Selasa, 05 April 2011

Fibre Optic Will be Ready to be Used by 2012 in Indonesia

The construction of a 50,000 kilometer fiber optic cable that will crisscross the entire archipelago, delivering better and cheaper data and voice services, should be finished by 2012, Minister of Communications and Information Technology Tifatul Sembiring said on Wednesday.

So far 40,000 km of the cable, stretching across Java, Sumatra and Kalimantan, has been built, Tifatul said.

The government has tendered the project out to a number of telecommunications companies that are building sections and will retain ownership of their respective parts of the cable.

“We only have to build the remaining 10,000 km to connect the nation,” he said.

The cost of building the rest of the system, mainly in eastern Indonesia, would be about Rp 5.3 trillion ($590 million), Tifatul said.

The fiber optic infrastructure will improve voice and high-speed data traffic nationwide, and will lower the prices consumers pay for telecommunication services, particularly in eastern Indonesia, he said.

Tifatul was speaking on the sidelines of the first day of the Infra structure Asia 2010 conference in Jakarta, which was reserved for small groups before today’s plenary sessions.

The government is waiting for state-owned PT Telekomunikasi Indonesia to finish construction of the Mataram-to-Kupang section of the cable, which should be completed next year.

After that, links to Ambon, North Maluku and Papua will be built, eventually forming a ring that will connect all the provinces of Indonesia.

The government is also planning to connect the cable to East Timor and run a link from Kupang, East Nusa Tenggara, to Darwin, Australia.

“At the [World Movement for] Democracy forum in Bali, Xanana Gusmao, the prime minister of East Timor, requested this [link] from President Susilo Bambang Yudhoyono,” Tifatul said.

The connection to Australia “is important so that we have an alternative overseas connection,” Tifatul said, pointing out that it would provide backup if the main overseas link went down.

“It will prevent trouble, such as when an earthquake in Taiwan occurred in 2006 that cut our connection,” he said.

Currently the country’s main international fiber optic link routes through Singapore to Taiwan and then to the United States.

The new link to Darwin will connect to Sydney and then to the United States.

PT Bakrie Telecom, the company that will build the 1,200 km cable from Kupang to Darwin, said it was still doing preparatory work on the project and it would cooperate with Australian telecom company Telstra and domestic investors to develop the project.

“We will start the project as early as 2012,” said Rakhmat Djunaidi, the director for corporate services at Bakrie Telecom, a unit of the Bakrie group


The World's First Laptop

As the personal computer became feasible in the early 1970s, the idea of a portable personal computer followed. A "personal, portable information manipulator" was imagined by Alan Kay at Xerox PARC in 1968, and described in his 1972 paper as the "Dynabook".
The IBM SCAMP project (Special Computer APL Machine Portable), was demonstrated in 1973. This prototype was based on the PALM processor (Put All Logic In Microcode).
The IBM 5100, the first commercially available portable computer, appeared in September 1975, and was based on the SCAMP prototype.
As 8-bit CPU machines became widely accepted, the number of portables increased rapidly. The Osborne 1, released in 1981, used the Zilog Z80 and weighed 23.6 pounds (10.7 kg). It had no battery, a 5 in (13 cm) CRT screen, and dual 5.25 in (13.3 cm) single-density floppy drives. In the same year the first laptop-sized portable computer, the Epson HX-20, was announced. The Epson had a LCD screen, a rechargeable battery, and a calculator-size printer in a 1.6 kg (3.5 lb) chassis. Both Tandy/RadioShack and HP also produced portable computers of varying designs during this period.
The first laptops using the flip form factor appeared in the early 1980s. The Dulmont Magnum was released in Australia in 1981–82, but was not marketed internationally until 1984–85. The $8,150 ($18,540 in current dollar terms) GRiD Compass 1100, released in 1982, was used at NASA and by the military among others. The Gavilan SC, released in 1983, was the first computer described as a "laptop" by its manufacturer From 1983 onward, several new input techniques were developed and included in laptops, including the touchpad (Gavilan SC, 1983), the pointing stick (IBM ThinkPad 700, 1992) and handwriting recognition (Linus Write-Top, 1987). Some CPUs, such as the 1990 Intel i386SL, were designed to use minimum power to increase battery life of portable computers, and were supported by dynamic power management features such as Intel SpeedStep and AMD PowerNow! in some designs.


10 Most Expensive Laptops in The World

10. Acer Ferrari 1100: $3000
Acer Ferrari laptop is built just like the Ferrari car. It’s built with ultralight design that wear resistant carbon fiber chassis. The laptop is built using AMD Turion X2 Dual Core CPU, 4 GB of RAM and of course all other features like Wifi. With the good specification of hardware, it’s hoped that it will get the maximal speed like Ferrari car. It’s a worthed buying with $ 3000. The reason to buy this most expensive laptop usually for the performance and of course for appearance.

Acer Ferrari 1100
9. Dell M6400: $3000
This notebook that coming from Dell is very powerful. It’s featured with Intel Core 2 Quad Core Extreme Edition Processors. The reason of using this laptop is for ripping complex analysis that need large data and graphics memory as the laptop have 16 GB of 1066 MHZ DDR 3 Memory for data as well as 1 GB of graphics memory. You won’t think that this laptop is the same as the low priced dell in all aspect. The price of this notebook reaches $3,000. Just provide that amount of money to buy this laptop.

Dell M6400
8. Toshiba Qosmio G35-AV660: $3500

The special thing about this laptop is can handle HD DVD. The laptop is powered by 2.0 GHZ Core 2 Duo, 240 GB RAID 0 HDD and Nvidia GeForce Go 7600. This is the first laptop computer that utilize with HD DVD player with 17 inch screen in 1920 x 1200 resolution. The price is quite expensive but you will think it’s worth of money because of the good design and the entertainment. Just provide $3,500 and you can take this laptop home.

Toshiba Qosmio G35 AV660
7. Lenovo ThinkPad W700DS: $4500
The special thing about this laptop is the secondary pull out display that can be drawn from the main dispaly. It makes this laptop different from normal 17 inch laptop. The additional dispaly is very useful for excel and CAD programs. The display itself is also very high in quality. This laptop is equipped with 2.53 Ghz Core 2 Quad Extreme QX9000, 4 GB RAM, Dual 250 GB 5200 RPM Hard drives. The price is $4,500.

Lenovo ThinkPad W700DS
6. Alienware Area 51: $5000
This laptop is dedicated for the game lovers. This laptop is sophiticated in hardware design with stylish and sleek casing design. The laptop is using Intel Core 2 Extreme Packs with Nvidia Geforce 9800M GT in dual SLI Configuration with 1 GB in graphic performance. This laptop has 1 TB of storage in high speed RAID 0 configuration. The storage is equipped with a smart bay system that can record HD TV and film with the built in TV tuner. For $5,000 this laptop is very reasonable in price.

Alienware Area 51



5. Rock Extreme SL8: $5000
This laptop is claimed to be the world’s fastest laptop computer with specs of Intel Core 2 Quad Processor, NVIDIA 9800 GPUs in SLI and 8GB of RAM. Equipped with blue ray that can display in high definition. You must be proud to own this prestige laptop. The price is $5,000 and I think it’s very reasonable price compared to its feature.

Rock Extreme SL8
4. Voodoo Envy H:171: $8500
If You want a high performance laptop that already optimized you should consider this laptop. The laptop is already optimized so will be maximal in performance. The specifications of the laptop are Intel Core 2 Extreme X6800 processor, 4 GB of RAM, twin Nvidia Quadro FX Go 2500M graphics chipset, 1.3 Megapixel webcam, dual 250 GB hard diskk, 7 in 1 memory card reader, dual layer DVD RW drive and high resolution 17 inch 1920 x 1200 display. The special thing about this laptop is the casing that can be chosen from 14 tattoos options available. The price of this laptop is $ 8,500.

Voodoo Envy H171
3. Ego for Bentley: $20,000
From the image of this laptop, you will surely think that this is not a laptop for men. The authenticity of bentley logo make this laptop very stylish and worhty to carry match with the bentley car that also driven by the owner. The laptop can match the color of the Bentley car. This laptop usually bring by rich women that can spend $20.000 just for fashion purpose. For your intention this laptop just use 64 bit for vista and 160 GB Hard Disk.

Ego for Bentley
2. Tulip E-Go Diamond: $355,000
The laptop has an image as “most luxurious laptop in the world”. And I guess it’s true. The reason is because the laptop is designed with a touch of chrome in unique women bag shapre. The grip of the laptop can be replaced with white gold and diamonds. The price of this laptop can reach $355,000. Don’t ask about performace as this is the same as usual laptop. It’s just 12 antiglare screen display, 2 GB of RAM, 160 GB Hard disk, integrated webcam, bluetooth 2.0 and DVD burner. You should be rich enough to spend $355,000 for just a laptop.

Tulip E-Go Diamond
1. Luvaglio One Million Dollar Laptop: $1,000,000
The title says it all. You should own $1 million to own this laptop. This laptop is made to order and you will get your own design and specification. You can also order from what kind of material your laptop will be made. You can choose from wood, metal or iron. This laptop is also designed so the owner can upgrade the hardware themself. This laptop is equipped with 128 solid State drive, MP3 player, built in USB stick and equipped with “integrated screen cleaning feature”.

Do you want to own one of these expensive laptops?? GET A JOB :D

Source : http://www.mostexpensivelaptop.net/


The computer will be used by the Department of Energy's National Nuclear Security Administration (NNSA) and will be ten times faster than today's most powerful system.

Two systems will be built for the super-computer by IBM. The first is Sequoia, a 20 petaFLOP/s (quadrillion floating operations per second) system based on future BlueGene technology. This will be delivered starting in 2011 and deployed in 2012. The second is an initial delivery system called Dawn, a 500 teraFLOP/s (trillion floating operations per second) BlueGene/P system, being delivered in the first quarter of 2009. Dawn will lay the applications foundation for multi-petaFLOP/s computing on Sequoia.


To put the size of the computer into perspective, if each of the 6.7 billion people on earth had a hand calculator and worked together on a calculation 24 hours a day, 365 days a year, it would take 320 years to do what Sequoia will do in one hour.

NNSA administrator Thomas D'Agostino said, "These powerful machines will provide NNSA with the capabilities needed to resolve time-urgent and complex scientific problems, ensuring the viability of the nation's nuclear deterrent into the future. This endeavour will also help maintain US leadership in high performance computing and promote scientific discovery."

Source : http://www.computerweekly.com/Articles/2009/03/09/234614/World39s-biggest-computer-built-for-US-nuclear-department.htm


Samsung 9 Series -Thinnest laptop in the world

Samsung has announced their new 9 series range of laptops in CES 2011 in LAS VEGAS. This laptop is synonymously called as the MacBook Air wannabe. But the stunning Samsung 9 laptop looking to give the wafer thin MacBook Air a run for its money.

With the duralumin machine barely troubling the scales at 2.89 pounds and the machine measuring just 0.68 inches thick, it’s matching the Apple MacBook Air in all aspect of the shape, although the Samsung packs a more ports and power, and comes with a backlit keyboard.
Although there’s no optical drive onboard, the wee fella bristles with Ethernet, HDMI, and USB connectivity, plus a headphone jack and two 1.5-watt speakers and a sub-woofer for hip-hop bass test too. It has a 400 nit LED-backlit display, while inside can be found a brand new Core i5 2537M processor, 4GB of RAM and 128GB SSD storage.

This Samsung 9 series has an price sticker of around $1,600 so it is known that beauty comes with a price. This is an powerful piece of equipment with killer looks to it. The release date is not confirmed yet.


The World's Worst Viruses

"As far as what [virus writers] can do, the sky is the limit," says April Goostree, virus manager for McAfee.com. "In the antivirus industry, we never say 'never' anymore. Because as soon as you do, you are going to be proven wrong. It's anybody's guess about what the next virus will do."

Here's a look at ten of the most malignant viruses and worms of all time.

10. Surreptitious Sircam
Sircam appeared in July 2001 on PCs running Windows 95, 98, and Me. The worm appeared in e-mail in-boxes with an attachment; the body of the message was in Spanish or English. Typical greetings included "Hi! How are you?" and "Hola como estas?" If you launched the attachment, Sircam installed itself on the infected computer, then grabbed random documents and sent them out to e-mail addresses it captured from your address book. It also occasionally deleted files and filled the infected computer's hard drive with gibberish. Visit Symantec's Security Response for instructions on how to remove Sircam.

9. Red Raider
Code Red burned brightly in the summer of 2001, infecting hundreds of thousands of computers--mainly on corporate networks. Code Red slithered through a hole in Internet Information Server (IIS) software, which is widely used to power Internet servers, then scanned the Internet for vulnerable systems to infect and continue the process. The worm used contaminated PCs as weapons in denial of service attacks--flooding a Web site with a barrage of information requests. The original target was the official White House Web site, but government officials changed the site's IP address to thwart the attack.

The worm exploited a weakness in the IIS software (which has since been fixed with a patch from Microsoft) that allowed an intruder to run arbitrary code on a victimized computer. Multiple variants of this worm now exist. Visit Symantec's Security Response for instructions on how to protect your system from Code Red.

8. Bad Benjamin
Benjamin--a new breed of worm--was let loose in May 2002, and it affected users of the popular file-sharing program Kazaa. The crafty worm posed as popular music and movie files. Kazaa users thought they were downloading a media file to their machines, but they got the imposter instead. It then set up a Kazaa share folder and stuffed it with copies of itself posing as popular music and movie files, which other Kazaa users would download. It congested the system's network connection and would ultimately fill up a hard drive. Visit Symantec's Security Response for instructions on how to remove Benjamin.

7. Numbing Nimda
Nimda (also known as the Concept Virus) appeared in September 2001, attacking tens of thousands of servers and hundreds of thousands of PCs. The worm modified Web documents and executable files, then created numerous copies of itself. The worm spread as an embedded attachment in an HTML e-mail message that would execute as soon as the recipient opened the message (unlike the typical attached virus that requires manual launching of the attachment). It also moved via server-to-server Web traffic, infected shared hard drives on networks, and downloaded itself to users browsing Web pages hosted on infected servers. Nimda soon inspired a crowd of imitators that followed the same pattern. Visit Symantec's Security Response for the Nimda removal tool.

6. Tennis Anyone?
The Anna Kournikova (or VBS.SST@mm) worm, appearing in February 2001, didn't cause data loss, although in the process of boosting the profile of its namesake, the Russian tennis player, it did cause embarrassment and disruption for many personal and business users. The worm showed up in Microsoft Outlook users' e-mail in-boxes with an attachment (supposedly a picture of Kournikova). The attachment proved hard to resist. The result? Clicking the bogus attachment sent copies of the worm via e-mail to all addresses found in the victim's Outlook address book. Kournikova also brought about a number of copycat variants. Visit Symantec's Security Response for instructions on how to remove Kournikova.

Most worm creators have never been identified, but a 21-year-old Dutchman, Jan de Wit, admitted to unleashing this worm. The admitted virus writer is appealing a 150-hour community service sentence handed down in September 2001 by a judge in the Netherlands.

5. (Expletive Deleted) Explorer
The Explorer.zip worm appeared in the summer of 1999, following in the footsteps of Melissa. The worm deleted Word, Excel, and PowerPoint files and randomly altered other types of files. Like Melissa (see below), Explorer traveled via e-mails that appeared to be from someone the recipient knew. The message included a file that, if activated, showed a fake error message to the user. Unlike Melissa, this virus did not use Outlook to gather e-mail addresses. Instead, it watched the in-box of the infected computer and then sent automatic replies to senders, using the same e-mail subject as the original message.

4. Maniacal Magistr
Magistr is one of the most complex viruses to hit the Internet. Its victims, users of Outlook Express, were hooked by an infected e-mail attachment. The virus, discovered in mid-March 2001, sent garbled messages to everyone in the infected user's e-mail address book. Attached were files pulled at random from the infected PC's hard drive plus an executable file with the Magistr code. This virus was not as widespread as many others, but it was very destructive. Magistr overwrites hard drives and erases CMOS and the flashable BIOS, preventing systems from booting. It also contained antidebugging features, making it hard to detect and destroy. Visit Symantec's Security Response for instructions on how to remove Magistr.

3. Malevolent Melissa
The Melissa virus swamped corporate networks with a tidal wave of e-mail messages in March 1999. Through Microsoft Outlook, when a user opened an e-mail message containing an infected Word attachment, the virus was sent to the first 50 names in the user's address book. The e-mail fooled many recipients because it bore the name of someone the recipient knew and referred to a document they had allegedly requested.

So much e-mail traffic was generated so quickly that companies like Intel and Microsoft had to turn off their e-mail servers. The Melissa virus was the first virus capable of hopping from one machine to another on its own. And it's another good example of a virus with multiple variants. Visit Symantec's Security Response for instructions on how to remove Melissa.

2. Klez the Conquerer
The Klez worm, which blends different virus traits, was first detected in October 2001. Klez distributes itself like a virus, but sometimes acts like a worm, other times like a Trojan horse. Klez isn't as destructive as other worms, but it is widespread, hard to exterminate--and still active. In fact, so far, no other virus has stayed in circulation quite like Klez. It spreads via open networks and e-mail--regardless of the e-mail program you use. Klez sometimes masquerades as a worm-removal tool. It may corrupt files and disable antivirus products. It pilfers data from a victim's e-mail address book, mixing and matching new senders and recipients for a new round of infection. Visit Symantec's Security Response for instructions on how to remove Klez.

1. Love Hurts
LoveLetter is the worm everyone learned to hate in spring 2000. The infection affected millions of computers and caused more damage than any other computer virus to date. Users were infected via e-mail, through Internet chat systems, and through other shared file systems. The worm sent copies of itself via Microsoft Outlook's address book entries. The mail included an executable file attachment with the e-mail subject line, "ILOVEYOU." The worm had the ability to overwrite several types of files, including .gif and .jpg files. It modified the Internet Explorer start page and changed Registry keys. It also moved other files and hid MP3 files on affected systems. Visit Symantec's Security Response for instructions on how to remove LoveLetter.

Source : http://www.pcworld.com/article/103992/the_worlds_worst_viruses.html


Selasa, 29 Maret 2011

                  The USSR's launch of Sputnik spurred the United States to create the Advanced Research Projects Agency (ARPA or DARPA) in February 1958 to regain a technological lead. ARPA created the Information Processing Technology Office (IPTO) to further the research of the Semi Automatic Ground Environment (SAGE) program, which had networked country-wide radar systems together for the first time. The IPTO's purpose was to find ways to address the US military's concern about survivability of their communications networks, and as a first step interconnect their computers at the Pentagon, Cheyenne Mountain, and Strategic Air Command headquarters (SAC). J. C. R. Licklider, a promoter of universal networking, was selected to head the IPTO. Licklider moved from the Psycho-Acoustic Laboratory at Harvard University to MIT in 1950, after becoming interested in information technology. At MIT, he served on a committee that established Lincoln Laboratory and worked on the SAGE project. In 1957 he became a Vice President at BBN, where he bought the first production PDP-1 computer and conducted the first public demonstration of time-sharing.


Professor Leonard Kleinrock with the first ARPANET Interface Message Processors at UCLA


                  A plaque commemorating the birth of the Internet at Stanford University
At the IPTO, Licklider's successor Ivan Sutherland in 1965 got Lawrence Roberts to start a project to make a network, and Roberts based the technology on the work of Paul Baran, who had written an exhaustive study for the United States Air Force that recommended packet switching (opposed to circuit switching) to achieve better network robustness and disaster survivability. Roberts had worked at the MIT Lincoln Laboratory originally established to work on the design of the SAGE system. UCLA professor Leonard Kleinrock had provided the theoretical foundations for packet networks in 1962, and later, in the 1970s, for hierarchical routing, concepts which have been the underpinning of the development towards today's Internet.
                  Sutherland's successor Robert Taylor convinced Roberts to build on his early packet switching successes and come and be the IPTO Chief Scientist. Once there, Roberts prepared a report called Resource Sharing Computer Networks which was approved by Taylor in June 1968 and laid the foundation for the launch of the working ARPANET the following year.
                 After much work, the first two nodes of what would become the ARPANET were interconnected between Kleinrock's Network Measurement Center at the UCLA's School of Engineering and Applied Science and Douglas Engelbart's NLS system at SRI International (SRI) in Menlo Park, California, on 29 October 1969. The third site on the ARPANET was the Culler-Fried Interactive Mathematics center at the University of California at Santa Barbara, and the fourth was the University of Utah Graphics Department. In an early sign of future growth, there were already fifteen sites connected to the young ARPANET by the end of 1971.
                 In an independent development, Donald Davies at the UK National Physical Laboratory developed the concept of packet switching in the early 1960s, first giving a talk on the subject in 1965, after which the teams in the new field from two sides of the Atlantic ocean first became acquainted. It was actually Davies' coinage of the wording packet and packet switching that was adopted as the standard terminology. Davies also built a packet-switched network in the UK, called the Mark I in 1970. Bolt, Beranek & Newman (BBN), the private contractors for ARPANET, set out to create a separate commercial version after establishing "value added carriers" was legalized in the U.S. The network they established was called Telenet and began operation in 1975, installing free public dial-up access in cities throughout the U.S. Telenet was the first packet-switching network open to the general public.
Following the demonstration that packet switching worked on the ARPANET, the British Post Office, Telenet, DATAPAC and TRANSPAC collaborated to create the first international packet-switched network service. In the UK, this was referred to as the International Packet Switched Service (IPSS), in 1978. The collection of X.25-based networks grew from Europe and the US to cover Canada, Hong Kong and Australia by 1981. The X.25 packet switching standard was developed in the CCITT (now called ITU-T) around 1976. X.25 was independent of the TCP/IP protocols that arose from the experimental work of DARPA on the ARPANET, Packet Radio Net, and Packet Satellite Net during the same time period.
                         The early ARPANET ran on the Network Control Program (NCP), implementing the host-to-host connectivity and switching layers of the protocol stack, designed and first implemented in December 1970 by a team called the Network Working Group (NWG) led by Steve Crocker. To respond to the network's rapid growth as more and more locations connected, Vinton Cerf and Robert Kahn developed the first description of the now widely used TCP protocols during 1973 and published a paper on the subject in May 1974. Use of the term "Internet" to describe a single global TCP/IP network originated in December 1974 with the publication of RFC 675, the first full specification of TCP that was written by Vinton Cerf, Yogen Dalal and Carl Sunshine, then at Stanford University. During the next nine years, work proceeded to refine the protocols and to implement them on a wide range of operating systems. The first TCP/IP-based wide-area network was operational by 1 January 1983 when all hosts on the ARPANET were switched over from the older NCP protocols.


T3 NSFNET Backbone, c. 1992
In 1985, the United States' National Science Foundation (NSF) commissioned the construction of the NSFNET, a university 56 kilobit/second network backbone using computers called "fuzzballs" by their inventor, David L. Mills. The following year, NSF sponsored the conversion to a higher-speed 1.5 megabit/second network that became operational in 1988. A key decision to use the DARPA TCP/IP protocols was made by Dennis Jennings, then in charge of the Supercomputer program at NSF. The NSFNET backbone was upgraded to 45 Mbps in 1991 and decommissioned in 1995 when it was replaced by new backbone networks operated by commercial Internet Service Providers.
The opening of the NSFNET to other networks began in 1988. The US Federal Networking Council approved the interconnection of the NSFNET to the commercial MCI Mail system in that year and the link was made in the summer of 1989. Other commercial electronic mail services were soon connected, including OnTyme, Telemail and Compuserve. In that same year, three commercial Internet service providers (ISPs) began operations: UUNET, PSINet, and CERFNET. Important, separate networks that offered gateways into, then later merged with, the Internet include Usenet and BITNET. Various other commercial and educational networks, such as Telenet (by that time renamed to Sprintnet), Tymnet, Compuserve and JANET were interconnected with the growing Internet in the 1980s as the TCP/IP protocol became increasingly popular. The adaptability of TCP/IP to existing communication networks allowed for rapid growth. The open availability of the specifications and reference code permitted commercial vendors to build interoperable network components, such as routers, making standardized network gear available from many companies. This aided in the rapid growth of the Internet and the proliferation of local-area networking. It seeded the widespread implementation and rigorous standardization of TCP/IP on UNIX and virtually every other common operating system.


This NeXT Computer was used by Sir Tim Berners-Lee at CERN and became the world's first Web server.
Although the basic applications and guidelines that make the Internet possible had existed for almost two decades, the network did not gain a public face until the 1990s. On 6 August 1991, CERN, a pan-European organization for particle research, publicized the new World Wide Web project. The Web was invented by British scientist Tim Berners-Lee in 1989. An early popular web browser was ViolaWWW, patterned after HyperCard and built using the X Window System. It was eventually replaced in popularity by the Mosaic web browser. In 1993, the National Center for Supercomputing Applications at the University of Illinois released version 1.0 of Mosaic, and by late 1994 there was growing public interest in the previously academic, technical Internet. By 1996 usage of the word Internet had become commonplace, and consequently, so had its use as a synecdoche in reference to the World Wide Web.
Meanwhile, over the course of the decade, the Internet successfully accommodated the majority of previously existing public computer networks (although some networks, such as FidoNet, have remained separate). During the late 1990s, it was estimated that traffic on the public Internet grew by 100 percent per year, while the mean annual growth in the number of Internet users was thought to be between 20% and 50%. This growth is often attributed to the lack of central administration, which allows organic growth of the network, as well as the non-proprietary open nature of the Internet protocols, which encourages vendor interoperability and prevents any one company from exerting too much control over the network. The estimated population of Internet users is 1.97 billion as of 30 June 2010.
From 2009 onward, the Internet is expected to grow significantly in Brazil, Russia, India, China, and Indonesia (BRICI countries). These countries have large populations and moderate to high economic growth, but still low Internet penetration rates. In 2009, the BRICI countries represented about 45 percent of the world's population and had approximately 610 million Internet users, but by 2015, Internet users in BRICI countries will double to 1.2 billion, and will triple in Indonesia.

Sumber : WIKIPEDIA (Internet)