Data Center is our focus

We help to build, access and manage your datacenter and server rooms

Structure Cabling

We help structure your cabling, Fiber Optic, UTP, STP and Electrical.

Get ready to the #Cloud

Start your Hyper Converged Infrastructure.

Monitor your infrastructures

Monitor your hardware, software, network (ITOM), maintain your ITSM service .

Our Great People

Great team to support happy customers.

Saturday, December 26, 2015

Produk terbaru MANAGEENGINE : FILEAUDIT PLUS

What is FileAudit Plus:

ManageEngine FileAudit Plus is an agent-based file auditing and reporting
software. Monitor in real-time the changes to all files in the file system along
with thorough reports on every activity as to 'who' did 'what', 'when' and 'from
where'. Keep track of changes made to the files, file objects in the folders or
sub-folders and shares. Watch out for any changes made to a particular type
of file (for e.g. *.log) or choose to exclude servers and file types.
.

What FileAudit Plus can do?
  • File / Folder Changes
  • Files / Folders Read
  • Files / Folders Permission Changes
  • Files / Folders Owner Changes
  • Files / Folders SACL Changes
  • Files / Folders Access Denied

FileAudit Plus offers convenient pricing for enterprises of all sizes. The licensing
is based on number of File Servers

                    Description                                      Cost

Annual Subscription Fee For 2 File Servers         $395
Annual Subscription Fee For 5 File Servers         $795
Annual Subscription Fee For 10 File Servers       $1,495
Annual Subscription Fee For 15 File Servers       $2,195
Annual Subscription Fee For 20 File Servers       $2,495
Annual Subscription Fee For 30 File Servers       $2,795
Annual Subscription Fee For 50 File Servers       $3,695

Saturday, December 19, 2015

Ingin liburan panjang ? Pastikan sistem anda termonitoring

Seringkali mendapatkan problem di sistem Anda pada waktu liburan?
Ya, itu yang dirasakan banyak IT manager, system admin, di banyak perusahaan dan instansi. Semua ini karena tidak menggunakan sistem monitoring.

Apa saja itu sistem monitoring ?
Pertama, bagi kita yang sangat bergantung kepada ketersediaan jaringan, baik jaringan Internet ataupun cabang, maka kita sangat memerlukan sistem monitoring jaringan, atau dikenal juga dengan Network Monitoring System.

Kedua, bagi kita yang tetap harus memastikan aplikasi atau program yang mendukung proses bisnis, proses layanan tetap berjalan, meskipun pada hari libur, dan bahkan liburan panjang, kita memerlukan Application Monitoring System.

Ketiga, bagi kita yang memerlukan pengawasan atas area khusus, seperti ruang server, data center, ataupun aspek khusus terkait lingkungan, yaitu ketersediaan listrik, temperature dan kelembaban, status kebocoran, bahkan ketersediaan solar dalam tangki genset. Dengan kebutuhan itu, kita memerlukan Environment Monitoring System.

Ketiga kebutuhan diatas, kami biasa menanganinya. Dengan beragam solusi NMS, Application Monitoring dan EMS, kami siap membantu banyak perusahaan dan instansi yang masih harus tetap online, tetap berjalan, meskipun liburan panjang.

Cara paling cepat untuk monitoring server, router, switch, access point, bahkan sampai perangkat IP camera dan perangkat berbasis IP lainnya, adalah menggunakan aplikasi monitoring PRTG. Software PRTG tersedia opsi untuk menggunakan 100 sensor free, artinya bisa digunakan untuk memonitor PING ke 100 device. Silahkan download aplikasi PRTG di link ini


Nah, sekarang aplikasi monitoring. Dengan PRTG kita bisa memonitor beberapa aplikasi / service. Tapi, apabila ingin lebih dalam, maka pilihannya adalah Application Manager dari ManageEngine.
Produk ini sangat powerful untuk memonitor aplikasi dan database, itu yang paling banyak dicari saat ini.



Silahkan download free utk 30 hari disini

Terakhir, soal monitoring fisikal. Ini mau tidak mau perlu perangkat dan sensor. Kami membawa solusi AKCP.com . Dengan solusi ini, tersedia perangkat yang paling kecil, mendukung 2 port sensor, dengan notifikasi dikirimkan via email. Sensor yang tersedia juga beragam. Paling banyak dipasang adalah Sensor Temperature and Humidity, Water Leakage (Rope Water dan Spot Water), dan ketersediaan listrik AC Voltage.


Silahkan kontak kami untuk kebutuhan di atas : askme@dayaciptamandiri.com, atau call kami 08121057533





Friday, December 18, 2015

Masih pakai Spicework ? Saatnya untuk beralih, ini alasannya


Price 
Free
Pros 
Easy to install and configure
Cons 
Doesn't allow you to create custom alerts; Ad-supported
Verdict 
Although convenient and easy to work with, Spiceworks Network Monitor lacks the customisability of its open source rivals.


Spiceworks Network Monitor is a free tool designed to provide real-time monitoring and statistics for your servers and SNMP-capable network devices. Although it's free, it's not open source and it shows adverts in a small frame at the top right of its main web interface. Spiceworks Network Monitor can be used alongside Spiceworks' IT Help Desk and Inventory Management tools, but we've reviewed it as a stand-alone product.
The network monitor runs on any version of Windows from Windows Server 2008 R2 onwards - we installed it on a Windows 2012 R2 server which wasn't running any other services. Installation and setup aren't very involved: just download the software from Spiceworks' website and run the installer. Once completed, a desktop shortcut takes you to a web interface where you can complete the initial setup process.
You'll need a Spiceworks account before you can log into the monitoring system - you'll have to go to spiceworks.com to set one up. It’ll require your name, email address and a password. Once logged in, we were presented with the default dashboard screen. Below the horizontal menu and alert bars at the top of the screen, there are boxes for server and network watchlists. Below that are spaces to add 3 devices for closer monitoring, which will display more detailed information about each of those devices.
The first time any user logs in, a help panel automatically opens up across the left-hand third of the page, annoyingly obscuring the dashboard items below it. The basic help information it displays isn’t terribly useful, but once closed, it remains shut on future logins unless deliberately re-opened.
When you first connect to the network monitor a rather annoying help bar dominates the left side of the screen
As well as the main dashboard, there are dedicated pages for devices, where you can add and view details of the machines you wish to monitor, and settings, where you can configure alerts and add users. There's also a menu option for help, but rather than immediately providing you with relevant documentation, it takes you to the Spiceworks community site, where you have to set up a forum name before you can access any useful information. The account creation process tries to get you to set up a profile for your company, as well as one for yourself and although it's possible to skip most of this, it's irritatingly involved if you just want some immediate help with the software. 
The main dashboard screen gives you a quick overview of any issues and lets you add your most important servers for at-a-glance monitoring
Even more annoyingly, once you've registered a profile, you're taken to the main Spiceworks community page, instead of the Network Monitor help pages. Fortunately, once registered, future attempts to access help from within Network Monitor's web interface will take you straight to the community support page, where you can search previously asked questions or go to the support forums.

Monitor the situation

The software keeps an eye on 26 different parameters for each device, split into 5 categories: Host, CPU, Memory, Disk, and Network. These can monitor for specific conditions such as consistently high processor load, spikes in memory usage, low disk space, and network bottlenecks. However, unlike more fully featured monitoring solutions (both commercial and open source) it lacks the ability to monitor specific processes, or any way to create custom alerts for specific error conditions.
Spiceworks provides a range of alert options but although you can change their default parameter thresholds you can't create your own alerts
The settings page has only two tabs, listed on the left hand side, Default Monitors and User Accounts. The first allows you to configure the default thresholds for the monitored parameters, and select which will generate email alerts. The second tab allows you to add or remove users for the monitoring system. Unfortunately, users can't be added directly. Instead you enter their name and email address, and the system sends them an invitation via email, with a link. If they sign in to the system, a spiceworks.com account will be automatically created for them.
The devices page starts with just one device listed: the machine that the monitoring software is running on. Clicking the add device button opens up a new pane, with tabs for adding computers running Windows or Linux as well as networking devices such as routers and firewalls. To add a device, all you need are its IP address or hostname and a login for that system with sufficient privileges. When adding a Windows server, we used an account with local administrator rights on that server. For Linux servers, we used standard user accounts which had been given full sudo access.
We can't fault the clean design of the monitoring graphs which make it easy to see errors such as this high CPU load

Alert Status 

Once a device has been added, the thresholds and email options for each alert can either be left at the default settings, or customized for that device. We simulated a variety of system errors on our test servers. Most of these were reported accurately, but when we used a software tool to keep the CPU of our Windows server at 100%, Spiceworks Network Monitor showed the CPU load correctly in its graph, but its process list showed only 50% CPU load for the process responsible, rather than the almost 100% load shown by Task Manager on the server itself.
Alerts are displayed in the network monitor's web interface and sent via email if you've enabled email alerts for the parameter in question. We found that the email to the primary user arrived promptly, but the email to a second user we added was always 15 minutes behind the first one. You can't specify which alerts get sent to which users, either: all users get sent all alerts. That's fine if you're only monitoring a handful of servers, but in a larger company where different staff may have responsibility for different groups of machines, the limited customisation features for alerts could be a problem. Until an alert is cleared, reminder emails are sent every 30 minutes. A final email is sent out once the issue has been resolved.
It's worth noting that the alert emails are sent via spiceworks.com systems, rather than using your own internal email server, so if your internet connection goes down, you won't get alert messages. The Network Monitor is similarly reliant on Spiceworks for user authentication, so you can't install the monitoring tool on a server on a protected section of the network with restricted internet access.

Conclusions

While we found Spiceworks Network Monitor to be quick and easy to install and set up, its lack of granularity in the configuration and inability to define custom alerts were disappointing. Combined with its reliance on external spiceworks.com systems for user authentication and email, and its limited monitoring capabilities, these factors make it unsuitable for enterprise-class or even medium-business monitoring setups. This is a shame as Network Monitor can, according to Spiceworks, keep track of up to 1,000 devices without suffering slow-downs.
However, entry-level users with limited monitoring requirements will find Spiceworks Network Monitor to be quick to set up and easy to work with, assuming you don't mind being dependant on an external service. Users with more heavy-duty monitoring requirements and small businesses that want to be able to configure their monitoring setup to their exact requirements should opt for a more customisable network monitoring tool that they have complete control over, such as Zabbix or Nagios.
Specifications 
System Requirements
Windows 7/Server 2008 R2/Server 2013
Dual-core processor
4GB RAM
2GB disk space
Active internet connection


Read more: http://www.itpro.co.uk/network-management/25751/spiceworks-network-monitor-review#ixzz3ucxtJf00

Monday, December 14, 2015

Sudahkah Anda Upgrade ke SERVICEDESK PLUS 9.1 ?


Why upgrade?

ServiceDesk Plus 9.1 comes with new features which will help you boost your service desk performance.
Custom request forms

Invoke custom HTML file from Request Custom menus

Customers can invoke a custom HTML file from Request Custom menus enabling the users to render their own UI from the request menu configurations. This provides an alternate way to integrate third party applications using the user interface. Custom scripts can be executed upon submission of HTML forms.

Field and form rules for incident and service request customization

With field and form rules, you can customize incident and service templates to perform customized actions when a form loads, (or) when changing a particular field in a form, (or) when a form is submitted. It is possible to perform actions like, mandate or non-mandate specific fields, enable or disable specific fields, show or hide specific fields in a form and to execute user-specified custom java scripts.
Incident & Service Request form customization
Fail over service

Fail over service (High availability)

Ensure high server availability. With the fail over service feature in ServiceDesk Plus 9.1, you have the option to configure the secondary service desk installation to provide uninterrupted service when there is a network, hardware, software, or power failure in the primary installation. The fail over server acts as the secondary server which runs in parallel to the primary server. This secondary server or slave will act as the primary server or the master when the primary server or master is down.

Mandate the status change comments for request module

ServiceDesk Plus 9.1 now comes with a feature to mandate the status change comments for Request module. Technician and requester comments on the change of status of a request can be easily captured. By default, status comments are not mandatory but can be disabled/enabled under Admin->Self-service Portal settings.
Request status comments
Export projects as pdf

Export as PDF option for project module activities

Export Project Gantt View, Project Overview Map, and Task Dependency Map in the PDF format. The PDF will downloaded automatically.

Configuration options to auto suggest solutions

Configure unique fields to the search drop down for auto suggestion of announcements and solutions during incident creation. By default, category/subcategory/item (CSI), title, and description will be included in the search.
Auto Suggest Solutions
Help desk mobile app

Requesters can raise or track requests on the go

Requesters can now login into the mobile app to raise or track requests. Earlier, native versions of ServiceDesk Plus mobile app were technician-specific. The feature is available from Version 3.0 in iOS and from Version 1.4 in Android.

Other introduced features

  • Rest API support to GET/ADD/DELETE the attachments under Request and Tasks
  • Search option in Request list view filters
  • Rest API support for requesters

Sunday, December 13, 2015

Masih gunakan custom script? import saja ke OpManager

ManageEngine OpManager www.facebook.com/MEOpManager http://twitter.com/#%21/MEOpManager
Using Scripts? Now import them into OpManager!
View video
No second thought that scripts are vital and help meet your custom monitoring needs. However, the biggest challenge is the intensive manual efforts required to execute it consistently across hundreds of serves. It also doesn’t alert when there is an issue.
Now import all your scripts into OpManager's new
Script Monitoring module, and
automate your pre & post script-execution activities.
Know more on OpManager's Script Monitor
The Script Monitoring module:
bullet Out-of-the-box supports Powershell, Linux shell, VBScript, Perl and Python scripts
bullet Offers import/ export and 'Save as Template' options
bullet Supports migration of scripts from HP OpenView and Zenoss
bullet Allows you to set threshold for script output, and receive email/SMS alerts if violated
bullet Allows you to trigger an IT workflow based on the script output
 
OpManager Features:
OpManager also includes Network Monitoring, Server Monitoring, VMware Monitoring,
Hyper-V Monitoring, Script Monitoring, MS Exchange, SQL & Active Directory Monitoring

Monday, December 07, 2015

IT WORKFLOW di OpManager


T Workflow Automation

Administrators have preset routine (run book) tasks to perform either during network faults or as an on-going maintenance task. These first level troubleshooting steps and repetitive laborious maintenance tasks can now be orchestrated and automated through powerful IT workflow automation engine.
OpManager’s IT workflow automation:

Code-free IT workflow automation with out-of-the-box checks and actions

Code-free IT workflow automation with out-of-the-box checks and actions
Over 70 workflow checks and actions grouped under 9 different categories, including VMware ESX actions are available for you to construct a powerful workflow rule to suit your IT management need. Just create workflows using these out-of-the-box checks and actions to the workflow builder and you are good to go.
You don’t have to skim through complex scripts and codes to automate your IT. OpManager IT workflow automation is carefully built with user friendly interface and code-free  

IT automation

  to help you build workflow rules quickly.

An agile and flexible drag-n-drop workflow builder

An agile and flexible drag-n-drop workflow builder
The intuitive drag-n-drop workflow builder makes it really straightforward to create new workflow rules for every administrator.
Besides defining new workflows, you can modify an existing workflow by making changes to the conditions or actions inside the workflow builder.

Initiate the workflow rules on network faults or as an on-going maintenance tasks

Initiate the workflow rules on network faults or as an on-going maintenance tasks
The application of IT  

run book automation

  can be initiated when there is a network fault, or as on-going maintenance tasks, or even on an ad-hoc basis. OpManager IT workflow automation module gives you the free hand to trigger workflow in all the aforementioned situations.

Record the IT workflow procedures as an XML and ensure structured practices across IT

Record the IT workflow procedures as an XML and ensure structured practices across IT
Using OpManager, seasoned administrators who are well-informed of their organization’s IT setup, can create IT workflow rules to meet the organization’s requirement. Contextual workflows address your specific IT automation needs, leading to minimized downtime and reduced time to repair a fault. These structured, time invested, useful documents can now be preserved as XML files with the option to export the workflows and also import them even into other instances of OpManager when there is a need.

Audit trails of workflow progresses and logs with detailed workflow execution logs reports

Audit trails of workflow progresses and logs with detailed workflow execution logs reports
Every executed workflow is recorded under "Execution logs" for future audits. This report comes handy when the administrators want to make sure what has happened during a particular workflow execution.

Benefits of OpManager IT workflow automation:

Helps you...
  • Resolve issues faster and reduce MTTR (Mean Time To Repair)
  • Inherit your IT infrastructure best practices and ensure structured/ proven methods to handle incidents and problems
  • Automate repeated activity executions for efficient IT management
  • Avoid human errors and substantially reduce support and operational costs

Sunday, December 06, 2015

Prediksi IDC dan FORRESTER RESEARCH untuk 2016

Over the past month, IDC and Forrester Research, two of the largest and most venerable analyst firms, have released 2016 predictions – and many readers will find their reports disquieting indeed (unfortunately, neither IDC’s FutureScape 2016 or Forrester’s Predictions 2016: The Cloud Accelerates are freely available to the general public). 
ready set go checkered flag sports race rally car racing 000003607936
IT will drive business change in 2016 thanks to these key tech developments.
READ NOW
I believe that we’re in the beginning stages of an IT landscape transformation and, from these reports, it appears these firms share this belief. Moreover, they contain predictions that should frighten most vendors. Simply stated, this landscape transformation is bringing a new set of dominant vendors to the fore to the disadvantage of legacy players. According to IDC and Forrester, the next five years will bring immense change and disruption to the IT industry. I see this every day, but my sense is most people in the industry fail to grasp just how quickly things are changing. 
It’s not often that analyst firms paint such a bleak picture. After all, much of their business comes from vendors seeking guidance about user needs, market opportunities, and technology trends. So announcing that most of them are in for hard times doesn’t seem like a strategy to generate more business. 
On the other hand, providing overly rosy predictions does no one any good; moreover, tweaking predictions in a more optimistic direction that subsequently fails to materialize risks reputational damage, which is bad for long-term analyst business survival. So, it’s safe to say, for these firms to be so blunt in their assessments means they feel the trends are so profound that they cannot be ignored, denied, or whitewashed. 
Here are five of the most important predictions I gleaned from their reports: 

1. Legacy vendors face a bleak future

It couldn’t be put more clearly: In its report, IDC states that “By 2020, More than 30 percent of the IT Vendors Will Not Exist as We Know Them Today.” In other words, nearly one-third of today’s vendors will be out of business, stripped-down shells of their former selves, or combined via mergers. 
However, this is just the warmup for what promises to be a wrenching time for the entire spectrum of legacy vendors – and the largest ones are the most at risk. It’s been clear for some time that they’re in trouble – no growth, missed earnings, excuses ranging from lousy salespeople to unfavorable exchange rates. The fact that growth has disappeared for these vendors is a leading indicator that things are about to get much, much worse. 
The thing is, this isn’t a failure of execution, to be fixed with a CEO change or a large layoff. It’s a sign that the nature of the industry is changing, and these vendors aren’t delivering tomorrow’s solutions. The restructuring of the existing industry will be accelerated by a new phenomenon in the tech world – private equity. 
Those of us who live in Silicon Valley smugly throw around the term disruption, and imply that any fallout is just collateral damage. The truth is that this restructuring will be extended, painful, disheartening – and inevitable. 

2. Cloud providers will be winnowed down

Well, even if disruption occurs in traditional legacy vendor markets, they can always take refuge in the cloud, right? Not according to Forrester. In its prediction, it says: 
The major public cloud providers will gain strength, with Amazon, IBM SoftLayer, and Microsoft capturing a greater share of the business cloud services market. Despite excellent technology and scale, Google will only begin to develop momentum in large-enterprise business in 2016. Even with innovative new players like Aliyun and DigitalOcean emerging, the number of options for general infrastructure-as-a-service (IaaS) cloud services and cloud management software will be much smaller at the end of 2016 than the beginning. 
I recall seeing a tweet from Lydia Leong (a savvy cloud analyst at Gartner, Twitter handle @cloudpundit) in which she said she is fielding inquiries from cloud service providers trying to figure out how to sunset their offerings. 
Forrester goes on to say that users should “standardize on the cloud leaders.” In other words, we’ve reached the musical chairs stage of the CSP market, and you want to commit to providers sure to, so to speak, have a place to sit. This is, of course, a self-fulfilling prophecy – as users turn to the major providers, smaller providers end up with less revenue, thus forcing service shutdown, driving more business to the large providers … and so it goes. 
This is not unexpected. In its 2014 predictions (see my discussion here), IDC said that the public CSP market would end up with six to eight players of scale, with remaining providers fighting over scraps. 
Like all capital-intensive industries, this is turning into a battle of who has the biggest checkbook, and 2016 will see many current providers conclude their bank balance just isn’t big enough to stay in the market. 

3. Big data gets, well, big

Big data is a phrase on everyone’s lips, and it has made data scientist, according to the Harvard Business Review, the sexiest job of the 21st century. This intense interest reflects the growing understanding that analyzing large amounts of data can offer insights previously unavailable or, worse, ignored in favor of “gut feel” and intuition. 
What’s remarkable is how widely big data is being applied. There does not seem to be any area that big data, and its associated fields like machine learning and artificial intelligence, is not being applied. Big data is transforming drug discovery, healthcare, education, language translation, employment recruiting … in fact, it might be easier to list industries and tasks big data isn’t transforming than to list those it is. 
But according to IDC, big data is only getting started. Today, only 1 percent of all apps use cognitive services; by 2018 (in other words, in three years), 50 percent will. Essentially, analytics will be embedded in every application, used to facilitate functionality or convenience. 
One of the major challenges of big data is, naturally enough, how much storage it requires. This is an area the big cloud providers are jumping on. You’ve undoubtedly heard of IBM’s Watson, but Google, Microsoft, and AWS have all rolled out machine learning services as well as access to a range of very large datasets that can be used for analytics. One obvious implication of this trend is that it once again makes the large providers more attractive to the disadvantage of smaller CSPs that cannot make the investment to host machine learning services. 
IDC’s prediction may be too optimistic in terms of timing, but it’s clear that big data will be an important area for enterprise IT for the foreseeable future. 

4. Enterprises turn into software companies

So enterprises are turning away from traditional vendors and toward cloud providers. They’re increasingly leveraging open source. In short, they’re becoming software companies, or, as IDC puts it: 
By the End of 2017, Two-Thirds of the CEOs of Global 2000 Enterprises Will Have Digital Transformation at the Center of Their Corporate Strategy. 
and 
By 2018, Enterprises Pursuing DX Strategies Will More than Double Software Development Capabilities; 2/3 of Their Coders Will Focus on Strategic DX Apps/Services. 
Corporate IT is about to see its role and expectations change as never before. For many, this will be disconcerting. As I often put it: “For years, IT has asked for ‘a seat at the table.’ It’s terrifying when you finally get a seat and then everyone turns to you and asks ‘what should we do?’.” 
But that’s the situation most IT organizations will find themselves over the next few years. While many companies outsourced their initial forays into mobile applications, there’s no way that you can build a digital enterprise on the back of external consultancies. 
Furthermore, even if you could, no company could afford to do so. Being a digital enterprise is so critical to the future of every company that relying on an external party, and living with the inevitable inefficiencies, false starts, and missed communications, would be too dangerous. 
Instead, IT will become the core driver of “how business does business.” The responsibility -- and expectations -- will be high. For those CIOs who rise to the challenge, it will be a heady time. Those unable to fulfill this role will face a gloomy future as they are discarded in favor of someone -- anyone -- seemingly better suited to the task at hand. 
Make no mistake, as companies move toward their digital future, IT will be leading the way. 

5. Developers are the scarce commodity 

Of course, CIOs can’t do it on their own. They require an organization staffed with people capable of implementing the applications that will make the company a digital enterprise. 
And everything about those applications will be different from traditional enterprise applications. They’ll use different languages. Different databases. Different frameworks. Different execution environments. In short, nearly everything will be new – and require a different set of skills from those appropriate to last-generation applications. IDC puts it this way: 
By 2017, over 50 percent of organizations' IT spending will be for 3rd platform technologies, solutions, and services, rising to over 60 percent by 2020. 
For a discussion of the third platform, see my blog post here. The bottom line is that the difference between “enterprise IT” and “technology vendor” will blur as both seek to implement technology solutions that form the basis of how their company operates. 
Therefore, one thing you can expect to see is a brutal war for developers (which I wrote about two years ago here) as enterprise IT shops and tech companies battle for a limited pool of next-generation talent. 
Frankly, I think this will require a significant mind shift on the part of both enterprise IT organizations as well as the larger entities of which they are part. IT has traditionally been viewed as a cost center with a focus on keeping a lid on budgets – and one place that enterprise IT has traditionally held the line on is salaries. In all too many enterprise IT organizations, developers are seen as odd-behaving interchangeable commodities. The emerging reality is that developers are critical resources, who will increasingly be able to write their own ticket. 
And don’t imagine that your IT organization is protected because it’s located outside Silicon Valley. The demand for talent by valley companies is so high that they are more and more frequently placing centers of talent wherever it happens to be located – and that could very well be wherever you’re located. 
In conclusion, both Forrester and IDC’s predictions are unusually direct statements of a very different world of IT, one in which software infuses every part of an enterprise and technical talent is critical. If I hadn’t read the reports, I would have been surprised to be told about their bluntness; reading them, you can see that it will be an incredibly tumultuous time for the industry. I wonder how their briefings are going these days?