Senin, 03 November 2008

TATA NANO MOBIL TERMURAH


Tata Nano, Mobil Termurah dan Irit di Dunia



Jakarta-Rekor China sebagai produsen mobil termurah di dunia kini terpatahkan oleh India. Tata Motor Co telah merilis Tata Nano, mobil termurah di dunia dengan harga hanya 100.000 rupee atau Rp 22,5 juta per unit, yang diluncurkan 10 Januari pada New Delhi Auto Show. Kendati disambut skeptis para analis, mobil murah tersebut tetap akan dipasarkan di India dan negara-negara berkembang.
Peluncuran mobil itu dilakukan di tengah makin dekatnya momentum pengumuman Tata sebagai pemenang akuisisi atas divisi Jaguar dan Land Rover, dua merek mobil premium milik Ford Motor Co.
Ratan Tata, Chairperson Tata Group--induk perusahaan Tata Motor Co, mengatakan, Tata Nano memiliki sasaran pasar para pemilik sepeda motor yang ingin beralih ke mobil. “Saya berharap mobil ini dapat memberi pilihan baru kepada konsumen karena lebih aman ketimbang sepeda motor,” ujar Ratan seperti dikutip Times of India, akhir pekan lalu.
Mahantesh Sabarad, analis pada Prabhudas Lilladher mengatakan, upaya mengalihkan minat pemilik sepeda motor di India ke mobil tidaklah mudah dilakukan karena jika pemilik sepeda motor ingin beralih ke mobil, akan ada banyak mobil bekas yang harganya lebih murah dari 100.000 rupee atau setara US$ 2.500.
“Kendaraan roda dua yang paling populer sekalipun, harganya 35.000-40.000 rupee per unit, jadi perbedaan harga yang jauh dengan mobil murah buatan Tata menjadi kendala. Selain itu, biaya perawatan mobil juga lebih mahal ketimbang sepeda motor,” ujar Sabarad.
Di India, mobil termurah keluaran Suzuki, yakni Maruti 800, dijual dengan harga 192.124 rupee (US$ 4.885) per unit, hampir dua kali lipat dari harga mobil Tata. Peluncuran mobil murah itu mendorong Suzuki ikut-ikutan menurunkan harga.
Tata Nano menggunakan mesin 33 tenaga kuda, 624 cc dua silinder (bensin) yang dipasangkan dengan transmisi CVT atau 5-speed manual. Untuk versi diesel menyusul kemudian. Mobil empat penumpang ini membutuhkan lima liter bensin untuk jarak 100 km. Mobil ini juga memenuhi standar uji tabrak India, dan juga regulasi emisi.
Mesin dua silindernya, yang menggunakan Value Motronic fuel injection buatan Bosch, dipasang di belakang bersama baterai. Ada ruang bagasi kecil di depan, di mana mesin biasanya ada.
Tidak dilengkapi power steering, rpm meter, hanya speedometer, fuel gauge, dan oil light.
Walau mobil ini dijual dengan harga 100.000 rupee atau 1-Lakh., konsumen harus membayar lebih dari itu karena ada pajak dan pungutan lain. Harga 1-Lakh itu untuk versi standar tanpa AC. Dua model lainnya dilengkapi AC. Mobil ini berbentuk minicar dengan empat kursi. Bodinya dari plastik yang dipadukan dengan perekat modern.

Dukungan Bosch
Value Motronic buatan Bosch adalah platform manajemen mesin terbaru untuk mesin bensin yang berguna menghasilkan fungsi maksimal dengan biaya rendah. Yang dilakukan Bosch adalah memangkas penggunaan sensor-sensor, injektor, dan alat-alat lainnya, digantikan perangkat lunak cerdas untuk mengurangi penggunaan sensor.
Perangkat ini menjadi penting, yang membuat Tata bisa memproduksi mobil paling murah di dunia. Tata menyebutnya Mobil Rakyat. Mobil ini dirancang agar pemilik sepeda motor di India mengganti kendaraannya dengan mobil ini. Mesin 660 cc yang dipasang diperkirakan mampu memproduksi daya sebesar 30-35 HP. Model ini menurut rencana bakal diboyong pada debut di Geneva Motor Show, yang berlangsung Maret 2008. Konon, konsumsi bahan bakarnya rata-rata 59 mpg atau 25 km/liter.
(wait and buy)

Kamis, 27 Maret 2008

Merubah Logo Google dengan Nama Anda


Google, ya hampir semua orang tahu dengan google.. mesin cari populer kepunyaan Larry Page dan Sergey Brein inimem iliki latar halaman bernuansa putih sederhana plus logo "Google" di atas kotak mesin carinya.

Jika Anda boring dengan tampilan logo tersebut, Anda bisa membuat halaman seperti Google dengan nama Anda. Caranya sangat mudah. Cukup klik-klik saja logo dan style yang diinginkan, dalam sekejap Anda akan bisa memiliki halaman mesin cari seperti Google dengan nama Anda. Simak langkahnya:

1. Buka situs http://www.funnylogo.info/create.asp
2. Masukan nama yang Anda inginkan pada situs tersebut.
3. Tentukan style tulisan yang diinginkan, misal: Google Style.
4. Klik "Create My Search Engine".
5. Setelah itu akan muncul tampilan "Situs Google" dengan logo yang kita inginkan.

Untuk membuat tampilan tersebut menjadi halaman default ketika Anda membuka browser, copy alamat yang tertera pada Address.

Untuk Browser Internet Explorer (IE):
1. Klik menu Tools - Internet Options
2. Pilih tab General, lalu ubah field Home Page dengan alamat tersebut.

Untuk Browser Mozila:
1. Klik menu Tools - Options
2. Pilih tab Main, lalu ubah field Home Page dengan alamat tersebut.
3. Pada field When Firefox starts, pilih settingan Show my home page, lalu klik OK.

Setelah semua perintah anda selesaikan, coba buka browser anda dan pasti tampilan Google sdh berubah sesuai dengan keinginan anda, jika belum bisa coba contact saya di edy_winarno@yahoo.co.id Selamat mencoba...!

Jumat, 25 Januari 2008

GSM (Global System For Mobile Communications)

GSM network is designed by using digital wireless technology. It offers compatible wireless services to all mobile users in all over the world. The basic requirements for GSM are following:
  • Services
  • Quality of services and security
  • Radio frequency utilization
  • Network
Services: The services, which are provided by the system, should be potable to all Mobile Stations or Mobile Phones so that it can b used in all over the world.

Quality of services and security: The quality of both voice and data services of GSM should be good. The voice data is encoded in digital form by using a modulation technique i.e.Gussian Minimum Shift Keying (GMSK).The security features should be provided by the system to protect the network against unauthorized users.

Radio frequency utilization: The system should use the available band of frequencies (For uplink: 890-915MHz & For downlink: 935-960MHz) efficiently.

Network: Network designers manage the identification and numbering plans while switching and mobility management based upon signaling system i.e. Signaling System Number 7(SS7).

GSM Architecture

The main component groups of GSM architecture are:
  • Mobile Stations (MSs)
  • Base Station System (BSS)
  • Network and Switching Subsystem (NSS)
Mobile Stations (MSs):

The Mobile Station (MS) consist of two operational parts.
  1. Mobile Equipment (ME)
  2. Subscriber Identity Module (SIM)
Mobile Equipment (ME): This is the hard ware used by the subscriber to access the network and it has a unique identity number known as International Mobile Equipment Identity (IMEI).

Subscriber Identity Module (SIM): This is a type of electronic card that is plugs into ME and contains detailed information about the mobile subscriber.

Base Station System (BSS):

BSS is central equipment, which is located at the cell site. It provides the link between MS and NSS. The BSS consists of two operational parts.

Base Transceiver Station (BTS): BTS consists of transmitting and receiving antennas and signaling equipment that provide air interface for a cell to route the call. BTS communicates with the MS.A single BTS can support one or more cells.

Base Station Controller (BSC): All switching functions, which are performed in MSC, are controlled by BSC. It also supports handoff strategies and allocate or release temporary channels for those users whose needed handoff. Several BTSs can be controlled by a single BSC and one MSC can serve many BSCs

Network Switching Subsystem (NSS)

It is the main switching center of GSM network. NSS includes the following:

Mobile Switching Center (MSC): It is the basic unit of NSS, which supports call-switching or routing functions. Its purpose is the same as that of telephone exchange but due to advanced wireless technology, its working is much better than that of exchange. Each MSC provides coverage to a defined geographic area only.

Home Location Register (HLR): For subscriber its a reference data base. Current location of MS, identification numbers and various addresses are maintained in it.

Visitor Location Register (VLR): It's also a type of database. When an MS moves from home location to a visited location then its location is registered as a visitor in the VLR of visited system and this information is also updated in HLR of MS, by the VLR.

Equipment Identity Register (EIR): Its again a type of database, which contains information about MS equipment and check and identify its international validity of hardware and software to work properly.

Authentication center (AUC): Its a processing center and is normally worked together with HLR.Like HLR its also require to continuously access or update subscribers data. Its main purpose is to provide data security features to authenticate the subscriber.

VIRUS IN COMPUTER

A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. However, the term "virus" is commonly used, albeit erroneously, to refer to many different types of malware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm can spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a file that appears harmless until executed.

How a Computer Virus Works?

The mechanism of a computer virus can undoubtedly be compared with working of a biological virus. Both of them more or less work in a similar way but follow different analogy.Unlike the computer virus, a biological virus is a fragment of genetic code, DNA, which breathes inside a human body and infects living cell by spreading rogue DNA into the cell environment. The viral DNA keeps replicating itself in the cell’s existing machinery.

Likewise, the computer virus seeks for a host i.e. any program or document to infect a machine and replicates itself each time a user opens the program. When the user opens an infected program, the virus loads itself into the computer’s memory and searches for another host to reproduce, thereby creating a vicious circle for itself.

Several viruses were originally designed to infect the boot sector, the part of the operating system that loads at the time you switch on your computer. The boot sector helps the computer in loading the operating system. By putting code in the boot sector, the virus is active every time the user switches on the computer.

General modes of computer virus transmission are infected floppy discs or documents uploaded to bulletin boards. All viruses have a sole aim to ruin computers’ functionality which is the main part of the attack phase. When the virus is being activated, a small program is opened to perform a task. It can be an attractive message on the user’s screen or it may attempt at deleting all the data present on your hard disk drive.

Immediate computer virus repair is must to avoid damage to computers. There are some terrible viruses that are always ready to scour the network’s functionality, thereby making it crucial to avail virus support. With technical support services have become the next big thing and arrival of names like IBM, Dell, iYogi, and Circuit City, the task of removing computer viruses can be done in no time.

Many personal computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.

Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.