Subscribe

Thursday, November 20, 2008

Situs Saran & voting untuk Obama

Baru-baru ini dunia telah di gemparkan atas terpilih nya Barack Obama sebagai presiden Amerika Serikat yang menang atas Jhon McCain. Bahkan di tanah air kita pun menjadi bincangan hangat para masyarakat indonesia. Sosok orang yang satu ini seakan-akan telah menghipnotis perhatian dunia, agar tertuju kepadanya.
Meski belum mendapatkan gelar sebagai Chief Technology Officer, namun para pengguna internet menunggu kepastian apa yang menjadi prioritas dari kabinet baru yang di bangun oleh Obama.

ObamaCTO.org sebuah situs tanpa ada koneksi dari tim transisi Obama yang baru saja di luncurkan tahun ini memudahkan user untuk memberikan kritik dan saran.

Contoh kritik dan saran yang ada pada situs tersebut, seperti memastikan internet bebas akses dan netralisasi jaringan sebesar 6,380 suara, memastikan "Open Government Data" sebesar 2,908 suara, dan sebagai nya. Situs ini di buat oleh perusahaan yang bermarkas di Seattle, Front Seat, dan situs ini juga sama dengan whitehouse2.org atau bigdialog.org yang membuat user mudah memasukkan saran atau pertanyaan untuk presiden.

Pemberian gelar CTO ini telah di tentukan sebelumnya, bahwa siapa saja yang menang akan mendapatkan nya. Dan Obama dari partai Demokrat lah yang mendapatkan gelar tersebut. Untuk itu Obama benar-benar sangat memperhatikan keadaan internet. Karena Internet telah mengsukseskan jalan nya pemiliha presiden. Dan Obama merancang sebuah perubahan administrasi yang lebih interaktif di bandingkan dengan para pendahulu nya.
[More..]

Wednesday, November 19, 2008

McAfee Menemukan domain berbahaya!

Ketika anda sedang melakukan surfing, anda pasti mengharapkan Website yang anda kunjungi adalah Website yang aman dari virus.
Namun tidak semua domain bisa seperti itu.
Anti Virus McAfee, menyatakan bahwa perusahaan yang memiliki alamat yang tertera pada website sepertinya telah mengalami krisis keamanan.
Ketika situs pemilik alamat situs tersebut mendaftarkan kepada suatu domain tertentu. McAfee menemukan bahwa terdapat beberapa domain yang di anggap berbahaya untuk navigasi user, seperti ".hk" (Hong Kong), ".cn" (China), dan ".info"(information).

Dari semua domain yang berbahaya, domain ".hk", stelah di tes oleh McAfee, domain tersebut memberikan kontribusi 19,2% sebagai domain yang berbahaya atau berpotensi untuk menimbulkan bahaya bagi para pengunjung situs.
Sementara ".cn" berpotensi menimbulkan bahaya sebesar 11,8% dan ".info" sebesar 11,7% sisanya situs di bawah domain ".com" yang cukup populer memiliki potensi sebesar 5%.

Pada situs McAfee, Mapping The Mal Web. McAfee mengatakan untuk mencoba untuk mengidentifikasi domain yang memiliki resiko situs berbahaya dengan konsentrasi tinggi. Server situs dengan domain ".hk" dan ".cn" tidak harus berada di cina sehingga operator website dapat melakukan register situs di mana saja. Domain lain yang beresiko seperti ".ro" (Romania) dengan kadar 6,8% dan ".ru" (Rusia) dengan resiko sebesar 6%.
Sorang peneliti dari McAfee, Shane Keats, mengatakan, penambahan situs di bawah ".hk" dan ".cn" yang di anggap berbahaya, telah di sebabkan pengumpulan data oleh McAfee pada domain tersebut dan pada beberapa proses register alamat yang di lakukan perusahaan. Laporan McAfee ini berdasarkan 9,9 juta website yang di tes dalam 265 domain untuk di masuki malicious code, pop-up yang berlebihan atau form pengisian yang sebenar nya adalah alat untuk para spammer untuk mengirimkan email spam.
McAfee juga menemukan nama domain yang sedikit berbahaya seperti:
  • ".gov"(di gunakan oleh pemerintah), dengan 0.05%

  • ".jp" (Japan), dengan 0.1%

  • ".au" (Australia), dengan 0.3%

  • [More..]

    How does anti-virus software work?

    How does anti-virus software work?
    An anti-virus software program is a computer program that can be used to scan files to identify and eliminate computer viruses and other malicious software (malware).
    Anti-virus software typically uses two different techniques to accomplish this:
    Examining files to look for known viruses by means of a virus dictionary
    Identifying suspicious behavior from any computer program which might indicate infection
    Most commercial anti-virus software uses both of these approaches, with an emphasis on the virus dictionary approach.
    Virus dictionary approach
    In the virus dictionary approach, when the anti-virus software examines a file, it refers to a dictionary of known viruses that have been identified by the author of the anti-virus software. If a piece of code in the file matches any virus identified in the dictionary, then the anti-virus software can then either delete the file, quarantine it so that the file is inaccessible to other programs and its virus is unable to spread, or attempt to repair the file by removing the virus itself from the file.
    To be successful in the medium and long term, the virus dictionary approach requires periodic online downloads of updated virus dictionary entries. As new viruses are identified "in the wild", civically minded and technically inclined users can send their infected files to the authors of anti-virus software, who then include information about the new viruses in their dictionaries.
    Dictionary-based anti-virus software typically examines files when the computer's operating system creates, opens, and closes them; and when the files are e-mailed. In this way, a known virus can be detected immediately upon receipt. The software can also typically be scheduled to examine all files on the user's hard disk on a regular basis.
    Although the dictionary approach is considered effective, virus authors have tried to stay a step ahead of such software by writing "polymorphic viruses", which encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match the virus's signature in the dictionary.
    Suspicious behavior approach
    The suspicious behavior approach, by contrast, doesn't attempt to identify known viruses, but instead monitors the behavior of all programs. If one program tries to write data to an executable program, for example, this is flagged as suspicious behavior and the user is alerted to this, and asked what to do.
    Unlike the dictionary approach, the suspicious behavior approach therefore provides protection against brand-new viruses that do not yet exist in any virus dictionaries. However, it also sounds a large number of false positives, and users probably become desensitized to all the warnings. If the user clicks "Accept" on every such warning, then the anti-virus software is obviously useless to that user. This problem has especially been made worse over the past 7 years, since many more nonmalicious program designs chose to modify other .exes without regards to this false positive issue. Thus, most modern anti virus software uses this technique less and less.
    Other ways to detect viruses
    Some antivirus-software will try to emulate the beginning of the code of each new executable that is being executed before transferring control to the executable. If the program seems to be using self-modifying code or otherwise appears as a virus (it immeadeatly tries to find other executables), one could assume that the executable has been infected with a virus. However, this method results in a lot of false positives.
    Yet another detection method is using a sandbox. A sandbox emulates the operating system and runs the executable in this simulation. After the program has terminated, the sandbox is analysed for changes which might indicate a virus. Because of performance issues this type of detection is normally only performed during on-demand scans.
    Issues of concern
    Macro viruses, arguably the most destructive and widespread computer viruses, could be prevented far more inexpensively and effectively, and without the need of all users to buy anti-virus software, if Microsoft would fix security flaws in Microsoft Outlook and Microsoft Office related to the execution of downloaded code and to the ability of document macros to spread and wreak havoc.
    User education is as important as anti-virus software; simply training users in safe computing practices, such as not downloading and executing unknown programs from the Internet, would slow the spread of viruses, without the need of anti-virus software.
    Computer users should not always run with administrator access to their own machine. If they would simply run in user mode then some types of viruses would not be able to spread.
    The dictionary approach to detecting viruses is often insufficient due to the continual creation of new viruses, yet the suspicious behavior approach is ineffective due to the false positive problem; hence, the current understanding of anti-virus software will never conquer computer viruses.
    There are various methods of encrypting and packing malicious software which will make even well-known viruses undetectable to anti-virus software. Detecting these "camouflaged" viruses requires a powerful unpacking engine, which can decrypt the files before examining them. Unfortunately, many popular anti-virus programs do not have this and thus are often unable to detect encrypted viruses.
    Companies that sell anti-virus software seem to have a financial incentive for viruses to be written and to spread, and for the public to panic over the threat.
    [More..]

    Wireless Internet Options for New Businesses

    Starting a business is one of the most intimidating things imaginable. You'll have to expose yourself to considerable financial and personal risk, of course, and you'll have to accept the fact that you may lose money. You'll quickly learn that you can save money by using technology as intelligently as possible. No technology will, by itself, make your business succeed or fail. You can, however, make sure that you're using it to its maximum possible level of effectiveness and not paying for technologies you do not need.
    If you're getting set up, you'll need broadband Internet access. Today, there are far better options than just getting a standard connection from a telephone or a cable television company. You can get Internet connectivity that is actually completely wireless. This is not wireless Internet service in the sense with which you're probably familiar. Wi-Fi is the term for the short-range connections that are provided in many offices. The type of wireless being discussed here is very long-range. It can cover an entire city, in fact. This service is delivered at broadband speeds and, if your freedom is part of the reason you're going into business for yourself, it's a good option to explore.
    4G wireless broadband is the latest in ISP technology. Instead of just wirelessly redistributing a DSL or cable connection, this service actually offers a complete wireless solution in and of itself. The technology can cover a very broad area and it's secure. It works with a modem that attaches to your computer and which provides you with access to the network. The speeds it offers are very fast and are on par with other broadband solutions. It also has the capability to cover your telecom needs at very affordable prices.
    The 4G wireless technology available today can be integrated with voice over IP technology. VoIP technology provides a viable alternative to expensive office telephone systems. Of course, you can take your office phone with you wherever you go, as well. Instead of giving every client your cell phone number, which can result in innumerable hassles, you can simply give them your office number and, wherever you are, you can answer or return calls to and from that number. This is a money-saving solution for any new business, as telecom companies tend to be among the most expensive of all contractors, especially where new systems are concerned.
    If your business is one that employs other workers, this technology is even more useful. You can offer the 4G connection to your employees and allow them to work from their homes or anywhere else. This allows you to avoid spending the considerable amounts of money required for an office. With more and more desirable employees demanding the option to telecommute, you can avail yourself of the best possible people to help your business grow. You can also make sure that you're on the cutting edge, but not so deeply invested in it that you buy technology that you don't use.
    [More..]

    Tips you Can Use to Based Crm Software Web

    In the next few paragraphs, we will explore new ideas and thoughts that may help you achieve your goal and decide what is best for you.
    Would you like to find out what those-in-the-know have to say about based crm software web? The information in the editorial below comes straight from well-informed experts with exclusive knowledge about based crm software web.
    One of the essential factors in the victory of any group is the liaison it shares with its customers. CRM or patron Relationship Management designates all skin of interaction a group shares with its customer. This includes everything from sales to service.
    CRM is mainly a concern strategy intended to accrue gains, produce revenue and cater to client needs and satisfaction. With the e-media selection up pace, the mode in which companies style their CRM strategies has terribly changed. This has even altered the customers purchasing attitude. So these days CRM too has become a web based effort as most of the client relationship is handled electronically.
    We hope that the first part of this article as brought you a lot of much needed information on the subject at hand.
    The web based CRM ceremony is more effective. Web-based CRM military mainly covers three areas of service- sales force automation, management of client relationships and client military and automated marketing.
    A web-based CRM software is a web-based structure used for dealings management, marketing and sales support, task tracking and other tasks associated with CRM. This software enables teams and departments to stake a middle and bright database. The software facilitates its users with an online dealings director and a project-tracking tool, whichever over the web or inside the corporate intranet. With the aid of the CRM software you can outlook and handle contacts, customers record, hot leads, projects and left-out work, from anywhere and with any web-browser. Moreover unlike the intervening and wanted to be testified upgrades of an enterprise software, the upgrades to the web based software do not shape the organizations ordered operations in any manner. Due to these skin more and more companies are ambitious towards this web-based software.
    Think about what you've read so far. Does it underpin what you already know about based crm software web? Or was there something completely new? What about the enduring paragraphs?
    Siebel Systems Inc., HydraNet and advocate CRM are some eminent names in web-based software service. Lately SAP has also blessed the advertise with on-demand shopper Relationship Management solution. A web based CRM has many names out of which on-demand CRM is one.
    These systems impart agents with the most up-to-date information on all shopper repair transactions. The software adds to the strategic value and affair of the organization by automating sales, marketing and shopper service. For request the SAP result specializes in providing core sales-force automation skin for running customers, contacts and sales pipelines.
    The software runs and keeps a finished track of your data after it is downloaded or purchased and then installed on your server or web-host. commonly the CRM software runs on all significant platforms such as Unix, Linux, Windows, Mac OS X, Novell (6.5) and so forth. because the software serves many purposes at the same time, it is totally expensive. However an incredible competition in the advertise has enabled the software seekers to essay their catalog to a certain extent.
    In choosing a web-based CRM software it is important that the addict should initially analyze his or her finances or the finances of the organization. Secondly also safeguard your organizations partner ecosystems. A user-friendly hosted CRM system, an on premise version or the combo of both should monitor this and lastly try to go for software that can fit any font of user, any bulk visitors and in any industry.
    So now you know a little bit about based crm software web. Even if you don't know everything, you've done something worthwhile: you've lingering your knowledge.
    The complexities of the subject matter within this article strive to give you a better look at what this subject is all about.
    [More..]

    Monday, November 17, 2008

    A Guide to Software Selection

    Buying decisions are the essence of life in the commerce-driven 21st century. From everyday decisions like selecting lunch from a restaurant menu, to getting a new car, to major company acquisitions, much of our time is spent “buying”. And these choices are anything but simple. Each marketer professes to be the sole champion of our consumer rights and pummels us with enticing advertising messages, about how their wares are “the best”. Seductive as these messages are, no product or service is quite the same. The difference may be glaring – that of “better vs. worse”, or a subtle tradeoff between price, quality, feature set, customer service, or durability. It is therefore important to keep our wits about & develop a systematic approach to the buying decision. Our view should be broad & farsighted, rather than buying based only on what immediately meets the eye. Hasty decisions leave us with flashy features never used, or hefty repair bills of products that came cheap. A good example of a systematic approach is when you buy a car. A myriad of factors are considered & weighed, which impact the owner for the next decade. This includes brand, performance vs. style, price, safety, terms of finance, mileage, maintenance, resale value & so many other factors.

    Selecting Software

    In our new “wired” modern reality, software is no less important than products & services in our everyday lives. Whether it’s a personal email program, chat software for instant connection, collaboration software to organize scattered employees, or an ERP implementation to manage company processes – there’s no surviving without them! But we’re somewhat more used to buying products & services than software, which is a relatively recent phenomenon. In many ways, selecting software is no different from selecting a product or service. Although intangible, software, also address a very real need, on which personal & professional success often depends. Naturally, some of the same purchase factors apply – brand, service, & maintenance costs. In spite of the patronizing obviousness of the above, software selection is a grey zone; an underdeveloped arena. This accounts for the high incidence of “shelfware” – software that are bought with grand intentions, but end up on dusty shelves. This is because unlike products & services, it is not so intuitively evident that software have “life cycles” & need to be “maintained”, “updated”, & “repaired”. Therefore, purchases are made based on what immediately meets the eye – technical features. This mistake is understandable, because technical features are well documented & advertised, & easy for the buyer to use as decision criteria. But with this approach, factors that are just as pertinent, but not so immediately obvious, get left out. Some research & serious thinking is needed to gauge these “hidden” factors.

    Key Factors for Buying Software

    1) Company History & Experience

    The vendor needs to be sized up before we even go on to consider the software itself. Company background is essential because, unlike traditional companies, software companies are often small, & often beyond national boundaries. Since these companies would likely be handling our sensitive data, we need to do a background check. Some related questions are: How Long Have They Been Around? As in most cases, we can reasonably assume that past record is a good indicator of future performance. Important questions are - How long have they been around? How long have they been in the field? If they’re offering online collaboration software, have they been in this industry long enough? Even if the software is new, do they have experience developing related software? What is Their Niche? Does the company know your niche well enough to know your needs? If you are a small/mid sized business, a company mainly serving the Fortune 500 is not for you. If you work from home, it is unlikely a solution serving large offices will meet your needs. The Ultimate Testament – The Customer The ultimate judge of software is its users. To get a true picture, it is important to look at how customers are using the software & what their comments are. Does their site include a client’s list or page? Check out what customers say under testimonials, or you could even get in touch with the customers yourself for comments. Dangers There are certain things about the software industry that a buyer should be wary of. Software startups have shorter life spans than traditional companies & ride high on a success wave, but go “pop” when the industry bubble bursts. This was exemplified by the “dot com burst” of 2000. Whether the current spate of “Web 2.0” companies constitutes another expanding bubble which will inevitably burst is debatable, but it makes sense to be wary & bet your money on dependable companies with proven track records.

    2) Cost

    There’s no denying the importance of cost effectiveness in buying decisions across the board. Yet costs should be seen in a broad perspective, because low entry costs may well result in higher total costs along the product’s life. Features vs. Price A cost-benefit analysis makes sense, & costs need to be compared with the software’s range of features & functionalities. A document management system may not be the cheapest, but it may allow you to also set up a virtual office. Going for loads of features also constitutes a trap, because users never get around to using half of them. Needs vs. Price Another question is whether there is an overlap between features & needs at all. Many features may not relate to needs sought to be addressed. You should clearly define your needs, & classify features as “needed features” & “features not needed”. Another possible scheme of classifying features could be “must have”, “nice to have”, & “future requirements”.

    3) Ease of Use/Adoption

    An adoption & learning curve is involved with every new software purchase. It needs to be integrated with current systems & software, & the end users have to be brought up to speed using it. If the software is chunky & too complex, adoption resistance can occur. Ease of Use The software should have an intuitive interface, & use of features should be pretty much self evident. The shorter the learning curve training a new user, the better. The software should also have the ability to easily fit into the existing systems with which it will have to communicate. For example, a collaboration software might allow you to use some features from your Outlook itself or even share Outlook data. Adoption To get a measure of “shelfware”, i.e., software that is purchased but never used, some studies peg the number of shelved content management solutions at 20-25%. At a million dollars per implementation, that’s pretty expensive shelfware! According to another study in the US, 22% of purchased enterprise portal (ERP) licenses are never used. No doubt, “Shelfware” is a result of ill thought out purchase decisions. These studies clearly underline the importance of making an educated purchase. One possible way to protect against shelfware is the new concept of “software as a service” (SAAS) hosted software. The software is hosted by its developer, & buyers have to pay a monthly subscription, which they can opt out of anytime.Support No matter how good a software is, there are bound to be times when one can’t find out how to work a particular feature or a glitch crops up. Some software solutions may require you to hire dedicated support staff of your own, while others may be easy to use, and no specialized staff may be needed, and still others may offer free support. The cost of hiring support staff needs to be factored into the buying decision. Provider support may be in the form of live human support, or automated help engines. In case of human help, the quality of solutions, availability & conduct of support executives matter. Support can also be in the form of an extensively documented help engine, or extensive help information on the company site. This form of support is often more prompt & efficient than human help. Training Training is another form of support which deserves special mention. Free training seminars or their new avatar - webinars (online seminars) - greatly help in getting up to speed with the software at no extra cost. In some cases the company might offer paid training, which may be essential, & hence this cost needs to be factored into the purchase decision. Maintenance Maintenance costs & efforts have a major impact on the performance & adoptability of software, & hence form important criteria of the buying decision. In case the software is hosted at the company’s end, it is of utmost importance that the software be available online at all times, or the “uptime”. Uptimes are covered under the “service level agreement” & range from 98% to 99.99%. A minimum uptime of 99% is what one must look for. The company’s upkeep is also important. Efforts to constantly improve upon the software underline a commitment to providing quality service. Are bugs fixed promptly & on an ongoing basis? Are they just releasing software & not updating it? One should develop a habit of keeping up with the company newsletter, release notes or the “what’s new” section on their site. Periodic newsletters & a “what’s new” section are indicative of a dynamic company.

    4) Familiarity

    The “feel” of the software is another important criterion. The software should keep with the basic layout & navigation schemes we are used to. This makes for quicker transition. One good way is to compare with the OS in which we would use the software. Does it have the same basic schema as the OS environment? A software with Mac schema on Windows wouldn’t sit that well. Or we could compare it with other software which we are used to. If you are switching to a low priced solution from an expensive one, choosing software with a similar “feel” would make sense. Does it retain most of the main features you are used to?

    5) Security

    Security is a top consideration because he software company will likely be handling information critical to us – business, financial or personal. We need to be well assured of our data's security & there are no risks of it being compromised. This needs research, & the extensiveness of which depends on the sensitivity of our data. What safety features does the provider have?

    Encryption, or coding of information, is used by most companies to protect the integrity of their clients’ information. There are different types of encryption, each of which is associated with a different level of security. DAS is one, once popular but now known to have loopholes. SSL 128-bit encryption is associated with top notch security. Password protection is another important facet. Is the software equipped to withstand manual & automated attempts to hack your password? The ability of the system to detect a hacking attempt & lock up in time is important. Data Backup In extreme cases of system breakdown caused by a facility fire, natural disaster or technical glitch etc, it is important that your data is frequently & adequately backed up. Data backup should be frequent & adequate. Certain factors are to be considered in backup practices. The first is the frequency of backups. If there is a long gap, there is a possibility of data being lost in intermittent periods. Secondly, what are the security arrangements at the facilities where your data resides? Is it manned & guarded by security personnel? What other safeguards are in place? Is there a good firewall? What is the protection against virus attacks? What procedures are in place for disaster management? Track Record As with company background, a little research on the security track record makes sense. Has the company ever been vulnerable to attacks before? What were the losses? How did the company react? How many years has the company had a good record? New companies will have a clean record, but that isn’t necessarily indicative of good security. The Server System The server system where the sensitive data actually lies is very important. Is it state-of-the-art? The server infrastructure could be owned by the software provider themselves or outsourced to a dedicated company providing hosting solutions. Outsourced hosting is a good thing because hosting companies have extensive expertise & infrastructure for security, & this frees up the software provider to concentrate on the software itself. The company might not have an elaborate setup at all, running the software & processing data through computers set up in the garage somewhere acting as servers. This should get your alarm bells ringing!

    Conclusion - A Systematic Selection Approach

    Now that we have discussed all the relevant factors in detail & have a better perspective of the subject, it is important to develop a systematic approach to analyzing these factors. What factors are important to me? Although all of the above factors are relevant, their relative importance may differ from customer to customer. For a company with deep pockets, price comes lower in the list. For a company using collaboration software to process business information, security is high priority. Again if a solution forms an important part of a company’s business, it is important that it integrates well with existing systems. For dynamic industries like real estate, short training times are important. Know Thy Software By this step you would have selected software. But that is still not the end. For all our theorizing & researching, the software still has to pass its toughest test. Most software allows you a free trial period. It would be a good idea to seriously use this period to analyze the software. It is important to stay focused during this testing period because the impact is going to be long lasting. Follow systematic planning. Identify objectives & needs, develop a testing plan, lay out the timelines and designate people from different departments to try out different features. Set responsibilities & goals so that testers take their job seriously.

    THE DECISION!

    Don’t hesitate to put the burden onto the company to prove itself. Let the company prove to you the features that seem important to you. For example, if security is of prime importance, ask the company to display how their solution scores high on security. Don’t hesitate to call them if you have questions. Test their service levels to see if it lives up to their promises. If you submit a ticket, is it promptly responded to? Is a good solution provided? If the problem requires live help, do you get it fast enough? When you call in with a problem, is it a live person or an automated message you converse with? This is as extensively as you can analyze software. You’re educated enough to make a choice which will most likely not fail you. You shall surely not be disappointed in your decision.
    [More..]

    Sunday, November 16, 2008

    Prosesor terbaru dari Intel


    Ternyata Intel corp benar-benar perusahaan microchip terbesar di dunia. Belum lama ini
    Intel corp telah me-launching produk nya yang terbaru, yaitu prosesor baru yang bernama "Penryn". Prosesor ini di rancang untuk komputer server dan PC berkinerja sangat tinggi. Menurut intel, Penryn merupakan prosesor berteknologi 45nm (nanometer) yang memiliki kecepatan 15% lebih bagus dari prosesor berteknologi 65nm.

    Jika pada proses chip berteknologi 65nm Intel "hanya" mampu menanam 582 juta transistor, maka dengan teknologi yang baru ini Intel berhasil menanamkan 820 juta transistor pada keping chip prosesor yang sama.

    Intel juga mengatakan bahwa prosesor terbaru tersebut tidak hanya semakin cepat, tetapi juga semakin hemat daya serta penambahan meterial baru dapat mencegah kebocoran listrik pada transistor.

    Selanjutnya, Intel telah menanamkan investasi sebesar USD 8 M untuk membangun pabrik baru berteknologi 45nm serta meng-upgrade pabriknya yang lama sehingga mampu menjalankan proses manufaktur chip 45nm. Prosesor tersebut telah di keluarkan sejak awal tahun 2008, yang di beri nama merk Xeon dan Core 2 Extreme.
    [More..]

    Why People Like Data Entry Work At Home

    When you really start thinking about it, you ask "Why did I actually start working at home want to enter data entry?" For some people it's a fairly simple answer: they love to type and are certain that pays for the right area are looking for. For others, it is only during their free time to do something that special gift or something and you want to buy can make a little extra money. You learn that some people take this kind of work to improve your computer and typing skills while earning money might be surprised himself.

    Flextime

    This is a most thought the aspects of data entry work at home, the fact that you pretty much are set free for their own hours. This is perfect if you are one of the many people who are not like night owls who happen to be working, while everyone around him is asleep. Another thing that people that you do as little work one hour or overnight if you can really wanted to love. How little you work or how much you owe it all depends on the type and how fast you type.

    They write love

    Away whatever they can tap to their heart's content to the pleasure of doing data entry work at home jobs do take many. If you're an excellent typist just pounding away on the keyboard to the forms, letters and documents to enter information enjoy, then you've come to the right place! In these jobs, you do not have anyone looking over my shoulder as you work at home, or it will be like this even as you type. This is a case where it is actually an advantage!

    Want to improve your skills

    then you write, but your skills are a little rusty? It really why some people start doing data entry jobs as part of a good type. Do not discuss here whether you type in a computer or typewriter keyboard. The point is that you just have to work this way to improve your skills a little more willing to make love work. Have you ever thought possible that there was a way to improve your typing speed? The front of my friends here can not be true. The old adage "practice makes perfect does not really apply here!"

    To wear whatever you please go Being able to work

    But what seems a bit odd and might be irrelevant in this article, but it also has an impact here. An office or weekend casual clothes you dressed in pajamas trying to enter the building and imagine that you might be willing to work? What people will never be acceptable!
    [More..]