Friday, July 6, 2018

Privacy Policy Prana Sakti : Arsip Ceramah Agama Guru Besar

Privacy Policy

Effective date: July 06, 2018
Prana Sakti : Arsip Ceramah Agama Guru Besar ("us", "we", or "our") operates the website and the Prana Sakti : Arsip Ceramah Agama Guru Besar mobile application (the "Service").
This page informs you of our policies regarding the collection, use, and disclosure of personal data when you use our Service and the choices you have associated with that data. This Privacy Policy for Prana Sakti : Arsip Ceramah Agama Guru Besar is powered by FreePrivacyPolicy.com.

We use your data to provide and improve the Service. By using the Service, you agree to the collection and use of information in accordance with this policy. Unless otherwise defined in this Privacy Policy, terms used in this Privacy Policy have the same meanings as in our Terms and Conditions.

Information Collection And Use

We collect several different types of information for various purposes to provide and improve our Service to you.

Types of Data Collected

Personal Data

While using our Service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you ("Personal Data"). Personally identifiable information may include, but is not limited to:
  • Cookies and Usage Data

Usage Data

We may also collect information that your browser sends whenever you visit our Service or when you access the Service by or through a mobile device ("Usage Data").

This Usage Data may include information such as your computer's Internet Protocol address (e.g. IP address), browser type, browser version, the pages of our Service that you visit, the time and date of your visit, the time spent on those pages, unique device identifiers and other diagnostic data.

When you access the Service by or through a mobile device, this Usage Data may include information such as the type of mobile device you use, your mobile device unique ID, the IP address of your mobile device, your mobile operating system, the type of mobile Internet browser you use, unique device identifiers and other diagnostic data.

Tracking & Cookies Data

We use cookies and similar tracking technologies to track the activity on our Service and hold certain information.

Cookies are files with small amount of data which may include an anonymous unique identifier. Cookies are sent to your browser from a website and stored on your device. Tracking technologies also used are beacons, tags, and scripts to collect and track information and to improve and analyze our Service.

You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Service.
Examples of Cookies we use:
  • Session Cookies. We use Session Cookies to operate our Service.
  • Preference Cookies. We use Preference Cookies to remember your preferences and various settings.
  • Security Cookies. We use Security Cookies for security purposes.

Use of Data

Prana Sakti : Arsip Ceramah Agama Guru Besar uses the collected data for various purposes:
  • To provide and maintain the Service
  • To notify you about changes to our Service
  • To allow you to participate in interactive features of our Service when you choose to do so
  • To provide customer care and support
  • To provide analysis or valuable information so that we can improve the Service
  • To monitor the usage of the Service
  • To detect, prevent and address technical issues

Transfer Of Data

Your information, including Personal Data, may be transferred to — and maintained on — computers located outside of your state, province, country or other governmental jurisdiction where the data protection laws may differ than those from your jurisdiction.

If you are located outside Indonesia and choose to provide information to us, please note that we transfer the data, including Personal Data, to Indonesia and process it there.

Your consent to this Privacy Policy followed by your submission of such information represents your agreement to that transfer.

Prana Sakti : Arsip Ceramah Agama Guru Besar will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of your data and other personal information.

Disclosure Of Data

Legal Requirements

Prana Sakti : Arsip Ceramah Agama Guru Besar may disclose your Personal Data in the good faith belief that such action is necessary to:
  • To comply with a legal obligation
  • To protect and defend the rights or property of Prana Sakti : Arsip Ceramah Agama Guru Besar
  • To prevent or investigate possible wrongdoing in connection with the Service
  • To protect the personal safety of users of the Service or the public
  • To protect against legal liability

Security Of Data

The security of your data is important to us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your Personal Data, we cannot guarantee its absolute security.

Service Providers

We may employ third party companies and individuals to facilitate our Service ("Service Providers"), to provide the Service on our behalf, to perform Service-related services or to assist us in analyzing how our Service is used.

These third parties have access to your Personal Data only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.

Links To Other Sites

Our Service may contain links to other sites that are not operated by us. If you click on a third party link, you will be directed to that third party's site. We strongly advise you to review the Privacy Policy of every site you visit.

We have no control over and assume no responsibility for the content, privacy policies or practices of any third party sites or services.

Children's Privacy

Our Service does not address anyone under the age of 18 ("Children").
We do not knowingly collect personally identifiable information from anyone under the age of 18. If you are a parent or guardian and you are aware that your Children has provided us with Personal Data, please contact us. If we become aware that we have collected Personal Data from children without verification of parental consent, we take steps to remove that information from our servers.

Changes To This Privacy Policy

We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page.

We will let you know via email and/or a prominent notice on our Service, prior to the change becoming effective and update the "effective date" at the top of this Privacy Policy.

You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.

Contact Us

If you have any questions about this Privacy Policy, please contact us:
  • By email: armansyah.skom.mpd@gmail.com

Thursday, July 5, 2018

Privacy Policy Hukum Anjing Menurut Islam

Privacy Policy Hukum Anjing Menurut Islam

Effective date: July 05, 2018
Hukum Anjing Menurut Islam ("us", "we", or "our") operates the website and the Hukum Anjing Menurut Islam mobile application (the "Service").
This page informs you of our policies regarding the collection, use, and disclosure of personal data when you use our Service and the choices you have associated with that data. This Privacy Policy for Hukum Anjing Menurut Islam is powered by FreePrivacyPolicy.com.
We use your data to provide and improve the Service. By using the Service, you agree to the collection and use of information in accordance with this policy. Unless otherwise defined in this Privacy Policy, terms used in this Privacy Policy have the same meanings as in our Terms and Conditions.

Information Collection And Use

We collect several different types of information for various purposes to provide and improve our Service to you.

Types of Data Collected

Personal Data

While using our Service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you ("Personal Data"). Personally identifiable information may include, but is not limited to:
  • Cookies and Usage Data

Usage Data

We may also collect information that your browser sends whenever you visit our Service or when you access the Service by or through a mobile device ("Usage Data").
This Usage Data may include information such as your computer's Internet Protocol address (e.g. IP address), browser type, browser version, the pages of our Service that you visit, the time and date of your visit, the time spent on those pages, unique device identifiers and other diagnostic data.
When you access the Service by or through a mobile device, this Usage Data may include information such as the type of mobile device you use, your mobile device unique ID, the IP address of your mobile device, your mobile operating system, the type of mobile Internet browser you use, unique device identifiers and other diagnostic data.

Tracking & Cookies Data

We use cookies and similar tracking technologies to track the activity on our Service and hold certain information.
Cookies are files with small amount of data which may include an anonymous unique identifier. Cookies are sent to your browser from a website and stored on your device. Tracking technologies also used are beacons, tags, and scripts to collect and track information and to improve and analyze our Service.
You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Service.
Examples of Cookies we use:
  • Session Cookies. We use Session Cookies to operate our Service.
  • Preference Cookies. We use Preference Cookies to remember your preferences and various settings.
  • Security Cookies. We use Security Cookies for security purposes.

Use of Data

Hukum Anjing Menurut Islam uses the collected data for various purposes:
  • To provide and maintain the Service
  • To notify you about changes to our Service
  • To allow you to participate in interactive features of our Service when you choose to do so
  • To provide customer care and support
  • To provide analysis or valuable information so that we can improve the Service
  • To monitor the usage of the Service
  • To detect, prevent and address technical issues

Transfer Of Data

Your information, including Personal Data, may be transferred to — and maintained on — computers located outside of your state, province, country or other governmental jurisdiction where the data protection laws may differ than those from your jurisdiction.
If you are located outside Indonesia and choose to provide information to us, please note that we transfer the data, including Personal Data, to Indonesia and process it there.
Your consent to this Privacy Policy followed by your submission of such information represents your agreement to that transfer.
Hukum Anjing Menurut Islam will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of your data and other personal information.

Disclosure Of Data

Legal Requirements

Hukum Anjing Menurut Islam may disclose your Personal Data in the good faith belief that such action is necessary to:
  • To comply with a legal obligation
  • To protect and defend the rights or property of Hukum Anjing Menurut Islam
  • To prevent or investigate possible wrongdoing in connection with the Service
  • To protect the personal safety of users of the Service or the public
  • To protect against legal liability

Security Of Data

The security of your data is important to us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your Personal Data, we cannot guarantee its absolute security.

Service Providers

We may employ third party companies and individuals to facilitate our Service ("Service Providers"), to provide the Service on our behalf, to perform Service-related services or to assist us in analyzing how our Service is used.
These third parties have access to your Personal Data only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.

Links To Other Sites

Our Service may contain links to other sites that are not operated by us. If you click on a third party link, you will be directed to that third party's site. We strongly advise you to review the Privacy Policy of every site you visit.
We have no control over and assume no responsibility for the content, privacy policies or practices of any third party sites or services.

Children's Privacy

Our Service does not address anyone under the age of 18 ("Children").
We do not knowingly collect personally identifiable information from anyone under the age of 18. If you are a parent or guardian and you are aware that your Children has provided us with Personal Data, please contact us. If we become aware that we have collected Personal Data from children without verification of parental consent, we take steps to remove that information from our servers.

Changes To This Privacy Policy

We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page.
We will let you know via email and/or a prominent notice on our Service, prior to the change becoming effective and update the "effective date" at the top of this Privacy Policy.
You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.

Contact Us

If you have any questions about this Privacy Policy, please contact us:
  • By email: armansyah.skom.mpd@gmail.com

Tuesday, July 3, 2018

Privacy Policy

Privacy Policy

Effective date: July 04, 2018
Rekonstruksi Sejarah Nabi Isa ("us", "we", or "our") operates the website and the Rekonstruksi Sejarah Nabi Isa mobile application (the "Service").

This page informs you of our policies regarding the collection, use, and disclosure of personal data when you use our Service and the choices you have associated with that data. This Privacy Policy for Rekonstruksi Sejarah Nabi Isa is powered by FreePrivacyPolicy.com.

We use your data to provide and improve the Service. By using the Service, you agree to the collection and use of information in accordance with this policy. Unless otherwise defined in this Privacy Policy, terms used in this Privacy Policy have the same meanings as in our Terms and Conditions.

Information Collection And Use

We collect several different types of information for various purposes to provide and improve our Service to you.

Types of Data Collected

Personal Data

While using our Service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you ("Personal Data"). Personally identifiable information may include, but is not limited to:
  • Cookies and Usage Data

Usage Data

We may also collect information that your browser sends whenever you visit our Service or when you access the Service by or through a mobile device ("Usage Data").
This Usage Data may include information such as your computer's Internet Protocol address (e.g. IP address), browser type, browser version, the pages of our Service that you visit, the time and date of your visit, the time spent on those pages, unique device identifiers and other diagnostic data.
When you access the Service by or through a mobile device, this Usage Data may include information such as the type of mobile device you use, your mobile device unique ID, the IP address of your mobile device, your mobile operating system, the type of mobile Internet browser you use, unique device identifiers and other diagnostic data.

Tracking & Cookies Data

We use cookies and similar tracking technologies to track the activity on our Service and hold certain information.
Cookies are files with small amount of data which may include an anonymous unique identifier. Cookies are sent to your browser from a website and stored on your device. Tracking technologies also used are beacons, tags, and scripts to collect and track information and to improve and analyze our Service.
You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Service.
Examples of Cookies we use:
  • Session Cookies. We use Session Cookies to operate our Service.
  • Preference Cookies. We use Preference Cookies to remember your preferences and various settings.
  • Security Cookies. We use Security Cookies for security purposes.

Use of Data

Rekonstruksi Sejarah Nabi Isa uses the collected data for various purposes:
  • To provide and maintain the Service
  • To notify you about changes to our Service
  • To allow you to participate in interactive features of our Service when you choose to do so
  • To provide customer care and support
  • To provide analysis or valuable information so that we can improve the Service
  • To monitor the usage of the Service
  • To detect, prevent and address technical issues

Transfer Of Data

Your information, including Personal Data, may be transferred to — and maintained on — computers located outside of your state, province, country or other governmental jurisdiction where the data protection laws may differ than those from your jurisdiction.
If you are located outside Indonesia and choose to provide information to us, please note that we transfer the data, including Personal Data, to Indonesia and process it there.
Your consent to this Privacy Policy followed by your submission of such information represents your agreement to that transfer.
Rekonstruksi Sejarah Nabi Isa will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of your data and other personal information.

Disclosure Of Data

Legal Requirements

Rekonstruksi Sejarah Nabi Isa may disclose your Personal Data in the good faith belief that such action is necessary to:
  • To comply with a legal obligation
  • To protect and defend the rights or property of Rekonstruksi Sejarah Nabi Isa
  • To prevent or investigate possible wrongdoing in connection with the Service
  • To protect the personal safety of users of the Service or the public
  • To protect against legal liability

Security Of Data

The security of your data is important to us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your Personal Data, we cannot guarantee its absolute security.

Service Providers

We may employ third party companies and individuals to facilitate our Service ("Service Providers"), to provide the Service on our behalf, to perform Service-related services or to assist us in analyzing how our Service is used.
These third parties have access to your Personal Data only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.

Links To Other Sites

Our Service may contain links to other sites that are not operated by us. If you click on a third party link, you will be directed to that third party's site. We strongly advise you to review the Privacy Policy of every site you visit.
We have no control over and assume no responsibility for the content, privacy policies or practices of any third party sites or services.

Children's Privacy

Our Service does not address anyone under the age of 18 ("Children").
We do not knowingly collect personally identifiable information from anyone under the age of 18. If you are a parent or guardian and you are aware that your Children has provided us with Personal Data, please contact us. If we become aware that we have collected Personal Data from children without verification of parental consent, we take steps to remove that information from our servers.

Changes To This Privacy Policy

We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page.
We will let you know via email and/or a prominent notice on our Service, prior to the change becoming effective and update the "effective date" at the top of this Privacy Policy.
You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.

Contact Us

If you have any questions about this Privacy Policy, please contact us:
  • By email: armansyah.skom.mpd@gmail.com

Tuesday, January 9, 2018

Mengenal API Vision (auto deteksi image dimedia sosial)

Didalam ilmu computer programming ada istilah API, singkatan dari Application Programming Interface. Secara sederhana arti dan fungsi dari API ini adalah sekumpulan perintah, fungsi, komponen, dan protokol dalam bentuk koding-koding pemrograman yang memudahkan proses kerja suatu aplikasi.

API ini biasanya berisi alghoritma terstruktur yang lengkap dan berjalan dibelakang layar. Kita sebagai user tak tahu apapun tentang API ini. Pokoknya kita tinggal klik-klik mouse, sentuh-sentuh layar atau ketik sana sini selesai. Sisanya apa yang ada dibalik layar (behind the scene), itulah yang dikerjakan oleh sistem dengan API-nya.

Bisa dikatakan semua aplikasi komputer yang beredar dijagad informatika pasti memiliki API-nya masing-masing. Sebab eksistensi API adalah mutlak untuk memudahkan kerja si programmer dan user dalam berinteraksi dengan aplikasi.

Facebook punya API, Instagram punya API, Youtube punya API, Google punya API, Twitter punya API, PATH punya API, General Ledger, Aplikasi Absensi Fingerscan dan lain-lain.... semua pasti punya APInya sendiri.

Yuk sekarang saya ajak anda melihat contoh langsung penggunaan API ini dalam kasus-kasus yang sering terjadi.

Google, untuk tujuan komersial, telah membuka kepada publik salah satu API mereka yang dinamai Vision API. Adapun fungsi dan cara kerja dari Vision API Google tersebut disebut dalam web officialnya : to understand the content of an image by encapsulating powerful machine learning models. It quickly classifies images into thousands of categories (e.g., "sailboat", "lion", "Eiffel Tower"), detects individual objects and faces within images, and finds and reads printed words contained within images.

Easily detect broad sets of objects in your images, from flowers, animals, or transportation to thousands of other object categories commonly found within images. Vision API improves over time as new concepts are introduced and accuracy is improved. (https://cloud.google.com/vision/)

Intinya, Vision API yang ditawarkan oleh Google ini mampu mengidentifikasikan sebuah gambar, foto atau image apapun kedalam klasifikasi tertentu sesuai apa yang terdapat didalam gambar itu sendiri.

Misalnya, anda upload foto berdua pasangan anda. Nah, Vision API akan langsung tahu disana adalah foto dua orang manusia. Bahkan secara lebih detil akan di identifikasikan apakah anda mengenakan topi alias penutup rambut atau tidak, apakah anda berkumis atau tidak dan seterusnya. Bahkan apakah didalam image ini ada hewan, ada gunung, ada kapal dan sebagainya akan mampu dikenali oleh Vision API. MasyaAllah.

Jika anda sering nonton film-film Science Fiction dan juga Police Action yang mempertunjukkan adegan bagaimana polisi mengenali dan mencari presisi wajah seseorang menggunakan komputer sampai muncul output orang itu adalah si A, si B ... nah inilah API-nya kurang dan lebih didalam praktek nyata.

Itulah contoh algorithma yang pernah kita bahas pada status saya terdahulu.

Jadi jangan heran bila begitu anda mengupload sebuah gambar/image lalu saat itu juga facebook atau instagram akan langsung dapat mengidentifikasikan image apa yang anda upload ini. Jualankah? Meme bullyingkah? dan sebagainya. Termasuk apakah didalam image itu ada kata-kata tertentu yang masuk dalam daftar hitam mereka (misal lgbt, fpi, cebong dan lain-lain).

Manakala image yang kita upload itu dianggap match dengan data didalam database yang mereka simpan, image yang sudah anda upload akan langsung di banned bahkan akun anda dapat secara otomatis diblokir oleh sistem. (Saya bilang oleh sistem ya, jadi otomatis, tidak ada campur tangan operator manusianya disini).

Skema algorithma yang mirip-mirip juga diterapkan oleh youtube dalam mengidentifikasikan sebuah video mengandung content berhak cipta dan sejenisnya sehingga sistem youtube akan langsung otomatis mengenali video kita itu terdapat musik dari si A, diproduksi oleh studio rekaman ABC dan lain-lain.

So, hati-hati dalam bermedia sosial saat ini. Cerdas dan ariflah. Kita tidak hanya berhadapan dengan manusia-manusia jahat yang selalu mengintai-intai status dan image kita tetapi juga berhadapan dengan sistem yang memiliki algorithma canggih, ibaratnya kita berhadapan dengan cyborg maya. API model ini juga yang sangat saya yakini dibenamkan dalam mesin 2T yang heboh itu.

Armansyah
Dosen & Praktisi IT
Ditulis di Bumi Palembang Darussalam, 08 Jan 2018.





Mengenal enkripsi (panduan untuk mca)

Didalam dunia pemrograman, ada istilah enkripsi yang secara bebas dapat diterjemahkan sebagai metode pengacakan. Apa yang diacak? Jelas teks, entah berupa kata atau kalimat. Baik dia ditulis dengan format alphabet maupun alphanumeric (gabungan alphabet dengan angka dan symbols).

Bila anda menulis "Tiada Tuhan Kecuali Allah" nah dengan metode enkripsi, kata-kata tersebut dapat saja berubah menjadi " !ibmmB!jmbvdfL!obivU!bebjU "

Dapatkah anda membaca teks " !ibmmB!jmbvdfL!obivU!bebjU " ? tentu tidak... sekeras apapun anda berupaya memutar balikkan teks itu dengan teori probabilitas tetap tak akan dapat memecahkan kodenya.

Nah untuk bisa membacanya maka anda perlu melakukan proses dekripsi atau restorisasi pengacakan dengan algorithma yang sama juga sehingga teks " !ibmmB!jmbvdfL!obivU!bebjU " akan dikembalikan kestruktur asalnya menjadi "Tiada Tuhan Kecuali Allah"

Formulanya harus sama.

Inilah yang sebenarnya terjadi pada proses percakapan di WhatsApp dan sebagian besar aplikasi chat lainnya. Hanya saja tingkatan enkripsi ini luas dan berjenjang. Apa yang tadi saya contohkan hanya bentuk sederhananya saja.

Secara klasik cara-cara begini digunakan pada sandi morse dan sandi pramuka. Hayo, yang SD-nya dulu ikut pramuka pasti ingat khan?

Metode enkripsi ini tentu akan efektif bila ditulis sebagai posting di media sosial. Tak sembarang orang dapat membacanya. Bahkan tidak pula mesin yang bernilai 2T. Tulisan yang sudah di enkripsi menjadi tak ubahnya seperti coretan yang tak berguna, ketikan asal dari anak kecil yang tak sengaja memainkan gadget ayahnya atau rapalan mantera-mantera dalam komik-komik.

Cuma ya itu tadi, si penerima informasi harus punya formula dekripsinya agar teks yang acak tadi dapat dikembalikan menjadi informasi. Repot. Apalagi bila sifatnya publik tertentu. Setiap orang harus copy paste ke mesin atau perangkat lunak dekripsinya masing-masing untuk dapat membaca informasi yang diteruskan oleh membernya.





Contoh program enkripsi dan dekripsi



Olehnya anak-anak IT sering bergurau dan membuat formula asal sehingga kesannya teks telah di enkripsi guna menyulitkan orang membacanya (dan dalam hal ini dianggap mampu mengelabui mesin 2T maupun fitur algorithma media sosial). Misalnya kata-kata FPI dirubah jadi eFP3i, Islam menjadi i5L4m.

Sebagai seorang programmer, saya tidak melihat ini efektif. No at all. Mereka bisa mempelajarinya dan kemudian memasukkan pola ini kedalam database filter yang mereka punya sehingga next time kata-kata seperti ini muncul akan langsung dapat dikenali. Piece of cake. Too easy. Bukan solusi. Cuma bikin mules. Xoxoxo

Sudah InsyaAllah ntar kita lanjut lagi ya... pelan-pelan. Take a breath.

Armansyah
Bumi Palembang Darussalam, 08 Jan 2018

Mengenal cara kerja media sosial (panduan untuk mca)

Jadi begini... pernahkah anda memposting sebuah item tertentu yang akan dijual di facebook lalu dalam waktu sepersekian milidetik facebook secara otomatis menandai posting anda sebagai posting jualan? Begitu juga ketika kita memposting suatu status mengandung kata-kata yang "dianggap" menyalahi aturan facebook lalu status kita itu dianggap spam dan tak bisa diposting di timeline? Padahal mungkin buat kita kata-kata itu sah-sah saja dan sesuai norma keagamaan maupun konstitusi dinegara kita, misalnya tag 3LG38T (baca : perilaku jahannam kaum Nabi Luth).

Dilain kesempatan anda mungkin pernah pula memposting sebuah video yang mengandung content musik dari artis tertentu dan youtube otomatis mengetahui apa nama musik tersebut, siapa artisnya serta apa nama studio rekamannya. Anda selanjutnya dianggap oleh youtube telah melanggar copyright. Semuanya lagi-lagi hanya dalam waktu sepersekian milidetik pasca ia kita upload.

Terakhir, di Instagram. Kita upload meme tertentu eh IG pun mendadak tahu meme apa itu. Jika dianggap gambar itu memiliki sesuatu yang dianggap melanggar peraturannya maka seperti youtube dan facebook, posting anda inipun akan di banned.

So bagaimana facebook, youtube dan instagram tahu apa yang kita upload dalam tempo yang sangat singkat? Taklah mungkin dibalik layarnya duduk para operator masing-masing media sosial nongkrongin akun-akun yang berjumlah jutaan manusia tersebut, khan? logika sajalah.

Seluruh cases ini didalam ilmu informatika, wabil khusus ilmu pemrograman komputer dikenali dengan algorithma. Yaitu skema tertsruktur tertentu yang telah didesain sedemikian rupa alurnya sehingga dapat digunakan untuk memecahkan persoalan yang dihadapi oleh manusia. Algorithma inilah yang nantinya setelah dipadukan dengan koding-koding bahasa pemrograman lalu ditanamkan kedalam chip dapat membuat sebuah mesin seolah memiliki kecerdasan buatan (Artifficial Intelligence alias AI).

Itulah yang digunakan oleh Facebook, Instagram dan Youtube. Ini juga yang ada dibalik mesin 2T yang sekarang sedang heboh.

Didalamnya juga sudah dipasang filter kata yang nantinya akan disimpan kedalam database tertentu sehingga manakala sebuah posting ditemukan match dengan kata-kata didalam database tersebut, mesin ini secara otomatis menandainya sebagai sebuah pelanggaran rules of the game mereka.

Kami para programmer sudah tak asing dengan permodelan klasik kata-kata ini. Secara prinsipnya pola kerja pemfilteran ini sama seperti anda mengetikkan suatu keywords di google, yahoo dan bing. Setelah anda tekan enter, kata yang anda input dikolom pencarian akan segera diproses oleh koding pemrograman yang telah dibekali algorithma bagus sehingga apapun temuan didatabase mereka yang mendekati apalagi persis sama dari keyword anda tadi akan langsung ditampilkan.

Lantas apakah tak ada cara untuk menghindari hal demikian?

Tenang... kami di dunia komputer selalu punya prinsip diatas langit selalu ada langit. Selama teknologi itu ciptaan manusia, tentu ada sisi lemahnya. Tinggal lagi how to find it.

Tentu anda sudah faham pula bila didunia perkomputeran ada yang disebut virus dan anti virus. Nah, sekuat apapun algorithma yang ada dalam sebuah anti virus, si programmer jahat akan terus mencari sisi lemahnya sehingga virus yang ia buat dapat mengelabui anti virus tadi. Makanya dijagad software akan anda temui ratusan anti virus dari berbagai vendor termasuk anti virus lokal. Kenapa? sebab setiap anti virus punya keterbatasan algorithma. Terkadang anti virus A tidak mampu mengenali virus X, anti virus B bisa namun tak mampu membersihkan virus tadi. Eh anti virus C bisa mengenali dan bisa membersihkannya.

Again... keterbatasan algorithma. Sisi lemah si programmer.

Lalu kembali lagi pada kasus mesin 2T.... hehehe, saya menyebutnya sami mawon. Tak ada ciptaan manusia yang sempurna. InsyaAllah kedepan kita coba bahas dan explore ini one by one ya.

Tetap setia pantengin status-status saya. Termasuk iklan komersial herbalnya, travelnya dan lain-lain ya hahaha.... namanya juga usaha.

Bumi Palembang Darussalam,
08 Januari 2018

Armansyah, S.Kom, M.Pd
Dosen & Praktisi IT

Wednesday, November 22, 2017

Dajjal (Revisi Catatan Kekinian)

Dalam teologi Islam khususnya berkenaan dengan nubuat akhir jaman, --meski tak ada dalam satu ayat al-Qur'anpun-- terdapat informasi tentang kedatangan Dajjal. Hadist-hadist yang bercerita mengenai ini jumlahnya cukup banyak dan redaksinya bervariatif.

Eksistensi Dajjal tersebut cukup sering dipahami dalam bentuk dan wujud makhluk tertentu yang bermata satu (bahkan entah dapat darimana pula referensinya, kadang ilustrasinya ada yang ditambah dua tanduk dikepalanya). Selain bermata satu, Dajjal digambarkan memilki kekuatan supernatural dimana ia mampu mengelabui pandangan orang sehingga api terlihat bagaikan air dan air terlihat bagaikan api.

Dajjal mampu menghidupkan orang mati, mematikan orang hidup, menyuburkan pedataran yang tandus dan sejumlah hal-hal yang disifati adikodrati lainnya.

Sepintas lalu bila kita mengabaikan pemahamannya secara kritis, maka tidaklah heran membaca hadist-hadist terkait Dajjal pasti langsung mengimajinasikannya kedalam bentuk wujud makhluk tertentu. Apalagi bila membaca rujukan tambahan terkait kedatangan Imam Al-Mahdi dan juga Nabi 'Isa al-Masih, tak ayal imaginasi sering mengantarkan ilustrasi kedalam dua sosok superhero bertempur melawan seekor monster yang ganas nan hebat.

Namun benarkah Dajjal ini adalah berupa sosok makhluk individual tertentu layaknya monster Doomsday dalam film Batman V Superman? Atau bak monster-monster dalam film-filmnya Ultraman hingga Megaloman?





Saya tidak melihatnya demikian.

Bahasa al-Qur'an dan Hadist terkadang banyak yang bersifat metafora. Berbentuk kiasan. Termasuk dalam hal Dajjal ini. Saya lebih menafsirkannya sebagai sebuah sistem yang diterapkan secara tidak adil khususnya terhadap komunitas Islam (bisa terhadap sebuah negara Islam maupun orang per-orangnya dari kaum Muslimin). Kepincangan cara pandang itulah yang disifati dalam inisial satu mata. Siapapun bisa melihatnya meski ia buta huruf sekalipun.

Akibat ketidak adilan ini maka siapapun yang memandang sistem tersebut akan dapat dengan mudah mengetahui bila ia merupakan suatu tatanan anti agama, anti kebenaran dan pastinya anti terhadap Islam. Disinilah penyifatan kata kafir pada kening Dajjal dalam berbagai hadist yang tersiar.

Sistem anti Islam ini dapat memanipulasi data dengan semua perangkat hukum, teknologi serta kekuasaan yang mereka miliki sehingga apa yang benar menjadi terlihat batil, sebaliknya sesuatu yang batil terlihat sebagai kebenaran.

Banyak orang terkecoh dengan rekayasa tersebut sehingga mereka menjatuhkan dirinya kedalam nilai-nilai tidak benar, bergabung dalam barisan kelompok kebatilan, kelompok penista agama, kelompok anti Islam sementara beberapa dari mereka masih berpikir bila pilihan sikapnya itu justru ada diatas jalan Tuhan. Ketika ayat-ayat al-Qur'an yang berupa hukum muhkamat dipelintir oleh kelompoknya sehingga menimbulkan gerakan perlawanan dari pejuang-pejuang kebenaran, dari para ulama, para ahli ilmu, mereka (yaitu orang-orang tadi) justru berada bersama barisan orang-orang yang menistakan al-Qur'an. Mereka mencemooh para pendekar kebenaran sebagai orang-orang tak ada kerjaan, orang-orang ekstrim, teroris dan berbagai sebutan penistaan lainnya.

Inilah api yang terlihat bagaikan air sementara mereka justru menghindar dari air yang sesungguhnya, yaitu air kebenaran.

Siapa yang mengingkari sistem ini bersiaplah untuk berhadapan secara frontal dengan budak-budak Dajjal yang menjadi operator misinya. Fitnah akan dihembuskan dengan sejuta satu pembenaran, baik berupa video, audio hingga kesaksian-kesaksian verbal. Pendeknya dijebak oleh sebuah permainan konspirasi tingkat tinggi. Bila dia negara Islam maka artinya dia siap untuk di invasi secara militer, di embargo secara ekonomi bahkan pimpinannya harus siap pula untuk ditembak mati atau diturunkan secara paksa seperti nasib Presiden Mursi di Mesir, Saddam Husain di Irak, Moammar Qhadafi di Libya hingga Erdogan di di Turki. Bila jalan-jalan ini tidak dimungkinkan untuk terjadi maka mempengaruhi orang-orang terdekat yang berkuasa menjadi pilihan. Ujungnya semua lawan politik ditangkap dengan tuduhan ini dan itu serta cepat maupun lambat kekuasaan berhasil diraih secara otoriter.

Rekayasa teknologi saat ini mampu menghadirkan cuaca buatan sampai tsunami palsu yang menghancurkan. Daerah yang kering dan tandus dapat "disulap" dengan perangkat teknologi menjadi penuh buah, subur, dingin... ibaratnya mereka menciptakan heaven in hell.

Armansyah, 22 Nop 2017
Ditulis ulang dengan beberapa perbaikan redaksi dan konteks politik kekinian dari tulisan-tulisan lawas pribadi tahun 2007a