Data Center is our focus

We help to build, access and manage your datacenter and server rooms

Structure Cabling

We help structure your cabling, Fiber Optic, UTP, STP and Electrical.

Get ready to the #Cloud

Start your Hyper Converged Infrastructure.

Monitor your infrastructures

Monitor your hardware, software, network (ITOM), maintain your ITSM service .

Our Great People

Great team to support happy customers.

Friday, December 31, 2010

Welcoming 2011..

 Tahun 2010 merupakan tahun yang mengagumkan bagi kami semua di PT.DCMS. Selain karena banyaknya hal yang kami bisa buat sepanjang tahun, kami juga memiliki tim yang solid dan kerjasama internal dan eksternal yang baik. Dan kami sangat bersyukur oleh karena itu semua. 

Tahun 2011, tantangan baru sudah tampak di depan mata. Selain ada beberapa pekerjaan yang sedang berjalan dan harus segera selesai di Januari 2011. Kami juga berharap akan banyak hal. 

Kami berharap kami bertambah solid dengan adanya nanti datangnya tim baru yang akan bergabung. Klien dapat kami layani dengan lebih baik. Saat ini, seolah Indonesia hampir kami rambah semua titiknya, sehingga pekerjaan 'borderless' akan menjadi tantangan sendiri untuk kami. 

Oleh karena itu, kinerja dan kerjasama sangat penting bagi kami. Kepuasan pelanggan dan harapan calon pelanggan selalu menjadi fokus kami. Memang pareto-law akan tetap berlaku, tapi tetap kami harapkan lebih banyak pelanggan baru dapat kami layani di tahun 2011 ini. 

Fokus perusahaan akan tetap berada di lini infrastruktur, khusus nya datacenter, baik desain, pembangunan dan perawatan. Aplikasi akan kami tajamkan ke fokus 'customer centric applications' dimana di dalamnya produk-produk unggulan yang telah ada akan kami kembangkan lebih baik lagi. Tidak lupa juga managed-services yang hampir sepanjang 2010 tidak tersentuh, akan kami tingkatkan lebih baik lagi. 

Untuk online, kami akan mengembangkan beberapa site dukungan, apa yang selama ini dibuat di tokofc.com akan kami tingkatkan untuk masuk ke aplikasi dan infrastruktur. 

Selamat datang 2011, kami siap menyambutmu.. Tuhan siapkanlah kami semua..



Wednesday, December 29, 2010

LOWONGAN URGENT

Kami membutuhkan :

1. PROGRAMMER VB/VB.NET
    - Menguasai VB/VB.NET
    - Mengerti koneksi ke database MySQL
    - Lebih disukai Fresh Graduate
    - Female

2. PROGRAMMER PHP/FLASH
     - Menguasai PHP/ Framework / Flash
     - Mengerti koneksi ke database MySQL
     - Lebih disukai Fresh Graduate
     - Female

kirimkan CV ke hrd@dayaciptamandiri.com / fankychristian@gmail.com

thanks,
Fanky

Saturday, December 25, 2010

Selamat atas implementasi finosSQM

Selamat kepada BNI yang telah memilih finosSQM sebagai solusi sistem antrian multimedia di kantor cabang.

Kami bangga melayani Anda.


build-access-manage on www.dayaciptamandiri.com

Sejarah Internet Indonesia

Mencari bahan sejarah Internet Indonesia,
bisa diakses di :

http://opensource.telkomspeedy.com/wiki/index.php/Sejarah_Internet_Indonesia

regards,

Fanky Christian

Friday, December 24, 2010

Ensuring an ERP implementation delivers

Now that we've examined how to evaluate your ERP readiness and how to
purchase the right system, let's look at the burdens of an ERP
implementation and the organization's responsibility in meeting them. At
the same time, let's consider how to maximize your organization's ability
to capture ERP's potential, boost your ROI and avoid common mistakes.

Define the ERP implementation strategy

Even with a perfect business survey and total understanding of the
enterprise, any organization faces formidable implementation challenges
regarding ERP. Any true IT leader has experience with other projects and
core implementations, and knows this: Not only is the human equation
involved (by virtue of changes in methods, practices and jobs), but all of
the organization's data, enterprise programs and systems also are up for
review and potentially radical change.

As with any major business or IT change, define the ERP strategy in
advance. Avoid going into any aspect of ERP if the business has a murky
understanding of the technology, or if IT is making assumptions on the
business' behalf. Business drives business, with suggestions and support
from IT. Do not proceed into any area without proper business
understanding and sanction.

Be certain to complete a comprehensive survey that captures
whole-enterprise resources for true ERP and management. Don't overlook
efficiencies to be had, costs to be cut or shared, redundancies that can
be eliminated, and customizations that can be "umbrella-ed" over multiple
areas or process -- or that can be repurposed to other areas with minor
tweaks.

What to avoid in an ERP implementation

The experiences of other organizations should help you avoid common
mistakes, so perform due diligence as you would with any change management
program. Keep in mind this survey conducted by Panorama Consulting Group
LLC:

* More than half of companies that implement ERP systems get no more
than 30% of the business benefits they expected.
* Of the 1,600 organizations surveyed, 72% said they were "fairly
satisfied" with their ERP package. But this can be misleading,
according to the study: "Some executives are just happy to complete
projects ... and give little thought to whether or not the company is
better off with the new software or whether or not they're getting as
much out of the system as possible."
* More than half (51.4%) of ERP projects went over budget, and about
35% of the respondents said their projects took longer than expected,
the survey found.

How to avoid mistakes in an ERP implementation

The IT leader must engage the senior executives, achieve full-business
buy-in, hold business' and stakeholders' feet to the fire about defining
needs and expectations accurately, deliver ERP as a jointly owned system,
and enable and ensure best use -- and that's it! Easy, right?

Highly recommended is a business implementation team (BIT). It's headed by
the IT leader, and involves key business stakeholders and IT staff
members, who are steeped in knowledge about your organization's business
processes from the front- and back-office perspectives. The BIT must be
recognized and sanctioned by senior executive management, thus ensuring
engagement of members who are fully committed to traction and forward
momentum.

By branding the team a business implementation team (as opposed to a
technology implementation team or, in this specific case, the ERP
implementation team), the emphasis is where it belongs -- on the business
of the organization, the business process and the business people. This is
an important cultural distinction for the team and its subsequent
engagement with ERP: It protects the IT leader and staff so they don't get
too far ahead of business' desires, understanding and fully vested
participation.

* First and foremost, ensure executive support: Know where you stand,
what your sanctions are and the levels of support for every aspect of
ERP. Executive buy-in is vital to ultimate success.
* Diagram existing business processes and map existing workflows, have
"business eyes" acknowledge their accuracy and document them with a
business sign-off.
* Diagram proposed changes to business process and new workflows in
service to the business.
* Expose any "shadow" systems, procedures, workarounds and so forth,
that fly under the radar. Unless it's absolutely necessary, avoid
continuing them because they would obviously undermine ERP's
advantages, reach and purpose. (In fact, your survey of the business
should help tease these shadow processes out, and assist in
documenting and formalizing them.)
* Ensure that financial support exists for customizations.
* Develop ROI measurements and analysis to expose present
opportunities (and initial customization needs), as well as evolving
opportunities against which you can assess the adaptability and
affordability of an ERP system.
* Ensure that expected levels of customization are supported by
available or future staff, and that consolidations of resources and
any job eliminations are fully understood so as to serve true ROI. As
such, the human resources department (HR) should have a presence on
the BIT.
* It may sound obvious, but management and end users must be involved
in every step of ERP implementation planning. Seek feedback through
all steps and brand ERP as our shared system driven by business.
* In concert with business, define intentions and goals. Establish
metrics for progress and the rapid exposure of problems for fast
resolution during the implementation period, as well as use
post-delivery.

Determine whether a phased or all-at-once approach makes sense for your
enterprise. The all-at-once approach may create too much disturbance and
interruption, so part of this decision will be determined by the overall
skill, culture and willingness of the organization's business and IT
staff. It will also be determined by the expectations of senior executive
management and their sanction.

Organizations that have weathered comprehensive, challenging
implementations have the experience, and therefore the culture to remain
positive and push toward ultimate success. If your IT staff is a little
green, or if your business counterparts are nervous, you may be better
served by a phased approach.

Post-ERP implementation considerations

A post-implementation assessment of your ERP system is an important step,
and should be followed by periodic reviews and actions:

* Following delivery, have an established roster of surveys and
measurements to expose level of use versus best (expected) use of the
system. Be prepared to modify and institute better surveys according
to needs.
* Deliver survey results to senior executive management and respective
functional business areas.
* Help the business carry out ERP's effects: Close gaps in
performance, conduct training, make suggestions, seek advice from the
vendor and so forth.
* Place specific surveys and responsibility for reporting in business
areas -- in other words, tether ERP's ROI to stakeholder observations.
* Guide all post-delivery business engagement regarding ERP through
this prism: the maximization of all efforts toward best fit and best
use.
* Survey for routine updates.
* Survey to anticipate necessary corrections.

Bottom line: Ensure sanction from senior executive management to make
certain there is full stakeholder engagement in each functional area of
business that comes under ERP's influence. This will serve the
implementation and its associated challenges, and will ensure ERP's best
use for maximum ROI.

David Scott is a Fortune 100 IT professional. He is the author of
I.T.Wars: Managing the Business-Technology Weave. Contact him at
David-Scott@david-scott.net.


Fanky Christian
Business Development Director
PT. DAYA CIPTA MANDIRI SOLUSI
IBEC Building 2nd Fl
Jl. KH Wahid Hasyim No.84-86
Jakarta Pusat, 10340, Indonesia
SMS: 62-21-98054359
Telp: 62-21-3924716
Fax: 62-21-3903432
mobile: 62-812-1057533
www.dayaciptamandiri.com

Online Store: www.tokofc.com

visit:
- dayaciptamandiri.blogspot.com
- fankychristian.blogspot.com
- www.facebook.com/fanky.christian

Structure Cabling and Data Center
|AMP|BrandRex|CCSI|NetViel|Goldbach|UniFlair|Mira|APC|
|Fingerprint|FM200|FirePro|
|Cisco Systems|Juniper|Raisecom|Proscend|

Multimedia
|Kiosk System|
|finosMQS - multimedia queuing system|
|finosMDS - digital signage system|
|finosSQM - sequence queuing system|

SMS Gateway
|SendQuick|OZEKI NG|

Enterprise Management
|OpManager|AppManager|ServiceDesk Plus|NetflowAnalyzer|
|Desktop Central|Firewall Analyzer|FacilityDesk|Solarwinds|

Database and Chart
|FusionCharts|Navicat|

Services
|Network Implementation Services|Operation Support Services|

Sunday, December 19, 2010

Selamat kepada PT. TASPEN (Tbk)

Selamat kepada PT.Taspen (Tbk) yang telah memilih solusi Fusioncharts
untuk memaksimalkan visualisasi aplikasi dengan menggunakan XML/HTML5.

Fusioncharts merupakan produk unggulan dari Infosoft Global Private Ltd,
berbasis di Hongkong dan India. Produk Fusioncharts merupakan salah satu
produk terbaik mereka yang banyak digunakan oleh banyak perusahaan,
instansi dan website personal untuk memvisualisasikan charts dengan cara
yang mudah dan elegan.

Kami sebagai sole-reseller untuk Indonesia sangat bangga memiliki produk
unggulan ini, yang banyak membantu klien dan mitra untuk menghasilkan
report dan aplikasi yang baik.

Silahkan pelajari produknya di www.fusioncharts.com

Hubungi kami untuk keperluan Fusioncharts Anda:

Fanky Christian
Business Development Director
PT. DAYA CIPTA MANDIRI SOLUSI
IBEC Building 2nd Fl
Jl. KH Wahid Hasyim No.84-86
Jakarta Pusat, 10340, Indonesia
SMS: 62-21-98054359
Telp: 62-21-3924716
Fax: 62-21-3903432
mobile: 62-812-1057533
www.dayaciptamandiri.com

Online Store: www.tokofc.com

visit:
- dayaciptamandiri.blogspot.com
- fankychristian.blogspot.com
- www.facebook.com/fanky.christian

Structure Cabling and Data Center
|AMP|BrandRex|CCSI|NetViel|Goldbach|UniFlair|Mira|APC|
|Fingerprint|FM200|FirePro|
|Cisco Systems|Juniper|Raisecom|Proscend|

Multimedia
|Kiosk System|
|finosMQS - multimedia queuing system|
|finosMDS - digital signage system|
|finosSQM - sequence queuing system|

SMS Gateway
|SendQuick|OZEKI NG|

Enterprise Management
|OpManager|AppManager|ServiceDesk Plus|NetflowAnalyzer|
|Desktop Central|Firewall Analyzer|FacilityDesk|Solarwinds|

Database and Chart
|FusionCharts|Navicat|

Services
|Network Implementation Services|Operation Support Services|

Zoho Targets the Enterprise With New Accounting, Telephony Functionality

Zoho has enhanced its CRM app with new accounting and telephony
functionality via integration with QuickBooks and several telephony
systems.

Zoho CRM for QuickBooks and Zoho PhoneBridge -- which hooks into PBX
systems from Asterisk, Avaya, Elastix, and Trixbox -- each take about 20
to 30 minutes to download and configure, Raju Vegesna, Zoho evangelist,
told CRM Buyer.

Zoho added the functionality in pursuit of its larger goal to expand its
reach into related CRM areas, such as order management and call tracking,
and embed itself deeply into the enterprise.

Zoho CRM for QuickBooks

Connecting Disparate Accounting, Customer Data

At bottom, the integration with QuickBooks -- specifically the on-premise
version of QuickBooks, not its online iteration -- is all about giving
Zoho customers a way to automate the financial data that is inevitably
generated from a sale or marketing contact, Vegesna said.

"Until now, a user would have to manually re-input the customer data that
results from the sale into the accounting systems," he said. Once the
integration between Zoho CRM and QuickBooks is activated, account and
customer data are automatically generated in both systems.

The company began experimenting with just two Zoho modules at first,
Vegesna explained. "Now we have expanded the integration to six different
modules: contacts, products, quotes, sales orders, vendors and invoices."

To implement the integration, users first download a small piece of
software offered by QuickBooks, called "Web Connectors." Then the user
configures Zoho CRM for the integration. The configuration options in the
integration allow users to resolve conflicts while synchronizing data, set
up field mapping for standard and custom fields, and view history of data
transfers.

Pricing for Zoho CRM for QuickBooks is US$25 per organization per month.
Zoho PhoneBridge

The integration and implementation process for Zoho PhoneBridge is
similar, Vegesna said. The company plans to extend PhoneBridge to other
Zoho applications besides CRM -- and it plans to develop integrations to
other telephony systems, such as Cisco (Nasdaq: CSCO).

Zoho PhoneBridge


When the integration goes live, Zoho users can support telemarketers,
sales reps and customer support agents with the contact data in Zoho CRM.
It is perfect for a variety of outbound and inbound call marketing
strategies, Vegesna said, as it automatically displays key contact details
such as name, telephone number and email address as a screen pop-up during
a call, and captures and logs all call details, including notes added
during a call.

The integration allows the user to store the customer communications in
Zoho CRM.

Zoho PhoneBridge is priced at $6 per user per month.

Contact us for your 'zoho' requirements:

Fanky Christian
Business Development Director
PT. DAYA CIPTA MANDIRI SOLUSI
IBEC Building 2nd Fl
Jl. KH Wahid Hasyim No.84-86
Jakarta Pusat, 10340, Indonesia
SMS: 62-21-98054359
Telp: 62-21-3924716
Fax: 62-21-3903432
mobile: 62-812-1057533
www.dayaciptamandiri.com

Online Store: www.tokofc.com

visit:
- dayaciptamandiri.blogspot.com
- fankychristian.blogspot.com
- www.facebook.com/fanky.christian

Structure Cabling and Data Center
|AMP|BrandRex|CCSI|NetViel|Goldbach|UniFlair|Mira|APC|
|Fingerprint|FM200|FirePro|
|Cisco Systems|Juniper|Raisecom|Proscend|

Multimedia
|Kiosk System|
|finosMQS - multimedia queuing system|
|finosMDS - digital signage system|
|finosSQM - sequence queuing system|

SMS Gateway
|SendQuick|OZEKI NG|

Enterprise Management
|OpManager|AppManager|ServiceDesk Plus|NetflowAnalyzer|
|Desktop Central|Firewall Analyzer|FacilityDesk|Solarwinds|

Database and Chart
|FusionCharts|Navicat|

Services
|Network Implementation Services|Operation Support Services|

Wednesday, December 15, 2010

10 ways to keep hard drives from failing

10 ways to keep hard drives from failing

Posted in:

10 things

Hardware prices have dropped considerably over the last decade, but it's irresponsible not to care for the hardware installed on machines. This is especially true for hard drives. Hard drives are precious commodities that hold the data employees use to do their jobs, so they should be given the best of care. Inevitably, those drives will die. But you can take steps to prevent a premature hard disk death. Let's examine 10 such steps to care for the health of your drives. Note: This article is also available as a PDF download.

1: Run chkdsk

Hard disks are eventually going to contain errors. These errors can come in the shape of physical problems, software issues, partition table issues, and more. The Windows chkdsk program will attempt to handle any problems, such as bad sectors, lost clusters, cross-linked files, and/or directory errors. These errors can quickly lead to an unbootable drive, which will lead to downtime for the end user. The best way I have found to take advantage of chkdsk is to have it run at next boot with the command chkdsk X: /f where X is the drive you want to check. This command will inform you the disk is locked and will ask you if you want to run chkdsk the next time the system restarts. Select Y to allow this action.

2: Add a monitor

Plenty of applications out there will monitor the health of your drives. These monitors offer a host of features that run the gamut. In my opinion, one of the best choices is the Acronis Drive Monitor, a free tool that will monitor everything from hard drive temperature to percentage of free space (and everything in between). ADM can be set up to send out email alerts if something is amiss on the drive being monitored. Getting these alerts is a simple way to remain proactive in the fight against drive failure.

3: Separate OS install from user data

With the Linux operating system, I almost always separate the user's home directories (~/) from the OS installation onto different drives. Doing this ensures the drive the OS is installed upon will enjoy less reading/writing because so much of the I/O will happen on the user's home drive. Doing this will easily extend the life of the drive the OS is installed on, as well as allow you to transfer the user data easily should an OS drive fail.

4: Be careful about the surrounding environment

Although this seems like it should go without saying, it often doesn't. On a daily basis, I see PCs stuck in tiny cabinets with zero circulation. Obviously, those machines always run hot, thus shortening the lifespan of the internal components. Instead of shoving those machines into tight, unventilated spaces, give them plenty of breathing room. If you must cram a machine into a tight space, at least give it ventilation and even add a fan to pull out that stale, warm air generated by the PC. There's a reason why so much time and money have gone into PC cooling and why we have things like liquid cooling and powerful cooling systems for data centers.

5: Watch out for static

Here's another issue that should go without saying. Static electricity is the enemy of computer components. When you handle them, make sure you ground yourself first. This is especially true in the winter months or in areas of drier air. If you seem to get shocked every time you touch something, that's a good sign that you must use extra caution when handling those drives. This also goes for where you set those drives down. I have actually witnessed users placing drives on stereo speakers, TVs, and other appliances/devices that can give off an electromagnetic wave. Granted, most of these appliances have magnets that are not strong enough to erase a drive. But it's a chance no one should take.

6: Defragment that drive

A fragmented drive is a drive being pushed to work harder than it should. All hard drives should be used in their most efficient states to avoid excess wear and tear. This includes defragmenting. To be on the safe side, set your PC(s) to automatically defrag on a weekly basis. This works to extend the life of your drive by keeping the file structure more compact, so the read heads are not moving as much or as often.

7: Go with a solid state drive

Solid state drives are, for all intents and purposes, just large flash drives, so they have no moving parts. Without moving parts, the life of the drive (as a whole) is naturally going to be longer than it would if the drive included read heads, platters, and bearings. Although these drives will cost more up front, they will save you money in the long run by offering a longer lifespan. That means less likelihood of drive failure, which will cause downtime as data is recovered and transferred.

8: Take advantage of power save

On nearly every OS, you can configure your hard drive to spin down after a given time. In some older iterations of operating systems, drives would spin 24/7 -- which would drastically reduce the lifespan of a drive. By default, Windows 7 uses the Balanced Power Savings plan, which will turn off the hard drive after 20 minutes of inactivity. Even if you change that by a few minutes, you are adding life to your hard drive. Just make sure you don't shrink that number to the point where your drive is going to sleep frequently throughout the day. If you are prone to take five- to 10-minute breaks often, consider lowering that time to no less than 15 minutes. When the drive goes to sleep, the drive is not spinning. When the drive is not spinning, entropy is not working on that drive as quickly.

9: Tighten those screws

Loose mounting screws (which secure the hard drive to the PC chassis) can cause excessive vibrations. Those vibrations can damage to the platters of a standard hard disk. If you hear vibrations coming from within your PC, open it and make sure the screws securing the drive to the mounting platform are tight. If they aren't, tighten them. Keeping your hardware nice and tight will help extend the life of that hardware.

10: Back up

Eventually, that drive will fail. No matter how careful you are, no matter how many steps you take to prevent failure, the drive will, in the end, die a painful death. If you have solid backups, at least the transition from one drive to another will be painless. And by using a backup solution such as Acronis Universal Restore, you can transfer a machine image from one piece of hardware to another piece of hardware with very little issue.

Other suggestions?

Have you found any of the above steps to be especially helpful in extending the life of a hard drive? What other form of wisdom or magic keeps those disks from failing prematurely? Is there a brand you have found that lasts longer than others? Share your experiences with your fellow TechRepublic readers.

posted by Jack Wallen
December 14, 2010 @ 2:11 pm
Sent from my BlackBerry® smartphone from Sinyal Bagus XL, Nyambung Teruuusss...!

Data center facilities equipment and design stats from Gartner conference

Posted by: Matt Stansberry

At this week's Gartner Data Center Conference in Las Vegas, research VP
John Phelps asked users a series of questions about their data center
facilities technologies. Here are some of the stats:

What type of data center fire suppression system do you have?

-Water sprinkler only 21%
-Water plus clean agent 50%
-Clean agent only 21%
-Don't know 8%

"For those of you with water-only systems, if those sprinklers go off you
will be in a world of hurt," Phelps said. "The goal of a sprinkler system
is to protect your building, a clean agent is supposed to protect your
equipment."

If you use a clean agent for data center fire suppression, what type?

-Halon 12%
-CO2 or inert gas 12%
-FM200 or other Fluoride based suppressant 64%
-Powered aerosol 1%
-Don't know 11%

In which budget does data center power reside?

-Facilities 62%
-Facilities but will probably move to IT 16%
-Budget has recently moved to IT 8%
-Always part of IT 12%
-Other 1%
-Don't know 6%

Do you measure PUE and if so, what is it?

-Do not measure PUE 49%
-Measure PUE, but don't know what it is 11%
-Measure PUE and it is greater than 2.5 3%
-Measure PUE and it is between 2.0-2.5 9%
-Measure PUE and it is between 1.75-2 10%
-Measure PUE and it is between 1.5-1.75 12%
- Measure PUE and it is between 1.3-1.5 6%

What computer room cooling system do you use?

-Room cooling 46%
-In-row cooling 4%
-In-rack cooling 1%
-In-row and in-rack cooling 2%
-Room and in-rack cooling 20%
-Room and in-row cooling 15%
-Room, in-rack and in-row cooling10%
-Don't know 2%

Do you use hot or cold aisle containment?

-Yes, cold aisle containment 22%
-Yes, hot aisle containment 15%
-Not currently, but plan to use cold aisle in 2 yeas 22%
-Not currently, but plan to use hot aisle in 2 years 13%
-No plans 23%
-Don't know 5%

Do you make use of free cooling?

-Air side economizers 13%
-Water side economizers 12%
-Both 6%
-Nope and no plans 48%
-No, but plan to install in two years 17%
-Don't know 4%

Would you build a data center in five years without a raised floor?

-No way, you have to have a raised floor? 18%
-Might consider, but not convinced 35%
-Yes, considering it 35%
-Yes, I am going to build a data center without a raised floor 6%
Yes, already built a data center without a raised floor 6%

Phelps said by 2015 more than 50% of new data center builds will not use
raised floor.

Hubungi kami untuk pembangunan data center Anda:

Fanky Christian
Business Development Director
PT. DAYA CIPTA MANDIRI SOLUSI
IBEC Building 2nd Fl
Jl. KH Wahid Hasyim No.84-86
Jakarta Pusat, 10340, Indonesia
SMS: 62-21-98054359
Telp: 62-21-3924716
Fax: 62-21-3903432
mobile: 62-812-1057533
www.dayaciptamandiri.com

Online Store: www.tokofc.com

visit:
- dayaciptamandiri.blogspot.com
- fankychristian.blogspot.com
- www.facebook.com/fanky.christian

Structure Cabling and Data Center
|AMP|BrandRex|CCSI|NetViel|Goldbach|UniFlair|Mira|APC|
|Fingerprint|FM200|FirePro|
|Cisco Systems|Juniper|Raisecom|Proscend|

Multimedia
|Kiosk System|
|finosMQS - multimedia queuing system|
|finosMDS - digital signage system|
|finosSQM - sequence queuing system|

SMS Gateway
|SendQuick|OZEKI NG|

Enterprise Management
|OpManager|AppManager|ServiceDesk Plus|NetflowAnalyzer|
|Desktop Central|Firewall Analyzer|FacilityDesk|Solarwinds|

Database and Chart
|FusionCharts|Navicat|

Services
|Network Implementation Services|Operation Support Services|

Monday, December 13, 2010

Selamat kepada ACSC Banjarmasin

Selamat kepada ACER Service Center di Banjarmasin yang telah
mengimplementasikan sistem antrian multimedia finosMQS.

Sistem antrian multimedia finosMQS terbukti sangat membantu untuk
mengukur kinerja layanan staf dan menentukan langkah terbaik bagi
manajemen untuk memberikan layanan terbaik dan terukur dari waktu ke
waktu. Produk finosMQS telah dipasarkan sejak tahun 2005 dan ACER
merupakan customer yang setia menggunakan produk ini.

Kami senang melayani ACER.

Kontak kami untuk keperluan sistem antrian multimedia di perusahaan /
tempat Anda.

Fanky (08121057533)

Friday, December 10, 2010

5 Higher Ed Tech Trends To Watch in 2011 (Outside Indonesia)

5 Higher Ed Tech Trends To Watch in 2011

Three higher ed tech experts discuss technology trends for the year ahead,
citing increased mobile and wireless access and cloud computing among
them. But are campuses also in for a little bit of a return to the
"basics" in the coming year?

* By Bridget McCrea
* 12/09/10

Technology that was unimaginable a decade or so ago is commonplace on
today's campuses. In 2010 American colleges and universities responded to
the ever-advancing IT requirements of their students and faculty with
mobile pilot programs, investments in online learning, massive network
overhauls, and initiatives designed to offset some of the increases in
energy use brought on by all these new technologies, among other novel
programs.

What will 2011 bring? Campus Technology spoke with a handful of higher
education technology experts to get their take. We've compiled their top 5
responses here.

1. The Cloud Computing Movement Will Continue.

Investing in purchase-and-install software is falling by the wayside as
institutions catch onto the value of using "cloud" applications that are
housed (and accessed) online. Not only are these options more affordable
and easier to implement, but they also include vast storage capacity that
can be used for, say, portfolio assessments. "Using cloud computing,
schools can create large collections of loosely-sorted data (such as
school records, written documents and even video recordings)," said Bob
Spielvogel, CTO at EDC, a Newton, MA-based nonprofit that creates programs
to address educational challenges, "and then utilize that information to
track project activity and conduct portfolio assessments across the
student's entire college career." With these and other uses gaining ground
in the higher education space, expect cloud computing's popularity to grow
in 2011.

2. More Work Will Be Done Without Wires.

Being tethered to an outlet or Ethernet connection is so passé for college
students, teachers, and administrators. With more and more of these
individuals using mobile devices to connect to the Internet, the wireless
wave is sure to grow in 2011.

"We're seeing a continued migration towards tablets and other mobile
computers beyond just the Ipad," said Spielvogel. "As more technology
vendors introduce lower-cost devices, and as these types of computers
become more economically feasible, we'll see even more WiFi introduced to
support their use."

3. Mobile Technologies Will Continue to Proliferate in the Classroom.

There's no doubt that students have become more mobile in terms of the
technology they're using, and colleges seem determined to keep up with
that trend. David Stoloff, a professor in Eastern Connecticut State
University's education department, said the Willimantic, CT school has
embraced the notion of "laptops and mobile devices in class" to the point
where it's implemented interactive portfolio assessment technology to help
maximize the trend.

"We're not quite at the point of every student using a laptop in class,
but we're definitely getting there," said Stoloff, who added he expects
the mobile trend to take an even stronger hold on higher education in
2011. "It provides a great way to supplement classroom instruction in a
productive manner."

4. Online Education will even Further Displace Seat Time.

Stoloff, who attended the most recent Sloan-C Conference on Online
Learning, said 2011 will find more colleges integrating online learning
into their curriculums as core offerings, and not just adjuncts to
classroom learning.

"New high school graduates have less and less patience for sitting and
listening to long lectures in college," Stoloff said. "They want to be
more active, and that means getting their hands on computers."

Looking out even further, Stoloff painted a future picture where colleges
are less focused on "seat time" and more on validating learning regardless
of where it takes place (be it overseas, in the community, or in a
traditional classroom). "Engagement will become the central issue for
education in the future," said Stoloff, "and learning won't necessarily be
defined by how much 'seat time' a student has put in."

5. A Retreat from Technology Overload is Imminent.

As the Master of Arts in Teaching and Technology program director for the
Marlboro College Graduate School in Marlboro, VT, Caleb Clark uses blended
learning, e-portfolios, WordPress, and other Web media tools in the
classroom. And while he doesn't dispute the value of these and the
multitude of other technology innovations being used in higher education
right now, he does expect a slight pullback on the technology hype in 2011
as people get back to basic communications and human interactions (outside
of Facebook and Twitter).

"We're in an over-adoption stage right now," said Clark. "To get through
it, we're going to need to get students to close their laptops and get
back in touch with the other side of their desks--the one that doesn't
face their computers."

About the Author

Bridget McCrea is a business and technology writer in Clearwater, FL. She
can be reached at bridgetmc@earthlink.net.


What we will have in Indonesia? Wait for my next article..

Ozeki NG SMS Gateway v3.16 released

for SMS,MMS and Voice calls

Check out the new voice call feature...

Ozeki NG is known to be a very reliable software when it comes to SMS/MMS
messaging. It can handle large load of traffic and it operates seemlesly
in the background 24/7. It also integrates very well with the corporate
infrastructure as it can send SMS messages directly from a database
through various communication channels.

With the release of Ozeki NG v3.16, companies will have a new ability to
dial telephone numbers automatically and to play in a voice messages after
the call has been picked up.

To jump to some early conclusions about the new voice call feature of
Ozeki NG SMS Gateway, we can state that it is a great addition to mobile
messaging. Adding voice messaging capability to mobile messaging systems
is a benefit for all. Now the users can select the best suited message
type for the given situation. A decision can be made to send out an SMS
text message to a mobile phone, to send out a multimedia MMS message
containing pictures and various attachments, or to automatically dial the
telephone number and to play in a voice message. The voice messages can be
a previously recorded audio file or text read out using the built in text
to speech converter


It's up to the user to determine which communication method is more
appropriate for a business case. This decision can be made on a per
messages basis. It is safe to bet, that SMS will still be the most popular
option, but in many cases voice calls will give better results. All
message types have certain advantages, but the most important thig is the
ability to be able to select the message type according to the preferences
of customers, suppliers, employees and the business itself.
Text messages (SMS and MMS)
In todays mobile messaging systems SMS text messages are often used in a
two way scenario. An IT system can send out SMS messages to mobile phones
to notify people about certain events, and people can send reply SMS
messages back to confirm they have received the message. The message
exchange can also be initiated by the mobile user, who sends in an SMS
message and receives a response from the system. Ozeki NG SMS Gateway
makes this two way communication possible.
Voice calls
Automated voice calls are appropriate when the mobile user needs to be
contacted urgently, or it is important to have an immediate reply or
information about wether he got the message or not.

The voice call feature of Ozeki NG SMS Gateway can be accessed the same
way as the SMS feature. A telephone number and the message text (or a file
name to a previously recorded audio file) should be provided. After
receiving the request Ozeki NG will dial the telephone number and when the
call is picked up by the remote end it will read in the text using the
built in text to speech engine (or it will play the previously recorded
audio file).

During the call the remote party can optionally press a DTMF key on the
telephone to confirm the call. In all cases a report is returned to the
application containing information about wether the call was successfully
completed, what percentage of the audio was played, and which DTMF key did
the remote party press. This way confirmed notifiactions and customers
surveys can be executed with great efficiency.
Setting up an automated SMS or Voice call system in your company
It is very easy to setup a system, that makes it possible to communicate
with mobile users through SMS text messages or voice calls. The first step
is to download Ozeki NG SMS Gateway and to install it on one of your
Windows computers. After the SMS gateway is installed, you need to setup a
communication link to the telephone network.

For SMS/MMS communication you can use a GSM modem or an IP SMS connection
as the communication link to the mobile telephone network. A GSM modem is
basicly a mobile phone that is attached to your computer with a data
cable. It can send SMS messages to the mobile network the same way your
standard mobile handset does. (If you don't have a GSM modem on hand, you
can order one directly from us.) The term IP SMS connection referes to an
SMS service provided over the Internet. This service is often provided by
mobile network operators for those who want to send large volume of
messages. There are many IP SMS service providers out there who can supply
connection details to their service. If you use an IP SMS connection your
Ozeki NG SMS Gateway system will forward the SMS messages to the mobile
telephone network through the Internet.

For making voice calls you have three options to setup a communication
link to the telephone network. (An SMS connection cannot be used for voice
calls.) For voice calls you can use a GSM Voice gateway (If you don't have
one, you can order one from us.), or you can sign up for a SIP account at
a VoIP telephone service on the Internet, or if you have an IP PBX with
SIP support in your office, you can configure Ozeki NG to use it for
making outgoing voice telephone calls.

Detailed configurations for all of the above options are available on this
website. Once the communication link to the telephone network is
established you can send out test messages from the graphical user
interface of Ozeki NG SMS Gateway. If you have configured an SMS link you
can send SMS, if you have configured a voice link, you can ask the
software to dial voice calls, if you have setup both you will have both
message types available.
Taking advantages of the system
Once an SMS/Voice gateway system has been installed and connected to the
telephone network, SMS and voice call services can be launched and
applications can be built. The common goal for these services and
applications is to pass outgoing messages to Ozeki NG SMS Gateway and to
be able to receives messages from it. To achieve this goal Ozeki NG SMS
Gateway provides many interfaces.

Common interfaces are:
# Database
# HTTP
# SMPP
# E-mail
# Text file
# Command line

All of these interfaces can be used for passing both SMS messages and
Voice calls to Ozeki NG SMS Gateway. The role of Ozeki NG SMS Gateway in
this environment is to forward messages between your application and the
telephone network. It is a gateway, that simplifies communication.

To launch a service or to build an application the first thing to do is to
determine which interface is the most appropriate. The most popular
interface among businesses is the Database interface. For example if your
company uses an SQL database server (MS SQL, Oracle, Mysql, etc) for
storing information, you will probably find it easy to send SMS messages
or to initiate voice calls by simply inserting a new record into the
database. Ozeki NG SMS Gateway can be configured to pickup outgoing SMS
text messages and Voice messages from database tables. Incoming messages
can be also inserted into database tables.
How to send SMS and Voice messages
After you have setup your system, you are ready to send messages. You can
specify wether you want to send SMS or Voice by specifying the message
type parameter of the message. For SMS messages SMS:TEXT, for Voice calls
AUDIO:WAV and AUDIO:TEXT are the message types you can use. The following
webpages give an insight on how to send SMS and Voice messages:

Quick start quide for setting up an SMS system

How to send Voice messages
Conclusion
If you would like to improve your business processes with automated mobile
messaging, both SMS messages and Voice calls can be used. In either case
you can reach the people you want to get in touch with in more
efficicently way then through traditional communication channels, such as
e-mail, human initiated calls. Ozeki NG SMS Gateway equipped with the
Voice call addon gives you the ability to exploit the mobile messaging
technology. It's worth to give a try and evaluate a license, by
downloading the free trial version from the following URL:

Download Ozeki NG SMS Gateway trial version.
(http://www.ozekisms.com/index.php?owpn=112)

Contact us for schedule presentation / demo:
Fanky Christian
Business Development Director
PT. DAYA CIPTA MANDIRI SOLUSI
IBEC Building 2nd Fl
Jl. KH Wahid Hasyim No.84-86
Jakarta Pusat, 10340, Indonesia
SMS: 62-21-98054359
Telp: 62-21-3924716
Fax: 62-21-3903432
mobile: 62-812-1057533
www.dayaciptamandiri.com

Online Store: www.tokofc.com

visit:
- dayaciptamandiri.blogspot.com
- fankychristian.blogspot.com
- www.facebook.com/fanky.christian

Structure Cabling and Data Center
|AMP|BrandRex|CCSI|NetViel|Goldbach|UniFlair|Mira|APC|
|Fingerprint|FM200|FirePro|
|Cisco Systems|Juniper|Raisecom|Proscend|

Multimedia
|Kiosk System|
|finosMQS - multimedia queuing system|
|finosMDS - digital signage system|
|finosSQM - sequence queuing system|

SMS Gateway
|SendQuick|OZEKI NG|

Enterprise Management
|OpManager|AppManager|ServiceDesk Plus|NetflowAnalyzer|
|Desktop Central|Firewall Analyzer|FacilityDesk|Solarwinds|

Database and Chart
|FusionCharts|Navicat|

Services
|Network Implementation Services|Operation Support Services|

Thursday, December 09, 2010

Navicat for SQL Server

Today we are glad to announce the release of Navicat™ for SQL Server,
adding a new member to the Navicat family.

To meet the wishes of Navicat customers and the demand of managing
Microsoft® SQL Server database through a GUI, Navicat for SQL Server
is introduced to the Navicat family in this launch. This new product
provides SQL Server users a tool for administering and managing
database objects as well as for database migration, data import,
export, synchronization, reporting, and more.

Major Features in Navicat for SQL Server:

# Support of Microsoft SQL Server version 2000 to 2008R2
# Management of SQL Server objects
# Cross data transfer between different SQL Server databases
# Synchronizing data between different SQL Server databases
# Importing data to SQL Server from various data sources
# Exporting data from SQL Server to various formats
# Available for MS Windows and Mac OS X

We are Navicat reseller for Indonesia, contact us for detail.
- Fanky Christian - 08121057533
- Alexander K.S - 021-3907418

Tuesday, December 07, 2010

Five+ tips to ensure PCI DSS compliance

On occasion, I help a friend who owns several businesses. His latest venture is required to comply with the Payment Card Industry Data Security Standard (PCI DSS). My friend is computer savvy. So between the two of us, I assumed the network was up to snuff. Then went through a compliance audit. The audit was eye opening. We embarked on a crash course in PCI DSS compliance with the help of a consultant. My friend thought the consultant could help prepare for the mandatory adoption of PCI DSS 2.0 by January 1, 2011. The PCI Security Standards Council defines PCI DSS this way: "The goal of the PCI Data Security Standard is to protect cardholder data that is processed, stored, or transmitted by merchants. The security controls and processes required by PCI DSS are vital for protecting cardholder account data, including the PAN -- the primary account number printed on the front of a payment card." The consultant's first step was to get familiar with the network. He eventually proclaimed it to be in decent shape, security-wise. Yet the look on his face told us there was more. Sure enough, he went on to explain that more attention must be paid to protecting cardholder data.

Back to school

The consultant pointed out that PCI DSS consists of 12 requirements. These requirements are organized into six guides. Although the requirements are for PCI DSS compliance, I dare say the guides are a good primer for any business network, regardless of whether PCI DSS is a factor. With that in mind, I've used the guides as the basis for these tips.

1: Build and maintain a secure network

Guide 1 states the obvious, and books have been written on how to secure a network. Thankfully, our consultant gave us some focus by mentioning that PCI DSS places a great deal of emphasis on the following:

Well-maintained firewalls are required, specifically to protect cardholder data.

Any and all default security settings must be changed, specially usernames and passwords.

Our consultant then asked whether my friend had offsite workers who connected to the business's network. I immediately knew where he was going. PCI DSS applies to them as well -- something we had not considered but needed to.

2: Protect cardholder data

Cardholder data refers to any information that is available on the payment card. PCI DSS recommends that no data be stored unless absolutely necessary. The slide in Figure A (courtesy of PCI Security Standards Council) provides guidelines for cardholder-data retention.

One thing the consultant stressed: After a business transaction has been completed, any data gleaned from the magnetic strip must be deleted. PCI DSS also stresses that cardholder data sent over open or public networks needs to be encrypted. The minimum required encryption is SSL/TLS or IPSEC. Something else to remember: WEP has been disallowed since July 2010. I mention this as some hardware, like legacy PoS scanners, can use only WEP. If that is your situation, move the scanners to a network segment that is not carrying sensitive traffic.

3: Maintain a vulnerability management program

It's not obvious, but this PCI DSS guide subtly suggests that all computers have antivirus software and a traceable update procedure. The consultant advised making sure the antivirus application has audit logging and that it is turned on. PCI DSS mandates that all system components and software have the latest vendor patches installed within 30 days of their release. It also requires the company to have a service or software application that will alert the appropriate people when new security vulnerabilities are found.

4: Implement strong access control measures

PCI DSS breaks access control into three distinct criteria: digital access, physical access, and identification of each user:

Digital access: Only employees whose work requires it are allowed access to systems containing cardholder data.

Physical access: Procedures should be developed to prevent any possibility of unauthorized people obtaining cardholder data.

Unique ID: All users will be required to have an identifiable user name. Strong password practices should be used, preferably two-factor.

5: Regularly monitor and test networks

The guide requires logging all events related to cardholder data. This is where unique ID comes into play. The log entry should consist of the following:

User ID

Type of event, date, and time

Computer and identity of the accessed data

The consultant passed along some advice about the second requirement. When it comes to checking the network for vulnerabilities, perform pen tests and scan the network for rogue devices, such as unauthorized Wi-Fi equipment. It is well worth the money to have an independent source do the work. Doing so removes any bias from company personnel.

6: Maintain an information security policy

The auditor stressed that this guide is essential. With a policy in place, all employees know what's expected of them when it comes to protecting cardholder data. The consultant agreed with the auditor and added the following specifics:

Create an incident response plan, since figuring out what to do after the fact is wrong in so many ways.

If cardholder data is shared with contractors and other businesses, require third parties to agree to the information security policy.

Make sure the policy reflects how to take care of end-of-life equipment, specifically hard drives.

Final thoughts

There is a wealth of information on the PCI Security Standards Council's Web site. But if you are new to PCI DSS, or the least bit concerned about upgrading to 2.0, I would recommend working with a consultant.

posted by Michael Kassner
December 6, 2010 @ 12:46 pm

Sent from my BlackBerry® smartphone from Sinyal Bagus XL, Nyambung Teruuusss...!

Saturday, December 04, 2010

Selamat kepada SRIWIJAYA EYE CENTER

Selamat kepada Sriwijaya Eye Center, Palembang,  yang telah mengimplementasikan sistem antrian finosSQM untuk mendukung operasionalnya.

Kami sungguh senang melayani Anda.

Anda kesulitan mencari ujung patchcord cables ?

Seringkali dalam melakukan troubleshooting terkait perkabelan,
khususnya cat5e dan cat6 di ruangan data center akan menemukan
kesulitan. Hal ini semata karena kurang baiknya dokumentasi yang kita
lakukan. Untuk menolong kita menemukan kabel yang tepat, maka Patchsee
memberikan solusinya. Dengan mengganti kabel patchcord Anda dengan
menggunakan kabel PatchCord PatchSee, maka dengan mudah kita bisa
menemukan cable yang kita cari.

PatchSee juga memudahkan kita untuk membedakan warna dengan
menggunakan tag warna yang ada.

Silahkan kontak kami untuk kebutuhan PatchSee Anda...

Friday, December 03, 2010

A New Approach to Business Intelligence: Rapid-fire BI

A New Approach to Business Intelligence: Rapid-fire BI

What is this new generation of business intelligence? Whether you've
heard it called new BI, self service BI or rapid-fire BI, this
whitepaper will help you and your IT team make sense of what it is,
how to identify it and how you and your organization can benefit.

Business intelligence initiatives continue to top CIO priorities, as
executives and managers demand greater visibility into business data
much faster. Traditional business intelligence platforms have fallen
short of delivering rapid analytics and insights. But that's changing.
A new kind of BI is here: rapid-fire BI.

Rapid-fire BI is a new approach to providing true business
intelligence delivering dramatically better business results. While
traditional BI platforms perfected scheduled, parameterized reports,
they do not do what they now espouse: provide self-service business
intelligence.

This paper addresses the key attributes of a Rapid-Fire BI Solution:

* User-Driven Approach
* Easy Visual Interfaces
* Flexible Configurations
* High Performance
* Easy Administration

Rapid-fire BI provides end-user freedom in an environment that
leverages existing IT infrastructure and recognizes that not all data
is in the enterprise data warehouse. It's about where people can take
advantage of the new generation of easy visual interfaces and visual
intelligence that make trends and outliers easy to detect. And it's
about low cost of ownership. It grows to fit your needs on your
timeline, leverages your existing infrastructure as much as possible
and never requires long implementation phases or specialty technical
skills.

Authors:
Dr. Chris Stolte, VP, Engineering - Tableau Software
Dan Jewett, VP, Product Management - Tableau Software
Dr. Pat Hanrahan, CTO - Tableau Software

download here:
http://www.tableausoftware.com/files/Rapid-fire-BI-A-New-Approach-to-Business-Intelligence--Tableau.pdf

Friday, November 26, 2010

Welcome to the 2010 Open Source Awards : Packt Open Source Awards 2010

The Open Source Awards is a contest that aims to encourage, support,
recognize and reward Open Source projects.

The winners of the 2010 Open Source Awards are listed below.

To identify the excellence among Open Source projects, public votes
for the finalists in each category were combined with ratings from a
panel of Judges.


Winners


Open Source CMS

Every Content Management System (CMS) that is based on one of the Open
Source licenses were eligible to participate in this category.

We are pleased to announce that CMS Made Simple has won the Open
Source CMS category in the 2010 Open Source Awards.

Winner: CMS Made Simple

1st Runner up: SilverStripe

2nd Runner up: MODx


Congratulations to CMS Made Simple and commiserations to the Open
Source projects that took part in the finals for this category but
just missed out.
Hall of Fame CMS

This category is reserved for those CMSes that have won the Open
Source CMS Award at least once in previous years.

We are pleased to announce that WordPress has won the Hall of Fame CMS
category in the 2010 Open Source Awards.*

Winner: WordPress

1st Runner up: Drupal

2nd Runner up: Joomla!

*As a result of a tie between Drupal and WordPress, an extra
independent judge Mark King was brought in for a decisive vote.

Congratulations to WordPress and a thank you to Drupal and Joomla! for
taking part in the Awards this year.
Most Promising Open Source Project

All Open Source projects, that have had its first release date less
than two years from 9 August, 2010, were eligible to participate in
this category.

We are pleased to announce that Pimcore has won the Most Promising
Open Source Project category in the 2010 Open Source Awards.

Sponsored by OpenCandy

Winner: Pimcore

1st Runner up: TomatoCMS

2nd Runner up: BuddyPress

Congratulations to Pimcore and commiserations to the Open Source
projects that took part in the finals for this category but just
missed out.
Open Source E-Commerce Applications

This category is reserved for the type of web applications that
simplify buying and selling of products on the Internet.

We are pleased to announce that PrestaShop has won the Open Source
E-Commerce Applications category in the 2010 Open Source Awards.

Winner: PrestaShop

1st Runner up: OpenCart

2nd Runner up: Tomato Cart

Congratulations to PrestaShop and commiserations to the Open Source
projects that took part in the finals for this category but just
missed out.
Open Source Graphics Software

This category, as the name suggests, is for all Graphic Application
Software that is used for graphic design, multimedia development,
specialized image development, general image editing, or simply to
access graphic files.

We are pleased to announce that Blender has won the Open Source
Graphics Software category in the 2010 Open Source Awards.

Winner: Blender

1st Runner up: GIMP

2nd Runner up: Inkscape

Congratulations to Blender and commiserations to the Open Source
projects that took part in the finals for this category but just
missed out.
Open Source JavaScript Libraries

This category is reserved for JavaScript libraries, libraries of
pre-written JavaScript controls which allow for easier development of
RIAs (Rich Internet Applications), visually enhanced applications or
smoother server-side JavaScript functionalities.

We are pleased to announce that jQuery has won the Open Source
JavaScript Libraries category in the 2010 Open Source Awards.

Winner: jQuery

1st Runner up: Mootools and Raphaël

Congratulations to jQuery and commiserations to the Open Source
projects that took part in the finals for this category but just
missed out.

Thursday, November 25, 2010

Gartner Identifies Four Converging Trends That Will Change the Face of IT and Business

Analysts Look Back and Forward 20 Years in IT as Gartner Celebrates 20 Years of Symposium/ITxpoSydney, Australia, November 15, 2010 — 
From social media to intelligent devices to cloud computing, evaluating how these technologies fit into an organization and their impact on the bottom line will become a critical function of the C-level executive, according to Gartner, Inc. In future, the impact of IT on revenue will be directly related to the financial compensation of CIOs.
Speaking in the keynote presentation at Gartner Symposium/ITxpo in Sydney this morning, Peter Sondergaard, senior vice president at Gartner and global head of Research, said that particularly in the high-growth markets of Asia Pacific, successful organizations are those that can quickly evolve their strategies from recessionary cost control to innovative implementations of technology that generate revenue.
Gartner Symposium/ITxpo is celebrating its 20th anniversary around the world in 2010, and Mr. Sondergaard looked at how during that time IT has transformed business, launched new industries, and helped drive the global economy.
“At the heart of the change in the next 20 years will be intelligence drawn from information,” Mr. Sondergaard said. “Information will be the ‘oil of the 21st century’. It will be the resource running our economy in ways not possible in the past.”
Gartner has identified four broad trends that will change IT, and the economy, in the next 10 years:
  1. Cloud
  2. Business impact of social computing
  3. Context Aware Computing
  4. Pattern Based Strategy
Cloud computing is a style of computing where scalable and elastic IT-related capabilities are provided “as a service” to external customers using Internet technologies. It constitutes the basis of a discontinuity that amounts to a new opportunity to shape the relationship between those who use IT services and those who sell them.
“Cloud computing will transform the IT industry as it will alter the financial model upon which investors look at technology providers, and it will change vertical industries, making the impact of the Internet on the music industry look like a minor bleep,” said Mr. Sondergaard. “For the CIO, it will require a shift from multisourcing to microsourcing, which is quite a different skill.”
The second major trend is the business impact of social computing. Not simply more platforms such as Facebook or Twitter, the real impact will come as the underlying ethos, culture and attitudes which shape social computing and have driven growth to date, pervade the enterprise and blur the boundaries between personal and professional activities.
“The rigid business processes which dominate enterprise organizational architectures today are well suited for routine, predictable business activities. But they are poorly suited to support people who’s jobs require discovery, interpretation, negotiation and complex decision-making,” Mr. Sondergaard said. “Social computing, not Facebook, or Twitter, or LinkedIn, but the technologies and principals behind them will be implemented across and between all organizations, it will unleash yet to be realized productivity growth, it will contribute to economic growth.”
The third major trend impacting IT leaders is Context Aware Computing. The proliferation and availability of wireless technologies – coupled with an explosion of super intelligent devices – notebooks, tablets and smartphones -- in the hands of consumers– linked to cost effective compute and communication capabilities in all physical products – has created a new Internet fabric.
“This enables the creation of software and services that will blend data, text, graphics, audio and video with context such location, language, desires, feelings. Services not imagined today will use people’s location – whether physical or virtual - as the foundation and then use data that determine your patterns of behavior, your desires,” Mr. Sondergaard said. “Context Aware Computing while linear in its impact on IT will have profound impact on organizations, on the way we do business.”
The last trend is Pattern-Based Strategy. A Pattern-Based Strategy provides a framework to proactively seek patterns from traditional and non-traditional sources, model their impact, and adapt according to the needs of the pattern.
This builds on pattern-based technologies such as social network analysis, context aware technologies and predictive analytic tools. It will allow IT leaders to seek-out patterns amidst the burgeoning information sources and model future possibilities.
“The combination of these four trends creates an unimaginable force impacting not just IT and the IT industry, but the capability of business and government,” Mr. Sondergaard said. “Each of these four trends is about driving IT business value. Whether IT acts now or not, the combination of these trends will drive dramatic change in your enterprises’ business model and strategy.”
A video replay of Mr. Sondergaard’s keynote will be available via the Gartner Symposium/ITxpo Webinar Series. The webinar series will provide full video replays of the Gartner Symposium/ITxpo keynotes, as well as selected Gartner analyst presentation. More information is available at http://mediazone.brighttalk.com/event/Gartner/27d8d40b22-4312-intro.

Gartner: 5 tips for cutting data center power consumption

Gartner: 5 tips for cutting data center power consumption

By Heather Clancy | November 24, 2010, 5:56am PST

Summary

When market research and advisory firm Gartner decided to remove green data centers from its list of strategic imperatives for 2011, the decision was met with some gnashing of teeth. But, frankly, the decision didn’t really surprise me all that much because energy efficiency, space optimization, infrastructure consolidation, and proper disposal of outdated technologies have [...]

Heather Clancy

Heather Clancy
Heather Clancy is an award-winning business journalist with a passion for green technology and corporate sustainability issues. Her articles have appeared in Entrepreneur, Fortune Small Business, The International Herald Tribune and The New York Times. In a past corporate life, Heather was editor of Computer Reseller News, where she was a featured speaker about everything from software as a service to IT security to mobile computing.
Heather started her journalism life as a business writer with United Press International in New York. She holds a B.A. in English literature from McGill University in Montreal, Quebec, and has a thing for Lewis Carroll.

When market research and advisory firm Gartner decided to remove green data centers from its list of strategic imperatives for 2011, the decision was met with some gnashing of teeth. But, frankly, the decision didn’t really surprise me all that much because energy efficiency, space optimization, infrastructure consolidation, and proper disposal of outdated technologies have become mainstream — almost commonplace — for data center IT managers. In other words, energy efficiency is not a separate concern, it’s probably the primary concern after resiliency.
The spirit of that decision makes itself felt in new Gartner commentary on data center design imperatives. According to Gartner, the trend toward higher density will be felt through 2012 — that’s density both in terms of the compute resources that are placed on the data center floor and the density of the power and cooling equipment supporting that equipment. The reason this is important is pretty simple: if current trends continue, the energy needed to operate a server over a three year period of time will actually exceed the cost of the technology itself. That is a fairly sobering concept.
According to Dave Cappuccio, chief of infrastructure research for Gartner, who is quoted on this topic in a recent press release, “at current energy rates, a 40-kilowatt rack could cost upward of $5,400 per server per year.”
But high-density designs could push a 300 percent increase in capacity in about 60 percent less space than current data centers, according to his research team.
Gartner recommends five this you can do in order to reduce power consumption. None of these are exactly rocket science and I’ve written about all of them before, but they bear repeating:
  1. Use row and rack-based cooling for high-density equipment, which apparently can reduce energy usage by up to 15 percent
  2. Build and provision only what is needed
  3. User air-side economizers in geographies where they work (you may already have air handlers that support this)
  4. Scrutinize floor layouts for optimal air movement
  5. Virtualize everywhere you can, especially on commodity hardware that eat up a lot of electricity
Kick off your day with ZDNet's daily e-mail newsletter. It's the freshest tech news and opinion, served hot. Get it.

Wednesday, November 24, 2010

Check out Untangle 8.0's new Bandwidth Control feature

Check out Untangle 8.0's new Bandwidth Control feature

Posted in:

In a number of posts previously, I've mentioned the Untangle appliance and its features for providing Internet gateway connectivity. Recently, Untangle 8.0 has been released with the Bandwidth Control feature and, much to my satisfaction, a virtual appliance deployment option for Untangle 8.0 I have used Untangle for a few years for the Internet connectivity and network management for my personal lab. For that network, I provide DNS, DHCP, content filtering, and port and protocol management all for free with the Untangle Lite Package. This includes a number of additional free features such as spam blocker, firewall, captive portal, OpenVPN support, Intrusion Prevention, and virus blocker modules. Untangle 8's new feature is Bandwidth Control, which allows base services to be prioritized at the server level and for quotas to be utilized. For example, Windows Update Internet traffic can be prioritized to be allocated a low amount of the Internet bandwidth. This can be critical if there is no central deployment server for this traffic, such as Microsoft System Center Systems Management Server. Likewise, critical services such as web traffic to business partner websites can be given high priority. Untangle's Bandwidth Control can be implemented per user, per site, or per application; giving flexible administration options. Figure A shows a Bandwidth Control panel within Untangle 8.0:

Figure A

Click image to enlarge.

Bandwidth Control is available with Untangle Premium Package and Education Premium Package. It can be purchased separately for $25 per month. The other recent development with Untangle that caught my eye is that it is now available as a virtual appliance for 8.0. On the Untangle Wiki, there are instructions on how to set up Untangle as an OVA (open virtual appliance) using the newest version. I have used Untangle exclusively as a virtual machine, and have been happy thus far along. Are you using Untangle 8.0? Share your configuration strategies and upgrade process below.

posted by Rick Vanover
November 23, 2010 @ 6:00 am


Infrastructure-Application-ManagedServices.Visit www.dayaciptamandiri.com for details..

Tuesday, November 23, 2010

HARGA DISCOUNT KHUSUS UNTUK PRODUK FUSIONCHART

Dalam rangka menyambut AKHIR TAHUN 2010, kami memberikan potongan discount khusus untuk pembelian produk FUSIONCHARTS (www.fusioncharts.com) mulai PURCHASE ORDER yang kami terima periode 20 NOVEMBER 2010 - 10 JANUARI 2011 .

Silahkan manfaatkan kesempatan  ini untuk mendapatkan produk terbaik untuk keperluan visualisasi grafik Anda.

Kontak kami: 021-3924716 / 08121057533

Berita terbaru terkait Fusioncharts:
For ready references, please refer to the mentioned link:
·         http://www.fusioncharts.com/

Selamat kepada LEMBAGA SANDI NEGARA

Selamat kepada Lembaga Sandi Negara yang telah mengimplementasi Security Manager Plus, solusi terpadu dari ManageEngine untuk memonitor security jaringan dan server, termasuk patch management yang menjadi kunci kestabilan sistem server.

Kami senang melayani Anda.

Selamat kepada LEMBAGA SANDI NEGARA

Selamat kepada Lembaga Sandi Negara yang telah mengimplementasi Security Manager Plus, solusi terpadu dari ManageEngine untuk memonitor security jaringan dan server, termasuk patch management yang menjadi kunci kestabilan sistem server.

Kami senang melayani Anda.

Friday, November 19, 2010

Campus Spotlight: Rebuilding IT from the Ground Up

* By Bridget McCrea
* 11/04/10

The first thing Bill Seretta did four years ago as American
International College's CIO was rip out all of the old cat-3 and coax
wires on campus and the equipment that relied on those wires. Then, he
replaced the Springfield, MA-based college's entire infrastructure
with state-of-the-art wireless options. After all, he said, if you
don't have a secure, reliable, high-speed core infrastructure, "you
can't do a thing."

"This holds true in corporate America, in education, and everywhere,"
said Seretta. "A lot of organizations forget this fact and wind up
with poor infrastructure, ineffective networking security, and stuff
crashing all around them."

Even worse, some opt to "layer" new equipment and software on top of
antiquated infrastructures. "That's a joke," said Seretta. "You can't
install student information systems, accounting solutions, and
emergency alert systems on top of an old infrastructure. It's a huge
waste of money."

Call him tough, but Seretta is just doing his job. Just over four
years ago he was brought on board to assess American International
College's technology infrastructure. The task wasn't easy, namely
because the school's president--who had recently retired and had
openly disliked the Internet--had been in his position for 35 years. A
new President ushered in change.

During that span, the school's technology infrastructure hadn't
exactly kept up with the times. "The technology here was limited and
archaic compared to where the rest of America's colleges were at the
time," recalled Seretta. "The good news was because it was so bad,
there was nothing to salvage. We had to rip everything out and start
over again."

Having that clean slate in front of him meant Seretta didn't have to
justify trashing the school's old systems in lieu of more modern
options. "A lot of schools get hung up on the fact that they put
$100,000 into equipment last year, and now they have to change to
something new," said Seretta. "They get trapped in these spending
cycles, and feel like they have to stick with their investments for
four or five years before upgrading or changing."

Without those challenges to worry about, Seretta said, he developed a
comprehensive IT plan for the college, which fast-tracked the project
to the point where his team had seven weeks to build a new network.
That network would extend to every building on campus, said Seretta,
so it only made sense that it be wireless.

"We installed 150 access points and brought our Internet access from 2
Mbps to 10 Mbps, which was a big jump for us," said Seretta. The
college shelled out about $1.5 million to purchase the equipment, and
then began taking other steps to bring its IT infrastructure into the
new millennium.

Key changes included server virtualization--a move that allowed it to
build up its core infrastructure "without having to buy a box to
handle every single task, upgraded data center, laptops for all
faculty, VoIP phone system, virtual campus, IP security cameras and
new accounting and student information systems, said Seretta.

With American International College's IT overhaul well underway,
Seretta left after one year in his position as acting CIO, assuming
the next IT director would take the ball and run with it. That didn't
exactly happen. "I was called back one year ago," said Seretta. "The
current CIO was gone, and a lot of the work we had done four years ago
basically was stopped in place."

In 2006, for example, every faculty member was given a laptop, whether
he or she wanted it or not. "There was a lot of grumbling, since
people were still tied to desktops back then," Seretta said. "Now they
want laptops, but the replacement cycles (which were laid out in
Seretta's original recommendations) weren't handled correctly, and a
lot of faculty members have antiquated machines."

This time around, Seretta is determined to see his IT overhaul through
to the finish line. He currently has 48 projects on his agenda, all of
which are at different stages of completion. Over the last 12 months,
he said much of the school's wired infrastructure was replaced with
three fiber rings connecting all buildings, new switches and 10
gigabit uplinks. "We've created a robust infrastructure that's going
to be in place for a while," said Seretta.

Other changes over the last year include the rebuilding of a data
center that now operates on managed power with a backup generator, and
a new collaboration with four other colleges that allows American
International University to purchase Internet access at a bulk
discount rate. The latter allows the school to offer 120 megabit
connection speeds at no additional cost.

Another major change Seretta spearheaded for the school's IT
department involved equipment and desktop leasing. Now, instead of
shelling out over $300,000 a year for replacement equipment for
$300,000 worth of equipment, the school spends less than $100,000 in
lease fees for $300,000 worth of equipment. "I'm building a cycle
where everything will be replaced every three years, with some going
to four or five years," said Seretta. "This will help embed the
three-year purchase cycle, and keep our technology current."

With more time to get American International College's IT
infrastructure into shape than he had four years ago, Seretta said the
department's five divisions (infrastructure/security, help desk,
administration, academic and telecom) are going to play an integral
role in the college's future growth. "IT touches every aspect of this
campus on a 24/7 basis," said Seretta. "Without the right
infrastructure, this place can't operate."

About the Author

Bridget McCrea is a business and technology writer in Clearwater, FL.
She can be reached at bridgetmc@earthlink.net.

Tuesday, November 16, 2010

NAVICAT - Beta Release Navicat Premium 9.1

We are glad to announce about the release of beta version of Navicat
Premium 9.1.

** NOTE ** : If you have bought a license of Navicat 9.0, license keys of
Navicat 9.1 will be available to you for FREE on Nov 25. You can login to
customer center to retrieve the license key on that day.

Major new features:
- Support of Microsoft SQL Server (2000 to 2008R2)
- Cross data transfer between SQL Server and other database servers
- Support of PostgreSQL Server 9.0
- Support of MySQL Server 5.5
- Enhanced user and role management
- New Privilege Manager
- Improved data synchronization performance with a new engine

========================================================================
Contact us for detail

Fanky Christian
Business Development Director
PT. DAYA CIPTA MANDIRI SOLUSI
IBEC Building 2nd Fl
Jl. KH Wahid Hasyim No.84-86
Jakarta Pusat, 10340, Indonesia
SMS: 62-21-98054359
Telp: 62-21-3924716
Fax: 62-21-3903432
mobile: 62-812-1057533
www.dayaciptamandiri.com

Online Store: www.tokofc.com

visit:
- dayaciptamandiri.blogspot.com
- fankychristian.blogspot.com
- www.facebook.com/fanky.christian

Structure Cabling and Data Center
|AMP|BrandRex|CCSI|NetViel|Goldbach|UniFlair|Mira|APC|
|Fingerprint|FM200|FirePro|
|Cisco Systems|Juniper|Raisecom|Proscend|

Multimedia
|Kiosk System|
|finosMQS - multimedia queuing system|
|finosMDS - digital signage system|
|finosSQM - sequence queuing system|

SMS Gateway
|SendQuick|OZEKI NG|

Enterprise Management
|OpManager|AppManager|ServiceDesk Plus|NetflowAnalyzer|
|Desktop Central|Firewall Analyzer|FacilityDesk|Solarwinds|

Database and Chart
|FusionCharts|Navicat|

Services
|Network Implementation Services|Operation Support Services|

Sunday, November 14, 2010

TechRepublic: Four types of clients to avoid

Posted in:
consulting

When you meet with a potential client, you should think about more than just how to meet their project needs; you should also listen and watch for cues that will help you determine if you actually want to work for that client. So how can you spot a problem client? Let's face it - no client is going to tell you upfront that she has a hidden agenda or reveal that every consultant who worked for their company quits mid-project. I look for telltale signs from the four types of problem clients that I've encountered. Here are more details about those client types and the red flags to look for early on in negotiations.

The bargain hunter

You don't want to do business with the client who is constantly trying to get free work. You can sometimes identify these clients in the sales process when they repeatedly try to get you to do significant amounts of work for free, or if they show irritation when you say that you charge for all but the first meeting with a client. Experienced consultants warn you to be wary of clients who are overly creative with payment methods; in particular, clients who tempt you into working for royalties on the software you develop for them instead of offering cash for your development work. Never fall for the statement, "The market is huge for a system like this - you'll be able to make a fortune when this thing is done!" All that client wants is free software development and a share of your future profits for "making you rich."

The power trip client

The power trip client tries to turn every situation into one with a winner and a loser. The tip-off that you've encountered this type of client may come during contract negotiations when the client shows inflexibility about modifying even the smallest of terms he's suggesting. If he insults you, becomes aggressive, or attacks your qualifications, those are all flashing red lights signaling you to run from this situation.

The know-it-all client

The know-it-all client shoots down your initial attempts at solving his problem and then tries to blow you away with tech buzzwords that he obviously learned by searching online. This type of client is likely to try to get a detailed proposal out of you only to turn it down and take that information somewhere else and try to get it done at a lower price.

The rush, rush client

Be wary of the client who seems like he is in such a rush that he wants you to get started immediately without a signed contract, spec, or any "trivial" paperwork relating to the engagement that might keep him from meeting his deadline. When you encounter a "drop everything and do my work" type of client, you know right away that you're likely dealing with a selfish, demanding, and likely very disorganized client who can't manage his way out of a paper bag. Even worse, this client will likely also turn out to be a rate chiseler, who will express shock when presented with your bill. Never, ever proceed without the engagement properly documented; otherwise, you'll probably get stiffed by this type of client. Run away fast.

Share your thoughts on difficult clients

What telltale signs do you look for to try to determine if a client is likely to cause you headaches? What types of problem clients would you add to this list? Post your comments in the discussion.

posted by Brad Egeland
November 12, 2010 @ 11:48 pm
Powered by Telkomsel BlackBerry®

Wednesday, November 10, 2010

Selamat kepada BIN

Selamat kepada BIN yang telah memilih implementasi Opmanager dan
Netflow Analyzer untuk monitoring dan performansi jaringan nya.

Dengan menggunakan OpManager, maka manajemen jaringan dapat dilakukan
dengan mudah, dengan implementasi yang mudah dan tampilan yang
powerfull. OpManager menjawab kebutuhan monitoring jaringan dengan
komprehensif. OpManager yang didukung NetFlow Analyzer memudahkan
tampilan monitoring jaringan, server dan perangkat berbasis SNMP
lainnya serta memudahkan untuk memonitor penggunaan bandwidth secara
intensif dan lengkap.

Hubungi kami untuk keperluan monitoring jaringan dan bandwidth di tempat Anda.

Selamat kepada Kementrian Perhubungan RI

Selamat kepada Kementrian Perhubungan RI yang telah memilih solusi
Fusioncharts untuk melengkapi dan memperindah tampilan aplikasi chart
yang ada. Dengan menggunakan FusionCharts, berbagai kemudahan dan
visualisasi tampilan charts dapat dilakukan dengan mudah.

Hubungi kami untuk keperluan Fusioncharts Anda..

Online content often a victim of plagiarism

Posted in:

In past blogs, I've recommended that IT pros increase their (positive) web presence by writing technical articles. This can be done in a personal blog or by writing-for-pay for technical publications. In light of a recent event that has been making the blogosphere rounds, I feel the need to make you guys aware of one the caveats of writing for money on the web: People will steal your stuff. Sometimes they'll steal it without really knowing the concept of plagiarism. They'll run your piece and retain your byline but on their site and without asking your permission in advance. Basically they're getting the content someone else paid for, for free. This would be a great business model if it were, oh I don't know, LEGAL. Also, it harms the bottom line of the online business that actually paid for the content, since most of those businesses depend on Google traffic and incoming links. Sometimes they'll take your content without your byline and run it on their site, with the underlying assumption that they wrote it. Also illegal. And weaselly. I have learned that there are an alarming number of people out there who believe that anything on the Internet is public domain. Here's a case in point: One freelance writer found this out the hard way. Basically she had one of her articles reused without permission or compensation by an online magazine called "Cooks Source." (Let me first say that if this mag was going to steal something it should have swiped an apostrophe from somewhere.) Anyway, when the writer wrote to the "editor" to point this out, she got this in return:

Yes Monica, I have been doing this for 3 decades, having been an editor at The Voice, Housitonic Home and Connecticut Woman Magazine. I do know about copyright laws. It was "my bad" indeed, and, as the magazine is put together in long sessions, tired eyes and minds somethings forget to do these things. But honestly Monica, the web is considered "public domain" and you should be happy we just didn't "lift" your whole article and put someone else's name on it!

First of all, you cannot be an "editor" and not know about copyright laws. Just can't happen. Secondly, what's with the attitude? This copying and pasting stuff happens enough that we here at TechRepublic have to get our Legal department to issue cease and desist warnings about once a week. Never underestimate the motives of another party either. One of our editors here told me that she just heard about an instance of someone stealing another person's Twitter feed, including a tweet about a pet dog dying. (I'm still trying to figure out a possible motive on this one. Is creepy a motive?) So there are two lessons here: Don't take content from other sites without the express permission of the editor or writer. Second, if you write something, Google yourself often. And then Google some words from your article to see if it's showing up elsewhere. Our Programming and Development blogger, Justin James, has in fact created an app for finding thieves of content online. Called Rat Catcher, the app is free for a 30-day trial. Another way to protect yourself online!

posted by Toni Bowers

Powered by Telkomsel BlackBerry®

Saturday, November 06, 2010

Moving from SQL to NoSQL

Moving from SQL to NoSQL

Are you thinking on moving your database from a SQL implementation to a
NoSQL one ?

Sometimes when you decide to move to a different approach lots of doubts
pop out of your mind, there are a couple of actions that can make your
decision more solid and secure. I'll try to provide some tips that would
help you to choose the right NoSQL implementation.
When do you need to think about NoSQL ?

Often web application start by being implemented on top of MySQL, the one
day your application got traction and performance issues start to be a
real pain due to high load of read/write queries on your system.

At this point you have 2 choices:

1. "Shard" your data to partition it across several sites
2. Go for a licensed SQL DBMS or move to a NoSQL DBMS

Basically, you need to scale with less amount of money spent possible.
Michael Stonebraker written a good article on this.

NoSQL use cases

1. Massive data volumes
2. Extreme query load
3. Schema mutation (often called as evolution)

NoSQL most popular pro's

* Scalability and Elasticity (at low cost)
* High Availability
* Flexible schemas (semi-structured data)
* Distributed (easily)
* Low Cost

NOSQL most popular con's

* Weak integrity models
* Consistency (called eventual consistency)
* Transactions (You can do it by code)
* Complex queries
* No standardization
* Messy access control (Some popular implementations already doing this)

Basically, NoSQL runs away from the ACID (atomicity, consistency,
isolation, durability) terminology.
NoSQL most popular implementations

As every topic, there are come popular and trendy implementations of
NoSQL: CouchDb, MongoDB , Cassandra, Memcache.

For a complete list, please refer to wikipedia.
Interesting to read articles/presentations on NoSQL.

1. "NoSQL Databases – Part 1 – Landscape" at VineetGupta.com
2. "Why Digg Digs Cassandra" by Om Malik at Gigaom
3. "NoSQL at Twitter (NoSQL EU 2010)" by Kwvin Weil at Slideshare
4. "NoSQL databases" by Marin Dimitrov at Slideshare

But the sky isn't always blue, you should read the voices that are against
NoSQL also:

1. I Can't Wait for NoSQL to Die by Ted Dziupa
2. NoSQL is Software Darwinism by Jeremy Zawodny

So how do you choose the right NoSQL implementation ?

I must answer with the magic sentence: It depends!

You must choose you database storage system based on the problem you are
trying to solve, but there is one thing that is universal to all of them,
you have to make tests with more than one and only by making results
analysis you will be able to take decisions, unless you are a guesser, i
am not.

My advice is, choose your most common use cases and perform small proof of
concepts, and only after having the numbers you should choose.

from: http://blog.josedasilva.net/moving-from-sql-to-nosql/

Thursday, November 04, 2010

Data Center Audit

Data center audit or site review is one of mandatory activity during
IT audit process. But most of IS auditor forget key activity that
should be checked during the process. Here is simple audit checklist
to be used:

1. Policies & Procedure
• Have computer center operating policies and procedures been written?
• Are they sufficiently descriptive in detail to guide the
organization and operation?
• Do data center personnel aware to the policies and procedures?
• Are they kept up-to-date?

2. Personnel
• Are data control center personnel and operators' assignments rotated?
• Is an operating log maintained to record any significant events and
action taken by the operator?
• Is the operator log inspected daily by management?

3. Incident handling
• Do the computer room operators know exactly what to do when the
different types of fire emergencies occur?
• Do the other personnel know exactly what to do when fire emergencies occur?

4. Fire Alarm
• Are the fire alarm pull boxes and emergency power switches clearly
visible and unobstructed?
• Are clear and adequate fire instructions posted in all locations?
• Are there enough fire alarm pull boxes in the computer area?
• Are the operators trained periodically in fire fighting?
• Are the operators assigned individual responsibilities in case of fire?
• How frequently are fire drills held?

5. Fire extinguisher
• Sprinkler
• Halon
• FM200

6. Air Conditioner
• Is the power of Air Conditioner separated from main building power?
• How frequently the Air Conditioner checked

7. Environment Control
• Wiring and cable management
• Combustible goods should be removed
• Water and liquid good should be located outside data center
• How data center protected? Secure ID? Finger print? Lock?