Data Center is our focus

We help to build, access and manage your datacenter and server rooms

Structure Cabling

We help structure your cabling, Fiber Optic, UTP, STP and Electrical.

Get ready to the #Cloud

Start your Hyper Converged Infrastructure.

Monitor your infrastructures

Monitor your hardware, software, network (ITOM), maintain your ITSM service .

Our Great People

Great team to support happy customers.

Thursday, June 27, 2013

10 cara membangun perencanaan kapasitas yang tepat

Dalam bulan Pertengahan tahun, biasanya ada kegiatan menarik dalam perusahaan adalah untuk melakukan audit, dimana salah satu yang dilihat adalah perhitungan dan pencatatan perencanaan kapasitas, atau dikenal dengan capacity planning.

Kenali dulu cara cara untuk membuat capacity planning..



10 ways to build a solid capacity planning effort

Takeaway: Trying to predict when you’ll need additional hardware resources, how much you’ll need, and what type you will need is a challenge. Follow these 10 steps to make your plan more effective and easier to implement.
Developing a comprehensive capacity plan can be daunting at the outset and requires dedication and commitment to maintain it on an ongoing basis. These 10 tips can help ease some of the challenges and increase the likelihood of an effective, successful program.
Note: This information is also available as a PDF download.

#1: Start small

Many a capacity-planning effort fails after a few months because it encompassed too broad a scope too early on. This is especially true for shops that have had no previous experience in this area. It is wise to start with just a few of the most critical resources — say, processors or bandwidth — and to gradually expand the program as you gain more experience.

#2: Speak your customers’ language

When requesting workload forecasts from your developers and especially your end-user customers, discuss the forecasts in terms that the developers and customers understand. For example, rather than asking for estimated increases in processor utilization, ask how many additional concurrent users are expected to be using the application or how many of a specific type of transaction is likely to be executed during peak periods.

#3: Consider future platforms

When evaluating tools to be used for capacity planning, keep in mind new architectures that your shop may be considering and select packages that can be used on both current and future platforms. Some tools that appear well suited for your existing platforms may have little or no applicability to planned architectures. This consideration should extend not just to servers, but to disk arrays, tape equipment, desktop workstations, and network hardware.

#4: Share plans with suppliers

If you plan to use your capacity-planning products across multiple platforms, it is important to inform your software suppliers of your plans. During these discussions, make sure that add-on expenses — the costs for drivers, agents, installation time and labor, copies of licenses, updated maintenance agreements, and the like — are all identified and agreed upon up front. Reductions in the costs for license renewals and maintenance agreements can often be negotiated based on all of the other additional expenses.

#5: Anticipate nonlinear cost ratios

One of my esteemed college professors was fond of saying that indeed we live in a nonlinear world. This is certainly the case when it comes to capacity upgrades. Some upgrades will be linear in the sense that doubling the amount of a planned increase in processors, memory, channels, or disk volumes will double the cost of the upgrade. But if the upgrade approaches the maximum number of cards, chips, or slots that a device can hold, a relatively modest increase in capacity may end up costing an immodest amount for additional hardware. This is sometimes referred to asthe knee of the curve, where the previous linear relationship between cost and capacity suddenly accelerates into exponential increases.

#6: Plan for occasional workload reductions

A forecasted change in workload may not always cause an increase in the capacity required. Departmental mergers, staff reductions, and productivity gains may result in some production workloads being reduced. Similarly, development workloads may decrease as major projects become deployed. Although increases in needed capacity are clearly more likely, reductions are possible. A good guideline to use when questioning users about future workloads is to emphasize changes, not just increases.

#7: Prepare for the turnover of personnel

One of the events that undermines a capacity-planning effort early on is to have the individual most responsible for, and most knowledgeable about, the overall program leave the company. Regardless of the preventative measures taken, there is no guarantee that attrition will not occur. But there are several actions that can mitigate the impact. One action to take is to carefully interview and select an individual who in your best judgment appears unlikely to leave your firm anytime soon. You should also ensure that the process is thoroughly documented. If resources are available, training a backup person is another way to mitigate turnover. Finally, in extreme cases, an employment contract may be used to sustain ongoing employment of a key individual.

#8: Strive to continually improve the process

One of the best ways to continually improve the effectiveness of the capacity-planning process is to set a goal to expand and improve at least one part of it with each new version of the plan. Possible enhancements could include the addition of new platforms, centralized printers, or remote locations. A new version of the plan should be created at least once a year and preferably every six months.

#9: Institute a formal capacity-planning program

Some shops initiate a capacity-planning program in a very informal manner to simply get something started. There is nothing wrong with this approach if the intent is merely to overcome inaction and to start the ball rolling. This can also help raise awareness of the need to evolve this initial effort into a formal capacity-planning program. The one major drawback to this method is that all too often shops that start out with this approach never progress beyond it. At some point soon after initiating a capacity-planning effort, a formal process needs to be put in place.

#10: Market the lesser-known benefits of capacity planning

In addition to being able to predict when, how much, and what type of additional hardware resources will be needed, a comprehensive capacity-planning program offers four lesser known benefits that should be marketed to infrastructure managers and IT executives. These benefits are:
  • Strengthened relationships with developers and end users. The process of identifying and meeting with key users to discuss anticipated workloads usually strengthens the relationships between IT infrastructure staff and customers. Communication, negotiation, and a sense of joint ownership can all combine to nurture a healthy, professional relationship between IT and its customers.
  • Improved communications with suppliers. Suppliers are generally like any other support group in that they do not enjoy last-minute surprises. Involving key suppliers and support staffs with your capacity plans can promote effective communications among these groups. It can also make their jobs easier in meeting deadlines, reducing costs, and offering additional alternatives for capacity upgrades.
  • Increased collaboration with other infrastructure groups. A comprehensive capacity plan by necessity will involve multiple support groups. Network services, technical support, database administration, operations, desktop support, and even facilities may all play a role in capacity planning. In order for the plan to be thorough and effective, all these various groups must support and collaborate with each other.
  • Promotion of a culture of strategic planning as opposed to tactical firefighting. By definition, capacity planning is a strategic activity. To do it properly, one must look forward and focus on the plans of the future instead of the problems of the present. One of the most significant benefits of developing an overall and ongoing capacity-planning program is the institutionalizing of a strategic-planning culture.


The Enterprise Computing Institute (www.ecinst.com) helps IT professionals solve problems and simplify the management of IT through consulting and training based on the best-selling Enterprise Computing Institute book series. Founded by Harris Kern (www.harriskern.com), the industry’s foremost expert on simplifying IT and world-renowned American author, publisher, lecturer, and consultant, the Institute has focused on providing practical guidance for tackling current IT challenges since its inception in 1998.

Tuesday, June 25, 2013

Aplikasi yang bisa difilter oleh Vigor Router.

Berikut adalah daftar aplikasi yang bisa difilter dengan menggunakan Vigor Router. Kemampuan ini membantu banyak customer dan perusahaan mengoptimalkan penggunaan bandwidth mereka. Sehingga hanya dengan low speed broadband Speedy, koneksi Internet tetap terjaga lancar dengan menggunakan Vigor Router


APP Enforcement Supported by Vigor Routers


Last update on 2013/05/16

This charts lists out the APP Enforcement supported by Vigor routers. Please note that some of them is currently supported in the beta firmware, and will be updated to the next version of firmware. Please contact your local support for more information.

APP Type
APP Name
Version
Note
IM
AIM
5.9
 
AIM
6/7
Only block Login. If users have already logged in, AIM services can’t be blocked. 
AliWW
2008
 
Ares
2.0.9
 
BaiduHi
37378
 
Fetion
2010
 
GaduGadu Protocol
 
 
Google Chat
 
 
iChat
 
 
ICQ
7
In ICQ6, if Videos are blockedVoices will be blocked at the same timeIn ICQ5 or former versions, Videos and Voices can be blocked separately.
ICU2
8.0.6
 
iSpQ
8.0.60
 
Jabber Protocol (Google Talk)
 
 
KC
2008
 
Lava-Lava
2007
 
MobileMSN
 
 
MSN
2011
 
Paltalk
9
 
POCO
2007
To block P2P, please check the P2P Object item.
Qnext
3.0.1
 
QQ
2012
 
TM
2009 beta3
 
UC
2009
 
XFire
25432
 
YM
11
Please note that the login action in YahooWebMail to YM will also be blocked if this item is checked.
VoIP
Gizmo5
4.0.5
 
Kubao
2.25
 
SIP/RTP
 
 
Skype
6.1.32.129
Only blocks Skype login. If users have already logged in, Skype services can’t be blocked.
TeamSpeak
6.0.9947
 
TelTel
1.0
 
RC Voice(RC語音)
7.0
Only blocks RC login. If users have already logged in, RC services can’t be blocked.
P2P
SoulSeek
SoulSeek
156
Released version
SoulSeek
157 test 12c
Test version
eDonkey
eDonkey
2000
Support Obfuscation Protocol detection.
eMule
0.50a
 
FastTrack
BareShare
6.2.0.45
 
iMesh
9.1
 
KazaA
1.0.0.3
 
Shareaza
4.1.0
 
OpenFT
KCeasy
0.19
When blocking the connection, it will show “Connected” at first while the connection is not established successfully. After few seconds it will change back to “Connecting” status. KCeasy also supports Ares and Gnutella, but this item only block OpenFT protocol.
Gnutella
BareShare
5.1.0.26

Foxy
1.9.9
 
LimeWireWin
4.18.3
 
Shareaza
2.3.0.0
 
OpenNap
Lopster
1.2.2
 
WinLop
1.2.2
Based on Lopster 1.2.2
XNap
2.5
 
BitTorrent
BitComet
1.30
The encrypted connection can’t be 100% blocked.
BitSpirit
3.2.1
 
BitTorrent
4.4.1
 
UltraTorrent
2.0
 
Winny
Share
1.0
 
WinMX
3.54
 
Winny
2.7
 
Other
Ares
3.1
 
Clubbox
 
 
ezPeer+
2.0.0.10
ezPeer+ToGo 2.0.0.70 can also be blocked.
Huntmine
2.8
 
Kuwo
1.9.4
 
Pando
2.1.5.7
 
POCO
2007
Please check the IM Object item to block IM function.
PP365/PP200
 
PP2008 also supports BT and eDonky protocols. Please note that this item only blocks the PP protocol.
Spotify
0.4.8
 
Vagaa
2.6.5.6
VaGaa also supports BT and eDonkey protocols. Please note that this item only blocks the VaGaa protocol, and supports VaGaa encrypted connection detection.
Xunlei(Thunder)
5.9.6.1018
The Web version can be blocked as well. Please note that Xunlei also supports some P2P protocols, including BT and eDonkey, and this item only blocks the Xunlei protocol.
Tunneling
DynaPass
1.5
 
FreeU
10
 
Hamachi
1.0.2.5
 
HTTP Proxy
 
 
HTTP Tunnel
4.4.4000
 
MS Teredo
 
 
PGPNet
7.0.3
 
Ping Tunnel
0.61
 
RealTunnel
1.0.1
 
Skyfire
1.5
 
Socks 4/5
 
Please note that Radmin will also be blocked by this item. Please set the server port of Radmin within 5001~32767 to avoid being blocked.
SoftEther
2.0
 
TinyVPN
2.9.5
 
Tor
0.2.0.34
Tor uses the standard SSL communication. Blocking the SSL protocol also blocks Tor.
UltraVPN
2.0.9
 
VNN
4.2.0.1
 
Wujie/UltraSurf
13.01
 
Hotspot Shield
2.93
Block Hotspot Shield from establishing VPN connections. Please note that the APP Enforcement needs to be enabled prior than the VPN connections, or the blocking may not be successful.
Streaming
FeiDian
1.6

FlashVideo
 
 
Joost beta
1.1.7
 
MMS protocol
 
 
MySee
0.138
 
NSPlayer protocol
 
 
PCast
1.0.0.94
 
PPStream
2.7.0.1515
Can block playing new videos. If the video is already playing, it can’t be blocked.
PPTV
2.4.2
Please note that PPTV supports playing videos in flv format. To block it, please also check the FlashVideo item.
QQLive
8.22.5278
 
QvodPlayer
3.5
QvodPlayer also supports playing FLV and BT. To block services completely it’s required to check QVOD, Flashvideo and BitTorrent.
RTSP protocol
 
 
SilverLight
 
 
Slingbox
1.5.0.325
 
SopCast
3.0.3
 
TVAnts
1.0.0.59
 
TVKoo
080313A
 
TVUPlayer
2.4.1.0
 
UDLiveX
1.0.0.46
 
UUSee 2008
5.9.122.1
 
Online Game
中國遊戲中心
0.8.011.10
Only supported by the Simplified Chinese version of FirmwareGB2312.
上海棋牌遊戲
2.0.00
聯眾世紀遊戲
2.6.1.26
邊鋒網路遊戲
3.0.1.4
Remote Control
CrossLoop
2.11
 
Gogrok
1.7.2.1
 
LogMeIn Pro2
 
 
pcAnywhere
12.1
 
Radmin
3.2
 
RemoteControlPro
3.4.1
 
SharedView
8.0
 
ShowMyPC
3005
The application will still show the connected message with Error messages intermittently. The connection is never established.  
SpyAnywhere
4.0
 
TeamViewer
7.0.15723
Block teamviewer from acquiring ID. If ID is already acquired, it can block the connection, as well as the remote connection.
8.0.16642
Block teamviewer from acquiring ID. If ID is already acquired, it can block the connection, as well as the remote connection.
Timbuktu
8.6.5
 
VNC protocol
 
 
Windows Live Sync
2008
 
WindowsRDP
6.1
 
WebHD
ADrive
 
BoxNet
 
Dropbox
1.4.17
GDoc Uploader
1.0
 
Hinet SafeBox
3.2.1.2
 
HTTP Upload
 
 
Mozy
1.10.4.2
 
MS SkyDrive
 
 
MyOtherDrive
 
OfficeLive
 
Readdle Storage
 
Protocol Enforcement
DB2
 
 
DNS
 
 
FTP
 
 
HTTP
 
 
IMAP
 
 
Informix
 
 
IRC
 
 
MSSQL
 
 
MySQL
 
 
NNTP
 
 
Oracle
 
 
POP3
 
 
PostgreSQL
 
 
SMB
 
 
SMTP
 
 
SNMP
 
 
SSH
 
 
SSL/TLS
 
 
Sybase
 
 
TELNET