Data Center is our focus

We help to build, access and manage your datacenter and server rooms

Structure Cabling

We help structure your cabling, Fiber Optic, UTP, STP and Electrical.

Get ready to the #Cloud

Start your Hyper Converged Infrastructure.

Monitor your infrastructures

Monitor your hardware, software, network (ITOM), maintain your ITSM service .

Our Great People

Great team to support happy customers.

Wednesday, March 09, 2016

PRTG mendukung SNMP Trap Receiver Sensor

Did you know with PRTG Network Monitor you have a full scale SNMP Trap Receiver at hand? With SNMP (Simple Network Management Protocol) traps you can easily track reports of important incidents and data. SNMP-enabled devices trigger these asynchronous notifications for various reasons, such as system events, outages, critical conditions, and many more. PRTG collects these messages, stores them in a high performance database, and analyzes their content.

Under lab conditions, PRTG could handle up to 10,000 SNMP trap messages per second when using a single sensor without filters. Wow, that's quite a lot! Imagine you had to analyze them all manually. But please note that the number of messages the trap receiver can process depends on your configuration and system setup.
With PRTG you can filter these incoming messages by various parameters and trigger alerts depending on the content of the message, which could be emails, texts, or external programs being executed. This way you always stay on top of important information regarding your SNMP-enabled devices—and let PRTG do the big share of the work.
You can either add the SNMP Trap Receiver sensor to:
  • Your probe device, processing all messages from any device sent to the probe system, or
  • Directly to a specific device, to have an implicit filter for this device already and a faster performance than using source filters on a probe device.

The SNMP Trap Receiver sensor shows the overall number of received traps per second, warning and error traps per second, as well as the number of dropped packets per second. To get the most out of it, refine filters and create notification triggers—this way you can customize PRTG to only send the alerts you really need to see. You can also filter your received messages to easily get an overview of specific incidents.
For detailed instructions on how you can setup a sample configuration of the SNMP Trap Receiver sensor, please have a look at the PRTG manual page on "Monitoring Syslogs and SNMP Traps". In the manual you'll also find information on the sensor and its individual settings itself.
You'll also get a useful overview of the SNMP Trap Receiver sensor in our 10 minute video tutorial:

PRTG Packet Sniffer

Although bandwidth isn't as strictly limited as it was some time ago, the perception of seemingly unlimited bandwidth can trigger problems in productive environments. Bandwidth has to be shared by a group of users who, especially in companies, have to rely on their remote services to run smoothly. Therefore it's important to identify fluctuations in bandwidth usage early and distinctly. There are several possibilities to monitor bandwidth. PRTG Network Monitor offers a wide variety of options for bandwidth monitoring like, for example, via WMI, SNMP, xFlow (NetFlow and IPFIX, sFlow, jFlow), or Packet Sniffer. Depending on the type of network devices, each technology has its advantages and disadvantages. For an overview of the different bandwidth monitoring approaches, please have a look at the PRTG manual.

If your network devices don't support SNMP or flow monitoring, or you need to differentiate bandwidth usage by network protocol and/or IP addresses, packet sniffing is the way to go. To calculate bandwidth usage, the Packet Sniffer Sensor looks at every single data package that travels through your network. PRTG analyzes the packets passing the network card of a PC or the monitoring port of a switch; you can also use remote probes to set up packet sniffers anywhere in your network.
In detail the Packet Sniffer Sensor enables you to keep an eye on the following channels:
  • Web for internet web traffic,
  • File Transfer for traffic caused by FTP (File Transfer Protocol),
  • Mail for internet email traffic,
  • Chat for traffic caused by chat and instant messaging,
  • Remote Control for traffic caused by remote control applications, such as RDP, SSH, Telnet, or VNC,
  • Infrastructure for traffic caused by network services, such as DHCP, DNS, Ident, ICMP, or SNMP,
  • NetBIOS for traffic caused by NetBIOS communication,
  • Citrix for traffic caused by Citrix applications, and
  • Other Protocols for traffic caused by various other protocols via UDP and TCP.

Packet sniffing not only allows you to measure the total bandwidth usage: You can also let PRTG break down the traffic by IP address, port, protocol and other parameters. The results are shown in Toplists, which offer three predefined bandwidth categories for each sensor:
  • Top Connections shows bandwidth usage by connection,
  • Top Protocols shows bandwidth usage by protocol, and
  • Top Talkers shows bandwidth usage by IP address.
For more information on bandwidth monitoring via packet sniffing in general and the Packet Sniffer Sensor in detail, please have a look at the PRTG manual.

PRTG mendukung Docker Container Status Sensor

Docker Containers are the new hot thing in terms of virtualization! First published in 2013 they have become popular extremely fast—meanwhile even Windows Server 2016 offers Docker Container integration. Not only do DevOps love Docker Containers as an easy to use and, first and foremost, quickly implementable virtualization method but network administrators also like to use them to efficiently roll out and reliably manage applications.

Reasons that Docker Containers are growing so quickly in popularity is their availability and performance. To ensure that, the containers have to be controlled continuously. Special tools are available for that purpose and there are also some application performance monitoring tools that can do so, but ideally this should happen within the monitoring solution that is already monitoring the network, applications, other virtual environments such as VMware, HyperV or Xen, email traffic, storage systems or websites; in short Docker Containers are part of the IT infrastructure and should be integrated into the central IT monitoring solution.
PRTG now has a dedicated Docker Container Status sensor. With this sensor, you can see all the important information about your Docker Containers that's available at one glance. You will be informed if failures or issues show up so you can proactively react. Here is an overview of all the available values in detail:
  • Status
  • Uptime/Downtime
  • CPU Usage
  • Available Memory Value/Percent
  • Packets in/out
  • Traffic in/out
  • Exit Code
The PRTG Docker Container Status sensor displays the different values as Channels. For each channel you can define individual thresholds which will affect the sensor's status and with these status changes, trigger notifications and alerts.
Find more details about the Docker Container Status sensor in our Knowledge Base and in the PRTG manual.

Sunday, March 06, 2016

6 type ecommerce

Generally speaking, when we think of e-commerce, we think of an online commercial transaction between a supplier and a client. However, and although this idea is right, we can be more specific and actually divide e-commerce into six major types, all with different characteristics.

There are 6 basic types ofe-commerce:

Business-to-Business (B2B)Business-to-Consumer (B2C)Consumer-to-Consumer (C2C)Consumer-to-Business (C2B).Business-to-Administration (B2A)Consumer-to-Administration (C2A)

1. Business-to-Business (B2B)

Business-to-Business (B2B) e-commerce encompasses all electronic transactions of goods or services conducted ​​between companies. Producers and traditional commerce wholesalers typically operate with this type of electronic commerce.

2. Business-to-Consumer (B2C)

The Business-to-Consumer type of e-commerce is distinguished by the establishment of electronic business relationships between businesses and final consumers. It corresponds to the retail section of e-commerce, where traditional retail trade normally operates.

These types of relationships can be easier and more dynamic, but also more sporadic or discontinued. This type of commerce has developed greatly, due to the advent of the web, and there are already many virtual stores and malls on the Internet, which sell all kinds of consumer goods, such as computers, software, books,shoes, cars, food, financial products, digital publications, etc.

When compared to buying retail in traditional commerce, the consumer usually has more information available in terms of informative content and there is also a widespread idea that you'll be buying cheaper, without jeopardizing an equally personalized customer service, as well as ensuring quick processing and delivery of your order.

3. Consumer-to-Consumer (C2C)

Consumer-to-Consumer (C2C) type e-commerce encompasses all electronic transactions of goods or services conducted ​​between consumers. Generally, these transactions are conducted through a third party, which provides the online platform where the transactions are actually carried out.

4. Consumer-to-Business (C2B)

In C2B there is a complete reversal of the traditional sense of exchanging goods. This type of e-commerce is very common in crowdsourcing based projects. A large number of individuals make their services or products available for purchase for companies seeking precisely these types of services or products.

Examples of such practices are the sites where designers present several proposals for a company logo and where only one of them is selected and effectively purchased. Another platform that is very common in this type of commerce are the markets that sell royalty-free photographs, images, media and design elements, such as iStockphoto.

5. Business-to-Administration (B2A)

This part of e-commerce encompasses all transactions conducted online between companies and public administration. This is an area that involves a large amount and a variety of services, particularly in areas such as fiscal, social security, employment, legal documents and registers, etc. These types of services have increased considerably in recent years with investments made in e-government.

6. Consumer-to-Administration (C2A)

The Consumer-to-Administration model encompasses all electronic transactions conducted between individuals and public administration.

Examples of applications include:

Education – disseminating information, distance learning, etc.Social Security – through the distribution of information, making payments, etc.Taxes – filing tax returns, payments, etc.Health – appointments, information about illnesses, payment of health services, etc.

Both models involving Public Administration (B2A and C2A) are strongly associated to the idea of efficiency and easy usability of the services provided to citizens by the government, with the support of information and communication technologies.

Advantages of e-commerce

The main advantage of e-commerce is its ability to reach a global market, without necessarily implying a large financial investment. The limits of this type of commerce are not defined geographically, which allows consumers to make a global choice, obtain the necessary information and compare offers from all potential suppliers, regardless of their locations.

By allowing direct interaction with the final consumer, e-commerce shortens the product distribution chain, sometimes even eliminating it completely. This way, a direct channel between the producer or service provider and the final user is created, enabling them to offer products and services that suit the individual preferences of the target market.

E-commerce allows suppliers to be closer to their customers, resulting in increased productivity and competitiveness for companies; as a result, the consumer is benefited with an improvement in quality service, resulting in greater proximity, as well as a more efficient pre and post-sales support. With these new forms of electronic commerce, consumers now have virtual stores that are open 24 hours a day.

Cost reduction is another very important advantage normally associated with electronic commerce. The more trivial a particular business process is, the greater the likelihood of its success, resulting in a significant reduction of transaction costs and, of course, of the prices charged to customers.

Disadvantages of e-commerce

The main disadvantages associated with e-commerce are the following:

Strong dependence on information and communication technologies (ICT);Lack of legislation that adequately regulates the new e-commerce activities, both nationally and internationally;Market culture is averse to electronic commerce (customers cannot touch or try the products);The users' loss of privacy, the loss of regions' and countries' cultural and economic identity;Insecurity in the conduct of online business transactions.

By José Fernandes

Fanky Christian
Director
PT. DAYA CIPTA MANDIRI SOLUSI
mobile: 62-812-1057533 / 0881-8857333
skype: fankych1211