Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 11 dokumen yang sesuai dengan query
cover
Naoyuki Yoshino
"This article proposes a tax sharing scheme between governments and private sector investors of Information and Communications Technology (ICT) infrastructure. The current COVID-19 pandemic has not only emphasized the crucial need of ICT infrastructure development, but has also expanded government budget deficits in many countries. Therefore, participation from the private sectors is necessary to close the widening investment gap in ICT infrastructure. One of the measures to attract private sectors’ involvement in ICT infrastructure is by creating a steady stream of income for the investors. To ensure the success of the proposed financing scheme, this article also recommends the development of supporting hard and soft infrastructure as well as the digitalization of tax reporting systems."
Jakarta: PT Penjaminan Infrastruktur Indonesia, 2022
658 JIPM 5:1 (2022)
Artikel Jurnal  Universitas Indonesia Library
cover
Dahliyah Hayati
"ABSTRAK
Kemajuan teknologi komunikasi dewasa ini berkembang dengan sangat pesat.
Kontrol keamanan komunikasi jaringan tidak bisa ditawar lagi untuk memastikan
sirkulasi data dan informasi berjalan dengan baik dan benar, begitupun standar yang
disyaratkan ISO 27001 : 2015 (Standar Internasional Sistem Manajemen Keamanan
Informasi) pada bagian Annex A ISO 27001 : 2015 mewajibkan adanya kontrol
kemanan jaringan yang memadai untuk menunjang kelancaran proses bisnis.
Permasalahannya adalah keamanan jaringan informasi tidaklah cukup hanya sekedar
menggunakan password dan username saja, oleh karena itu dibutuhkan sistem
keamanan yang lebih canggih lagi. Pada penelitian ini penulis mencoba untuk
menghadirkan sebuah alternatif sistem gratis yang handal untuk memenuhi Annex A
ISO 27001 : 2015, yaitu Squid Proxy System. Dari hasil penelitian dan analisa yang
dilakukan oleh penulis, bisa diambil kesimpulan bahwa Sistem Squid Proxy ini
cukup mumpuni dan layak untuk diterapkan di dunia industri sebagai salah satu
alternatif kontrol untuk keamanan komunikasi jaringan dengan beberapa persyaratan
yaitu antivirus yang handal, membuat jadwal dan SOP (Standard Operation
Procedure) mengenai pemeliharaan jaringan (termasuk semua aplikasi yang ada,
contohnya: email, software-software, dll) dan melakukan pengawasan terhadap
pelaksanaan jadwal dan SOP yang telah ditetapkan, memilih provider jaringan yang
terbaik dan memastikan tenaga ahli IT tersedia, baik yang direkrut secara langsung di
dalam organisasi dan atau menggunakan jasa konsultan IT

ABSTRACT
Advances in communications technology today are growing rapidly. Security
controls for network communication are not negotiable to ensure an adequate flow of
data and information to run properly, as well as the standard requirements of ISO
27001: 2015 (International Standard Information Security Management System) in
the Annex A of ISO 27001: 2015 require an adequate control network security to
support the business process. The problem is the security of information networks is
not enough to simply use the password and username only, therefore the system
needs more advanced security control. In this study, the authors tried to present a free
reliable alternative system to meet Annex A of ISO 27001: 2015, the Squid Proxy
System. From the research and analysis conducted by the authors, it can be
concluded that the Squid Proxy system is quite qualified and eligible to apply in the
industrial world as an alternative control for the security for network
communications with some conditions which should be applied, such as: providing a
reliable antivirus, providing network maintenance SOP (Standard Operation
Procedure) and schedule (including maintenance for all application to be used, for
example: email, software, etc.) also conducting monitoring for the implementation of
SOP and maintenance schedule, selecting the best network provider, ensuring that
reliable IT experts are available, either recruited directly in the organization and or
use IT consultants."
2016
T45746
UI - Tesis Membership  Universitas Indonesia Library
cover
Zhao, shijun
Beijing: Publication Internental Press, 2006
SIN 004.610 51 ZHA n
Buku Teks  Universitas Indonesia Library
cover
Azilahwati binti Adam
"Current technological advances, particularly in information and communications technology (ICT) and social media have sparked a phenomenon in the business world. The existence of social commerce (s-commerce), which is a combination of e-commerce and social media, has opened up greater opportunities for SMEs in Malaysia. The use of s-commerce as a medium for marketing and buying and selling is capable of helping SMEs to increase the sales and profitability of their businesses. However, according to studies conducted by SME Corp Malaysia, the usage of e-commerce and social media is still low. Attitude and self-efficacy are variables that are often used in studies related to entrepreneurs and their intention to accept a new business innovation or technology. Therefore, this study was undertaken to identify the internal factors within entrepreneurs, namely attitude and self-efficacy, which influence the acceptance and use of s-commerce among SMEs in Malaysia."
Universitas Pelita Harapan. Jurusan Manajemen, {s.a.}
338 DEREMA 11:1 (2016)
Artikel Jurnal  Universitas Indonesia Library
cover
Wahyu Setyo Prabowo
"Keuntungan Cloud Computing (CC) merupakan teknologi baru yang mempunyai karakteristik on-demand self service, broad network access, resource pooling, rapid elasticity, dan measured service, yang menjanjikan efisiensi dan efektifitas operasional Teknologi Informasi dan Komunikasi (TIK) pada organisasi. Permasalah pada CC dalam mendukung kinerja Lembaga Pemerintahan masih menjadi belum perhatian khusus. Artikel ini memaparkan hasil migrasi data center berbasis CC (Virtual Private Data Center) yang diterapkan pada Lembaga Ilmu Pengetahuan Indonesia (LIPI). Model penerapan ini diharapkan bisa menjadi acuan untuk instansi pemerintah lain yang memiliki karakteristik dan serumpun dengan LIPI maupun instansi pemerintah lain dalam melaksanakan pengelolaan TIK untuk bisa lebih banyak mendapatkan manfaat dari CC sehingga efektifitas dan efisiensi pengelolaan TIK dapat tercapai. "
Kementerian Komunikasi dan Informasi Ri, 2015
384 JPPKI 6:2 (2015)
Artikel Jurnal  Universitas Indonesia Library
cover
Wu, Leijia
"[This book discusses the basic idea of Common Radio Resource Management (CRRM), especially on the Radio Access Technologies selection part of CRRM. It introduces two interaction functions (information reporting function and RRM decision support function) and four interaction degrees (from low to very high) of CRRM. Four possible CRRM topologies (CRRM server, integrated CRRM, Hierarchical CRRM, and CRRM in user terminals) are described. The book presents different Radio Access Technologies selection algorithms, including single criterion and multiple criteria based algorithms are presented and compares them. Finally, the book analyses the advantages and disadvantages of the different selection algorithms. , This book discusses the basic idea of Common Radio Resource Management (CRRM), especially on the Radio Access Technologies selection part of CRRM. It introduces two interaction functions (information reporting function and RRM decision support function) and four interaction degrees (from low to very high) of CRRM. Four possible CRRM topologies (CRRM server, integrated CRRM, Hierarchical CRRM, and CRRM in user terminals) are described. The book presents different Radio Access Technologies selection algorithms, including single criterion and multiple criteria based algorithms are presented and compares them. Finally, the book analyses the advantages and disadvantages of the different selection algorithms. ]"
Heidelberg : [Springer, ], 2012
e20397721
eBooks  Universitas Indonesia Library
cover
Rusman
Jakarta : Rajawali, 2012
371.334 RUS p (1)
Buku Teks  Universitas Indonesia Library
cover
Doberstein, Dan
"Fundamentals of GPS receivers covers GPS receivers' theory and practice. The book begins with the basics of GPS receivers and moves onward to more advanced material. The book examines three types of GPS receiver implementations: first is the custom design by the author; second is an industry standard design, now part of the open source network, the third relates to the receiver designed by JPL /NASA. Each receiver is unique allowing the reader to see how each design solves the same problems. Chapters discuss carrier phase measurements and GPS time and frequency measurements. The overall text is measurement oriented as opposed to processing the measurements. With a focus on the fundamentals of measurements the reader will be building their intuition for the physical phenomenon at work."
New York: Springer, 2012
e20421079
eBooks  Universitas Indonesia Library
cover
"The transformational technologies of the Internet-Web compound continue to exert a vast and readily apparent influence on the way we live and work. In recent times, internet penetration is now very high in most parts of the world, impacting the context and content of the workplace and the boundary between work and private life is even more porous. Not only has the reach increased, but the technologies to access the Internet-Web have further evolved towards increasing portability. The hardware evolution from desktops to laptops to mobile technologies (phones, tablets, watches, eyeglasses) marches forward. The increasing mobility and 24/7 accessibility offers the opportune time to revisit the transformations occurring.
Today the Internet consists of billions of digital devices, people, services and other physical objects with the potential to seamlessly connect, interact and exchange information about themselves and their environment. Organizations now use these digital devices and physical objects to produce and consume Internet-based services. This new Internet ecosystem is commonly referred to as the Internet of People, Things and Services (IoPTS). In this follow-up to their 2006 volume, Simmers & Anandarajan examine how The Internet of People, Things and Services (IoPTS) transforms our workplaces.
Information and communications technology (ICT) expansion from desktops to laptops to ubiquitous smart objects that sense and communicate directly over the internet – the IoPTS - offers us the opportune time to revisit how the Internet transforms our workplaces."
New York: Routledge, 2018
e20534421
eBooks  Universitas Indonesia Library
cover
"This book introducing the general concepts in the field including technical data, it then describes how a chipless RFID tag can be made using a planar disc-loaded monopole antenna and an asymmetrical coupled spiral multi-resonator. The tag encodes data via the “spectral signature” technique and is now in its third-generation version with an ultra-wide band (UWB) reader operating at between 5 and 10.7GHz."
New York: Springer, 2002
e20418240
eBooks  Universitas Indonesia Library
<<   1 2   >>