Parallel computing

Parallel computing is a form of computation in which many calculations are carried out simultaneously, operating on the principle that large problems can often be divided into smaller ones, which are then solved concurrently (“in parallel”). There are several different forms of parallel computing: bit-level, instruction level, data, and task parallelism. Parallelism has been employed for many years, mainly in high-performance computing, but interest in it has grown lately due to the physical constraints preventing frequency scaling. As power consumption (and consequently heat generation) by computers has become a concern in recent years, parallel computing has become the dominant paradigm in computer architecture, mainly in the form of multi-core processors.

Parallel computers can be roughly classified according to the level at which the hardware supports parallelism, with multi-core and multi-processor computers having multiple processing elements within a single machine, while clusters, MPPs, and grids use multiple computers to work on the same task. Specialized parallel computer architectures are sometimes used alongside traditional processors, for accelerating specific tasks.

Parallel computer programs are more difficult to write than sequential ones,because concurrency introduces several new classes of potential software bugs, of which race conditions are the most common. Communication and synchronization between the different subtasks are typically some of the greatest obstacles to getting good parallel program performance.

The maximum possible speed-up of a single program as a result of parallelization is known as Amdahl’s law.

Distributed computing is a field of computer science that studies distributed systems. A distributed system is a software system in which components located on networked computers communicate and coordinate their actions by passing messages.[1] The components interact with each other in order to achieve a common goal. Three significant characteristics of distributed systems are: concurrency of components, lack of a global clock, and independent failure of components. Examples of distributed systems vary from SOA-based systems to massively multiplayer online games to peer-to-peer applications.

A computer program that runs in a distributed system is called a distributed program, and distributed programming is the process of writing such programs. There are many alternatives for the message passing mechanism, including RPC-like connectors and message queues. An important goal and challenge of distributed systems is location transparency.

Distributed computing also refers to the use of distributed systems to solve computational problems. In distributed computing, a problem is divided into many tasks, each of which is solved by one or more computers, which communicate with each other by message passing.

Types of parallelism

Bit-level parallelism

Main article: Bit-level parallelism

From the advent of very-large-scale integration (VLSI) computer-chip fabrication technology in the 1970s until about 1986, speed-up in computer architecture was driven by doubling computer word size—the amount of information the processor can manipulate per cycle. Increasing the word size reduces the number of instructions the processor must execute to perform an operation on variables whose sizes are greater than the length of the word. For example, where an 8-bit processor must add two 16-bit integers, the processor must first add the 8 lower-order bits from each integer using the standard addition instruction, then add the 8 higher-order bits using an add-with-carry instruction and the carry bit from the lower order addition; thus, an 8-bit processor requires two instructions to complete a single operation, where a 16-bit processor would be able to complete the operation with a single instruction.

Historically, 4-bit microprocessors were replaced with 8-bit, then 16-bit, then 32-bit microprocessors. This trend generally came to an end with the introduction of 32-bit processors, which has been a standard in general-purpose computing for two decades. Not until recently (c. 2003–2004), with the advent of x86-64 architectures, have 64-bit processors become commonplace.

Instruction-level parallelism

Main article: Instruction level parallelism

A canonical five-stage pipeline in a RISC machine (IF = Instruction Fetch, ID = Instruction Decode, EX = Execute, MEM = Memory access, WB = Register write back)

A computer program, is in essence, a stream of instructions executed by a processor. These instructions can be re-ordered and combined into groups which are then executed in parallel without changing the result of the program. This is known as instruction-level parallelism. Advances in instruction-level parallelism dominated computer architecture from the mid-1980s until the mid-1990s.

Modern processors have multi-stage instruction pipelines. Each stage in the pipeline corresponds to a different action the processor performs on that instruction in that stage; a processor with an N-stage pipeline can have up to N different instructions at different stages of completion. The canonical example of a pipelined processor is a RISC processor, with five stages: instruction fetch, decode, execute, memory access, and write back. The Pentium 4 processor had a 35-stage pipeline.

A five-stage pipelined superscalar processor, capable of issuing two instructions per cycle. It can have two instructions in each stage of the pipeline, for a total of up to 10 instructions (shown in green) being simultaneously executed.

In addition to instruction-level parallelism from pipelining, some processors can issue more than one instruction at a time. These are known as superscalar processors. Instructions can be grouped together only if there is no data dependency between them. Scoreboarding and the Tomasulo algorithm (which is similar to scoreboarding but makes use of register renaming) are two of the most common techniques for implementing out-of-order execution and instruction-level parallelism.

Task parallelism

Main article: Task parallelism

Task parallelism is the characteristic of a parallel program that “entirely different calculations can be performed on either the same or different sets of data”.This contrasts with data parallelism, where the same calculation is performed on the same or different sets of data. Task parallelism does not usually scale with the size of a problem.

Quantum Computation

First proposed in the 1970s, quantum computing relies on quantum physics by taking advantage of certain quantum physics properties of atoms or nuclei that allow them to work together as quantum bits, or qubits, to be the computer’s processor and memory. By interacting with each other while being isolated from the external environment, qubits can perform certain calculations exponentially faster than conventional computers.

Qubits do not rely on the traditional binary nature of computing. While traditional computers encode information into bits using binary numbers, either a 0 or 1, and can only do calculations on one set of numbers at once, quantum computers encode information as a series of quantum-mechanical states such as spin directions of electrons or polarization orientations of a photon that might represent a 1 or a 0, might represent a combination of the two or might represent a number expressing that the state of the qubit is somewhere between 1 and 0, or a superposition of many different numbers at once. A quantum computer can do an arbitrary reversible classical computation on all the numbers simultaneously, which a binary system cannot do, and also has some ability to produce interference between various different numbers. By doing a computation on many different numbers at once, then interfering the results to get a single answer, a quantum computer has the potential to be much more powerful than a classical computer of the same size. In using only a single processing unit, a quantum computer can naturally perform myriad operations in parallel.

Quantum computing is not well suited for tasks such as word processing and email, but it is ideal for tasks such as cryptography and modeling and indexing very large databases

Entanglement :

Quantum entanglement is a physical phenomenon that occurs when pairs or groups of particles are generated or interact in ways such that the quantum state of each particle cannot be described independently – instead, a quantum state may be given for the system as a whole.

Measurements of physical properties such as position, momentum, spin, polarization, etc. performed on entangled particles are found to be appropriately correlated. For example, if a pair of particles is generated in such a way that their total spin is known to be zero, and one particle is found to have clockwise spin on a certain axis, then the spin of the other particle, measured on the same axis, will be found to be counterclockwise. Because of the nature of quantum measurement, however, this behavior gives rise to effects that can appear paradoxical: any measurement of a property of a particle can be seen as acting on that particle (e.g. by collapsing a number of superimposed states); and in the case of entangled particles, such action must be on the entangled system as a whole. It thus appears that one particle of an entangled pair “knows” what measurement has been performed on the other, and with what outcome, even though there is no known means for such information to be communicated between the particles, which at the time of measurement may be separated by arbitrarily large distances.

Such phenomena were the subject of a 1935 paper by Albert Einstein, Boris Podolsky and Nathan Rosen, describing what came to be known as the EPR paradox, and several papers by Erwin Schrödinger shortly thereafter. Einstein and others considered such behavior to be impossible, as it violated the local realist view of causality (Einstein referred to it as “spooky action at a distance”), and argued that the accepted formulation of quantum mechanics must therefore be incomplete. Later, however, the counterintuitive predictions of quantum mechanics were verified experimentally. Experiments have been performed involving measuring the polarization or spin of entangled particles in different directions, which – by producing violations of Bell’s inequality – demonstrate statistically that the local realist view cannot be correct. This has been shown to occur even when the measurements are performed more quickly than light could travel between the sites of measurement: there is no lightspeed or slower influence that can pass between the entangled particles. Recent experiments have measured entangled particles within less than one part in 10,000 of the light travel time between them. According to the formalism of quantum theory, the effect of measurement happens instantly. It is not possible, however, to use this effect to transmit classical information at faster-than-light speeds (see Faster-than-light → Quantum mechanics).

Quantum entanglement is an area of extremely active research by the physics community, and its effects have been demonstrated experimentally with photons, electrons, molecules the size of buckyballs, and even small diamonds. Research is also focused on the utilization of entanglement effects in communication and computation.

Operation Data Qubit

            Quantum information science begins with the fundamental resources generalize classical bits of information into quantum bits, or qubits. As bits are ideal objects are abstracted from the principles of classical physics, qubits are quantum objects are abstracted ideal of the principles of quantum mechanics. Can be represented by a bit – magnetic region on the disc, the voltage on the circuit, or sign graphite pencil on paper made. Functioning of classical physical statuses, as bits do not depend on the details of how they are realized. Similarly, the attributes qubit is independent of specific physical representation of the atomic nucleus as a centrifuge or say, the polarization of a photon of light.

Illustrated by the status bits, 0 or 1. Similarly, the qubit is described by its quantum status. Two potential for qubit quantum state is equivalent to the classical bits 0 and 1. But in quantum mechanics, any object that has two different statuses certainly has a series of other potential state, called superposition, which led up to the status of second -degree manifold. Qubit statuses are allowed exactly is all the status that must be achieved, in principle, by the classical bits are transplanted into the quantum world. Status – qubit state is equivalent to the points on the surface of the ball, where 0 and 1 as the south and north poles. Continuum between 0 and 1 status fostered many outstanding attributes of quantum information.

Quantum gate :

In quantum computing and specifically the quantum circuit model of computation, a quantum gate (or quantum logic gate) is a basic quantum circuit operating on a small number of qubits. They are the building blocks of quantum circuits, like classical logic gates are for conventional digital circuits.

Unlike many classical logic gates, quantum logic gates are reversible. However, classical computing can be performed using only reversible gates. For example, the reversible Toffoli gate can implement all Boolean functions. This gate has a direct quantum equivalent, showing that quantum circuits can perform all operations performed by classical circuits.

Quantum logic gates are represented by unitary matrices. The most common quantum gates operate on spaces of one or two qubits, just like the common classical logic gates operate on one or two bits. This means that as matrices, quantum gates can be described by 2 × 2 or 4 × 4 unitary matrices.

Shor Algorithm :

Shor’s algorithm, named after mathematician Peter Shor, is a quantum algorithm (an algorithm that runs on a quantum computer) for integer factorization formulated in 1994. Informally it solves the following problem: Given an integer N, find its prime factors.

On a quantum computer, to factor an integer N, Shor’s algorithm runs in polynomial time (the time taken is polynomial in log N, which is the size of the input). Specifically it takes time O((log N)3), demonstrating that the integer factorization problem can be efficiently solved on a quantum computer and is thus in the complexity class BQP. This is substantially faster than the most efficient known classical factoring algorithm, the general number field sieve, which works in sub-exponential time — about O(e1.9 (log N)1/3 (log log N)2/3). The efficiency of Shor’s algorithm is due to the efficiency of the quantum Fourier transform, and modular exponentiation by repeated squarings.

If a quantum computer with a sufficient number of qubits could operate without succumbing to noise and other quantum decoherence phenomena, Shor’s algorithm could be used to break public-key cryptography schemes such as the widely used RSA scheme. RSA is based on the assumption that factoring large numbers is computationally infeasible. So far as is known, this assumption is valid for classical (non-quantum) computers; no classical algorithm is known that can factor in polynomial time. However, Shor’s algorithm shows that factoring is efficient on an ideal quantum computer, so it may be feasible to defeat RSA by constructing a large quantum computer. It was also a powerful motivator for the design and construction of quantum computers and for the study of new quantum computer algorithms. It has also facilitated research on new cryptosystems that are secure from quantum computers, collectively called post-quantum cryptography.

In 2001, Shor’s algorithm was demonstrated by a group at IBM, who factored 15 into 3 × 5, using an NMR implementation of a quantum computer with 7 qubits. However, some doubts have been raised as to whether IBM’s experiment was a true demonstration of quantum computation, since no entanglement was observed.[4] Since IBM’s implementation, several other groups have implemented Shor’s algorithm using photonic qubits, emphasizing that entanglement was observed. In 2012, the factorization of 15 was repeated. Also in 2012, the factorization of 21 was achieved, setting the record for the largest number factored with a quantum computer. In April 2012, the factorization of 143 was achieved, although this used adiabatic quantum computation rather than Shor’s algorithm.

 

Cloud computing

Cloud computing concept is usually regarded as the Internet. Because the Internet itself is described as a cloud (Cloud) great (usually in the network scheme, denoted as the Internet cloud) that contains a set of interconnected computers. Cloud computing comes as an evolution refers to the convergence of technology and more dynamic applications. Where there is a major change has implications that touch almost every aspect of computing. For the end user, Cloud computing provides a new means to improve service or allocate computing resources more quickly, Based on business needs.

Gambar

Cloud computing isa general overview

Benefits of Cloud Computing
Cloud Computing has many benefits, including:
a. Reduce the cost of technology.
Because Cloud Computing is paid incrementally, so you can save money data storage.
b. Increasing the capacity of
Data storage in the cloud computing outweigh the personal computer.
c. automatic updates
In Cloud Computing we do not have to worry about servers and software updates, because all that has been done automatically.
d. better flexibility
cloud computing offers better flexibility than previous computer system.
d. mobility
Employees can access information wherever they are, they do not need to open the computer to get the information they need.

 

The working principle of cloud computing itself.
The working principle is similar to the Cloud Computer regular computer, only difference coupled with the presence of other computers. On a regular computer files of the software we use is stored in the hard disk or other storage media. But on computer clouds when viewed from the side of the user, the files of the software we use is in another computer.

In other words we are connected to multiple computers on a network server, but the data we store it was in the datacenter or dipusatnya, so that not only we can open the file that we save but computers or other users can open it and vice versa (Public). Also in a lot of infrastructure servers that we can use and we only pay as needed.

 

Characteristics ofCloud Computing
Fivecriteriathatmust be metbyasystemto be able toenterthefamilyinCloud Computing, namely:
1. The On DemandSelf Service
A customermay be possibleto directly”order” required resources, such asprocessortimeandstoragecapacityviaan electroniccontrol panelthatis provided. So noneed to interactwith thecustomer service personnelif necessaryincrease or decrease thecomputationalresourcesrequired.
2. BroadbandNetwork Access
Services availableare connectedviabroadband networks, especiallyforadequatelyaccessiblethrough the Internet, eitherusinga thin client, thickclientorother mediasuch assmartphones.

3. Resourcepooling
Cloud serviceprovider, providing servicesthroughresourcesthat are groupedinoneormultiple locationsof datacentersconsistingofa number ofserverswithmulti-tenant mechanism. Thismechanismenablesmulti-tenant computingtheamountof resourcesusedjointlybya number ofusers, where those resourceseither in the formof physicalor virtual,can beallocateddynamicallytothe needs ofusers/customerson demand. Thus, customersdo notneed to knowhowandwherethe demand forcomputingresourcesmet bythe serviceproviders. Importantly, everyrequestcan befulfilled. Thecomputingresourcesincludestorage, memory, processor, networkandvirtual machinetape.

4. Elastic(Rapid elasticity)
Computingcapacitythatcanbe providedrapidlyandelasticallysupplied, be itin the form ofaddition orreduction ofthe required capacity. Forcustomers themselves, withthis abilityas if theavailable capacityis notlimited in size, andcan be”purchased” at any timewith the numberonly.
5. MeasuredService
Availablecloudresourcesshouldbemanaged andoptimizedits use, witha measurement systemthatcanmeasure theusageofeachcomputingresourceuse(storage, memory, processor, bandwidth, user activity, etc.). Thus, the amountof resources usedcanbe measuredin a transparent mannerwhichwillbe the basisfor the user topay forthe cost of usingthe service.

 

There are several questions that are questions about data security

1 . Was our data will not be lost / affected by the virus ?

2 . Whether the data we will not plow or stolen someone else ?

3 . What if the data center disaster ?

The above questions we often hear when I talk about the cloud in the discussion forum for the implementation of the cloud , because it is like a new old thing why I say long because before we know Facebook and Yahoo Masangger we have used e – mail , using the mail delivery started we trust data / information we on the other hand , after we send the data we no longer have the data right where we want at the same miss our email provider . So actually by pressing the send button on a web mail means we have believed and trusted bahaw network we use is safe either from the virus or piracy of data , because the data is already there setandar security for the cloud .

The second questions whether the data we are not stolen , the company’s current cloud service provider in Indonesia can not be sure to follow the rules because the Indonesian government has not prepared a regulatory matter or new Cloud RPP Pite ( Draft Regulation Implementation Information and Electronic Transaction ) . so that the basis of ISO 27002 is an international benchmark that is standard on information security best practices that can also be used to assess the level of security in a Cloud Computing service providers .

What if data center disaster ? Currently the company ‘s cloud service providers will be placing a data center in a disaster -free areas , as well as the latest technology in the data center will bekup from various other data centers in massive numbers quite a lot , so the level of security would be guaranteed by the rules that bind and generally applicable

Before we implementations of cloud computing then we first need to understand some of the issues that are currently being developed and could serve as guidelines when if we will soon adopt cloud technology

    Risk Management and Compliance , organizations start adopting cloud should still be responsible for the management aspects of security , risk , and compliance with the rules applicable in the relevant industries . Risk management and obedience requires strong internal team and the transparency of the process of cloud service providers .
    Identity and Access Management , identity can be obtained through some cloud service providers , and should be interoperable between different organizations , different cloud providers , and based on robust processes .
    Integrity services , cloud -based services should be built with a foundation of strong security , and operational processes must also be integrated with the organization’s security management . Cloud service provider must follow the process that could be proven , well-defined , and clearly in integrating security and privacy to the services ranging from the earliest point , at any point in the cycle , until the final . Besides security management and auditing must be aligned between cloud providers and customers .
    Integrity Client , cloud services are used on the client side should pay attention to security aspects , obedience , and integrity on the client side . Integrity client can be improved by using a combination of best practices .
    Information protection , cloud services requires a reliable process to protect the information before , during , and after the transaction . Make the Data Classification to increase control over the data that is ready to be released into the cloud .

By following these guidelines the cloud technology is the solution to improve our performance , because with cloud technology we already do not depend on the place , and the computer will only be a tool to perform data access .

 

In a cloud computing system, there’s a significant workload shift. Local computers no longer have to do all the work load when running an application. Computer networks that make up the “cloud”-the one who will handle it instead. Kebutuh hardware and software on the user side will decrease. The only thing needed is a computer user can run a cloud computing system’s interface software, which can be as simple as a browser Website, and other networks to handle cloud.

Gambar

Image: Conceptof CloudComputing

Most likely youhave usedsomeform ofcloud computing. Ifyouhavee-mailaccountswithe-mail servicessuch asWeb-based Hotmail, Yahoo!Mail, orGmail, thenyoualreadyhavesomeexperiencewithcloud computing. In lieu ofrunning thee-mail programonyourcomputer, youlog into thee-mail accountremotely. Softwareanddata storagemediaforyouraccountdoes notexistonyourcomputer-itis inservice”cloud” computer.

Impact of Mobile Computing

Type Mobile Computing
• Laptops are portable computers , small and can be carried anywhere very easily integrated in a casing . Weight laptops range from 1 to 6 pounds depending on size , materials and specifications . The power source comes from batteries or A / C adapter which can be used to recharge the battery and to power the laptop itself . Usefulness same laptop with a desktop computer , which distinguishes only the size making it easier for users to carry it around .
• Wearable Computer or computer that is applied in the human body . An example is Computer Glacier Ridgeline W200 . W200 is made from reinforced magnesium alloy which maximizes strength and minimizes overall weight . At only 10.2 ounces and was formed in the arm contour , W200 combines the same features of a standard computer with a device that provides comfort and ergonomic wrist worn instrument . The W200 has a 3.5 “color display with touch screen , backlit keyboard and a hot swappable battery . Wireless function of W200 ensure continuous connectivity regardless of the user’s location with plug and play Wi – Fi , Bluetooth and GPS modules . Using Windows CE or Linux operating systems , the unit can be quickly configured to access the remote host system through integrated wired or wireless interfaces . Hands – free operation of the W200 that overcomes the physical limitations associated with normal hand-held computer . This allows the user complete freedom to continue their daily activities with both hands while using the computer has full access at all times . In addition to the electronic compass , the system also integrates the latest and most innovative features , such as tilt and silent reckoning , which allows critical battery savings when the unit is not in use . Hands – free usability of the W200 makes it of special interest for Emergency Services , Security , Defense , Warehouse , Field Logistics and any area where access to a large amount of information required . W200 ridge line of the glacier when it joins rugged computers developed for data collection .
• PDAs ( Personal Digital Assistants ) is an electronic device and a computer -based small form and can be taken anywhere . According to my knowledge PDAs are widely used as a personal organizer at first , but because of its development , then multiply its utility function , such as a calculator , clock and timing pointer , computer games , internet users , receiving and sending electronic mail ( e – mail ) , radio receiver , video recorder , and a memo recorder . Apart from it with a PDA ( pocket computer ) , we can use the address book and store addresses , e-book reading , using GPS and many other functions . Even more sophisticated version of the PDA can be used as a mobile phone , Internet access , intranets , or extranets via Wi – Fi or Wireless Network . One of the typical PDA is the ultimate touch screen facility

• SmartPhone is a mobile phone offering advanced capabilities , its ability to resemble capabilities virtually the PC ( computer ) . Generally, a mobile phone as a smartphone when it is said to be running on the operating system software that is complete and has a standard interface and platform for application developers . While some say that a smartphone is a simple mobile phone with advanced features such as the ability to send and receive emails , surf the Internet and read e -books , built -in full keyboard or external USB keyboard , or has a VGA connector . In other words , the smartphone is a miniature computer with phone capabilities .
4 . Tool for Mobile Computing
– GPS ( Global Positioning System )
– Wireless ( Acess )
– GIS ( Location )

Excess and deficiency
Advantages of Mobile Computing
– Application wide
– Moving / berpidah freely locations
– Non- switch networks

Disadvantages of Mobile Computing
lack of Bandwidth
Internet access in peralatanini slow when compared to wired access , but with the use of technology GPRS , EDGE and 3G networks , high -speed Wireless LAN is not too expensive but has a limited bandwidth .
power consumption
Mobile computing is highly dependent on battery life .
Transmission disorders
Distance to the transmitter signal and weather affect transimis data on mobile computing .
Potential Occurrence of Accidents
Some accidents are often caused by akhir2 motorists who use mobile computing devices while driving .

Usefulness And Other Issues
As the use of mobile Internet using mobile internet sites , the ability of the site to be able to use (usability ) is important to attract and retain the attention of ” user stickiness ” ( the degree to which the user remain our site ) . There are three dimensions of usability , ie effectiveness , efficiency and satisfaction . However, users often find today’s mobile devices are not effective , especially because of restrictions pocket-sized keyboard and services , thus reducing its usefulness . Moreover, due to the limited storage capacity and speed of access to information than most smartphones and PDAs , as difficult or impossible to download large files from the per Alatan this kind . Technical limitations and other restrictions that slow the spread of m – commerce .
Failure In Mobile Computing and M – Commerce
Same with other technologies , especially new ones , there are many failures of the application and of the whole company in the mobile computing and m – commerce . It is important to anticipate and plan for the possibility of failure and learning from failure . Case Northaest Utilities beberikan some important insights .
The existence Impact of Modern Computing
The impact of modern computing is that it can help people to solve complex problems using computers . One example is a biometric . Biometric derived from the Bio and Metric . The word bio is taken from the ancient Greek language which means life , while Metric is also derived from the ancient Greek language , which means the size , so if concluded biometric means of life measurements .
But an outline of a biometric measurement of the statistical analysis of biological data that refers to the technology to analyze the characteristics of a body ( people) . From these explanations it is clear that describe Biometric detection and classification of physical attributes . There are many different biometric techniques , including :
• Reading of fingerprints / palm
• Hand geometry
• Reading of the retina / iris
• Voice recognition
• The dynamics of signatures .
And according to Don Tapscott (1995 ) in his book entitled ” The Digital Economy : Promise and Peril In The Age of Networked Intelligence ” illustrates how the impact of computing technology on human life . Application technology is less than perfect without the support of intelligent machines capable analytic . The presence of increasingly sophisticated computing technology has changed human lifestyle and the demands on human competence . Now human life increasingly dependent on computers . Here are the things that describe the concept of computational intelligence technologies are supported by the application .
1 . Product -driven computer system
a. Smart car ( car smart )
b . Smart card ( smart card )
c . Smart house ( smart home )
d . Smart road ( street smart )
2 . The design of the product is managed by a computer
3 . The process is driven by a computer work
4 . Computers became an effective means of communication
5 . Computer as an information center
In addition to the structural impact on human livelihoods , technology also evokes cultural processes in society diterpanya . It is a symptom that by N. Postman called technopoly , which is described by him as follows :
” Technopoly is a state of culture . It is also a state of mind . It Consist in the deification of technology , the which means that the culture seeks it’s satisfactions in technology , and takes it’s orders from technology “
Thus , what matters is the extent to which a society ready to enter an age characterized by the supremacy of the power plant technology as a new culture without cause risk resilience own culture . Thus , it is not wrong to state that also technological dominance will continue with the blossoming of a new culture that gave birth to various new value also tends to be the benchmark of modern human behavior in a variety of patterns of interaction with others .
Trends in Mobile Computing
Mobile devices have a radical impact on the different routines of individuals from the modern era . The introduction of the phone itself to change the communication pattern in previous years and the technology continues to evolve , now leave marks on other parts as well . Mobile computing not only provides the basic functions of communication , but to help other users in performing everyday tasks such as arranging tasks , social sharing , taking pictures and other computing tasks .

Data capability , with the introduction of wireless networks , mobile devices are also provided in advanced . Mobile technology also adds a new variation and improvisation in order to improve the overall user experience of mobile . Some of the new trends that have been introduced in mobile computing , in recent years are :
    Smart -phone Computing: The third-party application development for various smartphone platforms such as iOS , Android , Windows mobile , etc. have improved graphics innovation and functionality in this application . Different concepts such as BYOD and mobility companies have introduced the use of smart-phone applications as enterprise application to different domains of industry .
    Security on mobile phones : With mobile phones becoming smarter every day , the data handling capabilities become an integral part of mobile computing . The device is also connected to the network at any time , so the need to secure data stored also appeared . Because the mobile security becomes an important component of mobile computing , because the purpose of the communication device has been developed from voice to data.
    Wireless Networking : different network technologies such as 4G and WiMAX are also introduced recently which raised computational tasks of data from devices and provide high speed accessibility of data from these devices . This is helpful for users who require large amounts of data transfer from their handheld devices .
    M – commerce : Online trading activities has become a common activity for the user , for the shopping experience a laxative . With the growing practice of mobile computing , users can now perform the same tasks using their hand-held mobile phone or tablet device that is . Different security parameters are taken care of in the event, which involves the processing of financial information . Unlike the mobile payment application has also been introduced to cement a strong foundation of m – commerce activity .
Another location -based mobile application service which uses a special system called the Global Positioning System , or GPS , which was introduced which allows users to gain access to the information from the various locations of their device .
Different maps like Google maps facility allows users to get turn-by – turn navigation from their source of travel to their destination address . Different camera apps also introduced the use of GPSs with Geo-tagging feature so that users can customize the map view them according to their needs .
Sumber:
http://ku2harlis.wordpress.com/komputasi-modern/http://sumbait.blogspot.com/2013/03/komputasi-bergerak-nirkabel-dan-perpasif.htmlhttp://ariwiyanto83.blogspot.com/http://arissetiawan-balangan.blogspot.com/2012/10/artikel-artikel-komputer-masyarakat.htmlhttp://berserkerdark.blogspot.com/
boser45.blogspot.com/2012/12/trends-in-mobile-computing.html

Thread Part 1

Thread adalah sebuah alur kontrol dari sebuah proses. Kontrol thread tunggal ini hanya
memungkinkan proses untuk menjalankan satu tugas pada satu waktu. Banyak sistem operasi
modern telah memiliki konsep yang dikembangkan agar memungkinkan sebuah proses untuk
memiliki eksekusi multi-threads, agar dapat secara terus menerus mengetik dan menjalankan
pemeriksaan ejaan didalam proses yang sama, maka sistem operasi tersebut memungkinkan proses untuk menjalankan lebih dari satu tugas pada satu waktu. Suatu proses yang multithreaded mengandung beberapa perbedaan alur kontrol dengan ruang alamat yang sama.
Keuntungan dari multithreaded meliputi peningkatan respon dari pengguna, pembagian sumber daya proses, ekonomis, dan kemampuan untuk mengambil keuntungan dari arsitektur
multiprosesor. Thread merupakan unit dasar dari penggunaan CPU, yang terdiri dari Thread_ID,
program counter, register set, dan stack. Sebuah thread berbagi code section, data section, dan
sumber daya sistem operasi dengan Thread lain yang dimiliki oleh proses yang sama. Thread juga sering disebut lightweight process. Sebuah proses tradisional atau heavyweight process mempunyai thread tunggal yang berfungsi sebagai pengendali.
Perbedaan antara proses dengan thread tunggal dengan proses dengan thread yang banyak
adalah proses dengan thread yang banyak dapat mengerjakan lebih dari satu tugas pada satu satuan waktu.

1

Banyak perangkat lunak yang berjalan pada PC modern dirancang secara multi-threading.
Sebuah aplikasi biasanya diimplementasi sebagai proses yang terpisah dengan beberapa thread
yang berfungsi sebagai pengendali. Contohnya sebuah web browser mempunyai thread untuk
menampilkan gambar atau tulisan sedangkan thread yang lain berfungsi sebagai penerima data dari network.
Kadang kala ada situasi dimana sebuah aplikasi diperlukan untuk menjalankan beberapa tugas
yang serupa. Sebagai contohnya sebuah web server dapat mempunyai ratusan klien yang
mengaksesnya secara concurrent. Kalau web server berjalan sebagai proses yang hanya mempunyai thread tunggal maka ia hanya dapat melayani satu klien pada pada satu satuan waktu. Bila ada klien lain yang ingin mengajukan permintaan maka ia harus menunggu sampai klien sebelumnya selesai dilayani. Solusinya adalah dengan membuat web server menjadi multi-threading. Dengan ini maka sebuah web server akan membuat thread yang akan mendengar permintaan klien, ketika permintaan lain diajukan maka web server akan menciptakan thread lain yang akan melayani permintaan tersebut.
Keuntungan Thread
Keuntungan dari program yang multithreading dapat dipisah menjadi empat kategori:
1. Responsi: Membuat aplikasi yang interaktif menjadi multithreading dapat membuat sebuah
program terus berjalan meski pun sebagian dari program tersebut diblok atau melakukan
operasi yang panjang, karena itu dapat meningkatkan respons kepada pengguna. Sebagai
contohnya dalam web browser yang multithreading, sebuah thread dapat melayani permintaan
pengguna sementara thread lain berusaha menampilkan image.
2. Berbagi sumber daya: thread berbagi memori dan sumber daya dengan thread lain yang
dimiliki oleh proses yang sama. Keuntungan dari berbagi kode adalah mengizinkan sebuah
aplikasi untuk mempunyai beberapa thread yang berbeda dalam lokasi memori yang sama.
3. Ekonomi: dalam pembuatan sebuah proses banyak dibutuhkan pengalokasian memori dan
sumber daya. Alternatifnya adalah dengan penggunaan thread, karena thread berbagi memori
dan sumber daya proses yang memilikinya maka akan lebih ekonomis untuk membuat dan
context switch thread. Akan susah untuk mengukur perbedaan waktu antara proses dan thread
dalam hal pembuatan dan pengaturan, tetapi secara umum pembuatan dan pengaturan proses
lebih lama dibandingkan thread. Pada Solaris, pembuatan proses lebih lama 30 kali
dibandingkan pembuatan thread, dan context switch proses 5 kali lebih lama dibandingkan
context switch thread.
4. Utilisasi arsitektur multiprocessor: Keuntungan dari multithreading dapat sangat meningkat
pada arsitektur multiprocessor, dimana setiap thread dapat berjalan secara pararel di atas
processor yang berbeda. Pada arsitektur processor tunggal, CPU menjalankan setiap thread
secara bergantian tetapi hal ini berlangsung sangat cepat sehingga menciptakan ilusi pararel,
tetapi pada kenyataannya hanya satu thread yang dijalankan CPU pada satu-satuan waktu
(satu-satuan waktu pada CPU biasa disebut time slice atau quantum).

Refrensi :

http://iwan.staff.gunadarma.ac.id/Downloads/files/22154/3_Proses.pdf

http://moqiberbagi.blogspot.com/2013/01/pengertian-thread-multithreading-dan.html

Link blog yang lain :

Aries S Prayoga : Threading Part 2 (http://ariesprayoga.wordpress.com/2014/03/25/thread-part-2)
Fadhlanullah Sidiq Client – Server (http://fadhlansymphony.blogspot.com.tr/2014/03/client-server.html)

Priyanti Kusuma Sari :  Agent Part 1 (http://priyantikusumasari.blogspot.com.tr/2014/03/agent.html)

Description of Mobile computing

Definition
Moving or Mobile Computing Computing is a computing system that can be easily moved physically and computational capabilities that can be used when they are being moved .
Mobile Computing is in a sense is to use a computer anywhere. So we can use all the facilities that exist on the computer to be taken anywhere . different sense .

mobile computing technology is the ability to deal with displacement / movement of people in the use of computers in practice . From this definition we can conclude that the Mobile Computing today is much needed , given the needs of today’s computer usage is very high , so that the use of Mobile Computing to facilitate computer users in performing their activities by using a computer .

2 . History & Development
The development of a mobile computer to date is remarkable . This is not out of the developments of mobile computers from time to time . Here is discussed a bit about the history of the development of mobile computers , namely :

• Dynabook (1968 )
Alan kay developing a portable computer that will offer a modern electronic media that is intended for children . Graphical interface with the control icon on the computer is the forerunner of the operating system that exists today .

• Gir Compass 1100 (1982)
This technology is designed and developed by the very forefront gird . Her cover can be folded and teringrasi sebauh flatscreen and magnesium casing of the ultralight . But this is forwarded and was developed by bil Moggridge is too expensive with the price reaching $ 10,000 . only the U.S. military and NASA who can afford it .

• Oseborne 1 ( 1981)
IBM 1311 was introduced on 11 October 1962 menyipan hard drive can be up to 2 million characters on diskpack that can be replaced ( 1316 ) . Disk thickness is 4 inches and weighs 4.5 pounds and has a 6 disk size 6 14-inch disks and writable surface .

• Compaq Portable (1983 )
The first laptop is compatible with IBM offered by Compaq . Weight and without batrai because still using MS DOS operating system of this laptop is not popular .

• Gavilan SC (1984 )
The first touchpad laptop offered by Gavilan and located above the keyboard . This computer model has been folded and provide laya LCD and 80 168 intel processor is compatible with MS DOS price .

• BONDWELL 2 (1985 )
Although the era of CP / M that is past but this presence remained successful with 64 Mb of RAM 3.5 -inch floppy drive and the laptop LCD screen into a winner in the era.

• COMPAQ SLT 286 (1988)
Yan ‘s first laptop is equipped with a hard drive and LCD batrai . The screen offers a resolution of VGA penuh.notebook is intended for businesses . No wonder the price reaches the price of the car at the time .

• Multicolor 386 Sharp PC 8041 (1990 )
With spec :
– Processor : Intel 80386
20 – MHz clock frequency
– Ram 2MB
– Hard drive 40 mb
– Price U.S. $ 23.00

• USB interface (1997 )
After penganalan USB interface port almost all devices connected to the notebook portable computer suddenly becomes universal .

• WLAN for all (1999 )
Thanks to the use of notebook WLAN hotspot is no longer static connect the device to the office network and the Internet and can be accessed anywhere .

Refrensi :
http://ku2harlis.wordpress.com/komputasi-modern/
http://sumbait.blogspot.com/2013/03/komputasi-bergerak-nirkabel-dan-perpasif.html
http://ariwiyanto83.blogspot.com/
http://arissetiawan-balangan.blogspot.com/2012/10/artikel-artikel-komputer-masyarakat.html
http://berserkerdark.blogspot.com/
boser45.blogspot.com/2012/12/trends-in-mobile-computing.html

PROTOKOL ( Sistem Terdistribusi Komunikasi Studi)

Protokol dapat diartikan sebagai sebuah aturan yang mendefinisikan beberapa fungsi yang ada dalam sebuah jaringan komputer, misalnya mengirim pesan, data, informasi dan fungsi lain yang harus dipenuhi oleh sisi pengirim dan sisi penerima agar komunikasi dapat berlangsung dengan benar, walaupun sistem yang ada dalam jaringan tersebut berbeda sama sekali.

Protokol dapat di terapkan pada perangkat keras, perangkat lunak atau kombinasi dari keduanya.pada tingkatan yang terendah, protocol mendefinisikan koneksi perangkat keras. Protokol ini mengurusi perbedaan format data pada kedua sistem hingga pada masalah koneksi listrik.

Dahulu komunikasi antar computer dari vendor yang berbeda adalah sangat sulit di lakukan, karena mereka manggunakan protocol dan format data yang berbeda-beda. Sehingga internasional standards organization (ISO) membuat suatu arsitektur komunikasi yang di kenal sebagai open system interconnection (OSI), model yg mendefinisikan standar untuk menghubungkan computer-komputer dari vendor-vendor yang berbeda. Model OSI tersebut terbagi atas 7 layer.

Image1

Komponen Protokol

1. Aturan atau prosedur, mengatur pembentukan/pemutusan hubungan

2. Format atau bentuk, mengatur proses transfer data representasi pesan

3. Kosakata (vocabulary), jenis pesan dan makna masing-masing pesan

Fungsi Protokol

Secara umum fungsi dari protokol adalah untuk menghubungkan sisi pengirim dan sisi penerima dalam berkomunikasi serta dalam bertukar informasi agar dapat berjalan dengan baik dan benar. Sedangkan fungsi protokol secara detail dapat dijelaskan berikut:

  • Fragmentasi dan reassembly

 Fungsi dari fragmentasi dan reassembly adalah membagi informasi yang dikirim menjadi beberapa paket data pada saat sisi pengirim mengirimkan informasi dan setelah diterima maka sisi penerima akan menggabungkan lagi menjadi paket informasi yang lengkap.

  • Encapsulation

Fungsi dari encapsulation adalah melengkapi informasi yang dikirimkan dengan address, kode-kode koreksi dan lain-lain.

  • Connection control

Fungsi dari connection control adalah membangun hubungan (connection) komunikasi dari sisi pengirim dan sisi penerima, dimana dalam membangun hubungan ini juga termasuk dalam hal pengiriman data dan mengakhiri hubungan.

  • Flow control

Berfungsi sebagai pengatur perjalanan datadari sisi pengirim ke sisi penerima.

  • Error control

Dalam pengiriman data tak lepas dari kesalahan, baik itu dalam proses pengiriman maupun pada waktu data itu diterima. Fungsi dari error control adalah mengontrol terjadinya kesalahan yang terjadi pada waktu data dikirimkan.

  • Transmission service

Fungsi dari transmission service adalah memberi pelayanan komunikasi data khususnya yang berkaitan dengan prioritas dan keamanan serta perlindungan data.

Metode komunikasi :
-Send
-Receive
– Remote Procedure Call

Refrensi :

Klik untuk mengakses 4_Sistem+Operasi+Terdistribusi.pdf

Klik untuk mengakses 2+Komunikasi.pdf

http://isiidemu.files.wordpress.com/2010/11/bab5komunikasi.docx

LINK Kelompok :

Aries S Prayoga (58410288)
RPC (Remote Procedure Controller) :
http://ariesprayoga.wordpress.com/2014/03/17/remote-procedure-call/
Fadhlanullah Sidiq (52410476)
Konsep objek terdistribusi dan object interface :
http://fadhlansymphony.blogspot.com/2014/03/konsep-objek-terdistribusi-dan-objek.html
Priyanti Kusuma Sari (54410402)
Studi Kasus RPC : http://priyantikusumasari.blogspot.com/2014/03/sistem-terdistribusi-secure-shell-studi.html
Yanizar Dwi R (58410596)
Studi Kasus RPC :
http://teknophobia.blogspot.com/2014/03/sistem-terdistribusi-komunikasi-studi.html

Definisi Sistem Terdistribusi

Sebelum mengetahui apa itu sistem terdistribusi kita akan menjelaskan satu persatu pengertiannya, pertama yang saya akan jelaskan apa itu sistem?

A. Pengertian Sistem

Sistem merupakan kumpulan dari subsistem atau komponen atau elemen yang mempunyai tujuan yang sama yaitu untuk mencapai suatu sasaran atau tujuan yang diinginkan. Subsistem atau komponen atau elemen adalah bagian dari suatu sistem yang saling berkaitan dan saling mempengaruhi antara satu bagian dengan bagian yang lain dalam sistem tersebut. Secara sederhana sistem merupakan suatu jaringan yang saling bekerja sama untuk mencapai suatu tujuan yang telah ditentukan sebelumnya.

Selanjutnya kita akan menjelaskan apa itu Distribusi?

B. Pengertian Distribusi

Distribusi adalah salah satu aspek dari pemasaran. Distribusi dapat diartikan sebagai proses yang menunjukkan penyaluran barang dari produsen sampai ke tangan masyarakat konsumen. Distribusi merupakan kegiatan ekonomi yang menjembatani kegiatan produksi dan konsumsi. Seorang atau sebuah perusahaan distributor adalah perantara yang menyalurkan produk dari pabrikan (manufacturer) ke pengecer (retailer). Setelah suatu produk dihasilkan oleh pabrik, produk tersebut dikirimkan (dan biasanya juga sekaligus dijual) ke suatu distributor. Distributor tersebut kemudian menjual produk tersebut ke pengecer atau pelanggan.

C. Definisi Sistem Distribusi

Sistem Distribusi adalah sebuah sistem dimana komponen hardware atau software-nya terletak dalam suatu jaringan komputer dan saling berkomunikasi dan berkoordinasi mengunakan message pasing.
sebuah sistem yang terdiri dari kumpulan dua atau lebih komputer dan memiliki koordinasi proses melalui pertukaran pesan synchronous atau asynchronous.
kumpulan komputer independent yang tampak oleh user sebagai satu sistem komputer kumpulan komputer autonom yang dihubungkan oleh jaringan dengan software yang dirancang untuk menghasilkan fasilitas komputasi terintegrasi dapat terlihat dari bebarapa pengertian diatas dapat di tarik kesimpulan bahwa sistem terdistribusi adalah sebuah sistem yang terdiri dari beberapa komponen software atau hardware yang independent yang berkomunikasi dan berkoordinasi melalui message parsing baek sinkron maupun asinkron yang telihat satu kesatuan dan dirancang untuk menghasilkan fasilitas komputasi terintegrasi. atau terdapat definisi lain yaitu kesatuan dari element_element yang saling berinteraksi secara sistematik dan teratur untuk mendistribusikan data, informasi, proses, objek dan layanan dari dan kepada pengguna yang terkait di dalamnya.

D.Contoh – Contoh Sistem Terdistribusi
Beberapa contoh dari sistem terdistribusi yaitu :
1. Internet

Merupakan suatu bentuk jaringan global yang menghubungkan komputer dengan satu sama lainnya, yang dapat berkomunikasi dengan media IP sebagai protokol.
2. Intranet

● Jaringan yang teradministrasi secara lokal

● Biasanya proprietary
● Terhubung ke internet (melalui firewall)
● Menyediakan layanan internal dan eksternal

3. Sistem terdistribusi multimedia Biasanya digunakan pada infrastruktur internet
– Karakteristik
Sumber data yang heterogen dan memerlukan sinkronisasi secara real time
– Video, audio, text Multicast
Contoh:
– Teleteaching tools (mbone-based, etc.)
– Video-conferencing
– Video and audio on demand
4. Mobile dan sistem komputasi ubiquitous
– Sistem telepon Cellular (e.g., GSM)
Resources dishare : frekuensi radio, waktu transmisi dalam satu frekuensi, bergerak

– Komputer laptop, ubiquitous computing
– Handheld devices, PDA, etc

5. World wide web
– Arsitektur client/server tebuka yang diterapkan di atas infrastruktur internet
– Shared resources (melalui URL)
6. Contoh distribusi yang lainnya seperti
– Sistem telepon seperti ISDN, PSTN
– Manajemen jaringan seperti Administrasi sesumber jaringan
– Network File System (NFS) seperti Arsitektur untuk mengakses sistem file melalui jaringan.

Refrensi :

http://penuhrahmatt.mdl2.com/mod/book/view.php?id=4

http://elib.unikom.ac.id/download.php?id=84553

http://id.wikipedia.org/wiki/Distribusi_%28bisnis%29

Link Kelompok :

Aries S. Prayoga : karakteristik Sistem Terdistribusi

http://ariesprayoga.wordpress.com/2014/03/11/karakteristik-sistem-terdistribusi

Fadhlanullah Fadlan Sidiq : Model Sistem Terdistribusi

http://fadhlansymphony.blogspot.com/2014/03/model-sistem-terdistribusi.html

Priyanti Kusuma Sari : Permasalahan Sistem Terdistribusi

http://priyantikusumasari.blogspot.com/2014/03/permasalahan-sistem-terdistribusi.html

Yanizar Dwi R : Tantangan Sistem Terdistribusi

http://teknophobia.blogspot.com/2014/03/pengenalan-sistem-terdistribusi.html

 

 

contoh dan Prosedur tentang pendirian usaha

Contoh Akta Pendirian Usaha Dagang oleh Notaris

 

AKTA PENDIRIAN USAHA DAGANG

U.D. CAHAYA BAN

Nomor :  1

 

– Pada hari ini, Rabu, Tanggal 03 – 04 – 2013 -(tiga April dua —

ribu tiga belas), pukul 10.10 WIB(Sepuluh lewat sepuluh menit — 

Waktu Indonesia Bagian Barat) sampai dengan selsai.————–

– Menghadap kepada saya, SURYA ZULFIKAR IBRAHIM, Sarjana Hukum, –

Notaris di Surabaya, dengan dihadiri-—oleh saksi-saksi yang —–

saya, notaris kenal dan akan— disebutkan pada bagian akhir —- 

akta ini : ——————————————————

– Penghadap telah dikenal oleh saya, notaris. ——————-

1. Tuan Subiantoro, lahir di Lamongan, pada tanggal 10 – 03 – —–1953 (sepuluhpuluh Maret seribu Sembilan ratus limapuluh ——-
tiga),  Warga Negara Indonesia, Pekerjaan Swasta, Bertempat —– 
tinggal di Jalan Arif Rahman Hakim Nomor 10, Rukun Tetangga —– 
03,  Rukun Warga 03, Kelurahan Sidoharjo, Kecamatan Lamongan,—- 
Kabupaten Lamongan, Pemegang Kartu Tanda Penduduk Republik ——
Indonesia Nomor : 17.5001.600357.0009;—————————

– Penghadap menerangkan bahwa dirinya hadir bersama dengan istri- 
sah yaitu Sutianingsih.——————————————

– Penghadap menerangkan dengan ini ingin mendirikan suatu usaha –
dagang bernama U.D. Cahaya Ban Dengan tidak mengurangi ijin dari-
yang berwajib dan dengan memakai syarat-syarat dan aturan-aturan-
sebagai berikut :————————————————

———————- NAMA DAN TEMPAT KEDUDUKAN —————-

—————————— Pasal 1 ————————–

1. Usaha dagang ini bernama usaha dagang : ———————-

————————– U.D. Cahaya Ban ———————-

2. Berkedudukan di Kabupaten Lamongan, untuk pertama kalinya —-
berkantor di Jalan Andansari No 87, — Kabupaten Lamongan. ——
Dengan cabang-cabangnya/perwakilan  perwakilannya di tempat——
tempat lain — sebagaimana akan  ditetapkan oleh para – pesero –
secara musyawarah. ———————————————-

—————— MAKSUD DAN TUJUAN —————–

———————— Pasal 2 ———————

Maksud dan tujuan usaha dagang ini ialah : ———–

a. Menjalankan usaha-usaha dalam bidang perdagangan— pada umumnya, baik atas tanggungan sendiri maupun —atas tanggungan pihak lain secara komisi, termasuk — pula perdagangan ekspor, impor, interinsulair dan — lokal ; –———————————————

b. Menjalankan usaha-usaha sebagai grosir, ——leveransir  supplier dan agen dari segala macam—- barang-barang baik dalam maupun luar negeri ; ——-

c. Menjalankan usaha-usaha yang sifatnya memberikan —

bantuan dalam bidang jasa kecuali jasa dalam bidang —

hukum ;———————————————-

– segala sesuatu dalam arti kata yang seluas-luasnya dan tidak mengurangi ijin dari instansi-instansi —-

(pejabat-pejabat) yang berwenang bila diperlukan. —-

———————— WAKTU ———————-

———————— Pasal 3 ———————

Perusahaan ini dimulai pada tanggal sejak di —-keluarkan Akta Notaris ini dan didirikan untuk —-waktu yang tidak ditentukan lamanya. –—————

———————– MODAL ———————-

———————— Pasal 4 ———————

Modal usaha dagang tersebut disediakan sepenuhnya —-

oleh penghadap sendiri. —————————-

—————– PEMIMPIN PERUSAHAAN —————

———————— Pasal 5 ———————

Pemimpin perusahaan dipegang sendiri oleh penghadap —
dengan sebutan Direktur.—————————–
Direktur berhak mewakili perusahaan di dalam dan —- di luar Pengadilan, melakukan segala tindakan — pengurusan dan penguasaan milik, menerima dan — mengeluarkan uang untuk perusahaan dan singkatnya —- melakukan segala tindakan mengenai pengurusan —– dan pemilikan (penguasaan), tanpa pembatasan apapun — juga. ———————————————–

————– DEMIKIAN ATAS AKTA INI —————

Dibuat dan diselesaikan di Surabaya, pada hari, — tanggal, bulan dan tahun seperti tersebut pada —bagian  awal akta ini, dengan dihadiri oleh : ——–

1. Yanto Sumarlan

2. Ali Sadikin

keduanya pegawai kantor notaris, bertempat tinggal — di Surbaya, sebagai saksi-saksi. ———————

Setelah saya, notaris, membacakan akta ini kepada ——–

penghadap dan para saksi, maka segera penghadap, ———

para saksi dan saya, notaris, menandatanganinya. ———

Dibuat dengan tanpa adanya perubahan atau uraian tentang penambahan, pencoretan atau pengantian.

 

 

Surabaya, 03 April 2013

 

 

 

Surya Zulfikar Ibrahim S.H.

Notaris

 

prosedur & legalitas pendirian usaha

 

 

Dalam membangun sebuah badan usaha, kita harus memperhatikan beberapa prosedur peraturan perizinan untuk mendirikan badan usaha, seperti :

 

  1. Tahapan Pengurusan Izin Pendirian
    Bagi perusahaan skala besar hal ini menjadi prinsip yang tidak boleh dihilangkan demi kemajuan dan pengakuan atas perusahaan yang bersangkutan. Hasil akhir pada tahapan ini adalah sebuah izin prinsip yang dikenal dengan Letter of Intent yang dapat berupa izin sementara, izin tetap hinga izin perluasan. Untuk beberapa jenis perusahaan misalnya, sole distributor dari sebuah merek dagang, Letter of Intent akan memberi turunan berupa Letter of Appointment sebagai bentuk surat perjanjian keagenan yang merupakan izin perluasan jika perusahaan ini memberi kesempatan pada perusahaan lain untuk mendistribusikan barang yang diproduksi. Berikut ini adalah dokumen yang diperlukan, sebagai berikut :
    • Tanda Daftar Perusahaan
    • NPWP
    • Bukti Diri

Selain itu terdapat beberapa izin lainnya yang harus dipenuhi yaitu :

    • Surat Izin Usaha Perdagangan (SIUP) dikeluarkan oleh Dep. Perdagangan.
    • Surat Izin Usaha Indrustri (SIUI) dikeluarkan oleh Dep.Perindustrian
    • Izin Domisili
    • Izin Gangguan
    • Izin Mendirikan Bangunan (IMB)
    • Izin dari Dep.Teknis
  1. Tahapan pengesahan menjadi badan hukum
    Tidak semua badan usaha mesti ber badan hukum. Akan tetapi setiap usaha yang memang dimaksudkan untuk ekspansi atau berkembang menjadi berskala besar maka hal yang harus dilakukan untuk mendapatkan izin atas kegiatan yang dilakukannya tidak boleh mengabaikan hukum yang berlaku. Izin yang mengikat suatu bentuk usaha tertentu di Indonesia memang terdapat lebih dari satu macam. Adapun pengakuan badan hukum bisa didasarkan pada Kitab Undang-Undang Hukum Dagang (KUHD), hingga Undang-Undang Penanaman Modal Asing ( UU PMA ).
  2. Tahapan penggolongan menurut bidang yang dijalani
    Usaha dikelompokkan kedalam berbagai jenis berdasarkan jenis bidang kegiatan yang dijalani. Berkaitan dengan bidang tersebut, maka setiap pengurusan izin disesuaikan dengan departemen yang membawahinya seperti kehutanan, pertambangan, perdagangan, pertanian dsb.
  3. Tahapan mendapatkan pengakuan, pengesahan dan izin dari departemen lain.
    yang terkait Departemen tertentu yang berhubungan langsung dengan jenis kegiatan badan usaha akan mengeluarkan izin. Namun diluar itu, badan usaha juga harus mendapatkan izin dari departemen lain yang pada nantinya akan bersinggungan dengan operasional badan usaha misalnya Departemen Perdagangan mengeluarkan izin pendirian industri pembuatan obat berupa SIUP. Maka sebgai kelanjutannya, kegiatan ini harus mendapatkan sertifikasi juga dari BP POM, Izin Gangguan atau HO dari Dinas Perizinan, Izin Reklame, dll.

 

Surat Perjanjian Kontrak

 

Adalah Surat Perjanjian antara dua pihak yaitu Pihak Pemberi Tugas/Owner dengan Pihak Penerima Tugas/Pemborong sekurang-kurangnya memuat ketentuan sebagai berikut :

 

  • Para pihak yang menandatangani kontrak meliputi nama,jabatan dan alamat
  • Pokok pekerjaan yang diperjanjikan dengan uraian yang jelas mengenai jenis dan jumlah barang / jasa yang diperjanjikan.
  • Hak dan kewajiban para pihak yang terikat didalam perjanjian
  • Nilai atau harga kontrak pekerjaan serta syarat – syarat pembayaran.
  • Persyaratan dan spesifikasi teknis yang jelas dan terinci
  • Tempat dan jangka waktu penyelesaian / penyerahan dengan disertai jadual waktu penyelesaian / penyerahan yang pasti serta syarat-syarat penyerahannya.
  • Jaminan teknis/hasil pekerjaan yang dilaksanakan dan / atau ketentuan mengenai kelaikan.
  • Ketentuan mengenai cidera janji dan sanksi dalam hal para pihak tidak memenuhi kewajibannya
  • Ketentuan mengenai pemutusan kontrak secara sepihak
  • Ketentuan mengenai keadaan memaksa
  • Ketentuan mengenai kewajiban para pihak dalam hal terjadi kegagalan dalam pelaksanaan pekerjaan.
  • Ketentuan mengenai perlindungan tenaga kerja
  • Ketentuan mengenai bentuk dan tanggung jawab gangguan lingkungan
  • Ketentuan mengenai penyelesaian pekerjaan

 

Contoh Draft Kontrak Kerja :

 

KONTRAK PELAKSANAAN PEKERJAAN PEMBUATAN SISTEM INVENTORY GUDANG

 

antara
Griya Soft
dengan
IT Centre Computerindo (ICC)

 

_______________________________________________________________
Nomor : …………………….
Tanggal : …………………….
Pada hari ini ………, tanggal ……………kami yang bertanda tangan di bawah ini :
Nama : ………………………………………………………………………………
Alamat : ………………………………………………………………………………
Telepon : ………………………………………………………………………………
Jabatan : ………………………………………………………………………………

Dalam hal ini bertindak atas nama Griya Soft dan selanjutnya disebut sebagai Pihak Pertama.
dan
Nama : ………………………………………………………………………………
Alamat : ………………………………………………………………………………
Telepon : ………………………………………………………………………………
Jabatan : ………………………………………………………………………………

Dalam hal ini bertindak atas nama Pemilik atau Kuasa Pemilik dan selanjutnya disebut sebagai Pihak Kedua.
Kedua belah pihak telah sepakat untuk mengadakan ikatan Kontrak Pelaksanaan Pekerjaan Pembuatan Sistem Inventory Gudang untuk usaha yang dimiliki oleh Pihak Kedua yang terletak di ……………………………………………………………………………………
Pihak Pertama bersedia untuk melaksanakan pekerjaan pembuatan Sistem , yang pembiayaannya ditanggung oleh Pihak Kedua, dengan ketentuan yang disebutkan dalam pasal pasal sebagai berikut :

Pasal 1
Tujuan Kontrak
Tujuan kontrak ini adalah bahwa Pihak Pertama melaksanakan dan, menyelesaikan pekerjaan pembuatan system Inventory Gudang pada pihak kedua.

Pasal 2

Lain – Lain
Pihak Pertama dan Pihak Kedua akan bersama- sama mematuhi dengan baik dan bertanggung jawab terhadap seluruh kesepakatan kerja yang telah disetujui.
Demikian Kontrak Kerja ini telah di setujui dan di tanda tangani untuk dilaksanakan dengan sebagai mana mestinya tanpa adanya campur tangan dari pihak lain.

 

Pihak Pertama Pihak Kedua

( …………………. ) (…………………… )

Contoh Tender Project Pemerintah dan Syarat Untuk Mengikutinya

Tender adalah tawaran untuk mengajukan harga, memborong pekerjaan, atau menyediakan barang yang diberikan oleh perusahaan swasta besar atau pemerintah kepada perusahaan-perusahaan lain.

Mengikuti tender adalah salah satu cara untuk mendapatkan kontrak bisnis dalam skala besar atau memperluas usaha Anda. Banyak perusahaan yang secara teratur menyelenggarakan tender. Beberapa instansi pemerintah kini bahkan memuat semua tender dan investasi pemerintah di media cetak agar siapapun dapat mengikutinya.

Dalam upaya peserta tender untuk memenangi penawaran tender, disinilah biasanya persaingan akan terjadi. Perusahaan peserta tender akan mencari strategi untuk memenangi tender tersebut.

Berdasarkan perundang-undangan yang berlaku, pelaksanaan lelang dapat dilakukan dalam tiga bentuk lelang, yaitu

  1. Lelang Non Eksekusi Sukarela
  2. Lelang Non Eksekusi Wajib
  3. Lelang Eksekusi

Untuk contoh tender project pemerintah dapat kita temukan di http://lpse.lkpp.go.id/eproc
Dalam situs tersebut dijelaskan pula mengenai syarat-syarat tertentu yang harus dipenuhi bagi peserta tender.

 

Ada juga situs http://www.pengadaan.com dimana kita bisa mendapatkan info-info yang paling baru mengenai tender-tender apa saja yang sedang dibuka baik dari pemerintah maupun swasta. Hanya saja untuk dapat mengakses info lebih jauh kita diharuskan melakukan register secara komersial terlebih dahulu (dipungut biaya).

Sumber:

http://portalukm.com/siklus-usaha/mengelola-usaha/tender
http://lpse.lkpp.go.id/eproc
http://www.pengadaan.com
http://www.balindo.com/index.php/tentang-lelang/jenis-jenis-lelang

http://catatansuryaibrahim.blogspot.com/2013/04/contoh-akta-pendirian-usaha-dagang-oleh.html

http://www.ciputraentrepreneurship.com/bisnis-mikro/12628-seluk-beluk-mendirikan-perusahaan-perseorangan.html
http://kunjunganartikel.blogspot.com/2011/09/tata-cara-mendirikan-usaha-pribadi.html
http://raveshader.blogspot.com/2011/04/prosedur-pendirian-usaha-dibidang-it.html

PT Astra Graphia Information Technology

Pada kali ini saya akan menjelaskan salah satu perusahaan dalam Bidang IT yang terkenal di Indonesia, ya itu PT Astra Graphia Information Technology. Perusahaan ini adalah salah satu anak perusahaan dari PT Astra International Tbk (Astra).

Sejarah singkat  PT Astra Graphia Information Technology

Astragraphia mengawali perjalanan bisnis pada tahun 1971 sebagai Divisi Xerox di PT Astra Internasional yang kemudian dipisahkan menjadi badan hukum sendiri pada tahun 1975. Pada tanggal 22 April 1976 Astragraphia ditunjuk secara langsung sebagai distributor eksklusif dari Fuji Xerox Co. Ltd. Jepang di seluruh Indonesia dengan ruang lingkup usaha sebagai penyedia perangkat perkantoran.

Tahun 1989 Astragraphia mencatatkan sahamnya di Bursa Efek Indonesia (dahulu Bursa Efek Jakarta dan Bursa Efek Surabaya) dengan simbol saham ASGR. Per tanggal 31 Desember 2011, 76,87% saham Astragraphia dimiliki oleh PT Astra International Tbk, dan sisanya dimiliki oleh publik.

Sejalan dengan tuntutan kebutuhan pelanggan yang dinamis dan perkembangan teknologi khususnya teknologi informasi & komunikasi, sejak tahun 1990-an Astragraphia mulai merintis transformasi bisnis menjadi penyedia Solusi Teknologi Informasi. Saat ini astragraphia memantapkan ruang lingkup usaha sebagai penyedia bisnis berbasis teknologi dokumen, informasi & komunikasi atau yang dikenal dengan sebutan DICT (Document, Information & Communication Technology). Untuk mendukung transformasi tersebut, Astragraphia menetapkan visi “Menjadi penyedia solusi bisnis berbasis teknologi dokumen, informasi & komunikasi terbaik di Indonesia” dan misi “Menyediakan nilai yang terbaik bagi pelanggan melalui solusi bisnis berbasis DICT”. Upaya mencapai visi dan misi tersebut didukung oleh budaya organisasi yang disebut VIPS (Valuable to The Nation and Life, Innovative and World Class Excellence, Preferred Partner for Customer, dan Synergetic Teamwork).

Secara badan hukum, Astragraphia terdaftar sebagai perusahaan yang bergerak di bidang perdagangan, jasa konsultasi, jasa kontraktor peralatan dan perlengkapan kantor, teknologi informasi, telekomunikasi, dan perindustrian. Secara operasional, untuk menjalankan ruang lingkup usahanya, Astragraphia memiliki dua segmen usaha yang saling melengkapi satu dengan lainnya karena berorientasi pada perbaikan proses bisnis, yaitu Solusi Dokumen dan Solusi Teknologi Informasi & Komunikasi.

Solusi Dokumen dikelola langsung oleh Astragraphia dengan partner utama Fuji Xerox Co., Ltd., Jepang. Jenis produk dan layanan yang diberikan merupakan transformasi dari penyedia layanan berbasis perangkat keras (hardware-based services) menjadi layanan berbasis solusi (solution-based services) dalam ruang lingkup Solusi Dokumen dan teknologi informasi yang mencakup semua aspek siklus dokumen, mulai dari document input (creating, scanning, merging, editing, capturing) dan document management (sharing, indexing, storing, archieving, distributing) hingga document output (printing, faxing, scanning, copying, emailing, web viewing).

Sementara itu segmen usaha Solusi Teknologi Informasi & Komunikasi dijalankan oleh anak perusahaan PT Astra Graphia Information Technology (AGIT) yang 99,99% sahamnya dimiliki oleh Astragraphia. Pada tahun 2011, Astragraphia telah mengembangkan portofolio Mobile Financial Services. Solusi ini disediakan melalui PT AGIT Monitise Indonesia (AMI) yang merupakan kerja sama strategis antara anak perusahaan AGIT dengan Monitise Asia Pacific Limited yang berkedudukan di Hong Kong.

Kantor pusat Astragraphia terletak di Jalan Kramat Raya 43, Jakarta 10450, dan memiliki 79 titik layan di 27 kantor cabang yang tersebar di seluruh Indonesia.

Berikut sejarah singkat perusahaan:

  • 1971 : Mulai beroperasi pada tahun 1971 sebagai divisi Xerox di PT Astra International
  • 1976 : PT Astra Graphia berdiri sebagai badan hukum (perseroan)
  • 1983 : Memasuki bisnis TI dengan ditunjuknya sebagai distributor eksklusif Digital Equipment Corporation. USA
  • 1989 : Menjadi perusahaan publik dengan mencatatkan sahamnya di BEJ dan BES
  • 2004 : Membentuk kemitraan strategis dengan SCS atas unit bisnis IT Solution menjadi PT SAT (49% saham dimiliki Astragraphia)
  • 2008 : Melakukan akuisisi 50.99% saham PT SAT dari SCS, kepemilikan saham Astragraphia menjadi 99.99%
  • 2010 : Unit bisnis Solusi Dokumen (AGDS) mencapai pendapatan bersih Rp 1 Triliun pertama
  • 2011 : AGIT JV dengan Monitise Asia Pacific Ltd, HongKong, membentuk PT AGIT Monitise Indonesia (PT AMI)

Visi & Misi PT Astra Graphia Information Technology

Philosophy :

  1. Menjadi Milik yang Bermanfaat bagi Bangsa dan Negara
  2. Memberikan Pelayanan Terbaik kepada Pelanggan
  3. Menghargai Individu dan Membina Kerja Sama
  4. Senantiasa Berusaha Mencapai yang Terbaik

Visi :

Menjadi Penyedia Solusi Bisnis Berbasis Teknologi Dokumen, Informasi, dan Komunikasi Terbaik di Indonesia.

Misi :

Memberikan Nilai Terbaik bagi Pelanggan melalui Solusi Bisnis Berbasis Teknologi Dokumen, Informasi, dan Komunikasi.

Pemegang Saham

Komposisi Pemegang Saham sampai akhir tahun 2011, 76,87% saham Astragraphia dimiliki oleh PT Astra International Tbk (Astra) dan 23,13% sisanya dimiliki oleh publik, yang seluruhnya terdaftar di Bursa Efek Indonesia.

Astra merupakan salah satu perusahaan Indonesia yang terkemuka dan memiliki pengalaman panjang di pasar domestik. Saat ini Astra bergerak dalam enam bidang usaha yaitu: Otomotif, Jasa Keuangan, Alat Berat, Pertambangan dan Energi, Agribisnis, Teknologi Informasi serta Infrastruktur dan Logistik.

Sampai 31 Desember 2011, tidak ada Dewan Komisaris maupun Direksi yang tercatat memiliki saham Astragraphia.

Astragraphia memiliki satu anak perusahaan, yaitu PT Astra Graphia Information Technology (AGIT) yang mulai beroperasi sejak tahun 1983 sebagai salah satu divisi Astragraphia sebelum dipisahkan menjadi badan hukum sendiri pada tahun 2004. Sampai 31 Desember 2011, Astragraphia memiliki lebih dari 99,99% saham AGIT, dan sisanya dimiliki oleh PT Intertel Nusaperdana.

Sebagai upaya melakukan langkah-langkah inisiatif bisnis baru untuk mempercepat pertumbuhan perusahaan, pada tahun 2011 AGIT melakukan kerja sama strategis dengan Monistise Asia Pacific, Hong Kong membentuk suatu perusahaan patungan, PT AGIT Monitise Indonesia. Perusahaan patungan ini menyediakan platform yang menyeluruh yang mampu memberikan dukungan software dan solusi terhadap layanan mobile banking, mobile payment dan mobile commerce yang memudahkan bank, lembaga keuangan, mobile operators, dan penyedia layanan lainnya melakukan layanan pelanggan, pembayaran dan perdagangan secara bergerak (mobile). Selain itu tersedia juga layanan mobile wallets bagi masyarakat yang tidak memiliki rekening bank atau yang memiliki akses terbatas terhadap layanan keuangan Utama.

Direksi

Dewan Komisaris

Komisaris Utama: Lukito Dewandaya

Komisaris : Herrijadi Halim

Komisaris : Ganda Kusuma

Direksi

Presiden Direktur : Michael Alexander R. Roring

Wakil Presiden Direktur : Calvin Lim Eng Poh

Direktur : Sigit Hermansyah

Direktur : Hendrix Pramana

Astragraphia – 703 Michael Alexander Roring ( Direktur Utama )

Berkebangsaan Indonesia , Michael Alexander Roring lulusan dari Fakultas Ekonomi Universitas Trisakti . Dia bergabung Astragraphia pada tahun 1983 sebagai Sales Representative dan dipromosikan sebagai Manajer di berbagai kantor cabang, Manajer Proyek dalam Proses Rekayasa ulang Bisnis , General Manager sehingga banyak divisi termasuk Divisi Perencanaan Bisnis , rekening utama dan Channel Bisnis Printer , dan akhirnya menjabat sebagai Direktur Astra Graphia sebelum menjadi Presiden Direktur PT Astra Graphia Information Technology . Dia bertanggung jawab penuh atas seluruh kegiatan operasional di Astragraphia , Perencanaan & Pemasaran dan Layanan & Dukungan Pelanggan . Beliau juga menjabat sebagai Wakil Ketua Yayasan Fuji Xerox Asia Pasifik – Astra Graphia , Ketua ADMINKOM ( Asosiasi Distributor Resmi Mesin Fotocopy Berwarna Dan Multifungsi Berwarna ) , anggota Dewan AITI Indonesia ( Asosiasi Industri Teknologi Imformasi Indonesia ) serta Komisaris di BPK Gunung Mulia . Menjabat sebagai Direktur Astragraphia sejak tahun 2011 berdasarkan keputusan RUPS sebagaimana diatur dalam akta No 19 tanggal 28 April 2011 , yang dibuat oleh PSA Tampubolon , SH , notaris di Jakarta . Selama 2012 , ia menghadiri berbagai seminar dan lokakarya di Indonesia dan luar negeri . Dia tidak memiliki afiliasi dengan Direksi , dan anggota Dewan Komisaris atau dengan pemegang saham mayoritas .

Astragraphia – 632 Calvin Lim Eng Poh ( Wakil Presiden Direktur )

Berkebangsaan Malaysia , Calvin Lim Eng Poh lulus dari fakultas Akuntansi dan Analisis Keuangan di Universitas Warwick di Inggris . Ia memulai karirnya di Price Waterhouse di Malaysia dan memperoleh Akuntan Publik Bersertifikat ( BPA ) kualifikasi . Pada tahun 1995 , ia bergabung dengan Jardine Matheson di Hong Kong sebagai Senior Consultant kemudian , setelah dipromosikan beberapa kali dalam berbagai posisi dalam kelompok Jardine , ia menjadi Direktur Keuangan di berbagai unit Jardine Group, seperti Jardine Securicor dan Jardine Shipping Group di Hong Kong , Jardine Pengiriman di Singapura , PT Tunas Ridean Tbk dan posisi terakhir di PT Astra International Tbk sebagai Chief Finance Officer – Otomotif Sales Operations . Dia juga menjabat sebagai Wakil Presiden Direktur PT Astra Graphia Information Technology ( AGIT ) , serta Direktur PT AGIT Monitise Indonesia . Menjabat sebagai Direktur Astragraphia sejak tahun 2011 berdasarkan keputusan RUPS sebagaimana diatur dalam akta No 19 tanggal 28 April 2011, yang dibuat oleh PSA Tampubolon , SH , notaris di Jakarta , dan ia adalah kepala Pengembangan Bisnis , Finance & Accounting , Supply Chain Management , Manajemen Risiko dan SOP & Investor Relations . Pada 2012 , ia menghadiri berbagai seminar dan lokakarya di Program Manajemen Muka di INSEAD , Perancis serta workshop lainnya baik di Indonesia maupun luar negeri . Dia tidak memiliki afiliasi dengan Direksi dan anggota Dewan Komisaris maupun pemegang saham mayoritas.

Client & Partners

Selain memiliki kantor cabang yang tersebar diseluruh Indonesia, Astragraphia juga bekerja sama dengan beberapa dealer, yaitu:

List Dealer 

NO

NAME

KOTA

PHONE

STATUS

1

DUTA METRIX

Mangga Dua ABDAD Blok H2 No. 14

JAKARTA

021-6128626

Authorized Partner

2

FESSA SENTRA INFOKOM

Harco Mangga Dua Lt. 2 Blok B2 No. 129-130

JAKARTA

021-70955273

Authorized Partner

3

SAMUDERA JAYA

Harco Mangga Dua Lt III No.89

JAKARTA

021-62202606

Authorized Partner

4

MEDIA KOMPUTINDO

Mal Puri Indah Lt Dasar Unit KC-08

JAKARTA

021-5822434

Authorized Partner

5

ZOOM INFOTEK TELESINDO

Jl. KHR.Abdullah Bin M.Nuh No.136 Ruko Taman Yasmin SektorVI

BOGOR

0251-7540292

Authorized Partner

6

KOTA BARU MANDIRI

Bumi Panggungrawi Indah Blok A.1

TANGERANG

021-5545688

Authorized Reseller

7

MITRA CITRA GEMILANG (X-FILL)

Jl. Purnawarman no. 13-15, BEC LT.3

BANDUNG

022-92192122

Authorized Partner

8

REVI COM

Jl. Ahmad Yani No. 238

BANDUNG

022-7321341

Authorized Reseller

9

VMS

Jl. Ahmad Yani No. 296

BANDUNG

022-7271013

Authorized Reseller

10

LAURA DIGITAL PRINTING

Jl. Karang Getas No. 140

CIREBON

0231-206301

Authorized Reseller

11

TECS MANDIRI JAYA

Kliteran Lor GK.III/263 RT.014 RW.004

YOGYAKARTA

0274-4477814

Authorized Reseller

12

COMPUTA

Jl. Cik Ditiro No. 10

YOGYAKARTA

0274-513338

Authorized Reseller

13

MULTI ARUM

Jl. Tentara Rakyat Mataram 27A

YOGYAKARTA

0274-561666

Authorized Reseller

14

SAN MULTIMEDIA

Jl. Puspowarno Tengah I/11 Rt 001 Rw 002 Salaman Mloyo

SEMARANG

0274-7611702

Authorized Reseller

15

SUHA OPTIMA KARYA

Jl Veteran no : 1 Solo

SEMARANG

0271-723056

Authorized Partner

16

DUTA SARANA COMPUTER

Jl. Kusuma Bangsa, Hi Tech Mall Lt. Dasar Blok D 8-9

SURABAYA

031-91660088

Authorized Partner

17

BEST MEDIA COMPUTER

Jl. Kusuma Bangsa, Hi Tech Mall Lt. Dasar Blok A-49

SURABAYA

031-5356935

Authorized Reseller

18

GALERINDO TEKNOLOGI

Jl. Kusuma Bangsa, Hi Tech Mall Lt Dasar Blok D 17-19

SURABAYA

031-5348998

Authorized Reseller

19

SMART MEDIA COMPUTER

Jl. Kusuma Bangsa, HI Tech Mall Lt 1 Blok E 4

SURABAYA

031-5481235

Authorized Reseller

20

MANDIRI JAYA

Jl. Tenggilis Mejoyo Selatan IV/18

SURABAYA

031-8414867

Authorized Reseller

21

MULTIMAS MITRA BERSAMA

JL Pasar Besar Wetan No. 28 F

SURABAYA

031-3533975

Authorized Reseller

22

TUNAS ABADI

Jl. Ngagel Jaya Selatan H-10

SURABAYA

031-5047871

Authorized Reseller

23

SEMERU (X4Print)

JL. Semeru No. 62

MALANG

0341-364651

Authorized Reseller

24

DEWA KOMPUTER

Jl. Pengayoman No. 27, Computer City Lt. Dasar Blok B 9-10

MAKASSAR

0411-425439

Authorized Partner

25

INDOPRIMA

Pasifik Permai Blok D 12-14 Dok II

JAYAPURA

0967-531897

Authorized Partner

26

INDOPRIMA

Jl. Cendrawasih SP 2 Gd II Mini Mall Lt 2

TIMIKA

0901-323597

Authorized Partner

27

INDOPRIMA

Jl. Merdeka No. 7A

MANOKWARI

0986-214025

Authorized Partner

28

INDOPRIMA

Jl. Raya Sentani No.12A

PADANG BULAN

0967-588987

Authorized Partner

29

INDOPRIMA

Jl. SAM Ratulangi No.17-18 Ruko Irian Bakti

SORONG

0951-334492

Authorized Partner

30

ANEKA KOMPUTER

Jl. Mawar No. 43

BANJARMASIN

0511-3354379

Authorized Partner

31

ELIM JAYA COMPUTER

Jl. Achmad Yani No.16 RT.55 Gunung Sari Ilir

BALIKPAPAN

081253371707

Authorized Reseller

32

UNICOM PERSADA COMPUTER

Jl. Bhayangkara No. 28

BALIKPAPAN

0548-24542

Authorized Reseller

33

BIMA NUSA PRATAMA

Komp. Ruko Balikpapan Baru Blok D1

BALIKPAPAN

0811596809

Authorized Reseller

34

LUMBUNG COMPUTER

Jl. MT. Haryono

BALIKPAPAN

0542-878782

Authorized Reseller

35

SISCOM

Jl. Belibis Block D2/RT.9 RSS Damai

BALIKPAPAN

0542-876612

Authorized Reseller

36

PRIMA JAYA

Comp. Corpotex Estate Blok 000-02

SAMARINDA

0541-273460

Authorized Reseller

37

MITRA CEMERLANG COMPUTER

Jl. A. Yani, Ruko Cendrawasih Trade Centre B.19

SAMARINDA

0541-7950001

Authorized Partner

38

BINTANG PERDANA PRIMA

Jl. M. Effendi M/5-6

BONTANG

0548-41934

Authorized Reseller

39

FAJAR AGUNG

Jl. Raden Intan No. 61

LAMPUNG

0721-267192

Authorized Partner

40

JAYA MESIN

Jl. Tuanku Tambusai No. 21

PEKANBARU

0761-855939

Authorized Partner

41

ADI MITRA MANDIRI

Jl. Sultan Syarif Qasim No. 91G

PEKANBARU

0761-849138

Authorized Reseller

42

MEGA KOMPUTAMA PERKASA

Jl. Tuanku Tambusai 140E

PEKANBARU

0761-7062418

Authorized Reseller

43

SARANA SIGMA TEKNOLOGI

Jl. Teratai No. 152A

PEKANBARU

0761-857640

Authorized Reseller

44

TEKNO KOMPUTER

Jl. Tuanku Tambusai No.51/2

PEKANBARU

0761-27797/8

Authorized Reseller

45

CENTRO DTECH COMPUTER

Jl. Jambi No. 2 Padang Ulakkarang

PADANG

0751-7055346

Authorized Reseller

46

BOROBUDUR

Jl. Ahmad Yani No. 15

BENGKALIS

0766-21760

Authorized Reseller

47

BIMACOM

Jl. Singa (Terusan Jl. Sumatra) No. 8 Lt. 3-5

MEDAN

061-4558439

Authorized Reseller

48

PIXELINDO

Jl. Wahidin No. 124

MEDAN

061-4558917

Authorized Partner

49

NEWTECH COMPUTER CENTER

Komplek Multatuli Blok C No.36

MEDAN

061-4530043

Authorized Reseller

50

BIMA PRATAMA

Jl. W.R. Supratman No. 21 – 25

ACEH

0651-635622

Authorized Reseller

51

OZIANO

Komplek Bumi Indah Blok I/31 Nagoya

BATAM

0778-7027203

Authorized Reseller

52

PACIFIC COMPUTER

Komplek Penuin Center Blok A No. 12

BATAM

0778-423244

Authorized Reseller

53

DUTA COMPUTER

Komplek Excecutive Centre Blk II no 1-2

BATAM

0778-332553

Authorized Reseller

54

DWI SUKSES MULIA

Jl. Prof. Ir. Sutami

TANJUNG PINANG

0771-20245

Authorized Reseller

55

DEWATA KOMPUTER

Jl. PB. Sudirman Agung Blok A-53

DENPASAR

0361-238778

Authorized Reseller

56

RADJA

Jl. Diponegoro, RIMO Lt. 3

DENPASAR

0361-2776270

Authorized Reseller

57

WAHANA BALINDO

Jl. Pulau Kawe 77

DENPASAR

0361-246452

Authorized Reseller

58

SURYA DARMA

Jl. Pulau Menjangan No. 41

TABANAN

0361-819807

Authorized Reseller

59

CANDIKA COMPUTER

Jl. K.H. Wahid Hasyim No. 164B

PONTIANAK

0561-741423

Authorized Reseller

60

COMNET COMPUTER

Jl. Tanjung Pura No. 436

PONTIANAK

0561-769391

Authorized Reseller

61

PUTRI INDAH

JL. BrigJen H. Kasim Blok B-6 RT.44 Palembang

PALEMBANG

0711-716363

Authorized Partner