Wednesday, 13 November 2013

A Brief History of British (England)

The historical events of British (English) could be grouped into four main periods. There are:

The Early Period of English History (3 millennium BC-1066 AD)

Iberian

A native inhabitants of Iberians Peninsula of southwest Europe occupied by Spain and Portugal, to Britain in the third millennium BC which were then overrun by the various Celtic invasions beginning in the 8th century BC. The Iberians brought their metal-working skill and the first real civilization to Britain.

The Celts

The Celts originated from central Europe spreading to Western Europe and then to the British Isles, they brought their tribal organization and an early form of agriculture. They were forced by the Roman invasions in the beginning 43 AD by Cladius to the westward into Ireland, Wales, and Cornwall. The Celts were considered as the ancient Britons.

Roman Britain

A Great Invasion
More than four countries, from 55 BC up to 410 AD, Britain was under the influence of Roman Empire. In their early efforts to control Britains, the Romans used their military superiority to to gain control of the areas against the Celts. It happened in 54 BC-61 AD under the Roman rules Cassivelanus, Aulus, Plautius, Ostorius Scapula, and Suetonius Paulinus. The Britons were taken prisoners or killed and so were the Romans in the wars which were won by the Romans.

Anglo-Saxons

The Anglo-Saxons were the pirates from northwest of Germany (Norwegia, Swedia, Scandinavia, Denmark) who landed and settled in Thanet and Kent in about 449 AD and occupied the coasted areas up to become one people influenced by Romans buildings and roads and more importantly by Christianity.

The Danish Invasions

The Danes (Danish) invaded England and settled in Sheppey in 851. In the 875 the Danish won all England except Wessex. Then the Danish under Guthrum in 876 invaded and defeated by King Alfred that forced him to take a refuge at Athelney.


Medieval England (1066-1485)

There are some historical events during this period:
  • In 1066, England was conquered by William of Normandy.
  • 1067-1071, Saxon revolts against Normans.
  • The Kingdom become more powerful and the government more orderly.
  • 1338-1453, there was The Hundred Years War, the war between France and England. 
  • 1348, The Black Death which caused the plague broke out.
  • 1381, there was The Peasants' Revolt.


The Beginning of Modern Times (1485-1760)

Renaissance
Renaissance Era


Renaissance means the re-birth in the outlook of Europe which took place during the 14 to the 16 centuries. The re-birth refers to the revival of the learning of ancient Greece.

Tudor Dynasty
  1. Henry VII (1485-1509)
  2. Henry VIII (1509-1547)
  3. Edward VI (1547-1553)
  4. Mary (1553-1558)
  5. Queen Elizabeth I (1558-1603)
Colonial development.
The conflict between king and parliament.



The Present Age (1760-20th Century)

Some important events during this period:
  • Industrial Revolution
  • Agriculture Revolution
  • Victorian Britain (19th Century)
  • The Rise of the Working Class
  • Britain's as the World Power
  • Britain Decline as World Power
  • The World War I
  • The World War II


That's the brief information about historical period of British (England), there are so many things you could find in the other books or sources if yo want to know more about it. Feel free to give any comments or corrections :)

Source:
  • Introductory Study on the History of English (by Drs. H. Mundari Muhada, Dipl. TEFL)
  • Images from Google
  • Video from YouTube

Saturday, 9 November 2013

The Law of Information and Electronic Transactions (UU ITE) Republic of Indonesia

UU ITE 2008
UU ITE stands for Undang-Undang Informasi dan Transaksi Elektronik (The Law of Information and Electronic Transactions. This act was designed since March, 2003 by the Ministry of Communications and Technology and then authorized as the fixed act in 2008 (UU Nomor 11 tahun 2008). This act regulated all forms of activities that exist in the virtual world or internet under the auspices Republic of Indonesia.

The contents of the law as written below:


1. Website Content Violation


Pornography
Pornography is the most violation that occurred in the virtual world by displaying photos, stories or moving images inappropriate for display. We always find a case when someone manipulates the image or photograph of another person without consent, such as occurs in many porn sites.

Copyright Infringement
Copyright infringement often occurs in both the private and commercial web sites. For example, providing better facilities free download photos, songs, software, film and paper which are copyrighted.

2. Electronic Crime in Commerce


Online Fraud

Crime in electronic commerce (e-commerce) in the form, online scams, multilevel marketing scams online and credit card fraud. According Cahyana, online fraud characteristics that attracted many product prices are very low, the seller does not provide a phone number, no response to questions by e-mail, and promising products that are not available. The worst risk for crime victims are paid but never received the product, or the product was not obtained in accordance with the promised. The characteristics of this crime: the price of the products are widely enjoyed lower, the seller does not provide a phone number, no response to the question via email, promising products that are not available.


Tiered Marketing Scams Online
The characteristic is seeking to profit from recruiting members and selling fictitious products, with a 98 percent risk for the victims of this failed investment or loss.

Credit Card Fraud
The characteristic is there's mysterious charges on the card billing for internet products or services that were never ordered, the victims need time to pay off their credit.


3. Other Violations

Recreational Hacker
The beginner hacker is aimed only to break a system and show less of security system at a company.

Cracker
The motivation is to gain a financial profit by doing sabotage to the destruction of the data.

Political Hacker
A political activity through a web site to attach a message or discredit an opponent.

Denial of Service Attack
Attack by flooding the huge data and the resulting access to a web site to be very slow or turn into jam or can not be accessed at all.

Viruses
At least 200 new viruses spread through the internet and are usually hidden in a file or an e-mail to be downloaded over a network or the Internet and floppy.

Piracy
Piracy software that eliminates the potential revenue of a company that produced such, games, business applications and other copyright.

Fraud
Activities manipulation of information, especially about finances with a target maximum profits. Examples: making a fake phone card.

Phishing
Techniques for personal information such as e-mail addresses and account numbers by sending an e-mail as if it came from the bank concerned.

Gambling
Many forms of gambling casinos operating on the internet that provide opportunities for organized criminal money laundering everywhere.

Cyber ​​Stalking
Constitute any form of e-mail submissions unwanted acceptance and includes measures of coercion.

With the existence of this law, the owner of a work does not have to worry again about the violation on the virtual world, but it also can not guarantee that their work will not be abused, but with the law could at least minimize the piracy activities existing on the virtual world or internet.