iADA : Best Practice On Alumni Web Based Information System
Main Article Content
Abstract
Advances in information technology and the rapid pace of development in all sectors considered highly relevant to the relationship between computers. So spur of information technology to transform follow any changes that occur, due to the increasing needs of a growing. To some extent, there are still problems to deal with at the moment, including information regarding student alumni data are quite hard to come by society and the entire academic community colleges, thus inhibiting the activities and some decision-making. Therefore, the making of an application system that appropriate and accurate information is highly recommended. With online methods based systems, information systems alumni data will be very easy to obtain. The iADA is an information system based alumni data online are very practical. In this article describe the issues that arise as well as solving the problems examined. In addition there are three (3) characteristics and 7 (seven) advantage of this application, and the benefits of the method flowchart iADA. Featured listings on its implementation of programs written using ASP scripts. It can be concluded that the contribution of the system to maximize iADA various forms of service, and can be used as a medium of information that is valid for the entire academic community colleges and the general public.
Downloads
Article Details
References
[2] Dresang, T. Eliza. “The Information Seeking Behavior of Youth in the Digital Environment”. University of Illinois : USA, 2005.
[3] K. Barnard. “Learning The Semntics of Words And Pictures”, Comput Div. Computer Vision, Pages : 408-415 Vol. 2. University of California : Berkeley, 2001.
[4] Z. M. Teddy, Fandi. “Aplikasi Presensi Via PDA dengan Konektivitas Melalui Jaringan WiFi”. Jurnal Informatika Vol. 4 No. 1. Fakultas Teknologi Informasi Universitas Kristen Maranatha Jurusan Teknik Informatika, Bandung : Indonesia, 2008.
[5] R. Untung, Y. Muhamad, A. Lilik. “Pengontrolan Mutu Sistem Informasi denganMetode Database Health Monitoring” Pages : 214-230 CCIT Journal Vol. 2 No. 3. Perguruan Tinggi Raharja : Indonesia, 2009.
[6] R. Untung, Y. Muhamad, R. Eva. “Optimalisasi Key Performance Indicators (KPI) Melalui Pendekatan Balance Scorecard Upaya Mengimplementasikan Performance Management System (PMS) Pada Perguruan Tinggi”. CCIT Journal ISSN : Vol. 6 No 2. Perguruan Tinggi Raharja : Indonesia, 2012.
[7] R. Untung, W. B. Ary, S. Nurul Dini. “Penerapan Aplikasi iDINI sebagai Media Penyimpanan Materi Perkuliahan iLearning Pada Perguruan Tinggi”. CCIT Journal ISSN : Vol. 6 No. 5. Perguruan Tinggi Raharja : Indonesia, 2012.
[8] R. Untung, G. Suryo, S. Valent. “Access Restriction Sebagai Bentuk Pengamanan Dengan Metode IP Token”. CCIT Journal ISSN : 1978-8282 Vol. 1 No. 3. Perguruan Tinggi Raharja : Indonesia, 2008.
[9] R. Untung, M. F. Dina, C. Siti. “Periodic Historical System Sebagai Evaluasi Strategis Dalam Mendukung Pengambilan Keputusan Manajemen”. CCIT Journal ISSN : 19788282 Vol. 1 No. 2. Perguruan Tinggi Raharja : Indonesia, 2008.
[10] P. T. Kuntoro, R. Untung dan C. Siti. “Pengontrolan Mutu Sistem Informasi DenganMetode Database Self Monitoring” CCIT Journal ISSN : 1978-8282 Vol. 1 No. 3. Perguruan Tinggi Raharja : Indonesia, 2008.
[11] R. Untung, Maimunah, Hidayati. “Metode Pencarian Data dengan MenggunakanIntelligence Auto Find System (IAFS)”. CCIT Journal ISSN : 1978-8282 Vol. 1 No. 1. Perguruan Tinggi Raharja : Indonesia, 2007.
[12] R. Untung, N. Mia, Hidayati. “Peningkatan Kinerja Distributed Database Melalui Methode DMQ Base Level”. CCIT Journal ISSN : 1978-8282 Vol. 4 No. 3. Perguruan Tinggi Raharja : Indonesia, 2010.
[13] K. Ismi. “Kajian IT Governance Untuk Peningkatan Produktivitas OperasionalPelayanan Publik”. Jurnal CCIT ISSN Vol. 6 No.4. Perguruan Tinggi Raharja : Indonesia, 2012.