Tuesday, 22 June 2010

Rumus Tetesan DOPAMIN

DOPAMIN

Kandungan Obat 1 Vial = 200 mg / 5 cc ―》dilarutkan dlm 500 cc NaCl

= 200 mg/500 cc NaCl

= 400 mg/1000 cc NaCl

= 0,4 mg/cc NaCl

= 400 mcq/cc NaCl

bila 1 cc = 20 tts

= 20 mcq/tts

々Kebutuhan

Dosis = 4 mcq/kgbb/mnt

BB = 50 Kg

RUMUS = DOSIS X BB

= 4 X 50

= 200 mcq/mnt

* CONTOH

Dosis = 5 mcq/kgbb/mnt

BB = 50 Kg

Volume = 500 cc NaCl

RUMUS TETESAN = DOSIS X BB / (200/jmlh volume X 1000/20)

= 5 X 50 / (200/500 X 1000/20)

= 250 / 20

= 12,5 tts/mnt

Berikut adalah link untuk aplikasi rumus tetes Dopamin yang dapat dijalankan pada ponsel/HP dengan fitur Java
http://www.ziddu.com/download/10403129/TetesDopamin.jar.html

sumonggo dipun donlot...

Wednesday, 26 August 2009

Alternatif Software INA-DRG

http://ina-drg.blogspot.com/2009/08/alternatif-software-ina-drg.html

Alternatif Software INA-DRG

http://ina-drg.blogspot.com/2009/08/alternatif-software-ina-drg.html

Monday, 1 June 2009

WALK IN INTERVIEW

ARISTA MITRA LESTARI, PT (HONDA MANGGA DUA)

Company Description

WALK IN INTERVIEW

Arista Group adalah perusahaan yang bergerak di bidang penjualan automotif baik mobil dan motor. Saat ini Perusahaan merupakan salah satu group dealer motor Yamaha yang terbesar dengan daerah pemasaran di DKI Jakarta, Jawa Barat dan Lampung. Perusahaan juga mempunyai beberapa dealer resmi mobil Honda di daerah DKI Jakarta, Depok dan Medan.

Saat ini Perusahaan sedang berkembang pesat dan membutuhkan para profesional berkualitas yang mempunyai motivasi tinggi untuk bergabung bersama Perusahaan untuk menjawab tantangan sebagai berikut :

STAFF IT

(Programmer / Support)



STAFF IT (Programmer / Support) Post Date: 01 Jun 09

Persyaratan :

  • Pria usia maksimal 30 tahun.
  • Pendidikan S1 - komputer (Teknik Informatika / Teknik komputer / Mngm Informatika)
  • Mengusai RDBMS ( Sybase, SQL Server); Aplikasi database server : MySQL, SQL2000, MS Access; tool programming PC; Aplikasi Web Base : Visual Basic, C-Sharp, Delphi, HTML, ASP, PHP, Javascript; Aplikasi reporting : Crystal Report (IT-Programmer)
  • Menguasai LAN/WAN Environment untuk Enterprise configuration : switching Layer2/3, routing, VoIP, Firewall, Security; Wireless Environment : Access point, Wireless Client, Point to Point (IT-Support)
  • Lebih disukai jika memiliki ijazah/sertifikasi keahlian/pelatihan dari ventor IT : Microsoft, Cisco, Novell, SCO, Linux dengan titik berat pada sisi Software/Aplikasi Development (IT-Programmer); Memiliki kemampuan dasar mengelola : query, backup, dan restore database : SQL, MySQL (IT-Support)
  • Menguasai Aplikasi-aplikasi penunjang pekerjaan : MS Office, MS Project, Vision; Aplikasi Desktop Operation System : Window98, ME 2000 Professional, XP dan Windows Server (IT-Programmer / IT- Support)
  • Memiliki kemampuan administrasi dan dapat membuat laporan hasil kerja dengan baik (IT-Programmer / IT- Support)
  • Pengalaman minimal 1 thn diposisi yang sama sebagai programmer atau technical support (IT-Programmer / IT- Support)
  • Bersedia ditugaskan diluar kota (IT-Support)
  • Memiliki motivasi kerja yang tinggi, sanggup bekerja keras, dapat bekerja secara individu ataupun team work, serta memiliki integritas yang tinggi.

Bagi yang memenuhi persyaratan : kami memberikan gaji, Kompensasi & benefit, pelatihan, jenjang karir, yang menarik bagi yang terpilih.

Datang & bawalah Surat Lamaran, Daftar Riwayat Hidup, Copy KTP, dan Pas Photo terbaru.

Hari : Kamis

Tanggal : 4 Juni 2009

Waktu : 08.30 – 11.00 WIB

Tempat : Gedung Yamaha ARISTA Kalimalang

Jl. Raya Kalimalang No. 19

Jakarta Timur 13440

CAREER OPPORTUNITIES

SINERGI DAYA MITRA, PT

Company Description

CAREER OPPORTUNITIES

SDM, a brand name of PT Sinergi Daya Mitra, is a fast growing national company specializing in providing innovative solutions in Human Capital Management.

We urgently required Experienced and Potential Candidates for project-based (contract)assignments (extendable) for the following position:



Application Support (AS) Post Date: 02 Jun 09

Requirements:

  • Male / Female
  • Minimum Bachelor Degree (S1) in computer science and management information system
  • Minimum 2 years of experience as Programmer/ Application Support
  • Having knowledge in Banking business process/ knowledge
  • Have good knowledge in MS SQL Server
  • Have good knowledge in oracle
  • Have good knowledge in java
  • Have knowledge in VB
  • Have knowledge in C++

Only short-listed candidates will be notified

If you meet above requirements, send your application letter and resume along with expected remuneration to karir@dayamitra.com with position code on the subject line. Or send to

PT SINERGI DAYA MITRA

Menara KADIN Indonesia 30th Floor

Jl. H.R. Rasuna Said X-5 Kav.2-3

Jakarta 12950

Wednesday, 13 May 2009

Exploring Security Fundamentals

Exploring Security Fundamentals

A “secure network” is a moving target. As new vulnerabilities and new methods of attack are discovered, a relatively unsophisticated user can potentially launch a devastating attack against an unprotected network. This section begins by describing the challenges posed by the current security landscape. You will learn about the three primary goals of security:

confidentiality, integrity, and availability.

This section also explains traffic classification and security controls. You will learn how to respond to a security violation and consider the legal and ethical ramifications of network security.

Why Network Security Is a Necessity

Network attacks are evolving in their sophistication and in their ability to evade detection.

Also, attacks are becoming more targeted and have greater financial consequences for their victims.

Types of Threats

Connecting a network to an outside network (for example, the Internet) introduces the possibility that outside attackers will exploit the network, perhaps by stealing network data or by impacting the network’s performance (for example, by introducing viruses).

However, even if a network were disconnected from any external network, security threats (in fact, most of the probable security threats) would still exist.

Specifically, according to the Computer Security Institute (CSI) in San Francisco, California, approximately 60 to 80 percent of network misuse incidents originate from the inside network. Therefore, although network isolation is rarely feasible in today’s e-business environment, even physical isolation from other networks does not ensure network security.

Based on these factors, network administrators must consider both internal and external threats.

Internal Threats

Network security threats originating inside a network tend to be more serious than external threats. Here are some reasons for the severity of internal threats:

¦ Inside users already have knowledge of the network and its available resources.

¦ Inside users typically have some level of access granted to them because of the nature of their job.

¦ Traditional network security mechanisms such as Intrusion prevention Systems (IPS)and firewalls are ineffective against much of the network misuse originating internally.

External Threats

Because external attackers probably do not have intimate knowledge of a network, and because they do not already possess access credentials, their attacks tend to be more technical in nature. For example, an attacker could perform a ping sweep on a network to identify IP addresses that respond to the series of pings. Then, those IP addresses could be subjected to aport scan , in which open services on those hosts are discovered. The attacker could then try to exploit a known vulnerability to compromise one of the discovered services on a host. If the attacker gains control of the host, he could use that as a jumping-off point to attack other systems in the network.

Fortunately, network administrators can mitigate many of the threats posed by external attackers. In fact, the majority of this book is dedicated to explaining security mechanisms that can defeat most external threats.