Data Center is our focus

We help to build, access and manage your datacenter and server rooms

Structure Cabling

We help structure your cabling, Fiber Optic, UTP, STP and Electrical.

Get ready to the #Cloud

Start your Hyper Converged Infrastructure.

Monitor your infrastructures

Monitor your hardware, software, network (ITOM), maintain your ITSM service .

Our Great People

Great team to support happy customers.

Saturday, December 15, 2012

Mobile - tren terbesar di 2013


The Future of Mobile: The Biggest Trends for 2013

The mobile industry is constantly evolving and growing at an astronomical pace.  For example, just a little over five years ago (June 29, 2007 to be exact), Apple sold the first iPhone ever. Today, Apple has shipped about 250 million iPhones worldwide, according to Strategy Analytics. And this doesn’t account for the booming tablet industry or all the phones operating on Google’s Android platform. While this exceptional pace of growth is exciting, it also presents a whole new set of challenges. To keep up with demand, service providers will need to make investments to improve network speed, intelligence and reliability.
As evident by the statistics on the iPhone, the growth of connected devices will continue to be a major trend going into 2013. From phones, tablets, laptops and devices such as smart meters,Ericsson predicts that more than 50 billion devices will be connected to the web by 2020. Over the next year we will see even more communications, commerce, entertainment and service industries dependent on wireless services, making network reliability even more important.
The Future of Mobile: The Biggest Trends for 2013Besides the sheer volume of devices in the market, the data consumption on these devices is also surging and will continue to do so in 2013. In the last year, per-user data consumption amongst U.S. smartphone users jumped 80 percent. Recently, Cisco projected a 78 percent compounded annual global mobile data growth over the next five years. AT&T is also seeing its mobile data traffic grow100 percent. 50 billion devices will be connected to the web by 2020. Over the next year we will see even more communications, commerce, entertainment and service industries dependent on wireless services, making network reliability even more important.
Role of P2P and Streaming Video
The two biggest drivers of this data surge are video streaming and peer-to-peer (P2P) application usage. By 2015, video is likely to account for nearly 60 percent of all data traffic. As more and more consumers are using smartphones and tablets to download videos from sites such as YouTube, Hulu and Vimeo, the impact of video on the mobile industry will only continue to grow in the next year.  Likewise, P2P technology, a network where users are sharing content such as audio, video and data back and forth without the need for a central server, can use up all the capacity from one LTE cell site by one single user. For example, Skype, one of the most widely used internet phone applications, is using P2P technology. Not only does video streaming and P2P applications consume huge chunks of bandwidth on the network, they also raise the need for error free transmission and greater speed.
Classes of Service
Because of this data consumption, wireless carriers need to reevaluate their pricing models. In recent months, it has been reported that both AT&T and Verizon are starting to do just that.  As people continue to put an overwhelming strain on the network, carriers need to determine how they are going to charge users for the amount of bandwidth they use. Business customers and consumers who are increasingly reliant on wireless devices may be willing to pay a premium for guaranteed service that ensures videos stream clearly and data can be easily accessed. Because of this, carriers have the opportunity to offer classes of service based on performance, but they will need a means to ensure that the service is delivered and meets customer expectations if they are to be able to charge for it.
Need for Speed
Besides bandwidth demand, there is also a demand for speed. In many markets throughout Asia, Europe, and North America huge investments are being made to upgrade networks to 4G/LTE. The Global Mobile Suppliers Association forecasts there will be 119 commercial LTE networks in more than 50 countries by the end of 2012. Investment this year in LTE infrastructure worldwide is expected to exceed $8 billion. However, LTE is still in the early life cycle stages with only 6 million people using LTE out of the 6 billion who use mobile devices. Therefore, LTE will grow rapidly in 2013, and is expected to become a major piece of the mobile ecosystem in the years ahead.
Network Visibility
As we look at how the number of connected devices, data consumption and need for speed are affecting wireless networks, it becomes clear that networks need visibility to better manage, monitor and evaluate how their networks are performing. Improving visibility into the network helps expedite troubleshooting and enhance service to meet customer demands and needs. Moving into next year, it will become critical for wireless providers to step into a new era of innovation driven by network visibility. This is the next logical step in meeting the surge of growth in the mobile industry head on and with an effective solution.

Prediksi Networking untuk 2013 oleh Forrester


Forrester: Networking predictions for 2013

Andre Kindness, Forrester Research
Most infrastructure and operations (I&O) professionals admit that networking has been overlooked and under-funded in recent years. Why? Either the network seemed to work, and was therefore easily forgotten, or I&O leaders saw the network as a dumb set of pipes and thought new technology could overcome any new challenges it would inherit.
However, after datacentre, server and storage consolidation, plus application consolidation from branch offices, I&O professionals realised their wide area network (WAN) links could not keep up with the new traffic patterns. Furthermore, most current networks cannot adjust automatically to virtual machine (VM) migration, which means I&O professionals cannot take full advantage of server virtualisation.
To engineer the right solution, networking professionals need to work right alongside their customers – other technology domains, users and the business. For example, manufacturing sites that have International Organisation for Standardisation (ISO) 9001 certifications with any equipment hooked to the network must ensure that the network is documented.
Forrester has published a new report in which it shares eight critical predictions for 2013, designed to help I&O leaders set their networking strategy for the next five years. Here are four of these key predictions:

1. Software-defined networking will follow NAC's maturity path

The network access control (NAC) industry exploded with suppliers producing their own solutions without acknowledging the entire security and networking ecosystem. Thus, early NAC-enthusiast I&O teams got stuck with a dysfunctional and disparate set of components that proved very difficult to assemble. Over time, NAC suppliers standardised interfaces and worked together to ensure that endpoints and their assessments could flow from the devices to the network nodes to the policy managers and back.
Software-defined networking (SDN) solutions will go through this same refinement process. SDN solutions, products and concepts will need five years to mature enough for enterprises to use them in production. There is a lot of work to be done to tie the components together and fit them into other management systems, orchestration software, hypervisor management solutions and Layer 4 to Layer 7 services.
SDN's value only comes to fruition as part of infrastructure evolution to automation. You will need a large upfront investment in standardising processes and infrastructure, as well as changes to organisational structures, skills and sourcing, that will be uncomfortable for I&O teams and colleagues alike.
Forrester recommends putting SDN on the back burner and focusing on getting the networking team up to speed on virtualisation to achieve consistency in roles and responsibilities across the virtual and physical worlds. Once your networking team members master virtualisation, they will be in a much better position to take on SDN.

2. You will need network software engineers

The traditional method of telneting into networking devices and configuring them through the command line interface (CLI) is dead. Humans cannot keep up. The network will evolve into an automated system that requires application programming interfaces (APIs) andsoftware development kits (SDKs) to stitch together the constituent parts and provide updates to orchestrations systems running the infrastructure.
Developing an infrastructure that truly serves the business and users involves a lot of software interfaces that need customisation and algorithmic engines that perform workflows and analytics. Look for individuals (inside or outside your networking team) who thrive in a dynamic environment, are highly social, embrace new technology, and always seek new, creative ways to use that technology. These people will become your network software engineers.

3. WLAN deployment will support more than BYOD

Companies will need help to figure out how to create a wireless local area network (WLAN) that supports guest users, employees with their own devices who need access to critical company assets, employees with corporate-owned devices, legacy devices and voice over WLAN (VoWLAN). The access decision will require more than user credentials and fingerprinting the device.
Other criteria – location, business policies, applications, usage, data and other users – need to be part of the equation. Suppliers will respond with the basic bring-your-own-device (BYOD) story about iPhones and Android, but that is just the beginning. Future systems will focus on the user, user experience and empowering the business units.

4. Multisupplier versus single supplier arguments die but in favour of strategic sourcing

I&O teams will buy networking solutions from strategic partners, rather from "the best" or "the cheapest" suppliers, as infrastructures evolve into systems. Like a USB hard drive, keyboard, or other accessory connected to a personal computer, networking infrastructures will facilitate the discovery and configuration of hardware components without user intervention.
These automated systems require a highly paid set of resources to design and test all the components (routers, switches, WAN optimisers, etc) to get them to work together. This is no easy task. Nothing comes out of the box ready to go; companies cannot afford to devote precious staff time finding the best set of products and cobbling them together.
In lieu of staffing a large research and development department, I&O professionals will need to either buy directly from one of the big hardware suppliers and rely on its professional services arms, or buy through a systems integrator.

Andre Kindness (pictured) is senior analyst of infrastructure and operations at Forrester Research.

5 Network Management 2012 yang telah menjadi nyata saat ini..


5 Network Management Resolutions for 2012

posted by Jim Frey   | January 8, 2012 | 0 Comments
iStock_000014955077XSmall
In keeping with my nascent tradition of not predicting trends, I’ll instead propose a number of focal points that network engineering and operations professionals should keep in mind in the coming New Year of 2012.  2011 resolutions were around application-awareness, connecting with the network security team, assessing the impact of videoconferencing, embracing automation, and improving service orientation.  None of these have gone away, but some have evolved and there are a few more issues that have begun to crop to change the shape of our list for this year.  So without further ado, here’s the list of Network Management Resolutions for 2012:
1. Don’t wait for the Cloud to come to you. Cloud services are big emerging topics and goals in the minds of IT execs and IT departments, more broadly, but the networking team is often not involved in these conversations. And yet, experience tells us that when it comes time to put cloud services into production, whether that means entering into service agreements with external cloud providers or remaking IT to be an internal cloud, that networking will absolutely be an important aspect of production operations. What’s the best way to put yourself into position to help? A good start would be making sure you have application-aware monitoring tools, such as packet inspection or NetFlow, ready to go so that you can see how these services are being used and how well the network is playing its role as cloud services ramp up.
2. Use Converged Infrastructure projects as an opportunity to consolidate.  There are number of definitions of converged infrastructure out there, ranging from latest-generation networking fabrics to multi-domain pre-integrated “data center in a box” solutions such as FlexPod and Vblock, which deliver compute, hypervisors, network, storage, and sometimes even pre-installed applications, all in one pre-built unit and arriving on a single skid. If your organization is moving towards that latter category, the opportunity exists to ride that wave and bring truly integrated, cross-domain management tools and practices to bear. Take a look at EMC‘s Unified Infrastructure Manager (UIM) which was developed initially to consolidate provisioning functions for VCE Vblocks but was recently extended for integrated monitoring. This could very well herald things to come–a new approach for tightly integrated management tools and practices.
3.  Beware the virtual desktop. Last year, EMA spent some time researching/analyzing emerging requirements for network managers to accommodate VoIP and live videoconferencing, such as Telepresence. While these two technologies continue to grow in use, and hence impact to the lives of network managers, the next great network-dependent technology is hosted desktop, otherwise known asVirtual Desktop Infrastructure, or VDI. Like the other two, this is not a new technology, however it appears that other macro-level trends such as mobility and BYOD are driving interest in VDI to a level that is unprecedented. The big challenge, of course, is that if you introduce a network link between a thin virtual client and the server that is supplying all of its data and actions, there is a potential for networks to be a barrier to success. There are other barriers to VDI success, by the way, but it makes sense to look into how ready your network is to handle this new type of application service, by reviewing capacity plans and QoSpolicies.
4.  Look at the world through Application-colored lenses. This is mentioned above (resolution #1), but in case you have not gotten around to it yet, there is no better time than 2012 to put in place network-facing monitoring technologies that can reveal precisely who is using the network and for what purposes. This does not necessarily mean security awareness, although it can, but more specifically which applications and services are traveling across the network and consuming common resources. Look to NetFlow/xFlow and packet probes as the best technologies here, though log file analysis can also be useful.  This viewpoint puts network operators in a position to contribute valuable operational insights when troubleshooting a problem or analyzing trends that need to be accommodated via policy changes or capacity planning. In the eyes of many, the traditional BSM disciplines are all shifting more directly into APM (application performance management) and the result is yet another affirmation that “The Application is King.” To this I say “Long live the King!” Its reign is irrelevant if there is no network to deliver it.
5.  Seek the proactive path. Rarely do I speak to a networking practitioner who does not express some interest in moving out of reactive mode and into position to be more proactive in supporting their organization. Unfortunately, priorities as they are, this has been much more a dream than a reality for the majority. This is a quest, however, that must be continued. In the coming year, take a look at what your management tools offer in terms of proactive or preventative alerts. Try setting them up around a few high-priority, high-visibility resources or applications. If you can catch and prevent a degradation or outage from affecting a mission-critical application (and you tell someone about it), you will be every bit as much of a hero as when you come in to fight the fire after the house is already burning.

Mobile Device Management semakin diperlukan


Surge in Smartphone Sales Means More Devices Require Mobile Management

The Surge in Smartphone Sales Means more Mobile Device Management
Recently, David Spencer posted an article on the Engineering and Technology Magazine website, “Smartphone sales driving business tech investment”, an overview of a recent Gartner report on the Smartphone marketplace. According to Gartner, there has been an increase in Smartphone sales of almost 50 percent, with sales of Smartphone devices in the third quarter of 2012 in excess of 169 million units. Apple and Samsung are dominating the market, combining for 46.5 percent of market share.
So what does the exponential proliferation of Android phones and iPhones mean for you and your company? Natalie Sisson, The Suitcase Entrepreneur, says businesses have to realize there’s much more to going mobile than just phone calls, text messages and emails. In a recent blog post, she advises business owners that Smartphones can do everything from sending and accepting payments to scanning documents and managing inventory. “Mobile entrepreneurs can accomplish any ‘office’ task anywhere in the world,” Ms. Sisson writes.
The drawback to all this entrepreneurial mobility is the security threat endemic to having so much confidential and account information on a mobile device. Mobile devices, including Smartphones, are easily lost or stolen, which means your corporate information can be compromised or stolen.
The best way to protect your mobile enterprise is with 3CX Mobile Device Manager. 3CX Mobile Device Manager is an online service that lets you remotely lock your devices and, if necessary, remotely wipe all of their data. 3CX Mobile Device Manager enables you to change the password on any device and lock it from an online dashboard, so you can protect all of your data until the device is retrieved; even if the device isn’t connected to the internet, you can lock it by sending an SMS to it. If you can’t recover an employee’s device, use 3CX Mobile Device Manager to restore the device to its factory settings – this wipes the device entirely of data, both data stored on the device itself and on any SD cards.
Smartphones and other devices can help you take your business mobile – 3CX Mobile Device Manager makes sure you can do it safely and securely. Step outside. Sign up for your free 3CX Mobile Device Manager Account today.

Sunday, December 09, 2012

Employee Management - salah satu solusi manajemen karyawan Anda

FlexiServer Productivity & Attendance Software

Easily track employee attendance and computer usage

FlexiServer tracks staff hours and computer activity. It makes tracking hours worked, vacation and sick leave easier for both HR and employees. It also has computer usage monitoring for quality control, security or legal compliance.
  • Track staff check in times and working hours
  • Know what your staff is working on
  • Create a flexible working environment
  • View reports for each employee

Track Employee Hours and Attendance
FlexiServer is software for automatic employee time attendance logging. It also features additional tools for quality assurance monitoring and reporting, and works with home or remote employees.
Work Productivity and Attendance SoftwareDownload Free Trial
Know What Staff Members Are Working On
FlexiServer gives managers the confidence they need to know that things are getting done without needing to micro-manage. Monitoring is non-invasive and respects the employees' need for privacy, allowing them to enter private mode when necessary, while creating a paper trail that can be referenced should there be need.
HR Employee Team Management Software
Create a Flexible Working Environment
With FlexiServer you can track and monitor employee hours from a remote location. Simply have work-at-home staff or other remote employees install FlexiStaion to monitor the hours put in away from the office.
Improve Productivity and Efficiency
Improve the way your business operates by using reports for job-costing. Know exactly what tasks your staff is working on and which are taking the most time. See what percentages of a staff member's time are spent in each application.
Additional Benefits
  • Employees don't need to fill out time sheets to record their hours
  • Employers don't need to constantly remind staff to record and submit their hours
  • Human Resources and managers have 24/7 access to hours and reports
  • Management can easily monitor outsourced, contract or remote employees
  • Employees can work more flexible hours, working when and where they want
  • Prevent computer or misuse such as viewing pornography or illegal downloads

Management Software


Features
Screenshots
How It Works
System Requirements
Download Server
- for Windows
Download Employee Station
- for Windows
- for Mac
Questions (FAQs)
Technical Support




Features
  • Logs employee time attendance automatically
  • Detects breaks and idle time automatically
  • Alternatively enter hours manually through a web form
  • Private mode available to employees for extra privacy on breaks or when completing personal tasks
  • Takes and archives screenshots on five minute intervals
  • Link hours and attendance information to payroll software
  • Shows the online status of all team members
  • Real time screen monitoring available for Quality Assurance
  • Email monitoring can store all emails sent by employees
  • Generate reports on employee application and document usage
  • No extra hardware or dedicated server is required, FlexiServer can run on an HR or manager's computer
  • Works behind fire walls and routers
  • Can be used over the internet or a local network
Employee Attendance and Time Management SoftwareView Employee Management Screenshots

How It Works
The manager or bookkeeper runs FlexiServer on their computer. Whenever the manager or bookkeeper wants to view reports they can log onto FlexiServer with their web browser and use the control panel.All staff then run FlexiStation on their computers. FlexiStation runs in the background logging hours worked. Workstations will monitor hours even if the FlexiServer computer is offline, all the cached data will be sent to FlexiServer when it comes back online. FlexiStation provides employees a subset of features so they can manually enter hours, view individual reports, request time-off or report a colleague who has called in sick.
System Requirements
FlexiServer - For the Main ComputerFlexiStation - For Each Employee Workstation
  • Works on Windows 7, XP, Vista and 8
This can be a manager's computer. No dedicated server is required.
  • Works on Windows 7, XP, Vista and 8
  • Mac OS X 10.3 or later
Download FlexiServer for Main Human Resources Computer
Download FlexiStation for Employee Workstation Computers
More Information...

Flexi Server for Windows

Main Window



Manage multiple employees



Monitor your employees' computer activity



See what screens your employees have been looking at



Monitor your employees' hours



Flexi Station for Windows



Let employees enter their hours manually

Menyeimbangkan Ketegasan dan Kepekaan dalam Bisnis

Rabu, 07 Desember 2011 09:25

Karakter seseorang acapkali dikaitkan dengan bakat berbisnis. Jika terlalu baik hati atau cenderung tidak tega dengan orang lain, dianggap tak cocok menjalani usaha. Pasalnya, kurangnya ketegasan bisa membuat usaha merugi.

Anggapan atau pendapat yang berkembang seperti ini terkadang menghalangi sebagian besar orang untuk berbisnis. Keinginan untuk berbisnis dan mendapatkan penghasilan lebih dengan kemandirian yang dibangunnya, akhirnya pudar atau tertunda.

Berbisnis dengan menggunakan hati tak lantas membuat pemilik tak bisa tegas. Begitupun sebaliknya, siapa bilang jika bersikap tegas juga tak pakai hati. Tentunya dibutuhkan keseimbangkan ketegasan dan kepekaan dalam menjalani bisnis.

Berikut ini hal yang dapat Anda lakukan untuk menyeimbangkan ketegasan dan kepekaan dalam berbisnis seperti disadur dari laman mysmallbiz.com:

1. Fokuslah pada hal yang disenangi dan dikuasai
Anda dapat memulai suatu usaha dengan apa yang Anda senangi dan Anda kuasai. Jika Anda senang dengan usaha yang digeluti, Anda tidak ragu untuk menguasai setiap detil usaha Anda tersebut. Tidak mungkin seseorang menjadi ahli tanpa menyenanginya. Selalu ada korelasi antara kesenangan dan keahlian.

2. Memisahkan uang pribadi dan uang perusahaan
Ketika Anda menjadi entrepreneur, Anda harus pintar-pintar memisahkan antara uang perusahaan dan uang pribadi. Anda masih digaji dengan uang perusahaan. Setiap rupiah yang Anda pinjam dari uang perusahaan harus dikembalikan dengan jumlah yang sama.

3. Memperhatikan kesejahteraan pegawai
Meskipun Anda adalah pemilik usaha, Anda juga harus memperhatikan kesejahteraan para pegawai yang Anda miliki. Tanpa memperhatikan kesejahteraannya, Anda tidak dapat mengharapkan pelayanan yang baik.

4. Melayani dengan hati
Untuk membangun sebuah usaha di bidang jasa, pelayanan yang diberikan harus maksimal. Sehebat apapun suatu produk, jika pelayanan tidak terjaga dengan baik akan menjadi sia-sia. Mentalitas untuk melayani harus dimiliki tidak hanya oleh pegawai tetapi juga oleh pemiliknya.

http://ciputraentrepreneurship.com/tips-bisnis/174-rencana-bisnis/13302-menyeimbangkan-ketegasan-dan-kepekaan-dalam-bisnis.html
build-access-manage at dayaciptamandiri.com