Jumat, 13 April 2018

Motivation Letter

Dear Sir/Madam,

I have read the information about the Bachelor in Computer Science & Engineering study programme with great interest on your website. Through this motivational letter, I would like to put forward my candidacy for enrolment in this course.
In May 2016, I have finished my undergraduate at Gunadarma University in Indonesia and received the BSc CIS from the Computer Science Faculty. My bachelor is mainly aimed at mathematics and the sciences. I have decided to take the most advanced courses in mathematics, chemistry and physics available in school in order to challenge myself and make sure that I will be as prepared as possible for your study programme. Even though I have been reluctant many times to follow this combination of courses, as it is regarded as having the largest workload, I have pushed through the past two years of school work and I have made it possible thanks to my passion, commitment and hard work in mathematics, chemistry and physics.
My interest in computer science began around three years ago when I first came into contact with computer coding in school while creating a small website. From there on, I was captivated. I started working on small projects of my own, creating other websites and a simple calculator. I have learned small pieces of codes from several languages through the Harvard lectures that are available online freely as well as through other. For me, working on computer code is my way of being creative, since I find it difficult to be creative in more common ways such as drawing. Every time I write a piece of computer code, I get the feeling I have created a piece of art and reading computer code, to me, feels like looking at a piece of art.
Furthermore, in June 2015, I have participated in an internship for a week at Scania Financial Services Italy, where I worked together with the IT manager. During this week, I worked on creating a database. This was the first time I ever encountered SQL programming language. During this week, I managed to learn basic SQL and create the database. This week of work experience was very useful as it enabled me to deepen my understanding of computer science. It was an excellent opportunity to gain work experience in my chosen field of computer science.
Even in school, I have tried to contribute as much as I can with the technical team, getting involved throughout several events, particularly the International Evening. After the first year, I was elected to be a team leader in charge of organising the participants and technical manager who delegated tasks for the duration of the events. The most important thing I have learned from this is that it is very important to take initiative whilst working in a team, but also that, as a leader, you must not expect the rest of the team to do all the work on their own.
At home, I have also been very interested in computers. Around May last year, I build my second personal computer from scratch as well as one for my brother. I have also managed to assemble a server, which has been a very interesting experience as it gave me more insight into how a computer works and how the different processors and chipsets interact together to be able to function like a computer. Additionally, I have identified and overcome the technical difficulties associated with building a computer.
In regards to studying at University of Cambridge, I seek to combine all the knowledge I have gathered over the years and try to deepen my understanding of computer science and engineering. I have decided to go down this route which contains more software compared to hardware, because of my greater interest in software engineering combined with my ability to solve problems and the joy I take in doing so. I feel that this is my driving passion that will allow me to succeed during the years that I will be studying at the University of Cambridge.
I hope that I have been able to convince you of my excellent capabilities and my passionate motivation to start studying computer science and engineering at University of Cambridge. I really look forward to your reply and to start studying at your University.


Kind Regards


Tri Andrianto

Kamis, 22 Maret 2018

Pronouns analysis from an articles of opinion about hacker



Pronouns analysis from an articles of opinion about hackers

Discussion
Hackers are people who learn, analyze, modify, breaks into computers and computer networks, either for profit or motivated by challenges.



Hackers have negative connotations because of the misunderstanding of the community will be the difference in the term hacker and cracker. A lot of people understand that hackers had resulted in losses of certain parties such as changing the appearance of a web site (from defacing), paste the codes of viruses, etc. Whereas they are crackers who use security gaps that have yet to be fixed by software maker (bug) to infiltrate and damage a system. For this reason hackers are usually understood to be two classes:
1. White Hat Hacker is a term that refers to information technology ethically hackeryang shows a weakness in a computer system. A white hat is generally more focused action to how to protect a system, where contrary to black hat is more focused action to how to break through those systems.
White hat or White Hat Hackers is the hero or good guy, especially in the fields of computers, where it refers to the ethical hacker or penetration testers are focusing on securing and protecting IT systems. White hat hackers or Saint, also known as "good hackers, computer security expert" is, which specializes in penetration testing, and other testing methodologies, to ensure that the company's system the information is secure. Security experts is able to utilize a variety of methods to carry out their tests, including social engineering tactics, use of hacking tools, and attempts to circumvent security to gain entry into the secure area.
Characteristic Traits – White Hat Hackers:
Black hat SEO tactics such as utilizing spamdexing, attempt to redirect search results to particular target pages in a way that is contrary to the search engines ' terms of service, whereas White Hat methods are generally approved by the search engines. White Hat Hackers tend to produce good results and is legal, whereas Black Hat anticipate that their sites may eventually be banned either temporarily or permanently once the search engines discover what they do.
2. Black Hat Hackers are in general use, a hacker is someone who breaks into computers, usually by gaining access to administrative control. Some argue that the hacker, is described as a person who breaks into a computer by way of breaking through the security systems in the world there are communities of hackers hacker community. This is a community of people who have a great interest in computer programming, often creating open source software. These people are now referring to cyber-criminal hackers as "crackers".
How To Do The Hacking:
·  Hacktivist ; hacktivis is a hacker who uses technology to announce social view, ideology, religion, or political messages. In more extreme cases,hacktivism is used as a tool for cyberterrorism.
·  Compromise a computer ; compromise a computer is a common example of the exploitation of the security adengan how SQL injection, through the security holes that may be caused from substandard programming practices. Other exploits will be used through FTP, HTTP, PHP, SSH, Telnet and a few web pages.
·  Vulnerability Scanners ; A Vulnerability scanner is a device used to quickly check computers on the network for known weaknesses. Hackers also commonly use port scanner port scanner. This is a tool to see the ports on a specific computer to access the computer, and sometimes will detect the version number of the program. firewall protects your computer from intruders with restrict access to ports
·  Password cracking ; Password cracking is an application that captures data packets, which can be used to steal passwords and other data in transit through multiple networks.
·  Trojan horse ; Trojan horse is a program that seems to be doing one thing, but actually doing it is another. A Trojan horse can be used to set up a back door in a computer system such that the intruder can gain access upa seckemudian. (The name refers to the trojan horse of the horse of the Trojan war, with function conceptually to cheat the soldiers for bringing an intruder enters.)
·  The Virus ; A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Thus, the computer virus behaves similar to a biological virus that spreads by inserting itself into living cells.
·  Worm ; Like a virus, a worm is also a self-replicating program. A worm is different from a virus that spread through computer networks without user intervention. Many people are confused as to distinguish the term "virus" and "worms".
·  Spy Net ; Is a program that automatically spy on the victim's computer, but only its Internet network only instead of computer activity. It is usually entered through message/e-mail from an unknown person via video chat and others.
·  Keylogger Is a program specially created to spy on certain computers in the form of sounds, images or writing. Usually just in-injection via pendriveor USB (Universal Serial Bus).



Not long ago appeared a community named Surabaya Black Hat (SBH) who have horrendous world of Indonesia, Surabaya is a Black Hat hacker group the computer systems of the majority of its members is an IT student by age about 21 years. Do not use their knowledge positively, the Group thus have paved about 3000 computer systems in 40 countries including the United States, one of which, namely the system of Government-owned sites and database of Los Angeles. Later known to their registered as students of the semester VI Stikom Surabaya and incorporated in the Black Hat hacker community in Surabaya (SBH). All three paved known hundreds of sites spread across 44 countries. In fact, the actors dared to break the site belongs to the FBI. Not only that there are also at least four sites of agencies in East Java who successfully compromised. All four of these sites include gresikkab.go.id, malangkab.go.id, jatimprov.go.id, and pa-kotamadiun.go.id, in a single paved this SBH ransom groups about Rp 15 million to Rp 25 million paid through PayPal or Bitcoin. In the year all members of SBH can be pocketed money Rp 200 million.

Various motives behind their hackers (hackers) while daring to break a variety of sites on the internet. One of the factors alleged to be strong as the ability to have self-actualization. the natural process of compromise may actually be done briefly. Even once press enter is complete, if all of the software (software) already prepared. But that length is the steps, because it must collect a certain amount of information on the site to be compromised. Once known, dial her access related information, and so on in the security system, then the perpetrators use techniques that are owned, does wear a SQL Injection or the other. Usually, said Anjik, the target site for hackers compromised is a company that has an online service, hompage, and customer application online. In fact when you create the application of already existing safety standards.
Background:
The development of the internet world at this moment has reached a stage that is so fast, so it's not surprising in every corner of the city is found the internet site termpat, which serves a wide range of internet services. Initially the internet was used only to a limited extent in laboratory research and technology at some educational institutions and research institutes, which are directly involved in the project are DARPA (Defence Advanced Research Projects Agency). But the annual 45 later (now), the internet has spread to the rest of the world, from the Government, large and small companies, NGOs to individuals have much to use it, because of its versatility as a means of communication and the search for record information about the internet year 1998 mentions that an e-mail has been sent to 150 more countries in this world, file transfer (ftp) can reach to 100-an State, and users around the world is estimated to have up to 60 million-Ness people, or 5% of the total seluru population of the world. Then, based on data for the year 1999, internet users around the world through May 1999 has reached 163 million people.
At first, the internet had predicted would suffer destruction by some observers of the computer in the 1980-90s because of his ability at that time only exchange information in one direction only. But getting to the future, the estimates turned out to be a fumble, and now even be a need for the information that is there is no consistently used.
Lately we hear many security issues related to the world of the internet. In Indonesia itself some people have been arrested for using a stolen credit card to buy goods over the internet. A result of this alleged activities of credit card Indonesia hard use on the internet (or even in ordinary shops in foreign countries). Similarly, buyers from Indonesia will be suspected and not trusted by the seller on the internet.
But the beauty of the internet is not as beautiful as its name promised can provide a variety of information that is in any other parts of the world, for a variety of crimes that exist in real life turns out to be more in the world of internet. found Crime on the internet is popular with the name of cyber crime. The existence of cyber crime will be the impact of the bad for the progress and development of our country and in the world at umumumnya. Currently, the internet has become part of our daily lives as one vehicle of communication in the business or for the private. But behind it is still a lot of holes in the internet system weaknesses that could be exploited by hackers for the purpose of not good, such as mail bombs, weapon-unkempt home page, data theft, etc.

Theory:
Pronoun or pronouns are words that are used to replace a person or thing. There are 5 types of pronouns, that which serves as the subject (Subject Pronouns), object (object pronoun), as an adjective (possessive adjectives), to declare the possession (possessive pronouns), and to declare the self-reflection ( reflexive or reciprocal pronouns). Pronoun generally replace the position of the noun as subject, object or complement. So we can conclude that the pronoun is a pronoun that is used to replace the people, animals, and objects. pronoun in English (Pronouns) are words that are used to replace nouns (nouns), a noun it can be humans, animals, places and abstract concepts. The purpose of the use of the pronoun can be caused by many things such as to make it more concise, a name not mentioned repeatedly in a sentence and the effectiveness of a sentence.
Part Of Pronouns :
1. Personal Pronouns :
A personal pronoun refers to the person speaking, the person being spoken to, or the person or thing being spoken about.
2. Interrogative Pronouns :
Interrogative pronouns are pronouns that introduce a question.
3. Indefinite Pronouns :
Idenfinite pronouns are those pronouns that refer to an uspecified person, place, thing, or idea.
4. Relative Pronouns :
A relative pronoun I sused to introduce a subordinate clause.
5. Possessive Pronouns :
Possessive pronouns are pronoun that show the ownership.
6. Reflexive Pronoun :
Reflexive pronouns are pronouns that are used to show that the subject of the sentence is receiving the action of the verb.
7. Intensive Pronouns
These pronouns are used only to place emphasis on the subject.

Analysis :
- so it's not surprising in every corner of the city is found the internet site termpat, which serves a wide range of internet services. (a relative pronouns)
- technology at some educational institutions and research institutes, which are directly involved in the project are DARPA (a relative pronouns)
- for a variety of crimes that exist in real life turns out to be more in the world of internet.
  (a relative pronouns)

-    But behind it is still a lot of holes in the internet system weaknesses that could be exploited by  hackers for the purpose of not good (a personal pronouns)

Conclusion :
Not all hackers are doing negative activities, sebenarmya doing negative activities against the computer system is a cracker, maybe people who are not too familiar with the life of the home computer said if there is burglary or destruction of the system is a hacker hacker, whereas hackers themselves move in the field positive and generally they are on a white or clean path, Happen a real hacker.


Reference :

https://adhyz26.wordpress.com/2013/10/30/makalah-pronoun/


Minggu, 07 Januari 2018

Implementasi Analisis TI Pada Perusahaan

ANALISIS STRATEGIS SISTEM TI
PADA RS MATA CICENDO, BANDUNG

Profil RS Mata Cicendo, Bandung
Rumah Sakit Mata Cicendo diresmikan pada tanggal 3 Januari 1909dengan nama Koningen Wilhemina Gathuis voor Ooglijders dan direktur pertamanya C.H.A. Westhoff. Pelayanan yang diberikan saat itu adalah pelayanan rawat jalan, rawat inap dan kegiatan operasi. Tahun 1930, mulai melakukan kegiatan pelayanan luar gedung (outreach) ke daerah sekitar Bandung, seperti Sumedang, Tanjungsari, Congeang, Darmaraja, Situraja, dan Legok.

Tahun 1942 – 1945 berperan sebagai Rumah Sakit Umum. Sejak tahun 1961berperan sebagai Rumah Sakit Pendidikan Fakultas Kedokteran Universitas Padjadjaran.Tahun 1976 menjadi Pusat Kegiatan Bank Mata dan Pusat Kegiatan Hari Kesehatan Sedunia dengan tema Pencegahan Kebutaan. Tahun 1977 – 1979 menjadi Kantor Riset untuk Pencegahan Defisiensi Vitamin A berkolaborasi dengan AFOB dan Departemen Kesehatan. Tahun 1978 ditetapkan sebagai Rumah Sakit Tipe C oleh Departemen Kesehatan. Tahun 1992 ditetapkan sebagai Rumah Sakit Tipe B Non Pendidikan.

Tahun 2000 terakreditasi 5 pelayanan. Tahun 2005 terakreditasi 12 pelayanan. Tahun 2006 terakreditasi A untuk Bagian Ilmu Kesehatan Mata Fakultas Kedokteran Universitas Padjadjaran. Tahun 2007 menjadi Rumah Sakit Khusus Kelas A dan menjadi Rumah Sakit dengan Pola Pengelolaan Keuangan Badan Layanan Umum (PPK BLU). Pada tahun 2009 ditetapkan sebagai PUSAT MATA NASIONAL dan tahun 2014 ditetapkan sebagai Rumah Sakit Pendidikan dan terakreditasi Tingkat Paripurna oleh Komisi Akreditasi Rumah Sakit (KARS).

          Analisis SWOT
            Pada penulisan ini, RS Mata Cicendo, Bandung menggunakan analisis SWOT sebagai acuan  untuk menganalisis strategis TI. Analisis SWOT (StrengthWeakness,OpportunitiesThreats)  mengidentifikasi faktor internal perusahaan sebagai kekuatan (Strength) dan kelemahan (Weakness), sedangkan faktor eksternal perusahaan sebagai peluang (Opportunities) dan ancaman (Threats).
          Analisis Kekuatan dan Kelemahan
            Analisis ini menitikberatkan pada bagian internal perusahaan. Pengidentifikasian terhadap kekuatan dan kelemahan yang terdapat dalam perusahaan harus dilakukan, karena dengan mengetahui setiap kekuatan dan kelemahan tersebut maka tingkat kekuatan persaingan perusahaan dapat diketahui. Kekuatan merupakan dasar bagi pelaksanaan kegiatan perusahaan, sedangkan kelemahan muncul sebagai faktor yang membatasi serta mencegah manajemen untuk merealisasikan potensi yang sesungguhnya. Kelemahan ini kadang-kadang tidak disadari keberadaannya, oleh karena itu kelemahan bukan saja harus diidentifikasi tetapi harus diikuti oleh kesiapan pihak manejemen untuk menerima kenyataan bahwa perusahaannya memiliki kelemahan. Penelitian kelemahan dan kekuatan secar objektif akan timbul disebabkan oleh banyaknya kasus kegagalan serta keberhasilan, berarti keberhasilan dalam melakukan kebijaksanaan, prosedur, implementasi, strategi dan teknik yang pernah dilakukan oleh perusahaan.

            Analisis Peluang dan Ancaman
          Peluang dan ancaman merupakan faktor-faktor yang dating dari lingkungan eksternal perusahaan, dalam kenyataannya kita akan mengalami kesukaran untuk membedakan kekuatan dari peluang dan kelemahan dari ancaman. Kesukaran itu mungkin disebabkan batas antara perusahaan dan lingkungannya tidak selalu tajam dan ketara dengan jelas. Peluang menunjukkan kondisi lingkungan yang kita harapkan mempunyai dampak yang menguntungkan bagi manajemen, sedangkan ancaman menunjukkan kekuatan yang dating dari lingkungan eksternal yang menimbulkan kerugian bagi manajemen seperti merugikan dalam pelaksanaan program kerja, mencegah pencapaian sasaran atau merusak strategi yang telah ditetapkan sebelumnya.

            Metode Penelitian
            Langkah-langkah yang dilakukan untuk menganalisis staretegis pada penelitian terlihat pada gambar di bawah ini.
      
    Hasil dan Pembahasan
          Untuk penyusunan startegi menggunakan analisis SWOT maka akan dianalisa data lingkungan internal di dalam perusahaan yang sangat berpengaruh dan menentukan terhadap perencanaan strategis yang akan diformulasikan, dan data lingkungan eksternal adalah faktor yang berada di luar kendali lingkungan perusahaan. Faktor eksternal sangat berpengaruh terhadap kondisi perusahaan baik secara langsung maupun tidak langsung, oleh sebab itu kondisi eksternal harus dipertimbangkan dalam penentuan strategi perusahaan maupun pada pengembangan baruan pasar.
            Dari hasil pengamatan maka dapat diidentifikasi faktor-faktor internal dan eksternal, terlihat pada tabel di bawah ini.
Tabel Matriks Evaluasi Faktor Internal
Faktor Strategis
Bobot
Rating
Bobot x Rating
Kekuatan
1
Adanya dukungan dari pihak manajemen untuk pengembangan teknologi informasi di RS Mata Cicendo dengan memasukan kebutuhan teknologi informasi (sarana dan pelatihan) dalam anggaran keuangan.
0.17
4.00
0.68
2
Tersedianya fasilitas teknologi informasi yang memadai memungkinkan pelayanan dapat diatasi dengan menggunakan “Computerized  System”.
0.16
4.00
0.64
3
Semua unit-unit komputer sudah terhubung dalam suatu jaringan LAN.
0.07
1.00
0.07
4
Tersedianya modul-modul SIM-RS yang dapat membantu dalam proses pengolahan data yang diperlukan.
0.07
2.00
0.14
Kelemahan
1
Akses jaringan internet masih terbatas dan relatif lambat.
0.03
1.00
0.03
2
Kurangnya pemanfaatan pelayanan teknologi informasi yang telah dikembangkan sebelumnya.
0.07
2.00
0.14
3
Penggunaan SIM-RS yang belum menyeluruh di semua unit (dikarenakan faktor pengembangan modular dan penyesuaian anggaran).
0.07
1.00
0.07
4
Keterbatasan kewenangan dalam pengelolaan sumber (dana dan fasilitas ruangan).
0.14
3.00
0.42
5
Sumber daya manusia yang berbasis kompetensi teknolgi informasi jumlahnya masih kurang.
0.13
3.00
0.39
6
Belum adanya  job description yang jelas untuk para pegawai divisi IT.
0.10
2.00
0.20
Total
1.00

2.80

Tabel Matriks Evaluasi Faktor Eksternal
Faktor Strategis
Bobot
Rating
Bobot x Rating
Peluang
1
Perkembangan teknologi informasi yang semakin pesat memungkinkan untuk mengembangkan SIM-RS sebagai sarana untuk memberikanCommited to Service Excellence(C2SE).
0.18
4.00
0.54
2
Adanya software open sourcesehingga menyebabkan berkurangnya dana terhadap penyediaan software yang dibutuhkan untuk pengembangan TI di RS Mata Cicendo.
0.05
1.00
0.05
3
Adanya kebijakan pemerintah untuk pengembangan TI di RS agar siap memasuki pasar global.
0.10
1.00
0.10
4
Tuntutan masyarakat terhadap pelayanan kesehatan yang berbasiskan TI.
0.14
4.00
0.56
Ancaman
1
Semakin banyaknya RS yang memberikan layanan kesehatan mata lewat akses internet.
0.10
1.00
0.10
2
Tuntutan masyarakat terhadap mutu pelayanan yang diberikan rumah sakit.
0.15
3.00
0.45
3
Munculnya teknologi-teknologi baru yang dikembangkan oleh rumah sakit mata swasta, misal adanya fasilitastelemedicine.
0.14
2.00
0.28
4
Saingan dari konsultan-konsultan IT yang berkeinginan untuk membuat SIM-RS yang dapat memberikanCommited to Service Excellence(C2SE).
0.14
2.00
0.28
Total
1.00

2.54

            Setelah faktor-faktor strategis lingkungan internal dan eksternal diidentifikasi maka matriks Evaluasi Faktor Internal (EFI) dan matriks Evaluasi Faktor Eksternal (EFE) untuk merumuskan faktor-faktor strategis internal dan eksternal tersebut dalam kerangka kekuatan dan kelemahan perusahaan serta peluang dan ancaman bagi perusahaan. Terlihat pada gambar 2.
            Gambar 2 menunjukan divisi TI berada pada strategi pertumbuhan (Growth Strategy) dengan konsentrasi integrasi horizontal atau  strategi stabilitas keuntungan dengan tujuan  untuk menghindari kehilangan pelayanan kepada pengguna, meningkatkan fasilitas dan teknologi melalui pengembangan  internal yang sama maupun dengan industri yang mendukung kelancaran pelayanan yang diberikan oleh divisi TI.
Matriks SWOT adalah  identifikasi berbagai faktor secara sistematis untuk merumuskan strategi perusahaan. Analisis ini didasarkan pada logika yang dapat mekasimalkan Strengths (kekuatan) dan Opportunities (Peluang), namun secara bersamaan dapat meminimalkan weakness (kelemahan) dan Threats (Ancaman).
Bila strategi yang mungkin ditempuh oleh organisasi dipandang sebagai integrasi antara peluang dan ancaman dengan kekuatan dan kelemahan, maka strategi organisasi dapat dikategorikan kedalam :
1.      Startegi Kekuatan dan Peluang (Strength and Opportunity - SO)
Strategi untuk memanfaatkan  peluang dengan jalan mendayagunakan kekuatan yang dimiliki oleh organisasi.
2.      Strategi Kelemahan dan Peluang (Weakness and Opportunity - WO)
Strategi untuk memanfaatkan  peluang eksternal yang muncul dari lingkungan dengan tujuan  mengatasi kelemahan.
3.      Strategi Kekuatan dan Ancaman (Strength and Threat - ST)
Strategi untuk menghadapi dan  mengatasi ancaman dengan jalan mendayagunakan kekuatan yang dimiliki oleh organisasi.
4.      Strategi Kelemahan dan Ancaman (Weakness and Threat - WT)
Strategi untuk menghindari ancaman untuk melindungi organisasi dari kelemahan yang ada dalam organisasi.

KESIMPULAN
Setelah dilakukan proses pengolahan data dan analisa terhadap hasil penelitian dapat ditarik kesimpulan bahwa :
1.      Divisi TI berada pada strategi pertumbuhan, artinya dapat melakukan suatu kegiatan meningkatkan jenis pelayanan kepada pengguna, meningkatkan fasilitas dan teknologi informasi melalui pengembangan internal maupun eksternal melalui akuisisi atau joint venture dengan instansi lain baik dalam industry yang sama maupun dengan industri yang mendukung kelancaran pelayanan yang diberikan divisi TI.

2.      Sumber daya teknologi informasi yang ada di divisi TI sudah memadai untuk pengembangan teknologi informasi, hanya dibutuhkan pemetaan strategi teknologi informasi agar dapat memberikan nilai tambah bagi Rumah Sakit Mata Cicendo.

Referensi
repository.upnyk.ac.id/299/1/E-20_Usulan_Strategi_TI.pdf