cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
JAKSTIK Journal
Published by STMIK JAKARTA STI&K
ISSN : -     EISSN : -     DOI : -
Core Subject : Education,
JAKSTIK jurnal adalah kumpulan jurnal penelitian dari semua fakultas yang ditulis oleh dosen dan mahasiswa STMIK Jakarta. Kami jurnal yang diterbitkan setiap 6 bulan yang menunjukkan jurnal Studi yang berbeda Program studi.
Arjuna Subject : -
Articles 64 Documents
INFORMATION SYSTEMS DESIGN SERVICES DENTAL CLINIC PATIENTS Kosdiana Kosdiana
JAKSTIK Journal Vol 5, No 2 (2006): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The use of computer technology at the present time is very much needed in data management both in the number of large and small. Because in addition can also save time and effort to minimize errors that occur if done manually. Here on the system design of patient care dental clinic needed a computerized system that can support operational services to society as a maximum, and it can become more effective and efficiency.  In order for data to be processed more easily, quickly, precisely and accurately.
APPLICATION OF DATA IN THE CENTRE LIBRARY UNIVERSITY Marzuki Marzuki
JAKSTIK Journal Vol 5, No 2 (2006): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data center or data center is the facility used to put multiple servers or computer systems and data storage systems (storage) are conditioned by setting catudaya and air, fire protection, and are usually equipped also with physical security systems. Data centers can also be viewed as a repository of data (data warehouse) which serves as a data management system starting from the collection, processing, storage until the rediscovery of the data, and be able to also provide support in decision-making (decisionsupport system). Library Center may implement a data center (called CITED Data Center, PDC) to manage numerous databases, ie databases, books, magazines, multimedia, and publications. PDC consists of: (1) Back-end, to manage information; (2) PDC or network attached storage (NAS), a large-capacity storage media to store digital documents, and (3) front-end, as the medium of communication between systems PDC and users. Implementation should be supported PDC network infrastructure, IT equipment, applications, standard operating procedures, and managing resources, both in quantity and capability.
SECURITY ENGINEERING USING DATA ONLINE TRANSACTIONS ON cryptography Rahayu Noveandini
JAKSTIK Journal Vol 5, No 2 (2006): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

E-commerce is a means to conduct financial transactions online. Facility has grown rapidly since the beginning of its use in 1970. When is e-commerce is only about the commercial documents like purchase orders or invoices electronically. Now e-commerce has included credit card transactions, enterprise resource planning, and others. One method of securing the network is the use of technology, Secure Socket Layer (SSL). This technology allows the client to build a secure and encrypted connection with the server. In addition there is also a Digital Certificate technology allows a client to know whether the site's pages are accessible genuine or fake. Both technologies are then put together to facilitate e-commerce to be safe and prevent users from feeling anxious. There are several things that must be prepared to secure e-commerce. From the server side is the availability SSL technology, Digital Certificate, encrypting data, and so forth. To be able to use this technology, there are certain steps that must be taken lankah. While the readiness of the client side of client / server capabilities to rival browsers such as browser capabilities in running SSL.   Many of the lurking threat of e-commerce users. One is phishing. These crimes take advantage of the use of fake websites to deceive users of e-commerce so that when the user accesses such sites important information can be stolen from him by the offender. This crime other than relying on technology also relies on a user's attention ketidakhati in accessing e- commerce site.   Actually, the safety factor of e-commerce does not only depend on the sophistication of the technology used, but more emphasis on prudence and accuracy of e-commerce users in keeping the information themselves, and notice what he had access to the internet. Technology that determines it is safe or not was not only the technology that is used, but also the readiness of human resources in use. 
COMPUTER SECURITY SYSTEM Ristyawati Ristyawati
JAKSTIK Journal Vol 5, No 2 (2006): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computer system is a system that transforms data into information. Thus, if there are people who are not entitled to enter into the computer system, important information and valuable can be stolen or modified.
BASIC CONCEPTS proxy Yuce Yuliani
JAKSTIK Journal Vol 5, No 2 (2006): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In a network of intermediaries required, one form of such intermediaries is Proxy. Proxies can be understood as a third party who stood in the middle between two parties that are interconnected and function as an intermediary, such that the first party and second party not directly related, but each dealing with an intermediary, namely a proxy.   As an illustrative example: If a student borrows a book in the library, sometimes the students were not allowed to directly search and retrieve their own books that we want from the bookcase, but students asked for the book to the officers and of course by giving a number or code book that he wanted, and then the officer who will find and fetch the book. In the case above, the librarian has acted as an intermediary or proxy. Officers are also able to ensure and maintain, for example, so that students can only borrow books for students, lecturers can borrow books of all books, or the general public may only borrow a specific book.  Maybe the process takes more time than if we directly search and retrieve their own books we want. But if only every time officers locate and retrieve a book for someone, the officer also made several copies of the book before giving his book to people who ask, and keep it on the table service, so if there are other people who request a specific book, a very big possibility The requested book has been available a copy of it on a table, and the clerk gave it to stay straight. The result is a faster service and better security as well.   The above description explains the concept and basic functions of a proxy in the computer network and internet communications. Proxy servers have three main functions namely Connection Sharing, Filtering and Caching. Each function will be described further below.
DVD FORMAT AND PROCESS OF MAKING VIDEO EDITING USING SONY VEGAS PRO 8.0 Yulina Yulina
JAKSTIK Journal Vol 5, No 2 (2006): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In today's modern era, the need for entertainment is very important, especially in the business world. Therefore, the application of technology, the digital system is one correct solution in the process of filmmaking. In this case, may be helpful to learn the process of digital video editing using Sony Vegas Pro 8.0 software outputs Sony Creative Software.   The need for entertainment is very important, especially in the business world such as advertising and movie theater.
Pembuatan Alat Untuk Mendeteksi Taraf Logika Pada Sebuah Rangkaian Digital Nenny Anggraini
JAKSTIK Journal Vol 7, No 1 (2008): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dibuat suatu rangkaian pendeteksi taraf logika dari suatu rangkaian digital.Rangkaian ini memiliki kemampuan 3 (tiga) taraf logika sinyal digital yang lazimnyaterdefinisi, yaitu : Level tegangan tinggi (High), Level tegangan rendah (Low) dan Leveltegangan ambang (Thereshold).Kemampuan rangkaian ini memungkinkan membantutingkat analisis rangkaian digital yang lebih baik. Dalam pengujian rangkaian inidiaplikasikan khususnya untuk gerbang-gerbang dasar.
Penggerak Pintu Otomatis Menggunakan Sensor Infra Red Berbasis Mikrokontroller AT89C51 Fivtatianti Hendajani
JAKSTIK Journal Vol 7, No 1 (2008): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Perkembangan teknologi dan elektronika yang pesat sudah dimanfaatkanuntuk kehidupan sehari-hari. Misalnya perkembangan di bidang elektronika yaituprosesor. Mikrokontroler adalah prosesor keping tunggal yang dimanfaatkansebagai prosesor penggerak sistem baik sistem manual maupun otomatis.Mikrokontroler AT89C51 digunakan sebagai prosesor yang digunakan padasistem pernggerak pintu otomatis yang dapat membuka dan menutup pintu jika adasinyal dari sensor infra red dengan bantuan motor DC.
Sistem Pengendali Kamera Pemantau Ruangan Menggunakan PPI8255 Berbasis Komputer Pribadi Nenny Anggraini
JAKSTIK Journal Vol 7, No 1 (2008): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Keamanan, yang ditempatkan dibeberapa tempat fasilitas – fasilitas yangdianggap penting, guna memantau segala macam aktifitas yang sedang berlangsung,untuk menghindari dari segala jenis tindakan kejahatan. Dengan tersedianya alattersebut diharapkan para pemilik atau pemakai fasilitas apapun akan merasa aman.Agar tidak terjadi segala sesuatu kesalahan, pihak pengelola dituntut untuklebih mengutamakan peningkatan baik itu dari segi teknis dan individu agar alat inidapat dipakai dengan sebagaimana mestinya. Hal ini yang mendorong penulis untukmelakukan penelitian dan membuat alat Sistem Pengendali Kamera Pemantau RuanganMenggunakan PPI 8255 Berbasis Komputer Pribadi, agar penulis mengetahui hasilkerja dari alat yang telah dibuat penulis, dengan tujuan meminimalis tindakankejahatan disegala fasilitas apapun.
Sistem Keamanan Rumah Otomatis Dengan Teknologi Infra Merah Private Mohamad Saefudin
JAKSTIK Journal Vol 7, No 1 (2008): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Sistem keamanan lingkungan merupakan sistem perlindungan bagi warga dilingkungan dan sekitarnya dari gangguan kejahatan baik yang datang dari luarlingkungan ataupun dari dalam lingkungan itu sendiri. Sistem keamanan lingkunganyang baik harus dimulai dari lingkungan yang terkecil kemudian berlanjut danterintegrasi antar sistem keamanan lingkungan kecil dengan sistem keamananlingkungan yang lebih besar. Sistem keamanan lingkungan yang terkecil adalahsistem keamanan pada rumah.