Software Arsip Digital Life

HP ENVY 4520 Wireless Setup, Driver, and Manual - HP ENVY 4520 All-in-One Printer, Do extra with an economical HP ENVY all-in-one-- the ideal suit for your technology. Conserve up to 50% on ink with HP Instant Ink, as well as enjoy the most convenient way to print from your mobile phone or tablet computer. Get wireless printing and also lab-quality pictures. HP Picture and File All-in-One Printers are created for households as well as other residence users that want a tool efficient in printing whatever from documents, e-mail and websites to rich, bright lab-quality photos - with copy and scan devices as well.

You can manage to be imaginative with HP Instant Ink Save up to 50% on ink and also never ever go out. Print lab-quality photos at home for pennies. Loaded with value. Print up to two times as numerous web pages or pictures with Initial HP high-yield ink cartridges. Obtain high-quality prints-- time and again-- with an all-in-one designed as well as constructed to be reliable. Easy photo printing from your smart phone Manage printing tasks and scan on the move with the complimentary HP All-in-One Printer Remote mobile app.

Your tool, your option. Quickly print records as well as images from a range of mobile phones and also tablet computers. Start printing as well as get linked promptly with very easy setup from your smartphone, tablet, or COMPUTER. Connect your smartphone or tablet computer directly to your printer-- and quickly print without accessing a network. Whatever you have to produce Print from another location without worries.

Tracking for Free Phone New Mobile on Hack Software Another If I Hack Another Persons Phone? She writes the weekly Get Organized column, with tips on how to lead a better digital life. Is there another 7 ways to spy friends snapchat account and password PhoneSheriff SMS Tracking Software. Sure enough, the apps I.

Software Arsip Digital Life

The auto-deploying output tray keeps your web pages from landing on the floor. Print, scan, or copy rapidly as well as conveniently with the 2.2-inch (5.5 centimeters) display-- just touch and go.

Save paper and also conserve sources-- consume to 50% much less paper with very easy, automatic two-sided printing. Print borderless, lab-quality images, laser-quality files, scrapbook pages, and even more-- right in your house. Do a lot more in less space Save your room with a sleek, compact all-in-one designed to fit where you need it. Print in any kind of space you select-- without causing disruptions-- utilizing the optional quiet setting. Fundamentals Standard MFP features for the 4520 are restricted to printing, copying, as well as scanning. Paper handling is additionally limited, with a 100-sheet input tray and also a built-in duplexer as a welcome additional.

That suffices for most residence use, however to change in between ordinary paper and also picture paper, you need to exchange out the paper in the tray every single time. For scanning and duplicating, the flatbed can hold up to letter-size paper. The printer does not provide Ethernet, yet if you attach to your network through Wi-Fi, as well as thinking your network is connected to the Net, you could use the 2.2-inch front-panel touch screen to print from a selection of web sites making use of HP's print apps, with crossword challenges, Disney coloring publication web pages, and also a 7-day food selection coordinator being among the most prominent, according to HP. Mobile printing with a network connection includes printing with the cloud. On top of that, you could print via a Wi-Fi accessibility factor on your network from iOS, Android, Windows, Google Chrome, Amazon.com Kindle, and also Blackberry mobile phones as well as tablets.

If you attach to a solitary COMPUTER through USB cable rather, you won't have the ability to print via the cloud or use the Internet applications, yet you can still connect directly with Wi-Fi Direct to print from a smart phone, as well as you could print an assortment of layouts saved in the printer itself. Choices consist of chart paper, music paper, and-- actually for an MFP that lacks a fax capacity-- fax cover sheets. Setup The 4520 procedures 5 by 17.5 by 14.5 inches (HWD) and also evaluates 11 pounds 15 ounces, making it little enough to conveniently find space for as well as light enough for a single person to removal right into location.

For my examinations, I connected it to a Windows View system using USB cable. HP ENVY 4520 Wireless Setup Physical setup is conventional for an inkjet MFP.

Setting up the software is a little bit different than with most printers, yet HP claims it expects making this strategy standard for its new inkjets. The Beginning Right here directions tell you to head to the HP site where 'HP will certainly direct you via. Your printer setup.'

Nonetheless, similar to the HP Envy 5540 All-in-One Printer ($, stars), the page is a general installation page, rather than one that specifies for the printer, when I attempted searching for the 4520, the site could not locate it. HP states this was just since the printer was not available when I tested it, as well as the website ought to have it by the time you read this. For my examinations, I took the detour of mounting from the distribution disc that includes the printer.

Speed and Quality The 4520's speed for service applications is frustrating at best. I clocked it on our business applications suite (making use of QualityLogic's software and hardware for timing), at an especially slow-moving 1.4 pages each min (ppm). The Brother MFC-J470DW, on the other hand, came in at 4.9 ppm. Even the Epson Expression House XP-420 Small-in-One$ 117.90 at Amazon.com, whose speed I called no more than acceptable for the price in my evaluation, took care of 2.6 ppm. The good news is that the 4520 does better about the competitors for photos, balancing 1 minute 1 secondly for a 4 by 6. That's basically connected with the Sibling MFC-J470DW as well as more than a min quicker compared to the Epson XP-420 Output quality is a mixed bag.

Text top quality is an action below the array that includes most inkjet MFPs, making it significantly substandard. As long as you hardly ever use font styles smaller compared to 8 points, nonetheless, it should not be a trouble. Concerning HP Immediate Ink One last factor to consider that requires mention is running expense.

As with the HP 5540, the 4520 can capitalize on HP's Instantaneous Ink program, which works a little like a cell-phone plan. It lets you print some number of web pages per month for a dealt with cost, charges extra for additional web pages, and limits the variety of pages you can roll over if you don't utilize them. HP ENVY 4520 driver If you sign up for among the Instant Ink strategies-- at $2.99 to $9.99 each month-- instead of purchase cartridges as required, HP asserts that you can reduce your running price in half. Nevertheless, that assumes that you print specifically the number of web pages you spend for. Sign up for the $2.99 strategy and also print the 50 pages you're entitled to, and also you have actually spent about 6 cents per web page. Print two pages, and also you've spent $1.50 each page.

You have the alternative to go off a plan and back on, or button plans, any time-- if you're taking a holiday as an example. But if you fail to remember to opt out when you do not expect to print much, you'll still be paying the full plan rate. Making complex matters additionally, and making running cost contrasts to various other printers nearly difficult, is that web pages under the Instant Ink program are different from pages that companies quote as cartridge yields. When HP, or any other firm, states that a given cartridge will print, say, 100 pages, it's basing the return on a particular photo specified in an ISO/IEC specification. However when HP states that you can print 50 pages per month on the Instant Ink program, it's speaking about literally 50 web pages. Printing a solitary duration on the page counts as a page. So does covering it edge to edge in ink, with two-sided web pages counting as 2.

All this makes it difficult to contrast running prices with the Instantaneous Ink plan to running costs without it. Maintain that in mind, and also think about the cost thoroughly prior to you sign on. One of HP's selling points for Immediate Ink is that the printer keeps track of ink degrees and also automatically orders a lot more ink before you go out, so the brand-new cartridges show up before you require them. Yet if your printing needs vary, so you go some time without printing and afterward print a lot over a day or 2, you can quickly lack ink in one heavy-duty print day and also still end up from ink.

One extra concern is that HP strives to obtain you sign up for Immediate Ink both when you install the printer and also each time you alter ink cartridges, providing your tips on the printer's front-panel LCD. If you do not sign up for one of the Instant Ink strategies, the reminders on the LCD can become a repeating aggravation, although an undoubtedly minor one. REVIEWS THE GOOD The HP Envy 4520 printer makes use of the latest ink distribution modern technologies to lengthen cartridge life as well as potentially conserve you cash via its Immediate Ink shipment solution. It additionally scored well in print speed tests as well as generated high-quality output outcomes. HP ENVY 4520 REVIEW THE NEGATIVE The printer does not have a flash memory card viewers and an Ethernet port for straight networking. The touch display screen could also be complicated to make use of. THE BOTTOM LINE The HP Envy 4520 is a capable all-in-one that incorporates a printer, copier and also scanner with 2 ink shipment options created to alleviate back on expensive ink refills.

Specifications • Print Speed5 6 Black (ISO): Up to 9. Sonnet Suite Pro 13 Crack. 5 ppm; Color (ISO): Up to 6.8 ppm Black (Draft): Up to 20 ppm. • Color (Draft): Up to 16 ppm.

• Print Resolution Black (ideal): Up to 1200 x 1200 made dpi (when printing from a computer system); Color (ideal): Up to 4800 x 1200 enhanced dpi color (when printing from a computer system on selected HP photo documents and also 1200 input dpi). • Print Cartridges Number 2 (1 black, 1 Tri-color [cyan, magenta, yellow]. • Digital Sending Standard • Features: Scan to submit (PDF or JPG), Scan to email (PDF or JPG) as well as Everyday Scan (which is scan to PDF). • Copy Resolution Black (message and graphics): 600 x 300 dpi; 600 x 300 dpi; Color (text and also graphics): 600 x 300 dpi.

• Copier Settings Beginning Black Copy, Begin Color Copy, Variety of Copies, 2-sided, Paper Kind, Resize, ID Card Copy, Lighter/Darker. • Mobile Printing Capacity Features wireless straight and also neighborhood Wi-Fi connectivity to enable mobile printing via HP ePrint, Apple AirPrint ™ in addition to various other solutions; Mopria-certified.

Supports printing from many smart devices and tablet computers utilizing these operating systems: Android, iOS, Blackberry, Symbian, Windows 8, Windows RT as well as Windows 10 Mobile. • Paper Handling Up to 100 sheets; 25-sheet output tray; Duplex Options: Automatic (basic); Envelope Feeder: No; Requirement Paper Trays: 1; Input Capacities: Up to 100 sheets standard; Up to 10 envelopes; Up to 40 cards; Up to 100 sheets lawful; Output Abilities: Up to 25 sheets conventional; Up to 5 Envelopes. • Substitute Cartridges HP 63 Black Ink Cartridge (~ 190 pages); HP 63 Tri-color Ink Cartridge (~ 165 pages); HP 63XL Black Ink Cartridge (~ 480 web pages); HP 63XL Tri-color Ink Cartridge (~ 330 pages). • Power3 Power Supply Type: Built-in Universal Power Supply; Power Demands: 100-240 Vac, 50/60 Hz 0.7 A; Power Intake: Up to 15 watts (Printing), 3.05 watts (Prepared), 0.55 watts (Sleep), 0.13 watts (Off).

• Acoustics Acoustic Power Emissions: Print color, simplex, normal mode, A4 paper 6.1 Bel; Print mono, simplex, typical setting, A4 paper 6.4 Bel; Print color, simplex, peaceful mode, A4 paper 5.5 Bel; Print mono, simplex, silent mode, A4 paper 5.7 Bel; Acoustic Pressure Exhausts: 48 dB(A) color; 51 dB(A) mono. HP ENVY 4520 Wireless Setup: Steps 1: Collect the needed network setup things You have the complying with items before you install the printer on the wireless network: 1.

Gather these items: • Network name: The network name is the SSID (Service Set Identifier). • Network Password: The password may additionally be called the WEP key or WPA protection passphrase. • A computer connected to your wireless network • Web access: HP suggests broadband Web access such as cord or DSL for software downloads, making use of Internet Services, and also getting printer updates. Make sure the router and also computer system are activated, which the system of equipment is connected to the same wireless network to which you wish to link the printer. Steps 2: connects to the wireless network The Wireless Setup Wizard offers a simple method to establish as well as handle the wireless connection to your printer. • On the printer control panel, touch the Right Arrow to present the second navigating screen.

• Hit the setup icon. • Touch Network, Touch Wireless Setup Wizard, then touch Continue. • Hit the name of your network in the checklist of readily available networks, after this touch OK. • If the listing does not have your network name, touch Enter New Network Name, after it follows the on-screen directions to enter your network name.

• If requested, the kind the WEP or WPA key (network password). How to Install the driver: • If your printer is linked to the computer system with a USB cable, unplug the cord from the printer. • If requested, select a method to recognize your printer model, and then adhere to the on-screen instructions to go to the download page. • Click to DOWNLOAD HP Drivers (Full Drivers Recommended). • Follow the Installation Instructions Driver for HP Printer. How to Uninstall the driver: • Go to Control Panel.

• Find dan click uninstall driver HP Printer, • Follow the Uninstall Instructions Driver for HP Printer.

This article needs additional citations for. Unsourced material may be challenged and removed. (June 2009) () A computer file is a for recording discretely in a. Just as words can be written to paper, so can information be written to a computer file. There are different, designed for different purposes. A file may be designed to store a picture, a written message, a, a, or a wide variety of other kinds of data.

Some types of files can store several types of information at once. By using computer programs, a person can open, read, change, and close a computer file. Computer files may be reopened, modified, and copied an arbitrary number of times. Typically, computer files are organised in a, which keeps track of where the files are, and enables people to access them. The twin of an system The word 'file' derives from the Latin filum ('a thread'). 'File' was used publicly in the context of computer storage as early as February 1950: In a (RCA) advertisement in describing a new 'memory' vacuum tube it had developed, RCA stated: 'the results of countless computations can be kept 'on file' and taken out again. Such a 'file' now exists in a 'memory' tube developed at RCA Laboratories.

Electronically it retains figures fed into calculating machines, holds them in storage while it memorizes new ones - speeds intelligent solutions through mazes of mathematics.' In 1952, 'file' denoted, inter alia, information stored on. In early use, the underlying hardware, rather than the contents stored on it, was denominated a 'file'. For example, the disk drives were denominated 'disk files'. The introduction, circa 1961, by the and the MIT of the concept of a ' that managed several virtual 'files' on one storage device is the origin of the contemporary denotation of the word. Although the contemporary ' demonstrates the early concept of files, its use has greatly decreased.

File contents [ ] On most modern, files are organized into one-dimensional arrays of. The of a file is defined by its content since a file is solely a container for data, although, on some platforms the format is usually indicated by its, specifying the rules for how the bytes must be organized and interpreted meaningfully. For example, the bytes of a plain text file (.txt in Windows) are associated with either or characters, while the bytes of image, video, and audio files are interpreted otherwise. Most file types also allocate a few bytes for, which allows a file to carry some basic information about itself.

Some file systems can store arbitrary (not interpreted by the file system) file-specific data outside of the file format, but linked to the file, for example. On other file systems this can be done via or software-specific databases. All those methods, however, are more susceptible to loss of metadata than are and formats. File size [ ]. Main article: At any instant in time, a file might have a size, normally expressed as number of, that indicates how much storage is associated with the file. In most modern operating systems the size can be any non-negative whole number of bytes up to a system limit. Many older operating systems kept track only of the number of or occupied by a file on a physical storage device.

In such systems, software employed other methods to track the exact byte count (e.g., used a special control character,, to signal the end of text files). The general definition of a file does not require that its size have any real meaning, however, unless the data within the file happens to correspond to data within a pool of persistent storage. A special case is a; these files can be newly created files that have not yet had any data written to them, or may serve as some kind of in the file system, or are accidents (the results of aborted disk operations). For example, the file to which the link /bin/ls points in a typical system probably has a defined size that seldom changes.

Compare this with which is also a file, but its size may be obscure. (This is misleading because /dev/null is not really a file: in Unix-like systems, all resources, including devices, are accessed like files, but there is still a real distinction between files and devices—at core, they behave differently—and the obscurity of the 'size' of /dev/null is one manifestation of this. As a character device, /dev/null has no size.) Organization of data in a file [ ] Information in a computer file can consist of smaller packets of information (often called ' or 'lines') that are individually different but share some common traits. For example, a payroll file might contain information concerning all the employees in a company and their payroll details; each record in the payroll file concerns just one employee, and all the records have the common trait of being related to payroll—this is very similar to placing all payroll information into a specific filing cabinet in an office that does not have a computer. A text file may contain lines of text, corresponding to printed lines on a piece of paper. Alternatively, a file may contain an arbitrary binary image (a ) or it may contain an. The way information is grouped into a file is entirely up to how it is designed.

This has led to a plethora of more or less standardized file structures for all imaginable purposes, from the simplest to the most complex. Most computer files are used by which create, modify or delete the files for their own use on an as-needed basis. The programmers who create the programs decide what files are needed, how they are to be used and (often) their names. In some cases, computer programs manipulate files that are made visible to the computer user. For example, in a, the user manipulates document files that the user personally names. Although the content of the document file is arranged in a format that the word-processing program understands, the user is able to choose the name and location of the file and provide the bulk of the information (such as words and text) that will be stored in the file.

Many applications pack all their data files into a single file called an, using internal markers to discern the different types of information contained within. The benefits of the archive file are to lower the number of files for easier transfer, to reduce storage usage, or just to organize outdated files. The archive file must often be unpacked before next using. Operations [ ] The most basic operations that programs can perform on a file are: • Create a new file • Change the and of a file • a file, which makes the file contents available to the program • data from a file • data to a file • a file, terminating the association between it and the program Files on a computer can be created, moved, modified, grown, shrunk, and deleted. In most cases, computer programs that are executed on the computer handle these operations, but the user of a computer can also manipulate files if necessary. For instance, files are normally created and modified by the Microsoft Word program in response to user commands, but the user can also move,, or these files directly by using a such as (on Windows computers) or by (CLI).

In systems, programs do not operate directly, at a low level, on a file. Only the kernel deals with files, and it handles all user-space interaction with files in a manner that is transparent to the user-space programs. The provides a level of, which means that interaction with a file from user-space is simply through its filename (instead of its ). For example, filename will not delete the file itself, but only a to the file. There can be many links to a file, but when they are all removed, the considers that file's memory space free to be reallocated.

This is commonly considered a security risk (due to the existence of ). Any secure-deletion program uses kernel-space (system) functions to wipe the file's data. Identifying and organizing [ ]. Files and folders arranged in a hierarchy In modern computer systems, files are typically accessed using names (). In some operating systems, the name is associated with the file itself. In others, the file is anonymous, and is pointed to by links that have names. In the latter case, a user can identify the name of the link with the file itself, but this is a false analogue, especially where there exists more than one link to the same file.

Files (or links to files) can be located in directories. However, more generally, a can contain either a list of files or a list of links to files. Within this definition, it is of paramount importance that the term 'file' includes directories. This permits the existence of directory hierarchies, i.e., directories containing sub-directories. A name that refers to a file within a directory must be typically unique. In other words, there must be no identical names within a directory. However, in some operating systems, a name may include a specification of type that means a directory can contain an identical name for more than one type of object such as a directory and a file.

In environments in which a file is named, a file's name and the path to the file's directory must uniquely identify it among all other files in the computer system—no two files can have the same name and path. Where a file is anonymous, named references to it will exist within a namespace. In most cases, any name within the namespace will refer to exactly zero or one file. However, any file may be represented within any namespace by zero, one or more names. Any string of characters may or may not be a well-formed name for a file or a link depending upon the context of application.

Whether or not a name is well-formed depends on the type of computer system being used. Early computers permitted only a few letters or digits in the name of a file, but modern computers allow long names (some up to 255 characters) containing almost any combination of letters or unicode digits, making it easier to understand the purpose of a file at a glance. Some computer systems allow file names to contain spaces; others do not.

Case-sensitivity of file names is determined by the. Unix file systems are usually case sensitive and allow user-level applications to create files whose names differ only in the case of characters.

Supports multiple file systems, each with different policies [ ] regarding case-sensitivity. The common file system can have multiple files whose names differ only in case if the user uses a to edit the file names in the. User applications, however, will usually not allow the user to create multiple files with the same name but differing in case. Most computers organize files into hierarchies using folders, directories, or catalogs. The concept is the same irrespective of the terminology used.

Each folder can contain an arbitrary number of files, and it can also contain other folders. These other folders are referred to as subfolders. Subfolders can contain still more files and folders and so on, thus building a tree-like structure in which one 'master folder' (or 'root folder' — the name varies from one operating system to another) can contain any number of levels of other folders and files. Folders can be named just as files can (except for the root folder, which often does not have a name).

The use of folders makes it easier to organize files in a logical way. When a computer allows the use of folders, each file and folder has not only a name of its own, but also a path, which identifies the folder or folders in which a file or folder resides. In the path, some sort of special character—such as a slash—is used to separate the file and folder names.

For example, in the illustration shown in this article, the path /Payroll/Salaries/Managers uniquely identifies a file called Managers in a folder called Salaries, which in turn is contained in a folder called Payroll. The folder and file names are separated by slashes in this example; the topmost or root folder has no name, and so the path begins with a slash (if the root folder had a name, it would precede this first slash). Many (but not all) computer systems use in file names to help identify what they contain, also known as the file type. On Windows computers, extensions consist of a dot (period) at the end of a file name, followed by a few letters to identify the type of file. An extension of.txt identifies a text file; a.doc extension identifies any type of document or documentation, commonly in the;. Even when extensions are used in a computer system, the degree to which the computer system recognizes and heeds them can vary; in some systems, they are required, while in other systems, they are completely ignored if they are presented. Protection [ ] Many modern computer systems provide methods for protecting files against accidental and deliberate damage.

Computers that allow for multiple users implement to control who may or may not modify, delete, or create files and folders. For example, a given user may be granted only permission to read a file or folder, but not to modify or delete it; or a user may be given permission to read and modify files or folders, but not to execute them. Permissions may also be used to allow only certain users to see the contents of a file or folder. Permissions protect against unauthorized tampering or destruction of information in files, and keep private information confidential from unauthorized users. Another protection mechanism implemented in many computers is a read-only flag. When this flag is turned on for a file (which can be accomplished by a computer program or by a human user), the file can be examined, but it cannot be modified. This flag is useful for critical information that must not be modified or erased, such as special files that are used only by internal parts of the computer system.

Some systems also include a to make certain files invisible; this flag is used by the computer system to hide essential system files that users should not alter. Storage [ ] Any file that has any useful purpose, must have some physical manifestation.

That is, a file (an abstract concept) in a real computer system must have a real physical analogue if it is to exist at all. In physical terms, most computer files are stored on some type of data storage device. For example, most store files on a. Hard disks have been the ubiquitous form of storage since the early 1960s.

Where files contain only temporary information, they may be stored in. Computer files can be also stored on other media in some cases, such as,,,,, etc. The use of is also beginning to rival the hard disk drive. In Unix-like operating systems, many files have no associated physical storage device. Examples are and most files under directories /dev, /proc and /sys. These are virtual files: they exist as objects within the operating system kernel. As seen by a running user program, files are usually represented either by a or by a.

A File control block (FCB) is an area of memory which is manipulated to establish a filename etc. And then passed to the operating system as a parameter, it was used by older IBM operating systems and early PC operating systems including and early versions of. A file handle is generally either an or an integer, it was introduced in around 1961 by the running on the but is now ubiquitous. Back up [ ] When computer files contain information that is extremely important, a process is used to protect against disasters that might destroy the files. Backing up files simply means making copies of the files in a separate location so that they can be restored if something happens to the computer, or if they are deleted accidentally.

There are many ways to back up files. Most computer systems provide utility programs to assist in the back-up process, which can become very time-consuming if there are many files to safeguard.

Files are often copied to removable media such as writable CDs or cartridge tapes. Copying files to another hard disk in the same computer protects against failure of one disk, but if it is necessary to protect against failure or destruction of the entire computer, then copies of the files must be made on other media that can be taken away from the computer and stored in a safe, distant location. The method automatically makes three back-ups; the grandfather file is the oldest copy of the file and the son is the current copy. File systems and file managers [ ] The way a computer organizes, names, stores and manipulates files is globally referred to as its. Most computers have at least one file system. Some computers allow the use of several different file systems.

For instance, on newer MS Windows computers, the older FAT-type file systems of and old versions of Windows are supported, in addition to the file system that is the normal file system for recent versions of Windows. Each system has its own advantages and disadvantages. Standard FAT allows only eight-character file names (plus a three-character extension) with no spaces, for example, whereas NTFS allows much longer names that can contain spaces. You can call a file ' Payroll records' in NTFS, but in FAT you would be restricted to something like payroll.dat (unless you were using, a FAT extension allowing long file names). Programs are utility programs that allow users to manipulate files directly. They allow you to move, create, delete and rename files and folders, although they do not actually allow you to read the contents of a file or store information in it.

Every computer system provides at least one file-manager program for its native file system. For example, File Explorer (formerly Windows Explorer) is commonly used in Microsoft Windows operating systems, and Nautilus is common under several distributions of Linux. See also [ ] • • • • • • • • • • • • • • Notes [ ].

Open Source dapat didefinisikan tidak hanya sebagai aplikasi yang gratis dan dapat dengan mudah didapatkan sumber kodenya ( source code), akan tetapi sebuah aplikasi komputer dapat dikategorikan open source apabila memenuhi kriteria berikut ini: • Free redistribution. Lisensi software tersebut tidak boleh membatasi suatu pihak untuk menjual atau memberikan software, baik software yang berdiri sendiri maupun software yang menjadi komponen software lain. • Kode sumber. Program harus menyertakan kode sumber dan harus memungkinkan pendistribusian dalam bentuk kode sumber maupun terkompilasi. • Derived works.

Lisensi harus memungkinkan modifikasi dan pekerjaan turunan, serta harus memungkinkan mereka didistribusikan berdasarkan syarat-syarat yang sama dengan yang ada pada lisensi software awal. • Integritas kode sumber. Lisensi dapat membatasi distribusi kode sumber dalam bentuk termodifikasi hanya jika lisensi memungkinkan distribusi patch files.

Patch file adalah perbaikan-perbaikan kode sumber yang didistribusikan untuk memperbaiki software yang telah didistribusikan dahulu. Patch file ini biasanya tidak berukuran besar. Dengan adanya patch file maka seseorang tidak perlu mengambil ulang seluruh software sehingga menghemat waktu download. Serta kode sumber demi pemodifikasian program pada saat kompilasi. Lisensi harus secara eksplisit mengijinkan distribusi software yang dibangun dari kode sumber termodifikasi. Derived works harus mengenakan nomor versi atau nama yang berbeda dari software aslinya.

• Tidak ada diskriminasi terhadap orang atau kelompok. • Tidak ada diskriminasi terhadap fields of endeavor. Lisensi tidak boleh membatasi seseorang menggunakan program dalam bidang tertentu. • Distribusi lisensi. Hak-hak yang ada dalam program harus berlaku pula bagi tiap pihak yang menerima program, tanpa memerlukan lisensi tambahan.

• Lisensi tidak boleh spesifik terhadap suatu produk. • Lisensi tidak boleh mempengaruhi software lain. Lisensi tidak boleh membatasi software-software yang didistribusikan beserta software terlisensi open source. Open Source Initiative ( The Open Source Definition). Manfaat open source dalam dunia pendidikan adalah pelajar, mahasiswa ataupun pendidik tidak lagi mempelajari sesuatu secara teoritis namun mereka pun dapat mempraktikkannya. Sebagai contoh dalam bidang ilmu komputer, pada saat mempelajari mata kuliah Sistem Operasi, maka mahasiswa dan dosen dapat secara bersama-sama mempelajarinya dengan cara mengupas secara tuntas Sistem Operasi GNU/ Linux ataupun sistem operasi open source lainnya, sehingga mahasiswa dan dosen tidak hanya tahu teori, namun juga tahu penerapannya dalam dunia nyata.

Kemudian dengan menginstalasi sistem operasi open source, misalnya GNU/ Linux, seseorang umumnya telah memperoleh aplikasi-aplikasi yang cukup lengkap, tanpa harus mengeluarkan uang royalti untuk membelinya. Dalam pemerintahan, seiring dengan makin banyaknya tuntutan akan otonomi daerah, maka penggunaan program open source patut menjadi pertimbangan dalam perencanaan sistem informasi pemerintahan. Dengan menggunakan program open source, anggaran yang dibutuhkan relatif lebih rendah dibandingkan dengan program closed source dengan tingkat reliabilitas dan keamanan yang lebih tinggi. Selain itu dengan memanfaatkan program-program open source pemerintah dapat mendukung perkembangan teknologi informasi di daerahnya dan juga dapat memberikan kesempatan kerja pada masyarakat. Dengan tersedianya source code yang dapat dimodifikasi maka pemerintah dapat memastikan bahwa program yang digunakannya tidak memiliki suatu backdoor ataupun trojan horse yang dapat membahayakan pemanfaatannya dalam bidang yang sensitif, seperti bidang pertahanan keamanan ataupun data perusahaan dengan nilai yang sangat penting yang tersimpan dalam dokumen arsip. Aplikasi ICA-AtoM adalah aplikasi berbasis web, maka dalam pengoperasiannya menggunakan aplikasi internet browser seperti Firefox, Safari, Internet Explorer, Opera, dll. HTML digunakan untuk menampilkan aplikasi ini dalam web browser.

Database pada server menggunakan MySQL, namun dapat juga menggunakan Postgres, SQLite, SQLserver, Oracle, dll. Bahasa Pemrograman yang dipakai oleh ICA-AtoM menggunakan php5 yang menghubungkan antara database-webserver-browser. Framework yang digunakan adalah Symfony yaitu untuk mengelola komponen ICA-AtoM menggunakan model berorientasi objek dan desain web yang terstruktur. Qubit- open information management toolkit dikembangkan oleh ICA-AtoM dan diubah untuk disesuaikan dengan ICA-AtoM.

Berikut adalah gambar desain arsitektur aplikasi ICA-AtoM. Kemudian pada tahun 2005, UNESCO Information For All Programme (IFAP) memberikan € 45,000 Euro kepada ICA Human Right Task Force untuk membuat panduan online tentang sumber-data arsip yang berkaitan dengan kekerasan HAM. UNESCO IFAP secara aktif juga menyarankan untuk menggunakan open source sabagai salah satu kriteria panduan online tersebut.

Peter Horsman menyadari saat itulah ia bisa menerapkan OSARIS pada penggunaan database yang akan dibuat yang seharusnya berdasar pada Standar deskripsi ICA. UNESCO menyarankan agar tidak hanya membuat database online akan tetapi juga membuat sebuah aplikasi open source untuk deskripsi arsip yang dapat digunakan oleh anggota ICA dan institusi kearsipan lain. Pada tahun 2006, Sekretaris Jenderal ICA Joan van Albada memilih singkatan dari Access to Memory sebagai nama dari aplikasi ini, untuk kemudian secara resmi aplikasi ini dinamakan ICA-AtoM. Kemudian tahun 2007 pada pertemuan di kantor sekretariat ICA untuk mereview aplikasi ICA-AtoM rilis versi alpha 0.3, Belanda melalui Archiefschool berkomitmen untuk mendanai pengembangan lebih lanjut dari aplikasi ini dengan € 100,000 Euro. Direction des Archives de France juga memberikan € 30,000 euro tambahan yang membantu rilis versi alpha 0.5 pada November 2007. Hingga akhirnya dorongan terakhir datang dari United Arab Emirates Centre for Documentation and Research (CDR) bersedia mendanai pengembangan versi beta ICA-AtoM, karena melihat potensi dari software ini yang kemudian dirilis pada Juli 2008.

Lembaga Terkait. Dalam pengembangannya ICA-AtoM mendapat anggaran tidak berasal dari anggaran internal ICA, namun berasal dari berbagai pihak dan jaringan yang dimiliki oleh ICA. Berbagai pihak tersebut menyumbangkan dana mereka agar ICA-AtoM dapat dikembangkan sebagai mana tujuan pembuatan ICA, yaitu memberikan aplikasi software yang dapat digunakan oleh instansi/ lembaga kearsipan untuk mendeskripsikan arsip dengan standar yang dimiliki oleh ICA. Lembaga yang menjadi sponsor dalam poyek pengembangan ICA-AtoM adalah sebagai berikut: • International Council on Archives (ICA) • Center for Documentation & Research • Archief School-Nederlands Instituut Voor Archiefonderwus en –Onderzoek • Direction des Archives de France • United Nation Educational, Scientific and Cultural Organization (UNESCO) • Library and Archives Canada, Bibliotheque of Archives Canada • Canadian Council of Archives • Library and Archives of Development-The World Bank Group.

ICA-AtoM adalah aplikasi web-based dimana dalam melakukan proses instalasi bisa dikatakan lebih rumit dari pada aplikasi desktop lainnya. Karena itu ICA-AtoM mengembangkan instaler untuk aplikasi ini yang bisa membantu proses instalasi agar lebih mudah. Sejauh ini, sekitar 80% proses instalasi ICA-AtoM dilakukan oleh web instaler dengan 20% menggunakan intervensi manual dalam prosesnya. ICA-AtoM sudah didesain dengan asumsi penggunaan teknologi komputer yang terjangkau oleh pengguna.

Teknologi komputer yang dimaksud adalah yang dapat mengakses internet dan web browser. Semua web browser dapat menggunakan ICA-AtoM. Untuk memberikan tampilan browser yang bagus maka JavaScript dibutuhkan untuk menampilkan efek yang menarik bagi pengguna.

ISAD (G) ini adalah standar untuk deskripsi arsip yang dibuat oleh ICA dengan rekan jaringannya yang tersebar diseluruh dunia. Standar ini menyediakan panduan umum untuk membuat sebuah deskripsi tentang arsip.

Standar ini dibuat untuk menjadi pelengkap akan standar nasional yang dipakai oleh sebuah instansi atau negara. Sehingga masih sangat mungkin untuk dikembangkan oleh masing-masing penggunanya.

• International Standard Archival Authority Record (Corporate bodies, Persons, Families)(ISAAR(CPF)) – 2nd edition, 2003. Standar ini memberikan aturan umum untuk standarisasi deskripsi lembaga yang mengelola atau menyimpan arsip. Memberikan panduan praktis untuk mengidentifikasi dan menghubungi lembaga-lembaga yang memiliki arsip memberikan akses dan layanan yang tersedia, membuat direktori lembaga dengan kepemilikan arsip dan/ atau daftar inventori arsip, Pembuatan hubungan antar lembaga ( link) dengan perpustakaan dan museum dan/ atau mengembangkan direktori umum dari lembaga warisan budaya di regional, nasional dan tingkat internasional dan produksi statistik pada lembaga dengan kepemilikan arsip, di sebuah daerah, nasional atau tingkat internasional. Dalam versi v 1.1 dilengkapi juga dengan International Standard For Describing Function (ISDF) – 1st edition, May 2007. ICA-AtoM juga dilengkapi dengan data-entry template untuk Dublin Core dan The Canadian Rules for Archival Description. Semua data arsip pada setiap sectionnya langsung berdasarkan pada standar yang digunakan. Sebagaimana dalam aplikasi ini terdapat titik akses ( akses point) yang bisa digunakan dalam penelusuran deskripsi arsip, objek fisik arsip juga dapat dihubungkan dengan aplikasi ini untuk menyatakan dimana material arsip tersebut disimpan.

Archival Description-Deskripsi arsip memberikan informasi tentang konteks dari material arsip; deskripsi ini adalah perwakilan dari material arsip. Arsip yang dideskripsikan pada ICA-Atom sudah disusun berdasarkan pada level hirarki (contoh, fonds, series, files, item). Data-data dari setiap element pada deskripsi arsip ICA-AtoM menggunakan ISAD(G) Standar. Setiap arsip yang sudah dideskripsikan mungkin memiliki data yang berhubungan dengan objek fisik arsip, digital objek, lokasi, karakter fisik, struktur, informasi teknis mengenai material/ rekod itu sendiri, semua ini dapat dideskripsi dan ditampilkan oleh ICA-AtoM. Archival Institution-adalah lembaga yang menyimpan, melesratikan, dan membuat akses informasi tentang material fisik dari arsip yang sedang dideskripsikan. Deskripsi untuk lembaga arsip ini diatur juga dalam ISAAR akan tetapi ciri khusus sebagai tempat penyimpanan arsip, dengan karakretistik seperti jam operasional, layanan peneliti, dan juga kontak informasi lembaga dideskripsikan dengan standar ISDIAH. Dengan begitu lembaga arsip untuk penyimpanan ini menggunakan standar ISAAR namun untuk beberapa hal diatur dalam standar ISDIAH.