Data Center is our focus

We help to build, access and manage your datacenter and server rooms

Structure Cabling

We help structure your cabling, Fiber Optic, UTP, STP and Electrical.

Get ready to the #Cloud

Start your Hyper Converged Infrastructure.

Monitor your infrastructures

Monitor your hardware, software, network (ITOM), maintain your ITSM service .

Our Great People

Great team to support happy customers.

Saturday, July 11, 2015

4 Tahapan untuk automasasi perusahaan Anda.


For as long as companies have been doing business, leaders in those organizations have looked for new and better ways to streamline workflow. Transactions are the lifeblood of a company, and in today's customer-centric business environment, that lifeblood inevitably flows through the agent or employee desktop. Advances in desktop and robotic automation are enabling companies of all sizes to offer services in ways not even considered a few years ago.
By optimizing how transactions take place across different areas of an organization, companies can transform how people, processes, and technology work together to increase revenue, reduce operational costs, drive employee engagement, and deliver a world-class customer experience. 

Overcoming Typical Challenges

Enterprise transformation is the gradual evolution of how a company communicates and shares data internally. It is made up of many logical, incremental changes that improve business processes based around a business's needs and how management measures success.
Before an enterprise can begin to make those incremental changes, leadership must first look at how transactions take place within their organization. In the majority of enterprises today, most transactions take place on a computer desktop. Employees work in numerous systems and applications within the structure defined by the organization. Bottlenecks and inefficiencies often arise due to the inability of these different computer systems to share transactional data. 
This lack of integration can manifest in many different ways, including prolonged process times, unnecessary copy and pasting, limited access to customer transaction data, inaccurate data entry, and a general breakdown in company processes and core business activities.
Once a company understands what needs to be changed, there is a simple four-step process that can help them achieve the goals outlined above.

Step One: Completely Eliminate Processes That Can Be Performed Using Robotic Automation

Every day, employees perform repetitive tasks that do not require any level of actual decision making. In addition to wasting their time, this monotony increases the chance of human error and lost revenue. Robotic automation can eliminate these tasks and ensure greater accuracy and recordkeeping. Eliminating these processes also frees up employees to perform more important tasks and spend more time on customer satisfaction and quality assurance, rather than simple data entry.
Additionally, automation solutions help accelerate transaction times, allowing for faster customer service, even when the company is experiencing major spikes in volume or in off hours. The result is fewer backlogs and more efficient operations.

Step Two: Automate Manual, Repetitive, and Redundant Tasks

The next step is to look at the other functions that would benefit from automation. Core business activities, such as documenting notes about customer service inquiries, copying and pasting data from one system to another, and countless other manual tasks can drive up call handle times, inflate transaction processing time, and increase the opportunity for errors. While these activities must be performed on the employee desktop, they can be fully automated.
This is accomplished by integrating disparate applications and creating automated end-to-end processes that make workers more productive while also improving the quality and accuracy of the transactions.

Step Three: Optimize Processes That Cannot Be Fully Automated

Once a company has exhausted all opportunities to automate employee functions, the next step is to take a critical look at everything else the employees do and how they can be optimized using automation.
A few simple questions can help identify these areas:
  • How are employees using applications to gather the information they need to “work” the transaction?
  • Is a human decision actually required? If so, what are the activities that lead up to the point in which a decision must be made?
  • Does the employee have the information necessary to efficiently process the transaction?
  • Are there steps in the process that could introduce opportunities for error?
By taking this approach, a company can identify any remaining opportunities to improve efficiencies. Desktop automation can help shape the activities that lead to the point at which the employee must exercise a "decisioning" activity and automate micro-activities.
The best example of this is the adoption of 360 customer views—consolidating user interfaces and data points from disparate applications into a single screen. Having a comprehensive view of the customer's information empowers employees and enables them to engage customers with deeper, higher-valued activities.

Step Four: Extend the Value of Existing Technology Investments

The final step is to build extensible business logic that improves transaction quality companywide. For example, automation technology can guide customer service agents through complex transactions and deliver "next best action" recommendations for more effective upselling.
Intelligent guidance delivered to the contact center agent at critical moments can significantly improve average revenue per transaction, reduce training time and costs, and ensure compliance to key industry regulations. Additionally, having better customer intelligence enables employees to provide more accurate information faster and more efficiently.
By following these four steps, an enterprise can dramatically improve its customer satisfaction scores while reducing its cost per transaction. Furthermore, this can all be accomplished without disrupting current work processes or requiring extensive training. Automation solutions—whether desktop or robotic—represent a major leap forward in the evolution of transaction and data management within an enterprise.
Anna Convery is executive vice president, strategy, and oversees global market development and strategic initiatives forOpenSpan, an industry pioneer in automation technologies that support transformation initiatives focused on driving revenue growth, customer lifetime value and operational efficiency. She can be reached at info@openspan.com.

Thursday, July 09, 2015

Penting nya kemudahan gunakan NMS


The Network Operation Center (NOC) interacts with the Network through the User Interface of various Network Management Systems (NMS). Thus, the importance of theUser Interface cannot be underestimated as it can simplify the daily work of NOC operators and help minimize costs by allowing faster network roll-out, identification and restoration of network and service issues.

This article identifies and analyzes the characteristics that make a User Interface provide a better user experience to increase the efficiency and effectiveness of the NOC.

Read below to understand the importance of these User Interface characteristics, to help you select the best NMS for your needs.

Drag n' Drop

A Network Management System (NMS) must feature a drag 'n drop user interface, where the user can re-arrange the network model with simple actions, using the network tree view or map topology view. With simple drag n' drop actions, the user must be able to:

Add managed devices to domains and sub-networks.

Add sub-networks to domains.

Transfer domains under domains, creating hierarchical structures.

Transfer managed devices from domain to domain.

 

Tabs

 

A Network Management System (NMS) must feature atabbed user interface that helps users manage the way they browse their system reports, inclusive of reports for domains, managed elements, physical terminations, performance, faults, configuration, etc.

Users must be able to drag 'n drop tabs in and out of the main window in order to make them independent windows, thus supporting the usage of video walls in NOC premises.

 

Context Sensitive Menus

A Network Management System (NMS) must feature a click n' go user interface that is implemented through the utility of Context Sensitive Menus. These menus must appear when the user right-clicks anywhere on the User Interface, including:

A managed object in the Network Navigator.

A module / port in the Topology (Graphical View).

A record (e.g. an alarm or a performance measurement) in

a tabular report.

 

The context-sensitive menu that appears must provide options adapted to the selection the user has made. Using a context-sensitive menu, on the selected entity, the user must be able to carry out network configuration, monitoring, performance analysis, etc. with a one-click action.

 

Real Time Updates

A Network Management System (NMS) must feature real-time updates of the user interface with user-customizable update frequency. This automation minimizes the number of clicks required for monitoring and allows the real-time monitoring of events, faults and performance of the network.

 

Visualization on Maps

A Network Management System (NMS) must feature the capability to allow users to create geographical and administrative domains in order to group discovered devices and also create the connections and links between these managed devices. In this way, the network topology can bevisualized, greatly increasing the NOC capability to monitor the status and performance of the managed network and its elements.

With the Google maps service available to everyone for free, users have been educated to use mapping features such as zoom-in / zoom-out and drill-in / drill-out, and expect to find them also in the User Interface of the NMS.

Thus, visualizing the topology is only the first step. User Interfaces must display on Google maps the status and performance of the network color-coded, to provide the NOC user a new level of visualization .

Photo-realistic Equipment Views

A Network Management System (NMS) must feature photorealistic equipment views that are "live" in the sense that they display the alarm, operational and administrative status of the managed devices in real-time.

In such photorealistic equipment views, alarms can be represented with colored rectangles:

The rectangle's outline color to indicate the severity of the alarms, which exist in this object.A blinking outline to indicate the existence of unacknowledged alarms in this module or port.

 

Customization & Personalization

A Network Management System (NMS) must feature the capability to:

Fully customize the viewing workspace (desktop) at run time.

Display multiple reports (e.g. Inventory / Status / Alarms / Configuration / Performance) in one screen, synchronized.

Customize the menus to add new reports and navigators that give quick access to network domains.

The Network Management System (NMS) must feature the capability to make the above changes personal, i.e. apply them only to a selected user.

Conclusion

A Network Management System (NMS) must support the following characteristics to provide a good user experience and increase the efficiency and effectiveness of the Network Operation Center (NOC):

Drag n' dropTabsContext sensitive menusReal-time updatesVisualization on MapsPhotorealistic equipment viewsCustomization & Personalization

Fanky Christian
Director
PT DAYA CIPTA MANDIRI SOLUSI
mobile: 62-8121057533
www.dayaciptamandiri.com

Sunday, July 05, 2015

5 Hal penting perbedaan Online Data Storage dan Online Backup


5 Important Differences between Online Data Storage and Online Backup

by 
Think your files are all safely tucked away online because you’re using online data storage? Think again. Or perhaps you’re laboring under the misimpression that your online backup solution will let you undo mistakes and recover previous file versions – when what it’s really doing is overwriting all of yesterday’s versions with today’s. To avoid disappointment, here’s our handy guide to which does what.
  1. Continual Data Transfer. Imagine you’re working away on your PC (or mobile computing device). You have painstakingly and lovingly created a large file, and you are putting the finishing touches to it when your PC hard disk crashes (or your tablet falls down a sewer).
    Online data storage: if you didn’t think about transferring a copy of your file to your online storage beforehand, you will now have nothing left.
    Online backup: depending on the solution you use, an online backup may continually transfer copies or parts of your file to your online backup disk space. You should be able to recover some, possibly all of your masterpiece.
  2. Incremental Data Transfer. Same PC, same file. You’ve learnt that you should at least transfer a copy for safekeeping. It’s a large file all the same, with several voluminous embedded graphics.
    Online data storage: you transfer the whole file every time. If your Internet connection starts to fade, better hope the transfer goes through before any disk crash/sewer accident happens!
    Online backup: smart solutions only transfer the bits that changed since the last time. The first time you back up a file, it may take longer. Thereafter, each backup and transfer can be faster.
  3. Past and Present Versions. You fat fingered a command, accidentally deleted your file locally, or made a bold edit that turned out to be… a little too bold. Can you get your original file back?
    Online data storage: only if you kept a previous version. Some online data storage providers now offer versioning as part of the package, allowing you to automatically store ‘N’ previous versions. This is also a form of data backup.
    Online backup: only if you kept a previous version. As with online data storage, versioning may be part of the deal, but check with your provider. Watch out if your online backup is part of an online disaster recovery procedure. You may need to specify that you want previous file versions to be made available on a standby machine, not just the latest versions that were backed up.
  4. Encryption. ‘I see you’, as they said in the movie Avatar. That may have been cool for the Na’vi tribe, but perhaps you’d prefer a little more privacy for your data files.
    Online data storage: if you don’t manually encrypt your own files, you may have to rely on your cloud provider doing it. But it could then (theoretically) undo it and share your files with others.
    Online backup: may have encryption built in and applied before your local files are transferred to your cloud repository. You then unencrypt your files by restoring them via your backup app.
  5. File Syncing and Sharing. You’re proud of that file you made. You’d like to look at it on your PC in the office, on your tablet in the train, and on your smartphone before you go to sleep. You’d also like to make it available to others.
    Online data storage. Enough of online data storage bashing! This is where it scores compared with online backups. Depending on the service you use, you can sync between devices and share between friends or colleagues.
    Online backup. Wasn’t made for syncing or sharing. Sorry, wrong number.
If you want all the advantages that each solution – online data storage and online backup – have to offer, you may need to use or subscribe to two services. Alternatively, some cloud providers package up both sets of functions in one offering so that you don’t have to spend time and energy putting them together yourself.

Penerapan Vigor2925 untuk online perusahaan Anda.



Vigor2925 Series is the IPv6 ready dual WAN broadband security firewall router. It ensures the business continuity for today and the future IPv6 network. Its two gigabit Ethernet WAN port can accept various high-speed Ethernet-based WAN links via FTTx/xDSL/Cable. The 2 USB ports are for 3G/4G LTE mobile broadband access. With the multi-WAN accesses, Vigor2925 routers support bandwidth management functions such as failover and load-balancing, making them ideal solutions for reliable and flexible broadband connectivity for the small business office. 
The specifications cover many functions that are required by modern day businesses, including secure but easy to apply firewall, comprehensive VPN capability, Gigabit LAN ports, USB ports for 3G/4G mobile dongles, FTP servers and network printers, VLAN for flexible workgroup management, and much more.
Rear panel description


2925n-plus
 

Cloud-based Business Applications Utilization


2925-4
 
 

VPN backup
The VPN backup ensures the stable LAN-to-LAN (site-to-site) remote access
Vigor2925 vnp trunk





CVM (Central VPN Management)

2925 cvm

VLAN for Secure and Efficent Workgroup
Vigor2925n plus vlan

 AP Management
Vigor2925n plus AP management


 Security & Productivity -SSID
Vigor2925n plus SSID


 Flexibility WLAN
2925n-plus WLAN


Support Smart Monitor up to 50 PC Users


Vigor2925n plus smart monitor


 Vigor2925 series with rackmount bracket
rackmount-black-2925

Draytek Vigor 2925 - powerfull VPN router untuk online perusahaan Anda


Vigor2925n
  • Dual Gigabit Ethernet WAN port for failover and load-balancing
  • Two USB ports for connection to Two 3.5G/4G LTE USB mobiles, FTP server and network printer
  • 5 x Gigabit LAN ports with multiple subnets
  • Object-based SPI Firewall and CSM (Content Security Management) for network security
  • VLAN for secure and efficient workgroup management
  • 50 VPN tunnels with comprehensive secure protocols
  • VPN load-balancing and backup for site-to-site applications
  • Integrated with high-performance IEEE 802.11n wireless access point
  • Embedded Central VPN Management for 8 remote Vigor routers
  • Embedded Central AP Management for multi-deployed Vigor wireless access points *
  • Working with Smart Monitor Network Traffic Analyzer (50-nodes)
  • Working with VigorACS SI Central Management for multi-site deployment

    * The AP Management can work with VigorAP 800, VigorAP 810, and VigorAP 900.
       
      ipv6  




























Vigor2925 Series is the IPv6 ready Dual Gigabit Ethernet WANs and Dual USB WANs broadband security firewall router. The product range is from Vigor2925, Vigor2925n, Vigor2925n plus, and Vigor2925Vn plus.
It ensures the business continuity for today and the future IPv6 network. Its two gigabit Ethernet WAN ports can accept various high-speed Ethernet-based WAN links via FTTx/xDSL/Cable. The 2 USB ports are for 3.5G/4G LTE mobile broadband access. With the multi-WAN accesses, Vigor2925 series routers provides flexible and reliable broadband connectivity for the small business office. The VPN backup and VPN load balancing assures business continuity via multi-WAN connection to the Internet. The bandwidth management, Quality of Service, VLAN for flexible workgroup management, User Management for authentication, Route Policy, Central VPN Management, Central AP Management and Firewall serve your daily office network to bring in more business opportunities.

 2925-4
Dual Gigabit Ethernet WAN ports for failover and load-balancing
The Gigabit Ethernet WAN ports cater for any type of Internet access, including FTTx, xDSL and Cable fitting your local infrastructure. You can then use both WAN 1 and WAN 2 for failover, ensuring that you will always have an access to the Internet even if one of the WAN fails, or for load-balancing so the 2 WANs share Internet traffic requirements of your organization.

2 USB 2.0 ports for 3G/4G LTE mobile, FTP drive and network printers
The two USB ports can be used for the connection of 3G/4G mobile broadband dongle, FTP drive and network printers. A 3G/4G mobile broadband connected to one of the 2 USB ports can be used as a second WAN for bandwidth management. The USB WAN interface can also be the primary access if the local fixed line service hasn’t been deployed yet. You can have 2 USB 3G/4G dongles connected to the USB ports, and assign one of these (WAN 3) to be the primary access and the other (WAN 4) as the fail-over back-up. And, you have the flexibility to convert back to fixed line services when these become available.

Secured Networking
DrayTek Vigor2925 series inherited versatile firewall mechanism from previous Vigor series routers. The firewall allows setting of Call/Data Filters and DoS/DDoS prevention, whereas the CSM covers IM/P2P/Protocol filter, URL Content Filter and Web Content Filter. The object-based design used in SPI (Stateful Packet Inspection) firewall allows users to set firewall policy with ease. The object-based firewall is flexible and allows your network be safe. With Objects settings, you can pre-define objects or groups for IP, service type, keyword, file extension, etc., and mix these with the Time Scheduler or the VLAN groups as required. Altogether this gives you peace of mind whether you are guarding a complicated network or a small office. The DoS/DDoS prevention and URL/Web content filter strengthen the security outside and control inside. The enterprise-level CSM (Content Security Management) enables users to control and manage IM (Instant Messenger) and P2P (Peer-to-Peer) applications more efficiently. The CSM hence prevents inappropriate content from distracting employees and impeding productivity. Furthermore, the CSM can keep office networks threat-free and available.
By adoption of the world-leading Cyren GlobalView Web Content Filtering, you can block whole categories of web sites (e.g. sports, online shopping), subject to an annual subscription to the Cyren GlobalView WCF, which is timely updated with changed or new site categorizations. A free 30-day trial can be activated via activation wizard of Vigor2925 series routers’ web user interface. 

The "User Management" implemented on your router firmware can allow you to prevent any computer from accessing your Internet connection without a username or password. You can set scheduler or maximum usage time to your employees within office network. The user accounts can also be restricted by any other aspect of the firewall rule on a user-by-user basis.
The Vigor2925 series support DrayTek’s SmartMonitor network traffic analyzer (up to 50 nodes), which captures actual live data of activities in your managed network, such as the content of MSN entering to or out of your network. You can track specified files download/upload or view statistics on data type activities to realize what corporate related information have been released accidentally or on purpose. 

IPv6
Because the IPv4 addresses are limited and IPv6 allows for a larger address space and much more efficient routing. The Vigor2925 series support IPv6 and IPv4. The Vigor2925 series can support IPv6 broker/tunnel services to provide IPv6 access using either AICCU or TSPC via 3rd party IPv6 providers if your ISP does not support IPv6 yet.
  • can be run on any one of the WAN ports (ADSL/VDSL2, Ethernet or 3G; but the USB WAN port can run AICCU/TSPC tunnel mode only)
  • can connect to direct native IPv6 ISPs
  • can build tunnel to 3rd party IPv6 brokers using either AICCU or TSPC methods
  • Default stateful firewall for all IPv6 LAN clients/ devices
  • DHCPv6 Client
  • Static IPv6 Client
  • DHCPv6 & RADVD (Router Advertisement Server) for client configuration
  • QoS for IPv6 with DiffServ
  • IP Filtering Rules
  • Router Management over IPv6 (Telnet/HTTP) with IPv6 access list
  • Concurrent operation with IPv4 (“Dual-Stack”)
  • Other router features are only available on IPv4

VLAN for secure and efficient workgroup management
Not only with 5 x Gigabit LAN ports for the needs of unified communication applications, such as CRM server, FTP server, Mail server, the Vigor2925 Series has the comprehensive VLAN function for management. The VLAN functions allow 5 subnets to be allocated for multiple workgroups. When combined with the NAT and firewall functions, you can design corporate network groups in terms of traffic, security level, priority settings, etc.
Applications such as VoIP, IPTV and Wireless SSID can also be integrated into VLAN tags and firewall objects, giving you the maximum flexibility in designing workgroups for your organization.

Comprehensive VPN
For remote teleworkers and inter-office links, Vigor2925 series provide up to 50 simultaneous VPN tunnels (such as IPSec/PPTP/L2TP protocols) for secure data exchange and communication. With a dedicated VPN co-processor, the hardware encryption of AES/DES/3DES and hardware key hash of SHA-1/MD5 are seamlessly handled, thus maintaining maximum router performance. Teleworkers can be authenticated directly with your LDAP server if preferred. The Vigor2925 series are equipped with two Gigabit Ethernet ports and USB WAN ports for WAN load-balancing and backup. The VPN trunking (VPN load-balancing and VPN backup) are hence implemented on Vigor2925 series. With VPN trunking, you can create multiple WAN connections to a remote site in order to increase bandwidth. The VPN trunking also can allow you to have failover (backup) of VPN route through a secondary WAN connection.
With SSL VPN, Vigor2925 series let teleworkers have convenient and simple remote access to central site VPN. The teleworkers do not need to install any VPN software manually. From regular web browser, you can establish VPN connection back to your main office even in a guest network or web cafe. The SSL technology is same as the encryption that you use for secure web sites such as your online bank. The SSL VPNs can be operated in either full tunnel mode or Proxy mode.
For client-to-site, remote dial-in users can use up-to 25 SSL VPN tunnels to avoid the local network infrastructure limitation, , there are 64 profiles on WUI, but it only allows 25 concurrent tunnels.

Multi-subnet
With the 5-port Gigabit switch on the LAN side provides extremely high speed connectivity for the highest speed local data transfer of any server or local PCs. The tagged VLANs (802.1q) can mark data with a VLAN identifier. This identifier can be carried through an onward Ethernet switch to specific ports. The specific VLAN clients can also pick up this identifier as it is just passed to the LAN. You can set the priorities for LAN-side QoS. You can assign each of VLANs to each of the different IP subnets that the router may also be operating, to provide even more isolation. The said functionality is tag-based Multi-subnet.
Each of the wireless SSIDs can also be grouped within one of the VLANs.
With multi-subnet, the traffic can be sent through non-NAT mode with higher performance.   If you deploy Vigor2925 series with MPLS network with your main office, the multi-subnet settings will let your data transactions be carried out without NAT.

Centralized Management 
With F/W 3.7.4, the embedded Central VPN Management (CVM) will let network administrator register up to 16 remote routers but run concurrent remote management over 8 remote routers.

AP Management 
APM provides the 3-step installation, plug-plug-press, and then wireless clients are able to enjoy surfing internet. Moreover, through the unified user interface of Draytek routers, the status of APs is clear at the first sight.
If your network requires several VigorAP900 or VigorAP 810 units, to centrally manage and monitor them individually as a group will be expected. DrayTek central wireless management (AP Management) lets control, efficiency, monitoring and security of your company-wide wireless access easier be managed. Inside the web user interface, we call “central wireless management” as Central AP Management which supports mobility, client monitoring/reporting and load-balancing to multiple APs.  For central wireless management, you will need a Vigor2860 or Vigor2925 series router; there is no per-node licensing or subscription required.  For multiple wireless clients, to apply the AP Load Balancing to the multiple APs will manage wireless traffic with smooth flow and enhanced efficiency.

Supports Smart Monitor traffic report software
Vigor2925 series routers support Smart Monitor, DrayTek's proprietary network traffic reporting software, for up to 50 users. This software monitors all incoming and outgoing network traffic, categorizes these into various activity and data types and provides statistics in various report types, so network administrators can monitor network activities for planning and/or fault locating purposes.

Concurrent dual-band 802.11n WLAN (2.4G/5G)
Vigor2925n plus and Vigor2925Vn plus have a built-in IEEE 802.11n WLAN Access Point with concurrent dual-band (2.4G/5G). They can allow the essential applications to use the less interference band (e.g. 5G). The Wi-Fi access is also protected by security and encryption protocols, including WEP/WPA/WPA2, MAC Address Control, Multiple SSID, Wireless LAN Isolation, Wireless VLAN* and 802.1x Authentication.
The Wireless Rate Control function allows connection rates for each network device to be individually managed as required. The WMM (Wi-Fi Multi-Media)* function allows setting of priority levels for various applications: voice, video, data, etc., so time-critical applications can be assigned higher priority levels. Furthermore, WDS (Wireless Distribution System) function allows you to extend the wireless coverage distance easily.

Flexible Network Management
Like all DrayTek routers, Vigor2925 Series routers support comprehensive network management functions. For example, you can set username/password and directory/file access privilege for individual users as required. There are also routing/network tables, system log, debugging utilities, etc., making network administrators' jobs easy.
Other management features include SNMP, TR-069 and TR-104. TR-069 can be utilized with DrayTek's VigorACS SI management software to remotely monitor and manage the Vigor2925 Series.