Data Center is our focus

We help to build, access and manage your datacenter and server rooms

Structure Cabling

We help structure your cabling, Fiber Optic, UTP, STP and Electrical.

Get ready to the #Cloud

Start your Hyper Converged Infrastructure.

Monitor your infrastructures

Monitor your hardware, software, network (ITOM), maintain your ITSM service .

Our Great People

Great team to support happy customers.

Friday, December 10, 2010

5 Higher Ed Tech Trends To Watch in 2011 (Outside Indonesia)

5 Higher Ed Tech Trends To Watch in 2011

Three higher ed tech experts discuss technology trends for the year ahead,
citing increased mobile and wireless access and cloud computing among
them. But are campuses also in for a little bit of a return to the
"basics" in the coming year?

* By Bridget McCrea
* 12/09/10

Technology that was unimaginable a decade or so ago is commonplace on
today's campuses. In 2010 American colleges and universities responded to
the ever-advancing IT requirements of their students and faculty with
mobile pilot programs, investments in online learning, massive network
overhauls, and initiatives designed to offset some of the increases in
energy use brought on by all these new technologies, among other novel

What will 2011 bring? Campus Technology spoke with a handful of higher
education technology experts to get their take. We've compiled their top 5
responses here.

1. The Cloud Computing Movement Will Continue.

Investing in purchase-and-install software is falling by the wayside as
institutions catch onto the value of using "cloud" applications that are
housed (and accessed) online. Not only are these options more affordable
and easier to implement, but they also include vast storage capacity that
can be used for, say, portfolio assessments. "Using cloud computing,
schools can create large collections of loosely-sorted data (such as
school records, written documents and even video recordings)," said Bob
Spielvogel, CTO at EDC, a Newton, MA-based nonprofit that creates programs
to address educational challenges, "and then utilize that information to
track project activity and conduct portfolio assessments across the
student's entire college career." With these and other uses gaining ground
in the higher education space, expect cloud computing's popularity to grow
in 2011.

2. More Work Will Be Done Without Wires.

Being tethered to an outlet or Ethernet connection is so passé for college
students, teachers, and administrators. With more and more of these
individuals using mobile devices to connect to the Internet, the wireless
wave is sure to grow in 2011.

"We're seeing a continued migration towards tablets and other mobile
computers beyond just the Ipad," said Spielvogel. "As more technology
vendors introduce lower-cost devices, and as these types of computers
become more economically feasible, we'll see even more WiFi introduced to
support their use."

3. Mobile Technologies Will Continue to Proliferate in the Classroom.

There's no doubt that students have become more mobile in terms of the
technology they're using, and colleges seem determined to keep up with
that trend. David Stoloff, a professor in Eastern Connecticut State
University's education department, said the Willimantic, CT school has
embraced the notion of "laptops and mobile devices in class" to the point
where it's implemented interactive portfolio assessment technology to help
maximize the trend.

"We're not quite at the point of every student using a laptop in class,
but we're definitely getting there," said Stoloff, who added he expects
the mobile trend to take an even stronger hold on higher education in
2011. "It provides a great way to supplement classroom instruction in a
productive manner."

4. Online Education will even Further Displace Seat Time.

Stoloff, who attended the most recent Sloan-C Conference on Online
Learning, said 2011 will find more colleges integrating online learning
into their curriculums as core offerings, and not just adjuncts to
classroom learning.

"New high school graduates have less and less patience for sitting and
listening to long lectures in college," Stoloff said. "They want to be
more active, and that means getting their hands on computers."

Looking out even further, Stoloff painted a future picture where colleges
are less focused on "seat time" and more on validating learning regardless
of where it takes place (be it overseas, in the community, or in a
traditional classroom). "Engagement will become the central issue for
education in the future," said Stoloff, "and learning won't necessarily be
defined by how much 'seat time' a student has put in."

5. A Retreat from Technology Overload is Imminent.

As the Master of Arts in Teaching and Technology program director for the
Marlboro College Graduate School in Marlboro, VT, Caleb Clark uses blended
learning, e-portfolios, WordPress, and other Web media tools in the
classroom. And while he doesn't dispute the value of these and the
multitude of other technology innovations being used in higher education
right now, he does expect a slight pullback on the technology hype in 2011
as people get back to basic communications and human interactions (outside
of Facebook and Twitter).

"We're in an over-adoption stage right now," said Clark. "To get through
it, we're going to need to get students to close their laptops and get
back in touch with the other side of their desks--the one that doesn't
face their computers."

About the Author

Bridget McCrea is a business and technology writer in Clearwater, FL. She
can be reached at

What we will have in Indonesia? Wait for my next article..

Ozeki NG SMS Gateway v3.16 released

for SMS,MMS and Voice calls

Check out the new voice call feature...

Ozeki NG is known to be a very reliable software when it comes to SMS/MMS
messaging. It can handle large load of traffic and it operates seemlesly
in the background 24/7. It also integrates very well with the corporate
infrastructure as it can send SMS messages directly from a database
through various communication channels.

With the release of Ozeki NG v3.16, companies will have a new ability to
dial telephone numbers automatically and to play in a voice messages after
the call has been picked up.

To jump to some early conclusions about the new voice call feature of
Ozeki NG SMS Gateway, we can state that it is a great addition to mobile
messaging. Adding voice messaging capability to mobile messaging systems
is a benefit for all. Now the users can select the best suited message
type for the given situation. A decision can be made to send out an SMS
text message to a mobile phone, to send out a multimedia MMS message
containing pictures and various attachments, or to automatically dial the
telephone number and to play in a voice message. The voice messages can be
a previously recorded audio file or text read out using the built in text
to speech converter

It's up to the user to determine which communication method is more
appropriate for a business case. This decision can be made on a per
messages basis. It is safe to bet, that SMS will still be the most popular
option, but in many cases voice calls will give better results. All
message types have certain advantages, but the most important thig is the
ability to be able to select the message type according to the preferences
of customers, suppliers, employees and the business itself.
Text messages (SMS and MMS)
In todays mobile messaging systems SMS text messages are often used in a
two way scenario. An IT system can send out SMS messages to mobile phones
to notify people about certain events, and people can send reply SMS
messages back to confirm they have received the message. The message
exchange can also be initiated by the mobile user, who sends in an SMS
message and receives a response from the system. Ozeki NG SMS Gateway
makes this two way communication possible.
Voice calls
Automated voice calls are appropriate when the mobile user needs to be
contacted urgently, or it is important to have an immediate reply or
information about wether he got the message or not.

The voice call feature of Ozeki NG SMS Gateway can be accessed the same
way as the SMS feature. A telephone number and the message text (or a file
name to a previously recorded audio file) should be provided. After
receiving the request Ozeki NG will dial the telephone number and when the
call is picked up by the remote end it will read in the text using the
built in text to speech engine (or it will play the previously recorded
audio file).

During the call the remote party can optionally press a DTMF key on the
telephone to confirm the call. In all cases a report is returned to the
application containing information about wether the call was successfully
completed, what percentage of the audio was played, and which DTMF key did
the remote party press. This way confirmed notifiactions and customers
surveys can be executed with great efficiency.
Setting up an automated SMS or Voice call system in your company
It is very easy to setup a system, that makes it possible to communicate
with mobile users through SMS text messages or voice calls. The first step
is to download Ozeki NG SMS Gateway and to install it on one of your
Windows computers. After the SMS gateway is installed, you need to setup a
communication link to the telephone network.

For SMS/MMS communication you can use a GSM modem or an IP SMS connection
as the communication link to the mobile telephone network. A GSM modem is
basicly a mobile phone that is attached to your computer with a data
cable. It can send SMS messages to the mobile network the same way your
standard mobile handset does. (If you don't have a GSM modem on hand, you
can order one directly from us.) The term IP SMS connection referes to an
SMS service provided over the Internet. This service is often provided by
mobile network operators for those who want to send large volume of
messages. There are many IP SMS service providers out there who can supply
connection details to their service. If you use an IP SMS connection your
Ozeki NG SMS Gateway system will forward the SMS messages to the mobile
telephone network through the Internet.

For making voice calls you have three options to setup a communication
link to the telephone network. (An SMS connection cannot be used for voice
calls.) For voice calls you can use a GSM Voice gateway (If you don't have
one, you can order one from us.), or you can sign up for a SIP account at
a VoIP telephone service on the Internet, or if you have an IP PBX with
SIP support in your office, you can configure Ozeki NG to use it for
making outgoing voice telephone calls.

Detailed configurations for all of the above options are available on this
website. Once the communication link to the telephone network is
established you can send out test messages from the graphical user
interface of Ozeki NG SMS Gateway. If you have configured an SMS link you
can send SMS, if you have configured a voice link, you can ask the
software to dial voice calls, if you have setup both you will have both
message types available.
Taking advantages of the system
Once an SMS/Voice gateway system has been installed and connected to the
telephone network, SMS and voice call services can be launched and
applications can be built. The common goal for these services and
applications is to pass outgoing messages to Ozeki NG SMS Gateway and to
be able to receives messages from it. To achieve this goal Ozeki NG SMS
Gateway provides many interfaces.

Common interfaces are:
# Database
# E-mail
# Text file
# Command line

All of these interfaces can be used for passing both SMS messages and
Voice calls to Ozeki NG SMS Gateway. The role of Ozeki NG SMS Gateway in
this environment is to forward messages between your application and the
telephone network. It is a gateway, that simplifies communication.

To launch a service or to build an application the first thing to do is to
determine which interface is the most appropriate. The most popular
interface among businesses is the Database interface. For example if your
company uses an SQL database server (MS SQL, Oracle, Mysql, etc) for
storing information, you will probably find it easy to send SMS messages
or to initiate voice calls by simply inserting a new record into the
database. Ozeki NG SMS Gateway can be configured to pickup outgoing SMS
text messages and Voice messages from database tables. Incoming messages
can be also inserted into database tables.
How to send SMS and Voice messages
After you have setup your system, you are ready to send messages. You can
specify wether you want to send SMS or Voice by specifying the message
type parameter of the message. For SMS messages SMS:TEXT, for Voice calls
AUDIO:WAV and AUDIO:TEXT are the message types you can use. The following
webpages give an insight on how to send SMS and Voice messages:

Quick start quide for setting up an SMS system

How to send Voice messages
If you would like to improve your business processes with automated mobile
messaging, both SMS messages and Voice calls can be used. In either case
you can reach the people you want to get in touch with in more
efficicently way then through traditional communication channels, such as
e-mail, human initiated calls. Ozeki NG SMS Gateway equipped with the
Voice call addon gives you the ability to exploit the mobile messaging
technology. It's worth to give a try and evaluate a license, by
downloading the free trial version from the following URL:

Download Ozeki NG SMS Gateway trial version.

Contact us for schedule presentation / demo:
Fanky Christian
Business Development Director
IBEC Building 2nd Fl
Jl. KH Wahid Hasyim No.84-86
Jakarta Pusat, 10340, Indonesia
SMS: 62-21-98054359
Telp: 62-21-3924716
Fax: 62-21-3903432
mobile: 62-812-1057533

Online Store:


Structure Cabling and Data Center
|Cisco Systems|Juniper|Raisecom|Proscend|

|Kiosk System|
|finosMQS - multimedia queuing system|
|finosMDS - digital signage system|
|finosSQM - sequence queuing system|

SMS Gateway
|SendQuick|OZEKI NG|

Enterprise Management
|OpManager|AppManager|ServiceDesk Plus|NetflowAnalyzer|
|Desktop Central|Firewall Analyzer|FacilityDesk|Solarwinds|

Database and Chart

|Network Implementation Services|Operation Support Services|

Thursday, December 09, 2010

Navicat for SQL Server

Today we are glad to announce the release of Navicat™ for SQL Server,
adding a new member to the Navicat family.

To meet the wishes of Navicat customers and the demand of managing
Microsoft® SQL Server database through a GUI, Navicat for SQL Server
is introduced to the Navicat family in this launch. This new product
provides SQL Server users a tool for administering and managing
database objects as well as for database migration, data import,
export, synchronization, reporting, and more.

Major Features in Navicat for SQL Server:

# Support of Microsoft SQL Server version 2000 to 2008R2
# Management of SQL Server objects
# Cross data transfer between different SQL Server databases
# Synchronizing data between different SQL Server databases
# Importing data to SQL Server from various data sources
# Exporting data from SQL Server to various formats
# Available for MS Windows and Mac OS X

We are Navicat reseller for Indonesia, contact us for detail.
- Fanky Christian - 08121057533
- Alexander K.S - 021-3907418

Tuesday, December 07, 2010

Five+ tips to ensure PCI DSS compliance

On occasion, I help a friend who owns several businesses. His latest venture is required to comply with the Payment Card Industry Data Security Standard (PCI DSS). My friend is computer savvy. So between the two of us, I assumed the network was up to snuff. Then went through a compliance audit. The audit was eye opening. We embarked on a crash course in PCI DSS compliance with the help of a consultant. My friend thought the consultant could help prepare for the mandatory adoption of PCI DSS 2.0 by January 1, 2011. The PCI Security Standards Council defines PCI DSS this way: "The goal of the PCI Data Security Standard is to protect cardholder data that is processed, stored, or transmitted by merchants. The security controls and processes required by PCI DSS are vital for protecting cardholder account data, including the PAN -- the primary account number printed on the front of a payment card." The consultant's first step was to get familiar with the network. He eventually proclaimed it to be in decent shape, security-wise. Yet the look on his face told us there was more. Sure enough, he went on to explain that more attention must be paid to protecting cardholder data.

Back to school

The consultant pointed out that PCI DSS consists of 12 requirements. These requirements are organized into six guides. Although the requirements are for PCI DSS compliance, I dare say the guides are a good primer for any business network, regardless of whether PCI DSS is a factor. With that in mind, I've used the guides as the basis for these tips.

1: Build and maintain a secure network

Guide 1 states the obvious, and books have been written on how to secure a network. Thankfully, our consultant gave us some focus by mentioning that PCI DSS places a great deal of emphasis on the following:

Well-maintained firewalls are required, specifically to protect cardholder data.

Any and all default security settings must be changed, specially usernames and passwords.

Our consultant then asked whether my friend had offsite workers who connected to the business's network. I immediately knew where he was going. PCI DSS applies to them as well -- something we had not considered but needed to.

2: Protect cardholder data

Cardholder data refers to any information that is available on the payment card. PCI DSS recommends that no data be stored unless absolutely necessary. The slide in Figure A (courtesy of PCI Security Standards Council) provides guidelines for cardholder-data retention.

One thing the consultant stressed: After a business transaction has been completed, any data gleaned from the magnetic strip must be deleted. PCI DSS also stresses that cardholder data sent over open or public networks needs to be encrypted. The minimum required encryption is SSL/TLS or IPSEC. Something else to remember: WEP has been disallowed since July 2010. I mention this as some hardware, like legacy PoS scanners, can use only WEP. If that is your situation, move the scanners to a network segment that is not carrying sensitive traffic.

3: Maintain a vulnerability management program

It's not obvious, but this PCI DSS guide subtly suggests that all computers have antivirus software and a traceable update procedure. The consultant advised making sure the antivirus application has audit logging and that it is turned on. PCI DSS mandates that all system components and software have the latest vendor patches installed within 30 days of their release. It also requires the company to have a service or software application that will alert the appropriate people when new security vulnerabilities are found.

4: Implement strong access control measures

PCI DSS breaks access control into three distinct criteria: digital access, physical access, and identification of each user:

Digital access: Only employees whose work requires it are allowed access to systems containing cardholder data.

Physical access: Procedures should be developed to prevent any possibility of unauthorized people obtaining cardholder data.

Unique ID: All users will be required to have an identifiable user name. Strong password practices should be used, preferably two-factor.

5: Regularly monitor and test networks

The guide requires logging all events related to cardholder data. This is where unique ID comes into play. The log entry should consist of the following:

User ID

Type of event, date, and time

Computer and identity of the accessed data

The consultant passed along some advice about the second requirement. When it comes to checking the network for vulnerabilities, perform pen tests and scan the network for rogue devices, such as unauthorized Wi-Fi equipment. It is well worth the money to have an independent source do the work. Doing so removes any bias from company personnel.

6: Maintain an information security policy

The auditor stressed that this guide is essential. With a policy in place, all employees know what's expected of them when it comes to protecting cardholder data. The consultant agreed with the auditor and added the following specifics:

Create an incident response plan, since figuring out what to do after the fact is wrong in so many ways.

If cardholder data is shared with contractors and other businesses, require third parties to agree to the information security policy.

Make sure the policy reflects how to take care of end-of-life equipment, specifically hard drives.

Final thoughts

There is a wealth of information on the PCI Security Standards Council's Web site. But if you are new to PCI DSS, or the least bit concerned about upgrading to 2.0, I would recommend working with a consultant.

posted by Michael Kassner
December 6, 2010 @ 12:46 pm

Sent from my BlackBerry® smartphone from Sinyal Bagus XL, Nyambung Teruuusss...!