analysis is the Inference or deduction of useful intelligence from patterns of observable characteristics of data flow(s), even when the data is encrypted or otherwise not directly available. The characteristics used for the evolution of such patterns include the identities and locations of the source(s) and destination(s), and the presence, amount, frequency, and duration of occurrence.

Penetration Testing
The portion of security testing in which the evaluators attempt to circumvent the security features of a system. The evaluators may be assumed to use all system design and implementation documentation, that may include listings of system source code, manuals, and circuit diagrams. The evaluators work under the same constraints applied to ordinary users. Ethical Hacking of a commissioned system is an integral part of penetration testing.

Vulnerability Analysis
Vulnerability analysis is the systematic examination of an AIS (Automated Information System for acquisition, storage, manipulation, control, display, transmission, or reception of data etc.) or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation.

Network audit
It is the process of assessing the various components and the operating environment of a computer network for vulnerabilities and other loopholes that might occur in the process of installing, configuring, or securing the network. This process may range from a relatively simple Automated audit to check a network for known vulnerabilities in the operating system through a black box or even a white box or manual audit to determine the network's overall status as compared to the prevailing "best practice".

Cheers, frizzy2008.

Selamat buat Anandita Puspitasari, pemenang Bloggership Pesta Blogger 2008

Fahmi Rizwansyah says:

Anandita Puspitasari (23), seorang peneliti junior di salah satu LSM berhasil menjadi penerima Bloggership pertama di Indonesia yang diluncurkan pada Pesta Blogger 2008 lalu.

"Ini adalah sebuah amanat, untuk lebih mengoptimalkan sumber daya yang saya miliki supaya bisa memberi manfaat lebih untuk masyarakat. Sedari awal, saya langsung merasa `klik` dengan tujuan program ini," kata Anandita Puspitasari atau Dita dalam siaran pers yang diterima ANTARA di Jakarta, Selasa

Dengan blognya yang beralamat di www.nonadita.com, dia dipilih sebaga pemenang oleh panitia seleksi yaitu Microsoft Indonesia dan "bapak blogger Indonesia" Enda Nasution.

Empat kandidat yang dikalahkan Dita yaitu Aulia Halimatussadiah (25 thn, http://salsabeela.com), Bernardus Dian Adi Prasetyo (29, http://didut.wordpress.com), Calvin Michael Sidjaja (22, http://republikbabi.com) dan Siwi Piranti Rahayu (21 thn, http://chiw,.wordpress.com)

Sebagai pemenang, Dita berhak mendapatkan hadiah sebesar Rp 15 juta, smartphone Windows Mobile, serta perjalanan selama 6 bulan ke 3 propinsi dengan biaya ditanggung Microsoft Indonesia.

Cheers, frizzy2008.

Arsip-arsip Belanda di Indonesia Dibuka

Fahmi Rizwansyah says:

Sebuah situs arsip Belanda yang sangat menarik untuk Indonesia akan dibuka untuk para peneliti, demikian dilaporkan koresponden ANTARA di Belanda, Ronald Frisart, Selasa.
Arsip Belanda itu terdiri atas delapan puluh meter bahan arsip milik Nederlands Instituut voor Oorlogsdocumentatie (NIOD, Institut dokumentasi perang Belanda).

Arsip yang dapat dibuka lewat internet itu (www.niod.nl) akan dipresentasikan pada tanggal 22 Januari di Amsterdam dan situs ini tidak hanya dalam bahasa Belanda, tetapi juga bahasa Inggris.
Dalam arsip-arsip di situs tersebut terdapat lukisan-lukisan, koran-koran Indonesia, dokumentasi pemerintah Belanda, buku harian dan catatan perkara.

Dokumentasi pemerintah Belanda dalam situs ini merupakan dokumentasi Belanda periode 9 Maret 1942 (kapitulasi KNIL/Belanda kepada Jepang), ketika tentara Jepang menguasai Indonesia sampai 15 Agustus 1945 (kapitulasi Jepang kepada tentara Sekutu).
Baca selengkapnya...

by antara.co.id
Cheers, frizzy2008.

Pandanganku tentang PRT

Fahmi Rizwansyah says:

Aku adalah penganut paham anti feodalisme. Ini pandanganku mengenai keberadaan PRT (Pembantu Rumah Tangga) di rumah.
  1. PRT adalah manusia, sama dengan majikan.
  2. Scope pekerjaannya harus jelas.
  3. PRT yang telah melewati masa probation, maka harus diperlakukan seperti pegawai.
  4. Jadwal dia bekerja, berlibur, mengambil cuti dan hak untuk bersenang-senang sebagaimana layaknya majikannya harus dihormati. PRT punya waktu privacy sendiri di luar jam kerja.
  5. Bahwa hidupnya seorang PRT itu tergantung dia sendiri bukan tergantung majikannya.
  6. Majikan hanya berhak menegur untuk kesalahan profesi dan majikan tidak berhak menggunakan anggota badannya secara langsung maupun tidak langsung menyakiti hati dan diri seorang PRT (sesuai dengan hukum UU KDRT dan Pidana)
  7. Jam kerja PRT harus mengikuti peraturan Depnaker.
  8. Majikan harus memberikan basic training dan tidak membiarkan seorang PRT mengerjakan sesuatu yang belum dia mengerti cara melakukannya. Dan majikan tidak berhak mengatakan bodoh kepada PRT untuk sesuatu hal diluar kemengertiannya. Kerusakan yang disebabkan oleh PRT harus dianalisa root causenya. Apakah karena lalai atau ketidaktahuan/ketidakmengertian.
  9. Reward dan punishment harus diterapkan namun majikan tidak boleh menerapkan aturan denda financial kepada PRT, kecuali kerusakan materi yang disebabkan oleh kelalaian profesi.
  10. Perlakuan lainnya adalah hal-hal yang sesuai dengan prinsip Pancasila dan UUD 1945.
Semoga pemikiran ini bisa membuka wacana pemahaman kebangsaan yang lebih luas dalam arti kita memperlakukan manusia Indonesia di dalam diri, keluarga dan masyarakat kita. PRT sangat bisa diterima sebagai profesi di luar negeri, dan tidak ada bukti PRT membuat bangkrut majikan.

Mana pandanganmu?!!!

Artikel frizzy untuk Gerakan Indonesia Bangkit
Didukung oleh www.MediaKita.info.ms

Cheers, frizzy2008.

How to hug

Fahmi Rizwansyah says:

Hugs are an important expression of affection. By hugging someone, you remind them that you care about them and support them.
Steps
  • Approach the person. Depending on the person's relationship to you, you might want to approach differently:
  1. Family Hug: Approach kindly, but not too emotionally.
  2. Friend Hug (girls): Approach caringly, sometimes humorously, and smile.
  3. Friend Hug (guys): Approach quickly, usually not looking them in the eye.
  4. Crush Hug: Approach carefully, but do not seem shy. Smile slightly and perhaps say a caring word or two.
  5. Lover Hug: It doesn't matter who starts this; either can make it just as romantic. When approaching, put your hands on their shoulders and look them in the eyes. Say you love them, how much you care for them, and how much you are loving every second with them. Then fall into each other and hug with all your heart.
  • Embrace. Lean forward and wrap your arms around the person.
  1. Family Hug: You can keep talking when hugging; it will not ruin the momentum. Where you place your hands is not important; the hugged won't think it over too much. Press gently; it is not necessary to have head-contact. Stroke your hands quickly across the top of the hugged's back. Smile when letting go.
  2. Friend Hug (girls): Close your eyes and think about how much you love your friend when hugging. Press as much as you feel like. (But don't squish!) Do not clap the hugged on the shoulders or such; it's too masculine and some girls think you don't like them if you do it the guys' way.
  3. Friend Hug (guys): Embrace strongly, and clap each other on the top of your backs. If it's an emotional moment, keep in the hugged position for a brief moment and do not clap each other's backs.
  4. Crush Hug: Press the hugged warmly towards you. If you are a man, remember that it is more masculine and more protective to fold your arms under hers. Her arms should be around your neck, and you should be embracing her around the waist. When pressing her against you, you can lift her up a bit, pressing her chest and upper stomach against yours. Keep it in that position for a while, and then let go. Look her in the eyes when you separate and continue the conversation naturally.
  5. Lover Hug: 1) Males: Carefully sliding your hands down from her shoulders, put them on her waist and slide them around her lower back. Put your head on her shoulder and press her towards you for as long as you like. If you want to, you can give her a small massage with your hands, and try to warm her. When separating, you can look into her eyes, smile genuinely and, if the situation is fitting, kiss her. 2) Females: Extend your arms toward him and hold them around his neck and shoulders. Lean as close as possible and press your torso against his. In situations of extreme intimacy, interlocking your leg in his is appropriate. Avoid holding your arms below his shoulders and/or embracing strongly and tensely.
  • Don't hug too tightly. The best way to judge how tightly or loosely to hug is to let whomever you're hugging indicate what they want by how hard they squeeze. If they are soft, be soft back; if they like bear hugs and squeeze tightly, hug back the same way (but don't suffocate him/her).
  • Don't let go too early. A hug is a powerful way to communicate your caring for another person, as it can feel great and greatly improve one's mood. If someone hugs you, they may want a long, loving hug (maybe they are upset or down), so just go along with it and hug them until they let go or loosen their hold.

Tips
  • Be welcoming when you hug. If either of you requested the hug, then be warm and loving and just make it feel like the person you're hugging is safe from anything else and that the two of you are the only people that matter at the moment.
  • Make sure you're clean and showered.
  • Make eye contact, but also make sure to follow the movements of the other person, to avoid clumsy mishaps.
  • In a "manly hug", it is common to pat twice on the back before disengaging.
Warning
  • Do not confuse a lover hug with a friend hug. Things might get complicated and awkward.
  • Unless you've hugged the person before, don't hug them without asking first. In addition, use your best judgment in choosing when and where to hug someone. There are certain situations where one might be embarrassed to be seen hugging someone else.
  • Hug only when the person you want to hug has their arms out, they may not want to be hugged if their arms aren't out.

Cheers, frizzy2008.

Google Adsense Analysis - 3

Fahmi Rizwansyah says:

Frizzy iseng lagi, nyoba-nyoba daftar adsense lagi untuk www.lagunabiru.com. Gara-garanya habis chatting diskusi mengenai tips2 adsense dengan salah satu sobat blogger. Jadi terinspirasi deh, seberapa cepat si google approve registrasiku? Hasilnya? Ternyata diapprove gak sampai satu jam sob...

Kesimpulannya? aku serahkan kepada para bloggerous yang berminat...

Cheers, frizzy2008.

Mari bermain Keyword Valuation Tools

Fahmi Rizwansyah says:

Iseng-iseng aku nyari kata "Suggestion Keyword Tools" di google, kemudian sampailah aku ke seobook.com, terus coba-coba deh...

Dari hasil di atas, ternyata tiap keyword mengandung nilai yang berbeda-beda. Waa, jadi harus pintar nyari keyword nih...

Cheers, frizzy2008.

Google Adsense Analysis - 2...lanjutan

Fahmi Rizwansyah says:

Ini adalah lanjutan report Google Adsense Analysis - 2. Karena cut time GA adalah jam 14:30 WIB, disesuaikan dengan waktu pacific, jadi report hari ini masih bisa diambil dan dianalisa sekarang.
Kalo menurut aku si, penghasilan hari ini cukup besar, bagaimana menurut bloggerous yang lain ya?

Cheers, frizzy2008.

Google Adsense Analysis - 2

Fahmi Rizwansyah says:

Di sini kita bandingkan lagi dengan report sebelumnya. Masih terlihat, bahwa nilai secara satuan dari penelusuran lebih besar daripada nilai konten.
Cheers, frizzy2008.

Student Loan

Fahmi Rizwansyah says:

Beyond free money, student loans are the best choice to secure additional financing for school.
Here are the basics you need to make informed decisions when selecting student loans:

Determine How Much to Borrow
The following steps will help you determine exactly how much money you will need to borrow for school so you don’t come up short and find yourself charging items at higher interest rates.

Step 1: Identify Your Educational Expenses
Work with your school’s financial aid office to identify all expected costs. Expenses to consider include:
* Tuition
* Fees (i.e., late registration, parking permits, etc.)
* Room and Board
* Text Books and Supplies
* Special Equipment (i.e., computer, etc.)

Step 2: Evaluate Your Existing Financial Resources
Because the total cost of borrowing can increase significantly with time, a good strategy is to borrow only what is absolutely necessary. Evaluate non-loan sources first to pay for many of your educational expenses. These sources of funding include your savings and current income in addition to the awards listed in your financial aid package.

Step 3: Calculate Funding Needed
The additional money you need to pay for the full price of your education is calculated as follows:

Total Educational Expenses – Total Funding Available = Amount to Borrow
Example
Total Educational Expenses $21,580
– Financial Aid $14,590
– Savings $ 2,000
– Gifts from Family $ 1,000
Additional Amount Needed $ 3,990

Use this estimate to evaluate your loan options. Remember, borrow only what you need by maximizing financial aid.

Understanding Student Loan Interest Rates

This section provides you the basics you need to calculate and understand student loan interest rates since they play an important role in determining how much you will pay over the life of the loan.

How Interest Rates are Calculated
The interest charged on student loans is calculated as simple daily interest. Simply put, the outstanding principal balance is multiplied by the interest rate and divided by 365 days to calculate one day’s interest amount. So, if you have a $10,000 loan, with a 7.00% interest rate, the formula would be $10,000 x 0.07/365 and the interest amount for one day would be $1.92.

Shop for Competitive Rates
Since the federal government sets the interest rates for federal loans, you can be assured that all lenders offer the same interest rate. To get the most competitive offer, focus on borrower benefits.

The range of interest rates vary on private student loans, which are typically credit based. You may apply for a private loan on your own. However, if you don’t have an established credit history, you can apply with a creditworthy co-signer to potentially receive a lower interest rate. While it's tempting to choose the private loan with the lowest advertised interest rate, it's best to compare student loans using APR examples.

APR is the Best Comparison Tool
Unlike basic interest rates, which don't represent the true cost of the loan, the APR takes into account all of the associated loan costs such as finance charges and loan fees. Each of these factors can have a significant effect on the cost of a loan. The APR adjusts for each of these items illustrating the true cost of borrowing for your education. Since all lenders provide APR examples, using them to compare two competing loans will give you a true apples-to-apples comparison of your options.

Borrower Benefits Reduce Interest Rates
Many lenders offer money-saving benefits for services such as auto-debit payments. When shopping around, ask lenders how much you can expect to save over the life of the loan with their borrower benefits.

When you look at borrower benefits, consider selecting a lender that will provide service for the life of the loan. Some lenders offer great borrower benefits but will sell your loan to another party or servicer upon repayment. Another servicer may not provide you with the servicing levels you expect.

Graduated Repayment Plan
With a graduated repayment plan, you make interest-only payments for the first two or four years, or $50.00 a month, whichever is greater. After the initial period of lower payments, your payments will increase to include principal and interest for the rest of the term.
When you reduce your monthly payments, you pay more interest over the life of the loan because you repay the principal at a slower rate.

Extended Repayment Plan for Federal Loans
An extended repayment plan reduces your monthly federal loan payments by spreading them over a period of up to 25 years.
Since payments are stretched over a longer term, total interest costs are higher when compared to a standard repayment plan or graduated repayment plan.

by Citi.
Cheers, frizzy2008.

Self humiliation...another creativity

Fahmi Rizwansyah says:

Buka-buka arsip, eh nemu foto tahun 2002. Ini acara memperingati hari kemerdekaan RI...hihihi, jadi senyum-senyum sendiri.


butuh 'Percaya Diri' yang tinggi lho, untuk bertingkah seperti ini...

Cheers, frizzy2008.

Google Adsense Analysis

Fahmi Rizwansyah says:

ini adalah contoh report yang diambil dari aslinya. Di sini kita bisa melihat bahwa, google masih sangat mencintai search enginenya. Sehingga, nilai yang didapat dari 'Adsense untuk Penelusuran' jauh lebih tinggi dari 'Adsense untuk Konten', tapi ini cuma analisaku aja lhoo. Sang master GA di luar sana mungkin gak setuju ma aku.

Cheers, frizzy2008.

Cek pertama dari Google Adsense!

Fahmi Rizwansyah says:


...lagi nitipin di Citibank, dicharge Rp100ribu, nunggu 35 hari.

Cheers, frizzy2008.
Posted by Picasa

The Lightshare Photography

Fahmi Rizwansyah says:



The Kota Tua Session




Please contact the admin to join this group.

Cheers, frizzy2008.

What Does a Sex Therapist Do?

Fahmi Rizwansyah says:

How would you describe the role of a sex therapist?

Answer:
A sex therapist can be a psychiatrist, a marriage and family therapist, a psychologist, or a clinical social worker. We are specially trained in sex therapy methods beyond the minimal amount of training about sexuality that is required for each of those licenses.
There are a few graduate schools in the U.S. that specialize in training for sex therapy. Some people assemble their training by rigorous self-study and by attendance at the major sexological organizations' annual conferences. We have about a dozen scientific journals dedicated solely to sexual research. There are about six major organizations that hold conferences and trainings.

So seeing a sex therapist is like going to a gynecologist for gynecological problems rather than to a family practice physician. Both have specialized particularly in that area. That isn't to say that one couldn't get good help from a non-sex therapist for a sexual issue, it's just that the likelihood might be a bit less.
Most sex therapists have a particular awareness of sexuality that rises above personal opinion or personal experiences. We usually have several choices of ways to treat a particular issue when someone presents it. We tailor our treatment to the person(s) before us. We are not a "bigger hammer" there to coerce a person who wants less sex into wanting more. There is a sexological method to treating sexual issues. With the exception of when separate sexual surrogate therapists are added (in a very small number of cases), sex therapy is completely talk therapy.

Sex therapy views sexual issues as being resolved by specifically addressing them, rather than by the assumption that when the individuals in a relationship work out the relationship issues, the sex will just fall into place. For years, I have had a practice full of couples for whom that simply was not true.
Sex therapists also tend to have much greater than average knowledge about the physiological processes that are a part of human sexuality. We tend to work collaboratively with physicians to address the entirety of the causes of sexual concerns.

I would venture to say that there is near unanimity in the sex field when it comes to acceptance of sexual orientations and transgender existence. I have never met a sex therapist who tried to cure homosexuality -- though there are other mental health practitioners who do attempt to do so.
We hold a positive outlook on the beneficial influence that sexuality can have on people's lives and in the world in general. And we are not naive about the ill effects that come as a result of sexuality. We simply try to address those issues from a rigorous scientific perspective, rather than from an ideological perspective.

Louanne Cole Weston, PhD, is a licensed marriage, family, and child counselor and a board-certified sex therapist in practice since 1983. Her work in the field of human sexuality includes extensive experience as a therapist, educator, and researcher.

Cheers, frizzy2008.

Avoid Mosquitoes and Prevent Bites Naturally

Fahmi Rizwansyah says:

By MIHealthCoach, eHow Member

Step1
Clear away any standing water if possible in buckets, pool covers, etc.
Step2
Mosquitoes hate garlic. You can use this to your advantage by rubbing a little onto your exposed skin, or eat it and it will permeate through your pores.
Step3
Citronella candles are effective and also can be rubbed on your skin
Step4
Vitamin B-1 (thiamine hydrochloride) is known to give off an odor through the skin that repels mosquitos and also gnats, no seeums and black flies. A 100 mg. tablet, taken once daily should be effective.
Step5
Plants such as marigolds, lavender, cinnamon, rosemary, catnip, and peppermint repel mosquitoes and can be planted in your garden. Centerpieces made of the same plants will also work and can be planted later.
Step6
Bats are natural predators of mosquitoes. Take advantage of this by building bat houses to encourage them to take up residence.
Step7
When sitting outside, place a large electric fan by you. Mosquitos are too weak to fly against the air current.

Cheers, frizzy2008.

Mosquito bites human, how to...

Fahmi Rizwansyah says:

By Nic Fleming, Science Correspondent

Scientists have worked out why mosquitoes make a beeline for certain people but appear to leave others almost untouched.

Specific cells in one of the three organs that make up the mosquito’s nose are tuned to identify the different chemicals that make up human body odour.

To the mosquito some people’s sweat simply smells better than others because of the proportions of the carbon dioxide, octenol and other compounds that make up body odour.

It is those people who are most likely to be bitten.

The researchers believe the discovery of the way the mosquito smells will lead to the development of a new generation of repellents that would block mosquitoes’ nose - preventing them finding humans prey - within five to 10 years.

While helping those people who always seem to get bitten and people with allergic reactions to bites, such substances could also save millions of lives in the fight against malaria, most prevalent life-threatening disease in the world.

Mosquitoes use three organs to smell and taste – a feathery antenna which can identify a wide range of different chemicals, a proboscis used for short-range detection and the maxillary palp for longer range smelling.

US scientists, whose research was published today in the journal Current Biology, have produced a detailed map of the maxillary palp.

They found it contains a series of highly specialised receptor cells used to detect the different components of human body odour.

Laurence J. Zwiebel, professor of biological sciences at Vanderbilt University in Nashville, Tennessee, who led the study, said: “What makes mosquitoes such good transmitters of malaria is that they are extremely good at finding people to bite.

“The amazing thing that we found was that all the sensory hairs that line the bottom of the maxillary palp are identical.

“They are all attached to three neurons - one which is tuned to detect carbon dioxide, one which is tuned to detect octenol, and one which serves to enhance general olfactory reception.

“We are looking to make a new generation of repellents based on targeting these molecular components in the mosquitoe nose.

“If you can block or hyper-stimulate these receptors, the mosquito would not do nearly as well at finding human prey.”

Prof Zwiebel added he expected the new repellents to be available for use within five to ten years.

The tips of the organs that make up the mosquito nose are perforated with thousands of tiny holes that let aromatic compounds to penetrate.

Once inside chemicals encounter the receptors that detect specific molecules that identify potential targets as human.

Co-author of the research Tan Lu, also at Vanderbilt University, said: “These receptors are highly sensitive, which suggests that the maxillary palps serve as the malaria mosquito’s long-range detection system.”

Most of the reason for people believing they are targeted more frequently by mosquitoes is in reality down to their suffering more serious swellings and allergic reactions.

However it has been shown that some people are bitten more often because of differences in their body odour.

The researchers carried out their work on Anopheles gambiae, the mosquito species most responsible for spreading malaria.

They believe it can be applied to other malaria-spreading species.

Malaria infects some 650 million people per year worldwide and kills between one and three million, mostly young children in Sub-Saharan Africa.

The work is part of a large international collaboration led by the US National Institutes of Health aimed at developing a chemical strategy to combat the spread of malaria in the developing world.

Cheers, frizzy2008

Blogger, sikap membuka diri

Fahmi Rizwansyah says:

Keputusanku menjadi blogger, salah satunya adalah keinginan membuka diri seluas-luasnya, namun aku sadari, aku harus memiliki etika dan pemahaman dalam menjalani kehidupan blogger. Sudah lama mencari-cari bahan untuk menyampaikannya, eh ternyata muncul di kompas online pagi ini, 1/1/2009.

Berikut tulisan yang disampaikan oleh Nilam Widyarini, MSi, dosen pada Fakultas Psikologi Universitas Guna Dharma, Jakarta

MEMBUKA diri terhadap orang lain (self disclosure) itu ibarat mata uang, memiliki dua sisi. Di satu sisi berarti memasuki hubungan yang lebih matang. Di sisi lain, terdapat risiko dicemooh dan dikhianati. Bagaimanapun, self disclosure merupakan isyarat berkembangnya hubungan yang sehat yang perlu dikelola.

Kadang-kadang kita dibuat kagum oleh seseorang yang dengan sangat terbuka dapat menceritakan apa saja yang ia pikirkan, rasakan, dan inginkan. Meskipun banyak kesulitan atau kekurangan, hidup seolah dirasa sebagai hal yang ringan, dan dilakoni tanpa beban.

Kita dapat menjadi lebih nyaman berinteraksi dengan pribadi seperti itu. Karena ia terbuka, kita pun dapat menjadi lebih terbuka, dan akhirnya relasi berlangsung lebih akrab dan saling percaya.

Namun, pada kesempatan lain kadang terjadi sebaliknya. Kita justru merasa muak dengan seseorang yang terlalu membuka diri sampai ke hal-hal yang sangat pribadi, yang menurut kita tidak pantas untuk diceritakan kepada orang banyak.

Hal yang Diungkapkan
Ada rambu-rambu dalam pengungkapan diri agar hubungan menjadi efektif:
- Lebih mengungkapkan perasaan daripada fakta. Bila kita mengungkapkan perasaan terhadap orang lain, berarti kita mengizinkan orang lain mengenali siapa kita sesungguhnya. Misalnya, informasi bagaimana kita mengembangkan hubungan dengan saudara-saudari kita membuat orang lain memahami kita, daripada sekadar memberikan informasi bahwa kita memiliki saudara.

- Semakin diperluas dan diperdalam. Mungkin kita masih mengalami perasaan tidak nyaman berbagi pengalaman dengan seseorang yang seharusnya dekat dengan kita. Untuk itu perlu dilakukan pengembangan hubungan ke arah yang lebih dalam (lebih mengungkapkan perasaan terhadap isu tertentu) dan diperluas (dengan mendiskusikan berbagai isu, seperti pekerjaan, keluarga, pengalaman religius, dan sebagainya).

- Fokus pada masa kini, bukan masa lampau. Bila berbagi pengalaman soal masa lalu menjelaskan mengapa dulu kita melakukan tindakan tertentu adalah bersifat katarsis (melepaskan ketegangan), tetapi dapat meninggalkan perasaan bahwa kita lemah. Hal ini terjadi terutama bila keterbukaan tidak berlangsung timbal balik. Jadi, lebih baik kita fokus pada situasi sekarang.

- Timbal balik. Kita harus selalu mencocokkan tingkat keterbukaan kita dengan tingkat keterbukaan orang yang kita jumpai. Hati-hati, jangan terlalu membuka diri secara dini, sebelum melewati masa-masa pengembangan hubungan yang familier dan saling percaya. Di sisi lain, bila diperlukan, tidak perlu menunggu orang membuka diri. Jangan takut untuk memulai langkah penting membangun hubungan. Berikan contoh, dan orang lain akan menyesuaikan diri. Bila orang tidak merespon secara seimbang, hentikan langkah tersebut.

Banyak Manfaat
Keterbukaan diri memiliki manfaat bagi masing-masing individu maupun bagi hubungan antara kedua pihak. Dengan membuka diri dan membalas keterbukaan diri orang lain, kita dapat meningkatkan komunikasi dan hubungan dengan orang lain.

Secara rinci manfaatnya adalah:
- Meringankan. Berbagi dengan orang lain mengenai diri atau persoalan yang kita hadapi, dapat memberikan kondisi psikologis yang meringankan. Misalnya, cerita tentang ketidakmampuan menghadapi ujian atau berakhirnya hubungan dengan seseorang. Bagaimana kita mengatasi hal itu? Bagaimana pandangan orang lain? Dengan membuka diri, kita memperoleh tambahan perspektif yang membantu diri sendiri melihat titik frustrasi dari sudut pandang orang lain.

- Membantu validasi (menguji ketepatan) persepsi terhadap realita. Dengan sudut pandang sendiri, kita mungkin cenderung menggunakan ukuran yang idealistis menurut diri sendiri. Bila kita mengomunikasikan hal tersebut dengan seseorang yang tepat (yang memberikan simpati, suportif, dapat dipercaya, dan pendengar yang baik), kita tidak hanya mendapatkan persetujuan, tetapi juga informasi yang diperlukan untuk lebih memahami diri sendiri, yang kita perlukan agar memahami dunia secara lebih realistis.

- Mengurangi tegangan dan stres. Bila kita menghadapi ketegangan atau stres karena suatu hal, bila tidak diungkapkan akan berkembang menjadi eksplosif (mudah meledak). Sebaliknya, bila diungkapkan kepada orang lain, kita akan menemukan jalan keluar. Andaikan tidak mendapat jalan keluar, setidaknya lebih ringan karena kita merasa tidak sendirian. Hal ini justru dapat membuat kita menjadi lebih dekat dengan orang lain dan menambah rasa nyaman pada saat itu maupun dalam relasi selanjutnya.

- Meringankan fisik. Terdapat keterkaitan antara pikiran dengan sistem tubuh kita. Adanya pengaruh positif pada pikiran (akibat pengungkapan diri), berakibat pada fisik. Berbagi atau mengungkapkan diri dengan orang lain, membuat stres kita berkurang, kecemasan berkurang, dan meredakan juga detak jantung dan tekanan darah. Dengan kata lain, pengungkapan diri dapat berpengaruh positif terhadap kesehatan fisik, selain emosi.

- Alur komunikasi yang lebih jelas. Dengan menunjukkan keinginan untuk membuka diri terhadap orang lain, dan menghargai pengungkapan diri orang lain, berarti kita meningkatkan kemampuan untuk memahami sudut pandang atau perspektif yang berbeda. Dengan demikian, kita akan lebih percaya diri untuk mengklarifikasi niat-niat atau makna-makna dari orang lain. Adanya umpan balik lewat diskusi terbuka, kekaburan dalam komunikasi diminimalkan.

- Mempererat hubungan. Bila antarekan lebih saling mengenal satu sama lain, terjadi efek timbal balik: keterbukaan mengembangkan rasa senang yang semakin meningkatkan keterbukaan dan berakibat makin kuatnya rasa senang. Tanpa pengungkapan diri, tingkat keeratan hubungan dan kepercayaan berada pada level rendah. Dengan keterbukaan dihasilkan kepercayaan, dan dengan kepercayaan dihasilkan kerja sama. Di dalam organisasi, kerja sama dan saling percaya ini menentukan inovasi yang sangat penting agar tetap survive dan mampu berkompetisi. Lebih dari itu, hasil riset menemukan bahwa bila antarekan kerja semakin menyukai kerja sama, mereka lebih produktif dalam mengerjakan proyek atau dalam situasi tim.

Cheers, frizzy2008.

Greeting

Fahmi Rizwansyah says:

Happy New Year
1430 H and 2009 AD
May you have better life, better sex and better achievement...
GOD BLESS YOU ALL
Cheers, frizzy2008

Iseng aja -- koneksi biznet

Fahmi Rizwansyah says:

Norak dikit boleh yaa...(...abis yg lain begitu sii)
Pernah dapat koneksi segini gak? hmm biznet mang okeh!!!

ini sepuluh mega downlink, satu mega uplink lhoo!!!

Cheers, frizzy2008.

Arsip foto resepsi pernikahan Demian dan Yulia Rachman

Fahmi Rizwansyah says:







Karena datang sudah jam 21:05, jadi lewat deh seremoni pernikahannya dan para tamu sudah berkurang. Untung masih bisa dapat beberapa spot.


Kalo yang ini si, pesulap afkiran...hehehe

Kronologi kisah frizzy:
Jumat, 19/12
16:15, Aldy: Bos, jadi ke resepsi Demian - Yulia Rachman?
, Frizzy: Oh??? Sekarang tanggal 19 ya? waa lupa, ntar aku tanya istriku dulu deh
Call si Bunda
, Frizzy: Bunda, sekarang kan hari resepsinya si Demian, mo dateng gak?
, Bunda: Oh iya ya, waa undangannya sama ibu. Gimana ya? barusan aku nolak nganterin ibu ke terapi, gimana mintanya ya? gak enak nih
, Frizzy: Yah, gimana dong padahal kan sudah kita rencanakan dari kemarin2
, Bunda: Ya sud, aku coba ngomong sama ibu deh.

16:40, Bunda: Ayah, tadi katanya undangannya dibawa dek Ary kerumahnya terus ditaruh di kamarnya, dikunci. Dek Arynya sendiri dihubungi masih meeting di kantor, katanya si sampai malam
, Frizzy: Oooo, alamat gak jadi datang dong ni, waa. Coba telpon dek Ary, Bunda.

17:30, Bunda: Ayah, dek Ary katanya sudah di jalan.
, Frizzy: Waa, bisa berangkat dong kita...(lanjutin browsing2)

18:20, Aldy: Bos, data-data client dah ada ni, coba dilihat. (Aku ajak Aldy dan Dandy diskusi)
, Frizzy: Kita harus analisa dulu sebelum dapat solusinya. Apa sudah dicek requirement detilnya
, Dandy: Itu tinggal disamakan dari beberapa sisi bos, semuanya harus telly. Makro yang sekarang hasilnya beda-beda bos.
, Frizzy: Oke deh, kita pelajari dulu lah yaa...

18:40, Bunda: Ayah kok blom berangkat dari kantor!!!(bunda agak geram)
, Frizzy: iya iya bunda, aku turun sekarang.

18:50, Mau keluar parkiran, sistem parkirnya rusak. Terjadi antrian panjang ditambah klakson orang2 yang mau keluar.
, Frizzy: Wooiiii, benerin dong, gue ada janji lagi nii.
, Parkir: Pak, muter aja ya lewat pintu masuk.

19:40, sampai di rumah.
, Bunda: ayah, kamera kita ada di rumah bapak joglo.
, Frizzy: oh ok deh bunda, mestinya kan sudah kita siapkan.
, Frizzy: bunda ganti celana panjang aja soalnya kita pake motor buat ngejar waktu. (secara si bunda dah siap pake gaun, hihihi...)

Ambil kamera di joglo, trus tancap gas ke gedung PTIK.

21:05, Sampai di TKP, trus foto2in beberapa seleb n' gak lupa...makan sampai kenyang.
22:10, Sampai rumah, tidur.

Sabtu 20/12, Izhar sakit, aku dan bunda ngurusin ke dokter.
Minggu 21/12, Bapak joglo ke Riau membawa kamera yang berisi foto2 resepsi demian - yulia yang belum aku transfer.

Minggu 28/12, Bapak joglo pulang
Senin 29/12, Foto baru didapat dan langsung diposting.

Cheers, frizzy2008.