Senin, 22 November 2010

Go Bible for easy

Go Bible Home | News | Forum | About | Contact | Developer

Go Bible

For the glory of our Lord Jesus Christ and the furtherance of His Kingdom. Go Bible is a Free Bible viewer application for Java mobile phones (J2ME MIDP 1.0 and MIDP 2.0).
Go Bible 2.2.6 Features:
  • Christ's Words in red
  • SMS scriptures
  • Bookmarks
  • History
  • Coloured themes
  • Fast search
If you have installation questions please visit the Go Bible Forums.

Download Go Bible:


Step 1 - Select a translation
Language:
Translation:
About this translation:
The Authorized King James Version is an English translation of the Christian Bible begun in 1604 and first published in 1611 by the Church of England.
Step 2 - Select an edition
Some Nokia phones limit the application size to 512KB or 128KB which is smaller than the full Go Bible size of approximately 1.4MB. To support these phones we also provide Go Bible split into multiple applications of 512KB or 128KB. To find out the max JAR limit of your Nokia phone go to the Forum Nokia website, select your phone model, and look for the "Max JAR Size" in the table of the resulting page.
Step 3 - Download
Click the download button to begin downloading Go Bible King James Version to your computer:
The file you download is a ZIP file. You will need to decompress this file which will result in some JAD and JAR files. The JAR file is the actual application which needs to be loaded onto the phone. The JAD file is a smaller descriptor file that some phone application loaders may require to be able to install the JAR file.
Link to file (if the Download button doesn't work)

Alternatively: Download directly to phone
Go Bible King James Version can be downloaded directly on your phone using your phone's browser.
To do so enter the following link into your phone's browser:
Note: Downloading via your phone may incur data charges. You may want to find out how much you pay for data before downloading Go Bible over the air as it is a 1.4MB download.

iPad

The best way to experience the web, email, photos, and video. Hands down.

Watch the iPad video
All of the built-in apps on iPad were designed from the ground up to take advantage of the large Multi-Touch screen and advanced capabilities of iPad. And they work in any orientation. So you can do things with these apps that you can’t do on any other device.


Safari

iPad is the best way to experience the web. View whole pages in portrait or landscape on the large Multi-Touch screen. And let your fingers do the surfing. Learn more

Mail

There’s nothing like the Mail app on iPad. With a unified inbox, split-screen view, and expansive onscreen keyboard, it lets you see and touch your email in ways you never could before. Learn more

Photos

A vivid LED-backlit IPS display makes viewing photos on iPad extraordinary. Open albums with a tap. Flip through your pictures one by one. Or play a slideshow and share your photos. Learn more

From the App Store

The iWork productivity applications — Keynote, Pages, and Numbers — have been completely redesigned for iPad.2 So you can create great-looking presentations, documents, and spreadsheets. You can even share them as Microsoft Office files with any Mac or PC user. All using just your fingers.


iBooks

Reading is a joy on iPad. Text looks crisp and bright. Pages turn with a flick. And you can buy new books from the iBookstore. Just download the free iBooks app to get started. Learn more

Keynote

Create a presentation with custom graphic styles, elegantly designed themes, stunning animations and effects, and powerful new features designed just for iPad.


Watch this video below!



Rabu, 17 November 2010

Online Store


Online shopping is the process whereby consumers directly buy goods or services from a seller in real-time, without an intermediary service, over the Internet. If an intermediary service is present the process is called electronic commerce. An online shop, eshop, e-store, internet shop, webshop, webstore, online store, or virtual store evokes the physical analogy of buying products or services at a bricks-and-mortar retailer or in a shopping mall. The process is called Business-to-Consumer (B2C) online shopping. When a business buys from another business it is called Business-to-Business (B2B) online shopping. Both B2C and B2B online shopping are forms of e-commerce.
In 1990 Tim Berners-Lee created the first World Wide Web server and browser. It opened for commercial use in 1991. In 1994 other advances took place, such as online banking and the opening of an online pizza shop by Pizza Hut. During that same year, Netscape introduced SSL encryption of data transferred online, which has become essential for secure online shopping. Also in 1994 the German company Intershop introduced its first online shopping system. In 1995 Amazon launched its online shopping site, and in 1996 eBay appeared.

Customers

In recent years, online shopping has become popular; however, it still caters to the middle and upper class. In order to shop online, one must be able to have access to a computer, a bank account and a debit card. Shopping has evolved with the growth of technology. According to research found in the Journal of Electronic Commerce, if we focus on the demographic characteristics of the in-home shopper, in general, the higher the level of education, income, and occupation of the head of the household, the more favourable the perception of non-store shopping. An influential factor in consumer attitude towards non-store shopping is exposure to technology, since it has been demonstrated that increased exposure to technology increases the probability of developing favourable attitudes towards new shopping channels.
Online shopping widened the target audience to men and women of the middle class. At first, the main users of online shopping were young men with a high level of income and a university education. This profile is changing. For example, in USA in the early years of Internet there were very few women users, but by 2001 women were 52.8% of the online population.
Payment
Online shoppers commonly use credit card to make payments, however some systems enable users to create accounts and pay by alternative means, such as:
Some sites will not allow international credit cards and billing address and shipping address have to be in the same country in which site does its business. Other sites allow customers from anywhere to send gifts anywhere. The financial part of a transaction might be processed in real time (for example, letting the consumer know their credit card was declined before they log off), or might be done later as part of the fulfillment process.
Product delivery
Once a payment has been accepted the goods or services can be delivered in the following ways.
  • Download: This is the method often used for digital media products such as software, music, movies, or images.
  • Shipping: The product is shipped to the customer's address.
  • Drop shipping: The order is passed to the manufacturer or third-party distributor, who ships the item directly to the consumer,
  • post: It can be also posted to any customer
bypassing the retailer's physical location to save time, money, and space.
  • In-store pickup: The customer orders online, finds a local store using locator software and picks the product up at the closest store. This is the method often used in the bricks and clicks business model.
  • In the case of buying an admission ticket one may get a code, or a ticket that can be printed out. At the premises it is made sure that the same right of admission is not used twice.
Shopping cart systems
  • Simple systems allow the offline administration of products and categories. The shop is then generated as HTML files and graphics that can be uploaded to a webspace. These systems do not use an online database.
  • A high end solution can be bought or rented as a standalone program or as an addition to an enterprise resource planning program. It is usually installed on the company's own webserver and may integrate into the existing supply chain so that ordering, payment, delivery, accounting and warehousing can be automated to a large extent.
  • Other solutions allow the user to register and create an online shop on a portal that hosts multiple shops at the same time.
  • Open source shopping cart packages include advanced platforms such as Interchange, and off the shelf solutions as Avactis, Satchmo, osCommerce, Magento, Zen Cart, VirtueMart, Batavi and PrestaShop.
  • Commercial systems can also be tailored to ones needs so that the shop does not have to be created from scratch. By using a framework already existing, software modules for different functionalities required by a web shop can be adapted and combined.
Online Shopping Malls
Like many online auction websites, many websites allow small businesses to create and maintain an online shops (ecommerce online shopping carts), without the complexity that involved in purchasing and developing an expensive stand alone ecommerce software solutions.

Online Newspaper


An online newspaper, also known as a web newspaper, is a newspaper that exists on the World Wide Web or Internet, either separately or as an online version of a printed periodical.
Going online created more opportunities for newspapers, such as competing with broadcast journalism in presenting breaking news in a more timely manner. The credibility and strong brand recognition of well-established newspapers, and the close relationships they have with advertisers, are also seen by many in the newspaper industry as strengthening their chances of survival. The movement away from the printing process can also help decrease costs.
Professional journalists have some advantages over blogs, as editors are normally aware of the potential for legal problems.
Online newspapers are much like hard-copy newspapers and have the same legal boundaries, such as laws regarding libel, privacy and copyright, also apply to online publications in most countries, like in the UK. Also in the UK the Data Protection Act applies to online newspapers and news pages. As well as the PCC rules in the UK. But the distinction was not very clear to the public in the UK as to what was a blog or forum site and what was an online newspaper. In 2007, a ruling was passed to formally regulate UK based online newspapers, news audio, and news video websites covering the responsibilities expected of them and to clear up what is, and what isn't, an online publication.
News reporters are being taught to shoot video and to write in the succinct manner necessary for the Internet news pages. Many are learning how to implement blogs and the ruling by the UK's PCC should help this development of the internet.
Journalism students in schools around the world are being taught about the "convergence" of all media and the need to have knowledge and skills involving print, broadcast and web.
Some newspapers have attempted to integrate the internet into every aspect of their operations, i.e., reporters writing stories for both print and online, and classified advertisements appearing in both media; others operate websites that are more distinct from the printed newspaper. The Newspaper National Network LP is an online advertising sales partnership of the Newspaper Association of America and 25 major newspaper companies.
We’ll see example of Indonesia Newspaper below

Indonesia Newspapers


Social Network

A social network is a social structure made up of individuals (or organizations) called "nodes", which are tied (connected) by one or more specific types of interdependency, such as friendship, kinship, common interest, financial exchange, dislike, sexual relationships, or relationships of beliefs, knowledge or prestige.
Social network analysis views social relationships in terms of network theory consisting of nodes and ties (also called edges, links, or connections). Nodes are the individual actors within the networks, and ties are the relationships between the actors. The resulting graph-based structures are often very complex. There can be many kinds of ties between the nodes. Research in a number of academic fields has shown that social networks operate on many levels, from families up to the level of nations, and play a critical role in determining the way problems are solved, organizations are run, and the degree to which individuals succeed in achieving their goals.
In its simplest form, a social network is a map of specified ties, such as friendship, between the nodes being studied. The nodes to which an individual is thus connected are the social contacts of that individual. The network can also be used to measure social capital – the value that an individual gets from the social network. These concepts are often displayed in a social network diagra






Social network analysis

Social network analysis (related to network theory) has emerged as a key technique in modern sociology. It has also gained a significant following in anthropology, biology, communication studies, economics, geography, information science, organizational studies, social psychology, and sociolinguistics, and has become a popular topic of speculation and study.
People have used the idea of "social network" loosely for over a century to connote complex sets of relationships between members of social systems at all scales, from interpersonal to international. In 1954, J. A. Barnes started using the term systematically to denote patterns of ties, encompassing concepts traditionally used by the public and those used by social scientists: bounded groups (e.g., tribes, families) and social categories (e.g., gender, ethnicity). Scholars such as S.D. Berkowitz, Stephen Borgatti, Ronald Burt, Kathleen Carley, Martin Everett, Katherine Faust, Linton Freeman, Mark Granovetter, David Knoke, David Krackhardt, Peter Marsden, Nicholas Mullins, Anatol Rapoport, Stanley Wasserman, Barry Wellman, Douglas R. White, and Harrison White expanded the use of systematic social network analysis.
Social network analysis has now moved from being a suggestive metaphor to an analytic approach to a paradigm, with its own theoretical statements, methods, social network analysis software, and researchers. Analysts reason from whole to part; from structure to relation to individual; from behavior to attitude. They typically either study whole networks (also known as complete networks), all of the ties containing specified relations in a defined population, or personal networks (also known as egocentric networks), the ties that specified people have, such as their "personal communities". The distinction between whole/complete networks and personal/egocentric networks has depended largely on how analysts were able to gather data. That is, for groups such as companies, schools, or membership societies, the analyst was expected to have complete information about who was in the network, all participants being both potential egos and alters. Personal/egocentric studies were typically conducted when identities of egos were known, but not their alters. These studies rely on the egos to provide information about the identities of alters and there is no expectation that the various egos or sets of alters will be tied to each other. A snowball network refers to the idea that the alters identified in an egocentric survey then become egos themselves and are able in turn to nominate additional alters. While there are severe logistic limits to conducting snowball network studies, a method for examining hybrid networks has recently been developed in which egos in complete networks can nominate alters otherwise not listed who are then available for all subsequent egos to see. The hybrid network may be valuable for examining whole/complete networks that are expected to include important players beyond those who are formally identified. For example, employees of a company often work with non-company consultants who may be part of a network that cannot fully be defined prior to data collection.
Several analytic tendencies distinguish social network analysis:
There is no assumption that groups are the building blocks of society: the approach is open to studying less-bounded social systems, from nonlocal communities to links among websites.
Rather than treating individuals (persons, organizations, states) as discrete units of analysis, it focuses on how the structure of ties affects individuals and their relationships.
In contrast to analyses that assume that socialization into norms determines behavior, network analysis looks to see the extent to which the structure and composition of ties affect norms.
The shape of a social network helps determine a network's usefulness to its individuals. Smaller, tighter networks can be less useful to their members than networks with lots of loose connections (weak ties) to individuals outside the main network. More open networks, with many weak ties and social connections, are more likely to introduce new ideas and opportunities to their members than closed networks with many redundant ties. In other words, a group of friends who only do things with each other already share the same knowledge and opportunities. A group of individuals with connections to other social worlds is likely to have access to a wider range of information. It is better for individual success to have connections to a variety of networks rather than many connections within a single network. Similarly, individuals can exercise influence or act as brokers within their social networks by bridging two networks that are not directly linked (called filling structural holes).
The power of social network analysis stems from its difference from traditional social scientific studies, which assume that it is the attributes of individual actors—whether they are friendly or unfriendly, smart or dumb, etc.—that matter. Social network analysis produces an alternate view, where the attributes of individuals are less important than their relationships and ties with other actors within the network. This approach has turned out to be useful for explaining many real-world phenomena, but leaves less room for individual agency, the ability for individuals to influence their success, because so much of it rests within the structure of their network.
Social networks have also been used to examine how organizations interact with each other, characterizing the many informal connections that link executives together, as well as associations and connections between individual employees at different organizations. For example, power within organizations often comes more from the degree to which an individual within a network is at the center of many relationships than actual job title. Social networks also play a key role in hiring, in business success, and in job performance. Networks provide ways for companies to gather information, deter competition, and collude in setting prices or policies.


Computer security


Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done.
We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs.  Although you may not consider your communications "top secret," you probably do not want strangers reading your email, using your computer to attack other systems, sending forged email from your computer, or examining personal information stored on your computer (such as financial statements).
Intruders (also referred to as hackers, attackers, or crackers) may not care about your identity. Often they want to gain control of your computer so they can use it to launch attacks on other computer systems.
Having control of your computer gives them the ability to hide their true location as they launch attacks, often against high-profile computer systems such as government or financial systems. Even if you have a computer connected to the Internet only to play the latest games or to send email to friends and family, your computer may be a target.
Intruders may be able to watch all your actions on the computer, or cause damage to your computer by reformatting your hard drive or changing your data.
Unfortunately, intruders are always discovering new vulnerabilities (informally called "holes") to exploit in computer software. The complexity of software makes it increasingly difficult to thoroughly test the security of computer systems.
When holes are discovered, computer vendors will usually develop patches to address the problem(s). However, it is up to you, the user, to obtain and install the patches, or correctly configure the software to operate more securely. Most of the incident reports of computer break-ins received at the CERT/CC could have been prevented if system administrators and users kept their computers up-to-date with patches and security fixes.
Also, some software applications have default settings that allow other users to access your computer unless you change the settings to be more secure. Examples include chat programs that let outsiders execute commands on your computer or web browsers that could allow someone to place harmful programs on your computer that run when you click on them.

History of Computer


Before the 1920s, computers (sometimes computors) were human clerks that performed computations. They were usually under the lead of a physicist. Many thousands of computers were employed in commerce, government, and research establishments. Most of these computers were women, and they were known to have a degree in calculus. Some performed astronomical calculations for calendars.
After the 1920s, the expression computing machine referred to any machine that performed the work of a human computer, especially those in accordance with effective methods of the Church-Turing thesis. The thesis states that a mathematical method is effective if it could be set out as a list of instructions able to be followed by a human clerk with paper and pencil, for as long as necessary, and without ingenuity or insight.
Machines that computed with continuous values became known as the analog kind. They used machinery that represented continuous numeric quantities, like the angle of a shaft rotation or difference in electrical potential.
Digital machinery, in contrast to analog, were able to render a state of a numeric value and store each individual digit. Digital machinery used difference engines or relays before the invention of faster memory devices.
The phrase computing machine gradually gave away, after the late 1940s, to just computer as the onset of electronic digital machinery became common. These computers were able to perform the calculations that were performed by the previous human clerks.
Since the values stored by digital machines were not bound to physical properties like analog devices, a logical computer, based on digital equipment, was able to do anything that could be described "purely mechanical." The theoretical Turing Machine, created by Alan Turing, is a hypothetical device theorized in order to study the properties of such hardware.