Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 23088 dokumen yang sesuai dengan query
cover
"Tahun 2011 merupakan era baru teknologi komputasi (Cloud Computing) Teknologi komoutasi awan adalah solusi teknologi informasi dan komunikasi yang memberikan kesempatan kepada konsumen untuk dapat menyewa teknologi dari penyedoa (provider). Penyedia memberikan jasa pengelolzam infrastruktur, platform, dan aplikasi jasa teknologi informasi sehingga memudahkan konsumen tanpa harus berinvestasi. Hanya saja, ketika medoa baik media massa cdtsk dan media online menyebarluaskan informasi tentang teknologi komputasi awan, yang terjadi adalah penggunaan istilah-istilah teknologo yang beradampada level pakar (expert sphere) yang sulit dimengerti oleh masyarakat luas. Analisis yang digunakan adalah tiga kategori teknologi komputasi awan seperti Platform as a Service (PaaS), Infrastructire as a Service (IaaS), dan Software as a Service (SaaS); dua lapisan dari model Arnold Pacey seperti lapisan pakar (expert sphere) dan pengguna (user sphere) dalam pemanfaatan teknologi; dan dua pendekatan dari Arnold Pacey tentang pendekatan obyek (object approach) dan manusia (human approach). Dengan metode analisis isi diperoleh bahwa pemberitaan tentang teknologi komputasi awan lebih banyak pada kategori PaaS, expert sphere, dan object approach. Kemudian penelitian ini memperlihatkan adanya kecenderungan penggunaan bahasa dan tulisan wartawan yang tidak seimbang. Dengan menggunakan analisis framing, penelitian ini memperlihatkan adanya bingkai tertentu yang dilakukan oleh wartawan dalam menulis artikel dan berita terkait dengan teknologimkomputasi awan.

In 2011 was new era of Cloud Computing Technology . Cloud Computing Technology was solution of information and communication technology which gave opportunity to consumer to get hired technology service from provider. Provider gave managing service for infrastructure, platform, and information technology application service until facilitating consumer without might invest. It is just, when media both printed media and online media disseminated information about cloud computing technology, occured using of terms technology were on expert sphere level that was misunderstanding by society. Analyses was used that were three categories of cloud computing technology such as Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Software as a Service (SaaS); two layers of Arnold Pacey model such as expert sphere and user sphere in technology utilization ; and two approach of Arnold Pacey about object approach and human approach. By content analyses method obtained reporting about cloud computing technology was more than PaaS, expert sphere, and object approach categories. Then this study showed that tends used language and journalist writing were unbalance. By using framing analyses, this research described the particular framing was conducted by journalist to write article and news related to cloud computing technology."
Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2012
MK-Pdf
Artikel Jurnal  Universitas Indonesia Library
cover
Velte, Anthony T.
New York: McGraw-Hill, 2010
006.78 VEL c
Buku Teks  Universitas Indonesia Library
cover
Crookes, David
Unites States: Financial World, 2012
004.678 2 CRO c
Buku Teks  Universitas Indonesia Library
cover
Marinescu, Dan C.
""The first chapter gives an overview of cloud computing at a level accessible to a lay person. To motivate the reasons for a paradigm shift in the way we compute and store information, we introduce the concept of network-centric computing and network-centric content. A brief discussion of peer-to-peer systems, a first step in the shift from local to remote data storage and processing follows. The chapter continues with a discussion of technological advances that have made cloud computing possible and of the economical reasons why this new paradigm is attractive for many users and applications. Then we take a closer look at the cloud computing delivery models, Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). SaaS gives the users capability to use applications supplied by the service provider but allows no control of the platform or the infrastructure. PaaS gives the capability to deploy consumer-created or acquired applications using programming languages and tools supported by the provider. IaaS allows the user to deploy and run arbitrary software, which can include operating systems and applications. The new paradigm raises ethical questions and has significant vulnerabilities each dissected in separate sections. Finally, the chapter presents the major challenges faced by this new paradigm. The chapter concludes with a overview of the literature and with a historic perspective"--"
Amsterdam: Elsevier , 2013
004.678 2 MAR c
Buku Teks  Universitas Indonesia Library
cover
Mohamad Fathurahman
"Keberadaan data center pada sistem cloud computing sangat besar artinya. Data center yang terletak pada lapisan IaaS pada sistem cloud berisi komponen fisik yang meliputi komponen komputasi seperti server dan switch dan komponen non komputasi seperti sistem pendingin dan pengaturan suhu. Seiring dengan meningkatnya jumlah pengguna data center, maka konsumsi daya listrik pada data center akan meningkat. Telah diusulkan skema penghematan energi pada data center yakni skema DVFS dan DNS.
Pada penelitian ini telah disimulasikan menggunakan GreenCloud, yang merupakan ekstensi dari NS2, kepada tiga macam arsitektur data center yakni two-tier, three-tier dan three-tier high-speed dengan jenis workload adalah High Performance Computing HPC. Penerapan skema penghematan meliputi skema DVFS dan DNS saja serta DVFS dan DNS sekaligus. Dari hasil yang diperoleh menunjukkan bahwa penerapan skema DNS menunjukkan hasil terbaik karena berhasil melakukan penghematan rata-rata sebesar 63,42% pada server dan hampir 100% pada switch.

The existence of a data center in the cloud computing system was huge. Data center is located on the IaaS layer cloud systems containing physical component includes computing components such as servers and switches and non-computing components such as cooling systems and temperature regulation. Along with the increasing number of users of data center, then the electric power consumption in the data center will increase. Energy conservation schemes have been proposed in the data center is DNS and DVFS.
In this study has been simulated using GreenCloud, which is an extension of NS2, the three kinds of data center architecture these are two-tier, three-tier and three-tier high-speed with the type of data center workloads is HPC High Performance Computing. The applications of the savings schemes include schemes DVFS only, DNS only and both DVFS and DNS. From the results obtained indicate that the application of the DNS control scheme is the best because it managed to save an average of 63.42% on the server and almost 100% on the switch for all data center architecture.
"
Depok: Fakultas Teknik Universitas Indonesia, 2012
T31942
UI - Tesis Open  Universitas Indonesia Library
cover
"Media berkembang seiring dengan perubahan teknologi komunikasi melalui proses mediamorfosis menjadi media baru. Hal uang sama juga terjadi dengan demokrasi yang berkembangnya kebebasan berekspresi yang di dalam komunikasi lebih dikenal dengan "human cannot not communicate". Sehingga, baik medoa dan demokrasi saling memanfaatkan dan melengkapi menjadikannya selalu tergantung antara saru dengan lain. Paling tidak ada dua pandanganmyaktu utopia dan distopia. Di satu sisi utopia mengatakan bahqa salahnsatu yang dirasakan menarik saat ini adalah tumbuhnya media barj dalam peran partisipasi politik yang berbiaya rendah. Namun, pandangan distopia mengatakan bahwa perlu disadari baik media dan demokrasi juga mengalami proses marketisasi dan keduanya terkadang tidak menjadi dseterministik antara saru dengan lainnya serta memperlihatkan adanya konspirasi politik. Oleh karena itu, ketika adanya keinginan untuk membuat media baru sebagai suatu proses demokrasi yang dapat mensejahterakan masyarakat maka hal-hal tersebut perlu didiskusikan.

Media developed with movement of communication technology through mediamorfosis process was being new media. The same thing also occured with democration developed with growing of expression freedom in communication, it was called "human cannot not communicate". Until, media and democration mutual advantage and equip making depended upon one another. At least, there were two viewing specifically utopis and distopia. One side of utopia said that one of perceived attractive nowadays was developing new media in political participation with low cost. However, distopia viewing said that need to realize both media and democration also have marketisation process and both of them sometimes were not being deterministic one another and showed political conspiracy. Therefore, when there was necessity to make new media as a democration process that can be welfare society if the things need to be discussed."
Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2011
MK-Pdf
Artikel Jurnal  Universitas Indonesia Library
cover
Fatur Rahman Stoffel
"Teknologi komputasi cloud merupakan sebuah pool besar yang terdiri dari sumber daya komputasi yang di virtualisasikan, sehingga pengguna dapat mengakses dan menggunakannya. Cloud telah diadaptasi oleh banyak perusahaan besar di bidang IT, seperti Google, IBM, Amazon dan masih banyak lagi. Oleh karena itu, keamanan pada teknologi cloud menjadi prioritas utama, sehingga bisa terhindar dari serangan cyber. Advanced Persistent Threat (APT) merupakan sebuah serangan cyber yang bertujuan untuk mendapatkan akses terhadap sistem atau jaringan, sehingga bisa melakukan pencurian data. Berbeda dengan teknik pencurian data biasa yang bersifat "smash and grab", APT akan tetap berada pada sistem target dalam periode waktu tertentu, sehingga penyerang bisa mengakses dan mengambil data target secara terus menerus, tanpa bisa terdeteksi. Hal ini membuat APT menjadi salah satu ancaman cyber yang sulit untuk dicegah, khususnya pada cloud environment. Metode keamanan analitik menjadi salah satu solusi yang bisa digunakan untuk bisa mengatasi serangan APT pada cloud environment, hal ini dikarenakan data yang dihasilkan semakin banyak, dan infrastruktur dari cloud juga mempunyai kapasitas yang besar untuk bisa menangani banyak nya data yang dihasilkan, sehingga metode keamanan lama yang sering diterapkan menjadi tidak lagi efisien. Salah satu metode keamanan analitik yang dapat diterapkan pada teknologi cloud adalah dengan menggunakan Security Information Event Management (SIEM) yang disediakan oleh banyak vendor seperti IBM dengan IBM QRadar. Hasilnya didapatkan bahwa kinerja tingkat deteksi SIEM dengan IBM Qradar terhadap ancaman serangan APT tidak optimal dengan pendeteksian hanya sebesar 57,1% dan yang terdeteksi sebagai kategori penyerangan sebesar 42,9% dari total 4 serangan yang dilancarkan. Hal ini dikarenakan IBM Qradar memerlukan beberapa ekstensi tambahan, sehingga membutuhkan resource komputasi yang lebih besar agar bisa meningkatkan kemampuan deteksi terhadap serangan APT.

Cloud computing technology is a large pool of virtualized computing resources, so that users can access and use them. Cloud has been adapted by many large companies in the IT field, such as Google, IBM, Amazon and many more. Therefore, security in cloud technology is a top priority, so that it can avoid cyber attacks. Advanced Persistent Threat (APT) is a cyber attack that aims to gain access to a system or network, so that it can carry out data theft. Unlike the usual "smash and grab" data theft technique, the APT will remain on the target system for a certain period of time, so that attackers can access and retrieve target data continuously, without being detected. This makes APT one of the most difficult cyber threats to prevent, especially in cloud environments. Analytical security methods are one of the solutions that can be used to overcome APT attacks in the cloud environment, this is because more and more data is generated, and the infrastructure of the cloud also has a large capacity to be able to handle a lot of data generated, so the old security method which are often applied become inefficient. One of the analytical security methods that can be applied to cloud technology is to use Security Information Event Management (SIEM) that have been provided by many vendors such as IBM with IBM Qradar. The result shows that the performance of SIEM detection rate with IBM Qradar against APT attack is not optimal with only 57.1% detection rate and 42.9% detected as an attack category out of a total of 4 attacks launched. This is because IBM Qradar needs some additional extension, thus requiring more additional computing resources in order to increase the detection rate ability against APT attack."
Depok: Fakultas Teknik Universitas Indonesia, 2022
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Buyya, Rajkumar, 1970-
""Key Features: Explains how to make design choices and tradeoffs to consider when building applications to run in a virtual cloud environment; Test and experiment with a live cloud system on the Aneka platform; Real-world case studies include scientific, business, and energy-efficiency considerations; Download examples and instructor support materials on the book's companion page.Cloud computing is a technological advancement that focuses on the way in which we design computing systems, develop applications, and leverage existing services for building software. It is based on the concept of dynamic provisioning, which is applied not only to services, but also to compute capability, storage, networking, and IT (Information Technology) infrastructure in general. Resources are made available through the Internet and offered on a pay-per-use basis from Cloud computing vendors. Today, anyone with a credit card can subscribe to Cloud services and deploy and configure servers for an application in hours, growing and shrinking the infrastructure serving its application according to the demand, and paying only for the time these resources have been used"--"
Amsterdam: Elsevier, 2013
004.678 2 BUY m
Buku Teks  Universitas Indonesia Library
cover
"As part of the Syngress basics series, The basics of cloud computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use it in conversation, many are confused by it or unaware of what it really means. This book helps readers understand what the cloud is and how to work with it, even if it isn’t a part of their day-to-day responsibility.
Authors Derrick Rountree and Ileana Castrillo explains the concepts of cloud computing in practical terms, helping readers understand how to leverage cloud services and provide value to their businesses through moving information to the cloud. The book will be presented as an introduction to the cloud, and reference will be made in the introduction to other Syngress cloud titles for readers who want to delve more deeply into the topic.
"
Waltham, MA: Syngress, 2014
e20427739
eBooks  Universitas Indonesia Library
cover
Laili Gita
"Data kehadiran adalah data yang penting baik di lingkup sekolah, universitas, maupun perkantoran untuk karyawan. Presensi yang berupa tandatangan dapat dipalsukan oleh siapa saja dan kapan saja. Sehingga dibutuhkan sebuah perangkat yang dapat mempermudah proses absensi sekaligus mendeteksi keterlambatan siswa/pegawai sebelum memasuki ruangan. Skripsi ini mengembangkan Smart Presence System berbasis Face Recognition dengan machine learning yang dirancang dengan komputasi pada awan (Cloud Computing) dan komputasi pada sebuah node/titik (Fog Computing). Skripsi ini melakukan perbandingan performa Smart Presence System yang dibangun dengan Cloud Computing menggunakan layanan AWS Face Rekognition dan Fog Computing yang ditulis menggunakan bahasa Python dengan library OpenCV yang menggunakan perangkat Raspberry Pi sebagai titik komputasi. Penulis telah melakukan pengujian perbandingan waktu komputasi, penggunaan memori, serta penggunaan biaya antara Cloud Computing dan Fog Computing. Pengujian waktu komputasi dilakukan dengan menggeser router/titik uji sejauh 3 meter, 5 meter dan 7 meter dari sensor kamera. Pengujian waktu komputasi pada Cloud Computing didpat sebesar 11.02 detik, 2.99 detik dan 3.02 detik dengan total penggunaan memori sebesar 0.0042 MB dan total biaya yang diperlukan untuk membangun rancangan Cloud Computing sebesar Rp2.819.516 dalam penggunaan 12 bulan. Dan rata-rata waktu untuk komputasi pada fog sebesar 0.723 detik, 0.99 detik, 1.94 detik dengan total penggunaan memori sebesar 540MB dan total biaya untuk membangun rancangan ini sebesar Rp2.220.00 dalam penggunaan 12 bulan.

Attendance document is an important thing in schools, universities, and offices for employees. Attendance is usually done by giving a signature on a piece of paper, and it can be forged by anyone. In school, attendance is usually done manually by the teacher and it takes time. So we need a device that can simplify the attendance process and can not be forged. This thesis has developed a Smart Presence System with machine learing designed with Cloud Computing and Fog Computing. This Thesis compared the performance of The Smart Presence System that built with Cloud Computing using AWS Rekognition and Fog Computing that built in Raspberry pi and written in python and library Opencv. The author has tested the comparison of Cloud Computing and Fog Computing in Computing Time, Memory usage and Cost. Computing time testing is done by shifting the router/test point as far as 3 meters, 5 meters, and 7 meters. The computing time on Cloud Computing were 11.02s, 2.99s, and 3.02s with total memory usage of 0.0042MB and the total cost is Rp.2.819.516 in 12 months of use. And The computing time on Fog Computing were o.72s, 0.99s, and 1.94s with the total memory usage of 540MB and the total cost to build this architecture is Rp2.220.000 in 12 months of use.
"
Depok: Fakultas Teknik Universitas Indonesia, 2022
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>