Data Center is our focus

We help to build, access and manage your datacenter and server rooms

Structure Cabling

We help structure your cabling, Fiber Optic, UTP, STP and Electrical.

Get ready to the #Cloud

Start your Hyper Converged Infrastructure.

Monitor your infrastructures

Monitor your hardware, software, network (ITOM), maintain your ITSM service .

Our Great People

Great team to support happy customers.

Saturday, December 13, 2014

Gartner Identifies the Top 10 Strategic Technology Trends for 2015

Analysts Examine Top Industry Trends at Gartner Symposium/ITxpo 2014, October 5-9 in Orlando

Gartner, Inc. today highlighted the top 10 technology trends that will be strategic for most organizations in 2015. Analysts presented their findings during the sold out Gartner Symposium/ITxpo, which is taking place here through Thursday.

Gartner defines a strategic technology trend as one with the potential for significant impact on the organization in the next three years. Factors that denote significant impact include a high potential for disruption to the business, end users or IT, the need for a major investment, or the risk of being late to adopt. These technologies impact the organization's long-term plans, programs and initiatives.

"We have identified the top 10 technology trends that organizations cannot afford to ignore in their strategic planning processes," said David Cearley, vice president & Gartner Fellow. "This does not necessarily mean adoption and investment in all of the trends at the same rate, but companies should look to make deliberate decisions about them during the next two years."

Mr. Cearley said the top trends for 2015 cover three themes: the merging of the real and virtual worlds, the advent of intelligence everywhere, and the technology impact of the digital business shift.

The top 10 strategic technology trends for 2015 are:

Computing Everywhere

As mobile devices continue to proliferate, Gartner predicts an increased emphasis on serving the needs of the mobile user in diverse contexts and environments, as opposed to focusing on devices alone.

"Phones and wearable devices are now part of an expanded computing environment that includes such things as consumer electronics and connected screens in the workplace and public space," said Mr. Cearley. "Increasingly, it's the overall environment that will need to adapt to the requirements of the mobile user. This will continue to raise significant management challenges for IT organizations as they lose control of user endpoint devices. It will also require increased attention to user experience design."

The Internet of Things

The combination of data streams and services created by digitizing everything creates four basic usage models — Manage, Monetize, Operate and Extend. These four basic models can be applied to any of the four "Internets." Enterprises should not limit themselves to thinking that only the Internet of Things (IoT) (assets and machines) has the potential to leverage these four models. For example, the pay-per-use model can be applied to assets (such as industrial equipment), services (such as pay-as-you-drive insurance), people (such as movers), places (such as parking spots) and systems (such as cloud services). Enterprises from all industries can leverage these four models.

3D Printing

Worldwide shipments of 3D printers are expected to grow 98 percent in 2015, followed by a doubling of unit shipments in 2016. 3D printing will reach a tipping point over the next three years as the market for relatively low-cost 3D printing devices continues to grow rapidly and industrial use expands significantly. New industrial, biomedical and consumer applications will continue to demonstrate that 3D printing is a real, viable and cost-effective means to reduce costs through improved designs, streamlined prototyping and short-run manufacturing.

Advanced, Pervasive and Invisible Analytics

Analytics will take center stage as the volume of data generated by embedded systems increases and vast pools of structured and unstructured data inside and outside the enterprise are analyzed. "Every app now needs to be an analytic app," said Mr. Cearley. "Organizations need to manage how best to filter the huge amounts of data coming from the IoT, social media and wearable devices, and then deliver exactly the right information to the right person, at the right time. Analytics will become deeply, but invisibly embedded everywhere." Big data remains an important enabler for this trend but the focus needs to shift to thinking about big questions and big answers first and big data second — the value is in the answers, not the data.

Context-Rich Systems

Ubiquitous embedded intelligence combined with pervasive analytics will drive the development of systems that are alert to their surroundings and able to respond appropriately. Context-aware security is an early application of this new capability, but others will emerge. By understanding the context of a user request, applications can not only adjust their security response but also adjust how information is delivered to the user, greatly simplifying an increasingly complex computing world.

Smart Machines

Deep analytics applied to an understanding of context provide the preconditions for a world of smart machines. This foundation combines with advanced algorithms that allow systems to understand their environment, learn for themselves, and act autonomously. Prototype autonomous vehicles, advanced robots, virtual personal assistants and smart advisors already exist and will evolve rapidly, ushering in a new age of machine helpers. The smart machine era will be the most disruptive in the history of IT.

Cloud/Client Computing

The convergence of cloud and mobile computing will continue to promote the growth of centrally coordinated applications that can be delivered to any device. "Cloud is the new style of elastically scalable, self-service computing, and both internal applications and external applications will be built on this new style," said Mr. Cearley. "While network and bandwidth costs may continue to favor apps that use the intelligence and storage of the client device effectively, coordination and management will be based in the cloud."

In the near term, the focus for cloud/client will be on synchronizing content and application state across multiple devices and addressing application portability across devices. Over time, applications will evolve to support simultaneous use of multiple devices. The second-screen phenomenon today focuses on coordinating television viewing with use of a mobile device. In the future, games and enterprise applications alike will use multiple screens and exploit wearables and other devices to deliver an enhanced experience.

Software-Defined Applications and Infrastructure

Agile programming of everything from applications to basic infrastructure is essential to enable organizations to deliver the flexibility required to make the digital business work. Software-defined networking, storage, data centers and security are maturing. Cloud services are software-configurable through API calls, and applications, too, increasingly have rich APIs to access their function and content programmatically. To deal with the rapidly changing demands of digital business and scale systems up — or down — rapidly, computing has to move away from static to dynamic models. Rules, models and code that can dynamically assemble and configure all of the elements needed from the network through the application are needed.

Web-Scale IT

Web-scale IT is a pattern of global-class computing that delivers the capabilities of large cloud service providers within an enterprise IT setting. More organizations will begin thinking, acting and building applications and infrastructure like Web giants such as Amazon, Google and Facebook. Web-scale IT does not happen immediately, but will evolve over time as commercial hardware platforms embrace the new models and cloud-optimized and software-defined approaches reach mainstream. The first step toward the Web-scale IT future for many organizations should be DevOps — bringing development and operations together in a coordinated way to drive rapid, continuous incremental development of applications and services.

Risk-Based Security and Self-Protection

All roads to the digital future lead through security. However, in a digital business world, security cannot be a roadblock that stops all progress. Organizations will increasingly recognize that it is not possible to provide a 100 percent secured environment. Once organizations acknowledge that, they can begin to apply more-sophisticated risk assessment and mitigation tools. On the technical side, recognition that perimeter defense is inadequate and applications need to take a more active role in security gives rise to a new multifaceted approach. Security-aware application design, dynamic and static application security testing, and runtime application self-protection combined with active context-aware and adaptive access controls are all needed in today's dangerous digital world. This will lead to new models of building security directly into applications. Perimeters and firewalls are no longer enough; every app needs to be self-aware and self-protecting.

About Gartner Symposium/ITxpo

Gartner Symposium/ITxpo is the world's most important gathering of CIOs and senior IT executives. This event delivers independent and objective content with the authority and weight of the world's leading IT research and advisory organization, and provides access to the latest solutions from key technology providers. Gartner's annual Symposium/ITxpo events are key components of attendees' annual planning efforts. IT executives rely on Gartner Symposium/ITxpo to gain insight into how their organizations can use IT to address business challenges and improve operational efficiency.

Evernote helps you remember everything and get organized effortlessly. Download Evernote.

Wednesday, December 10, 2014

Prediksi IDC tentang Data Center di 2015

International Data Corporation (IDC) today hosted the IDC FutureScape: Worldwide Datacenter 2015 Predictions Web conference, which highlighted predictions based on a new IDC FutureScape report. The Predictions Web conference series and accompanying IDC FutureScape reports are designed to help company leaders capitalize on emerging market opportunities and plan for future growth. An audio replay of today's Web conference will be available this afternoon. To access the replay, please visit: http://bit.ly/IDCDataCenterFutureScape2015.
The predictions from the IDC FutureScape for Datacenter are:
1. By 2016, 65% of organizations' infrastructure investments will target creation and expansion of 3rd Platform systems of engagement and insight, rather than maintaining existing systems of record.
2. In the next two years, 25% of all large and mid-sized businesses will confront significant power/cooling facilities mismatches with new IT systems, limiting them to using less than 75% of their physical datacenter space.
3. In the next two years, incompatible or immature IT asset management practices will prevent 80% of organizations from being able to take full advantage of converged and software defined IT solutions in their own facilities.
4. By 2016, hyperscale datacenters will house more than 50% of raw compute capacity and 70% of raw storage capacity worldwide, becoming the primary consumers/adopters of new compute and storage technologies.
5. By 2017, 60% of the datacenter-based IT assets that organizations rely on to conduct business and deliver services will be in colocation, hosting, and cloud data centers.
6. Over the next two years, over 60% of companies will stop managing most of their IT infrastructure, relying on advanced automation and qualified service partners to boost efficiency and directly tie datacenter spend to business value.
7. Over the next three years, 70% of large and mid-sized organizations will initiate major network redesigns to better align inter-datacenter and datacenter-to-edge data flows.
8. By 2018, third-party service providers will own a quarter of all IT assets installed in organizations’ server rooms and closets, posing major asset management and governance challenges.
9. By 2016, the top 20 providers of consumer and business as-a-service solutions will deploy broad spectrum, multi-datacenter security solutions.
10. By 2018, every organization in data-intensive industries will have formal data ethics review processes and will publicize data control policies.
"The key question for organizations is whether they have the insight, capital, and commitment to design, build, and operate datacenters for reliable and dynamic delivery of transaction, content serving, archiving, and analytic capacity on time, with no delays and no excuses to individuals and organizations around the world," said Richard Villars, Vice President, Datacenter & Cloud Research at IDC. "For many the answer will be 'no!' They will rely increasingly on third parties to build, deploy, manage, and 'rent' IT capacity and store important information."
The IDC FutureScape report that this Web conference is based on will be published and available within the next 24 hours. To learn more about IDC Predictions and IDC FutureScapes, please visit: www.idc.com/Predictions2015.
For additional information about these predictions or to arrange a one-on-one briefing, please contact Sarah Murray at 781-378-2674 or sarah@attunecommunications.com. Reports are available to qualified members of the media. For information on purchasing reports, contact insights@idc.com; reporters should email sarah@attunecommunications.com.
About IDC Predictions
A hallmark of IDC's offering for three decades, the annual Top 10 Predictions reports provide our outlook on the IT market, across industries, in the coming year. During the next 90 days, IDC will publish Top 10 Predictions documents for 2015. Please visit www.idc.com/Predictions2015 for a complete listing.
About IDC FutureScape
IDC FutureScape reports are used to shape IT strategy and planning for the enterprise by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of decision imperatives designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three-year business planning cycle.

WebNMS and Calsoft Labs Partner to Accelerate NFV and SDN Integration into Orchestrated Multi-Vendor Service Provider Networks

WebNMS and Calsoft Labs Partner to Accelerate NFV and SDN Integration into Orchestrated Multi-Vendor Service Provider Networks

WebNMS and Calsoft Labs Jointly Simplify the Delivery of End-to-End, Assured Virtual Services
  • WebNMS expands network orchestration to virtual appliances
  • Calsoft Labs integrates virtual appliances into existing carrier networks
  • Visit the Calsoft Labs exhibit at Carrier Network Virtualization 2014
Carrier Network Virtualization 2014
PALO ALTO, Calif. & PLEASANTON, Calif.--()--WebNMS, the leading provider of multi-vendor network management and IoT solutions, and Calsoft Labs, a pioneer in network function virtualization (NFV) and software-defined networking (SDN) services, today announced a partnership to help service providers increase their revenue and reduce costs by delivering virtual services on their existing networks. The partners are exhibiting their collaborative solutions at the Carrier Network Virtualization conference being held Dec. 9-11, 2014, in Palo Alto.
“With Calsoft integrating our Symphony platform with NFV solutions, network providers get unified, multi-vendor network management, flexible service orchestration and a broad choice of virtual appliances.”
To meet the growing demand for dynamic network services, providers need solutions to transform their existing network and service management processes into orchestration systems that automate existing operations and rapidly incorporate new, on-demand services. To enable this transformation, WebNMS offers the WebNMS Symphony Orchestration Platform. Symphony combines multi-vendor carrier network management solutions, based on the field-proven WebNMS Framework, with the Composer Workflow Framework that helps providers automate their unique operations.
Calsoft Labs offers professional services to help network operators simplify multi-vendor network management, end-to-end service provisioning and SLA monitoring for Carrier Ethernet services. In addition, Calsoft Labs offers high performance VNF frameworks as well as NFV orchestration and systems integration services to help network operators deliver new revenue-generating services in an agile and cost-effective manner. As a WebNMS partner, Calsoft Labs will offer professional services to help customers leverage WebNMS Symphony as the unified network management and service orchestration platform for advanced Ethernet services.
“Collaboration between WebNMS and Calsoft Labs gives service providers a clear path to orchestrating NFV in conjunction with their existing services,” said Prabhu Ramachandran, director of WebNMS. “With Calsoft integrating our Symphony platform with NFV solutions, network providers get unified, multi-vendor network management, flexible service orchestration and a broad choice of virtual appliances.”
“Service providers see the tremendous value in a unified network management and service orchestration solution that spans across access, metro and core network domains,” said Narendra Dhara, senior vice president and CTO at Calsoft Labs. “By partnering with WebNMS, we hope to simplify end-to-end service provisioning, including NFV services like virtual CPE for next-generation business Ethernet services.”
Calsoft Labs and WebNMS representatives will be available during the Carrier Network Virtualization event to provide more insights into their joint offer.
For more information about Calsoft Labs, please visit www.calsoftlabs.com. For more information about WebNMS, please visit www.webnms.com.
About Calsoft Labs
Calsoft Labs is a wholly owned subsidiary of the €1.2 billion ALTEN Group. Calsoft Labs offers technology consulting, product engineering and systems integration services globally to equipment manufacturers (OEMs/ODMs), telecom operators and independent software vendors (ISVs). Calsoft Labs operates state-of-the-art product design and development centers at Bangalore, Chennai and Mysore in India, with sales and support offices worldwide including North America, Europe and Asia. For more information, please visit www.calsoftlabs.com.
About WebNMS
WebNMS, the telecom software division of Zoho Corporation, specializes in platforms for network management, element management, service orchestration and workflow orchestration. WebNMS builds these solutions on flexible, extensible frameworks for network service providers, managed service providers and network solution vendors. With more than 25,000 deployments across the globe, the flagship WebNMS Framework is the most preferred and reliable multi-vendor management solution in the market today. For more information about WebNMS, please visitwww.webnms.com.
WebNMS is a trademark of Zoho Corporation. All other brand names and product names are trademarks or registered trademarks of their respective companies.
Tags: WebNMS, Zoho, Calsoft Labs, Carrier Ethernet, NFV, SDN, network functions virtualization, software-defined networking, Carrier Network Virtualization, Symphony Orchestration Platform, WebNMS Framework, Composer Workflow Framework, network management, service orchestration, virtualization, on-demand services

Tuesday, December 09, 2014

Triple Play dengan Draytek Vigor 2120n-plus

Vigor2120n-plus

  • font size decrease font size increase font size
Vigor2120n-plus
  • Integrated with four-Gigabit LAN switch
  • Object-based firewall minimizing vulnerability
  • Comprehensive VPN facilities for remote data access
  • USB 2.0 for flash drive, printer and 3.5/4G USB mobile
  • Concurrent 2.4/5GHz WLAN
  Rear Panel of Vigor2120n-plus
wan-lan


 Triple Play Application 
triple play


 USB 2.0 Port
USB 2.0 Port


 Port-based VLAN + Multiple SSID
  
ssid


2 VPN Tunnels

vpn



Bandwidth Management

Bandwidth Management



 Wireless Security

Wireless Security



 Monitor / Filter / Block unwanted websites

Monitor



Firewall
Firewall



Central Management via ACS SI (System Integrator) / TR-069

acs