Translate

Monday, July 30, 2012

20 Cara untuk menemukan Panggilan Hidup Anda


Apakah Anda tidak yakin ingin menjadi apa saat dewasa nanti? Jangan bingung lagi, kita bisa menemukannya bersama-sama, mari kita mulai!


1. Abaikan masa depan, mari kita berurusan dengan yang ada sekarang.
“Saya harus menjadi seperti apa saat dewasa nanti?” adalah sebuah pertanyaan yang salah. Lebih baik Anda bertanya, “Apa yang harus diselesaikan selanjutnya hari ini?”
Orang-orang bertambah gemuk sedikit demi sedikit, dan kita menjadi dewasa seiring berjalannya waktu, maka apa yang kita lakukan hari ini sangat penting dan berpengaruh.


2. Berkelilinglah.
Saat memilih baju, Anda tidak akan tahu cocok atau tidaknya jika Anda tidak mencobanya langsung. Lakukan hal yang sama terhadap pekerjaan, kegemaran, hobi, dan kemampuan. Anda harus mencoba setiap ‘rasa’ yang ada untuk mengetahui apa yang menjadi favorit Anda.

3. Katakan “Ya!” pada kesempatan ganjil/aneh yang datang.
Katakan ‘ya!’ pada hal-hal yang membangkitkan minat Anda, daripada hal-hal yang membuat Anda bosan.
 
4. Temukan masalah untuk diselesaikan.
Menemukan sebuah solusi akan membuat pekerjaan Anda lebih bernilai. Memiliki sebuah masalah untuk ‘dilawan’ seolah membuat Anda memiliki lawan bermain untuk dikalahkan.

 5. Bakarlah perencanaan Anda.
Hidup Anda tidak akan berjalan sesuai rencana. Tidak ada yang pernah melakukannya. Jadi jangan khawatir saat Anda keluar dari jalur, toh jalurnya memang tidak pernah nyata.

 6. Jangan mengikuti mimpi orang lain.
Orang tua Anda ingin Anda menjadi A. Boss Anda ingin Anda menjadi B. Teman-teman ingin Anda menjadi C, dan lingkungan sosial ingin Anda menjadi D.
Anda tidak bisa memuaskan semua orang, tapi Anda mengerjakan sesuatu yang Anda pikir bisa mewujudkan mimpi Anda, setidaknya Anda bisa tidur dengan tenang.




7. Padukan talenta Anda.
Daripada mengerjakan sesuatu yang hanya membutuhkan satu jenis kemampuan, buatlah gabungan dari beberapa hal yang bisa Anda kerjakan dengan baik. Anda akan membuat diri Anda berbeda dan lebih puas dengan apa yang sudah Anda lakukan.

 8. Carilah orang-orang yang memang Anda sukai.
Lebih menyenangkan menggali sebuah lubang yang kotor bersama teman daripada membangun gedung pencakar langit bersama orang-orang yang tidak Anda sukai.

 9. Berikan kesempatan pada diri Anda untuk berubah pikiran.
Kebanyakan dari kita memilih jalan hidup saat berumur 18 tahun. Tapi seiring berjalannya waktu dan semakin banyaknya tempat dan orang yang kita kenal, beberapa ‘panggilan’ yang Anda rasakan dulu mungkin perlu diubah.

 10. Mintalah Nasehat pada orang yang sudah tua dan berpengalaman.
Mereka sudah pernah menjalankan dan menyelesaikannya. Anda akan menyadari bahwa kebahagiaan dan kepuasan berpengaruh lebih besar daripada Rupiah dan Dolar.

 11. Jelajahi Perpustakaan
Anda tidak akan pernah tahu buku, pengarang, atau topik apa yang akan mempengaruhi perjalanan hidup Anda.

 12. Carilah bantuan.
Anda akan membutuhkan bantuan untuk semua hal. Pastikan Anda memiliki orang yang akan mendukung mimpi Anda tidak hanya dengan kata-kata, tapi dengan aksi.

13. Habiskan waktu sebelum Anda menghabiskan uang.
Berinvestasilah dalam membaca,membicarakan, dan mencari tahu sebelum Anda menyalurkan sejumlah besar uang untuk sebuah gelar, sertifikasi, atau relokasi. Anda akan menyadari bahwa Anda tidak perlu selalu mengeluarkan uang untuk menyusun masa depan Anda.

14. Jangan keliru antara pekerjaan dan sebuah purpose (tujuan)
Jika Anda bekerja sebagai tulang punggung keluarga, maka mereka adalah bos Anda yang sebenarnya. Jika Anda bekerja untuk mencapai sebuah purpose(tujuan), jangan biarkan gaji Anda (seberapapun nilainya) menjadi halangan untuk mencapai purpose(tujuan) itu.
 
15. Pikirkan tulisan yang ada di batu nisan Anda, bukan tulisan di resume Anda
Berpikir secara jangka panjang bisa membantu Anda melihat apa yang benar-benar penting dan apa yang tidak.

16. Anda tidak perlu menjadi yang terbaik.
Sangat sedikit orang yang menjadi terbaik di dunia dalam suatu hal. Melakukan yang terbaik dari Anda bukan berarti Anda harus jadi yang terbaik. “Your Best” sudah lebih dari cukup.
 
17. Jangan terus memperhatikan kompetitor
Tidak akan ada orang yang berada selamanya di bagian paling bawah atau paling atas dalam kehidupan mereka. Orang-orang yang Anda anggap saingan akan terus berganti. Terus memperhatikan skor anda dibandingkan kompetitor akan menjadi sebuah pekerjaan full-time jika dibiarkan, dan itu adalah cara yang buruk untuk menjalankan sebuah hari, apalagi bila dijalankan selama sisa hidup Anda.

18. Gantilah jalan saat menyadari Anda terbawa arus.
Sangat mungkin untuk terjebak dalam sebuah jalur yang mudah dan menghasilkan, seperti sebuah pekerjaan yang enteng dan tidak menekan Anda. Jika Anda menyadari diri Anda bersantai-santai, sudah saatnya mengubah jalan, karena terbawa arus seperti itu bisa menghentikan mimpi Anda.

19. Jadilah benar-benar tidak cool.
Berpeganglah pada apa yang Anda sukai, bahkan saat orang lain mencemoohnya. Ini juga bisa disebut sebagai integritas.

20. Rileks.
Tidak ada jawaban yang benar, tapi ada ribuan pilihan yang dapat Anda jalani.
 

source: http://startupbisnis.com/20-cara-untuk-menemukan-panggilan-hidup-anda/

Saturday, July 28, 2012

Fase kehidupan setiap 7 tahun.



Dalam sebuah keyakinan akan aura kehidupan, ada kepercayaan akan putaran kehidupan itu terjadi setiap fasenya adalah 7 tahun.
3 kali 7 tahun pertama, kita melihat kedalam, kepada diri kita sendiri. 4 kali 7 tahun kemudian kita melihat keluar diri kita. Kedua periode besar itu adalah dalam pelebaran horisontal. 49 tahun adalah masa pengembangan kesamping. Dan pada 5 x 7 tahun berikutnya adalah pencapaian harmony dan spirituality yang merupakan pengembangan vertikal keatas.

1. 1-7 tahun: Protection period, Fase Perlindungan, dimana kita menjadi anak kecil yang tidak tahu menahu dan menerima apa saja yang diberitahukan orang tua kita.

2. 8-14 tahun: Learning and Questioning, Fase Pembelajaran, dimana kita mulai mempertanyakan apa saja: Mengapa daun hijau, dari mana datangnya hujan, siapa yang mengatur dunia ini, dan seterusnya.

3. 15-21 tahun: Rebelion: Penentangan. Kita mau memberontak pada aturan dan budaya, inilah masa kita mau menentukan diri sendiri. Tiga fase ini semuanya adalah tentang kata “Saya”, melihat kemauan dan kebutuhan diri sendiri, tidak mempedulikan orang lain, semuanya adalah tentang cintaku, diriku, mauku, masadepanku. Semuanya adalah tentang “Aku”.

4. 22-28 tahun: Finding Identity: Pencarian Jati Diri. Kegelisahan jiwa mulai membuat kita memandang keluar, melihat dunia dengan mata baru, dan mencoba menyamakan identitas kita dengan dunia luar; bahwa “Aku” itu sebenarnya siapa? Kitapun mencari keluar. Mencari pasangan, mencari jati diri, mencari apa yang sebenarnya kita inginkan dalam hidup ini.

5. 29-35 tahun: Building and Forming: Pembentukan diri. Setelah menikah, berkeluarga, kita mulai membentuk diri kita, panggilan pekerjaan kita mulai terlihat. Kita mulai memilih apa yang akan kita bangun dalam hidup ini. Melihat kesempatan dan menangkap yang sesuai dengan hati kita, dan menetap disana.

6. 36-42 tahun: Growing Period: Masa Pertumbuhan diri. Mengembangkan apa yang kita yakini, menumbuhkan bisnis, kehidupan, network, persahabatan, dan akar2 bisnis kita. Menjadi lebih besar dan berkembang. Kita telah menanam cinta, tinggal menunggu buah keajaiban.

7. 43-49 tahun: Wisdom Period: Maturity time for every individuals, Pematangan diri. Masa kearifan dan akhir dari masa horisontal, masa akhir dari melihat keluar dan pengejaran duniawi. Secara umum, pencapaian sudah selesai, bisnis sudah terbentuk, dan kita sudah selesai dengan pencarian diri kedalam dan keluar.

8. 50-56: Peace and Balance: Kedamaian dan Keseimbangan. Awal dari masa Vertikal: Menyatukan diri dengan harmonisasi dan spiritualisasi kejiwaan kita. Masa duniawi sudah lewat, kita mulai melihat semuanya dari peta yang lebih luas dan besar. “Aku” sudah kita hapus secara pelahan dalam kehidupan kita.

9. 57-63:One-ness: Penyatuan. Semua hal adalah satu, tidak ada keserakahan, hanya ada kebesaran kehidupan.

10. 64-70: Finding Spirituality: Penemuan Kedamaian dan Keyakinan akan keseimbangan spiritual.

11. 71-77: Reaching “It”: Pencapaian jati diri sepenuhnya akan diri kita dan alam semesta.

12. 78-end:Knocking on Heaven’s Door: Reapness to enter the “other side”: Siap pindah dunia, siap menjenguk sisi sana hidup ini. Akhir dari perjalanan. The Edge of everything. Inilah 5 fase vertikal manusia yang dimulai pada 50 sampai “akhir” nya, berapapun umur anda.

12 potong fase kehidupan manusia secara umum adalah seperti itu. Dimana kita mulai dari lahir, mencapai kedewasaan pada umur 21, selalu melihat kedalam diri kita, dan mengisi diri kita dengan ilmu, dan pengetahuan. Lalu sampai 49 kita melihat apa yang ada diluar kita, dan mengembangkan diri mencapai maksimum pada 49.

Lalu kitapun harus siap memasuki fase baru, fase vertikal: Dimana uang, jabatan, keserakahan sudah tidak lagi bermakna banyak, dari 50 hingga akhir kita hanya akan mencoba menyeimbangan diri dan berjalan menjalani perjalanan kehidupan kita dengan kearifan yang lebih baik.

Dimanakah anda sekarang? Apa yang telah anda kerjakan selama ini? Apa yang akan terjadi di fase berikutnya? Semoga ini bisa menjadi "cermin masa depan" untuk menyemangatkan teman2 semua untuk mau "memaksimalkan diri" mulai sekarang, di fase manapun anda berada. Berapapun usia anda, semoga anda semua dipenuhi berkat, kesuksesan dan kebahagiaan, selalu dan selamanya. Amin.

*Tanadi Santoso

Thursday, July 26, 2012

How to evaluate virtual firewalls

Dave Shackleford

As their virtualized infrastructure grows, many organizations feel the need to adapt and extend existing physical network security tools to provide greater visibility and functionality in these environments. Virtual firewalls are one of the leading virtual security products available today, and there are quite a few to choose from; Check Point has a Virtual Edition (VE) of its VPN-1 firewall, and Cisco is about to offer a virtual gateway product that emulates its ASA line of firewalls fairly closely. Juniper has a more purpose-built Virtual Gateway (the vGW line) that is derived from its Altor Networks acquisition, and Catbird and Reflex Systems also have virtual firewall products and capabilities. So what do you look for when evaluating virtual firewall technology?

Virtual firewalls: management and scalability

Before digging into the specifics of virtual firewalls, it's important to determine whether you really need one or not. Very small virtualization deployments won't likely need one. However, with a large number of virtual machines of varying sensitivity levels, and highly complex virtual networks, there's a fair chance that virtual firewall technology could play a role in your layered defense strategy.. Note that it's highly unlikely that virtual firewalls will replace all your physical firewalls in most cases (although some consolidation is expected for those with a large number of physical firewalls). Assuming you need one -- now what?

There are several key considerations any security or network team should include when reviewing virtual firewalls. The first two aspects you'll need to evaluate are similar to what you'd evaluate for physical firewalls: scale and management. In terms of management,  you'll first want to determine whether the firewall is largely managed through a standalone console (usually Web-based), or integrates into the virtualization management platform (such as VMware's vCenter). For those with a standalone console, the standard management considerations apply, such as ease of use, role-based access controls, granularity of configuration options, etc. Another consideration is the command-line management capabilities of the virtual device, and how they're accessed. For example, most Cisco engineers prefer command-line IOS operation, and most virtual firewalls can be accessed via SSH.

Scale is critical in virtual firewalls, especially for very large and complex environments. Virtual firewall scalability comes down to two aspects. First, you'll need to determine how many virtual machines and/or virtual switches a single virtual firewall can accommodate. For large environments with numerous virtual switches and VMs on a single hypervisor, this can be a big issue. The second major scalability concern is the number of virtual firewalls that can be managed from the vendor's console, and how well policies and configuration details can be shared between the various virtual firewall devices.

Virtual firewalls: integration

A crucial evaluation point for virtual firewall devices is how the firewall actually integrates into the virtualization platform or environment. There are two common implementation methods. The first is the simplest: a firewall that is a virtual appliance or specialized virtual machine (VM). This can be loaded on a hypervisor just like any other VM, and then configured to work with new or existing virtual switches. The advantage to this model is its simplicity and ease of implementation, while the disadvantages include higher performance impact on the hypervisor, less integration with the virtualization infrastructure, and possibly fewer configuration options.

The second implementation method is to integrate fully with the hypervisor kernel, also known as the Virtual Machine Monitor (VMM). This affords access to the native hypervisor and management platform APIs, as well as streamlined performance and  lower-level recognition of VM traffic, but may also necessitate additional time and effort to properly install and configure the platform, and some highly customized virtualization environments may encounter stability issues or conflicts.

Other factors to consider when evaluating virtual firewalls include physical security integration and VM security policy depth and breadth. Virtual firewalls can "see" what is happening in a virtual environment, but can they relay alerts and security information to their physical counterparts? Look for any native or simple integration capabilities with physical firewalls, IDS/IPS and event management platforms. In addition, virtual firewalls can and should evaluate VM configurations and security posture above and beyond the traffic coming and going into the virtual environment. Some virtual firewalls can perform antimalware, network access control (NAC) and configuration management and control functions, all of which add significant value.

About the author:

Dave Shackleford is the senior vice president of research and the chief technology officer at IANS. Dave is a SANS analyst, instructor and course author, as well as a GIAC technical director.
build-access-manage at dayaciptamandiri.com

Do you need virtual firewalls? What to consider first

John Burke, Contributor

The size of the virtual hole in enterprise security is daunting. Virtual firewalls may be a solution, but there are many factors to consider first.

What are virtual firewalls?

Virtual firewalls are virtual appliances that re-create the functions of a physical firewall. They run inside the same virtual environments as the workloads they protect. Because they sit inside the virtual environment, they apply policy to traffic that is invisible to the physical network, securing it without negating the agility that virtualization brings. They don't necessarily care whether the virtual machines (VMs) are in the data center or floating up to an Infrastructure as a Service (IaaS) environment.

Why the need for virtual firewalls?

Currently more than 97% of companies virtualize servers, and more than 53% of the workloads running in the data center are on virtual servers. During the conversion from physical to virtual, security structures between servers on the physical network are either dropped or they are maintained as physical systems.

When physical firewalls are used to address virtual traffic, this traffic must be routed out of the virtual environment, through the physical security infrastructure, and back into the virtual environment. This kind of hairpinning adds complexity, increases fragility and decreases the ability to move workloads around. What's more, things only get more difficult as enterprises extend their reach into IaaS environments. Currently, 17% of companies use IaaS, and an increasing number of IT shops are using it for customer-facing work.

Given this, it's clear that IT must secure both the internal virtual environment, as well as the external network. Virtual firewalls can be used for both environments.

Read more on virtual firewalls

How to evaluate virtual firewalls

Virtualization security challenges are plentiful; what's the answer?

Planning a virtual firewall strategy

If you're considering virtual firewalls for IaaS or other public cloud use, it is important to be sure the virtual appliance you use internally can be provided on your cloud provider's platform. If the virtual appliance only runs under VMware, but you need it to work in a Xen- or KVM-based IaaS environment, you will be out of luck.

Why a single-policy environment for physical and virtual firewalls?

It's best to integrate virtual and physical firewalls into the same policy environment, and it's better to use a single tool set for both. A single environment means business users can be sure that the same access controls will follow their data wherever it flows. A single environment also means IT doesn't have to:

maintain and synchronize activity across parallel environments;

keep up multiple staff skill sets;

continually maintain cross-platform verifications of policy equivalence;

manage multiple vendor and support relationships.

In an ideal virtual firewall scenario, you would have a single firewall vendor that provides a virtual platform running under the hypervisors you need, and you would have tools that manage both virtual and physical appliances.

Products capable of managing a single vendor's virtual and physical appliances together include Cisco's Secure Policy Manager, McAfee's Firewall Enterprise Control Center and StoneSoft's StoneGate Management Center. 

While multivendor environments are not ideal, there are few tools that manage multivendor firewall solutions. These vendors include FireMon and Tufin.

Virtual firewalls and IaaS: Potential challenges

Before you start jumping those hurdles for IaaS, consider whether a virtual appliance in IaaS will fit into your compliance or security framework. Using a virtual firewall in an IaaS environment, even if it is your own chosen virtual appliance, implies a level of trust in the cloud provider, since VM-to-VM traffic will be visible to whoever controls that environment.

If you can't assert this level of trust for the cloud platforms, you must instead resort to a host-based firewall or VPN solutions that filter traffic in and out of VMs. These consume more resources than virtual appliances because, for example, if a packet gets dropped once at an appliance, it might have to be dropped on every server that would have been sitting behind that appliance. Nevertheless, these host-based firewalls or VPN solutions require no additional level of trust in the cloud provider.

Breaking down IT silos for virtual firewall implementation

Lastly, a very practical point: Systems, security and network folks should not undertake virtual firewall rollout in a vacuum. All three groups must be involved in developing guidelines for when, how and why virtual firewalls will be implemented. All three must have a voice in planning and management, as well as visibility into the virtual firewall infrastructure. Without cooperation, all three teams are bound to step on each other's toes.

About the author: John Burke is a principal research analyst with Nemertes Research, where he advises key enterprise and vendor clients, conducts and analyzes primary research, and writes thought-leadership pieces across a wide variety of topics.
build-access-manage at dayaciptamandiri.com

Tuesday, July 24, 2012

Network Virtualization, now will be part of VmWare

Q&A

Nicira network virtualization architecture: The VMware of networking?

Shamus McGillicuddy, News Director

Nicira Networks emerged from stealth mode this month, articulating a new network virtualization architecture and software that it claims can do for networks what VMware has done for servers.

After four years of operating mostly in secret, the company timed its emergence carefully, not just announcing its Network Virtualization Platform, but also revealing the names of several major companies that have deployed its network virtualization architecture into production, including AT&T, Rackspace, eBay, NTT and Fidelity.

In this Q&A with SearchNetworking.com, Nicira CTO and co-founder Martin Casado and vice president of marketing Alan S. Cohen talk about the company's network virtualization architecture.

Nicira Networks is describing itself as a network virtualization company. What is your definition of network virtualization?

Martin Casado: Network virtualization to me has three components. When you virtualize anything, what you end up with must look like what you started with. When you virtualize the network, the final solution must provide a network that looks like the original one; otherwise you limit the workloads that can live in this new domain.

When you [perform] x86 server virtualization, the operating system doesn't know it's not running on the physical machine. Network virtualization is where you build a solution where you can create logical networks on top of a physical network that [have] all the same properties of the physical network.

The second component is [that] all the mapping of the management of that logical [network] to physical view is done totally programmatically. With server virtualization, servers virtualize compute, storage and memory, and anytime things move within the server or new VMs [virtual machines] spin up, all of that has to be done automatically. The same thing [must happen] with network virtualization. You create logical networks, you expose them to VMs and then, anytime things change, it's all automatically patched up.

The last component is that [network virtualization] should be compatible with any hardware. It should work with any vendor. Virtualization does decoupling and the decoupling should be independent of the underlying hardware. Network virtualization is simply creating a logical view of the network and mapping it to a physical view.

Alan S. Cohen: When people talk about other approaches, like using OpenFlow, they're still tied to hardware. Network virtualization doesn't equal OpenFlow.

What is Nicira's Distributed Virtual Network Infrastructure (DVNI) and how does it compare to other examples of network virtualization architecture, such as software-defined networking?

Casado: Software-defined networking is just a general parad igm in which the control plane is decoupled from the data plane. You could use this to run a backbone network or a wireless network. Software-defined networking does not equal network virtualization. It's just one way of creating networks.

DVNI is a network virtualization solution where the intelligence resides at the edge of the network. It's controlled using software-defined networking, and it allows you to create a logical network that is fully independent of the hardware. An OpenFlow solution would try to emulate the same thing, but it would require OpenFlow hardware. We don't require you to change your existing hardware or upgrade. And if you do, it doesn't have to be on an OpenFlow-compatible design. It could be OpenFlow, but it doesn't have to be.

Another thing that differentiates us almost uniquely: We introduce a new address space, which means that our logical networks can look like physical networks no matter where we are. Even if the physical network is L3 [Layer 3] we can give you an L2 [Layer 2] network. Or if it is L2, we can give you an L3 network. We are totally decoupled from physical networks.

Most network virtualization solutions today don't provide you with a virtual network. They provide you with a subset of the existing network, a basic technique called "slicing." VLANs are slicing -- they will take the existing network and give you a piece of it.

Instead of giving you a piece of that, we give you an entirely new network that looks exactly how you want it to look. A VLAN will give you your own little segment of the world, but if you have IPv4 infrastructure, it won't allow your VMs to send IPv6 traffic. It doesn't change the way that the logical view looks, and it doesn't change the physical network.

With our approach, even if you have IPv4 infrastructure, we could allow the VMs to have IPv6. We introduce an entirely new world.

Can you tell us more about the intelligence at the edge of your network virtualization architecture?

Casado: Nicira is the main developer of Open vSwitch. [The intelligence is] either in an Open vSwitch [on the server] or at top-of-rack. For this announcement, it is in the Open vSwitch. Within the server, we deploy the Open vSwitch, whether Xen or KVM or VMware. And that Open vSwitch, under the coordination of a controller, will create a set of L2 and L3 tunnels [between the physical network and the server hypervisors]. With this, we can create an illusion of a virtual network that will allow us to have any VM run anywhere over any type of hardware.

What does Nicira's Network Virtualization Platform actually do?

More on network virtualization

Read Martin Casado's SearchNetworking.com blog post on edge overlay software

Building a private cloud network

Network virtualization technology FAQ: What you need to know

Channel Chat podcast: Avaya talks network virtualization architecture

Casado: DVNI is a general architectural approach, which says you have intelligence at the edge. The Network Virtualization Platform is the product; it's our instantiation of DVNI.

How do you abstract the physical network? Are you using OpenFlow?

Casado: We have a set of servers that are controllers, and they talk to these edge devices -- the Open vSwitch or top-of-rack switches. That communication is using OpenFlow. Because Open vSwitch is something we developed, it doesn't matter that it's OpenFlow. It could be any other protocol and the customers wouldn't know the difference.

The magic in creating this new view is within this intelligent edge. We map between this virtual view of the network and the physical view of the network. When a packet leaves a VM, we do lookups in the virtual world and then we map that into the physical world. We send [the packet] to the physical world. Then we transport it back from the physical world into the virtual world, where we do some more computation on it.

It's very similar to how server hypervisors work. They manage these virtual address spaces and map [them] to the physical address space. We manage these virtual network address spaces and we map it to the physical address space along the edge in real time.

Who are your customers within an IT organization? Network architects? Virtualization administrators?

Casado: Primarily we target the cloud architects. Cloud architects understand why networks get in the way when they build these things out. We do work with some network architects, but they tend to be fairly forward-thinking.

Cohen: We've seen service providers that are already organized for cloud, and a certain set of enterprises have begun to organize around cloud. These are multidisciplinary teams -- people who have server virtualization skills as well as storage and networking experience. But that is a fairly nascent movement on the enterprise side. You will see more people start to organize their infrastructure teams into these cloud units. They'll break down the silos of, "I'm a server guy, I'm a storage guy, I'm a networking guy."

Do you need to build relationships with the network hardware vendors?

Casado: No, we don't. These will become two different problem domains. Eventually Microsoft and VMware will also take similar approaches. [The network] hardware will essentially become a backplane. It will become a fabric. That fabric will still have to be competitive. It will have to be competitive on price, on the ability to do QoS, on the scale it can achieve [and] on the latency. That will be a separate entity in the market from the virtual network, which provides the provisioning, the security policies, the QoS policies, isolation and things like that.

As soon as there are [hardware] partnerships in virtualization, you aren't really virtualizing. Virtualization in the past, by its very nature, decoupled the things that would be virtualized. While I think that hardware will adapt to be more amenable to virtualization, just like Intel [servers] adapted for VMware, I don't think there needs to be any tight partnerships between the [network] virtualization companies and the hardware.

You announced several significant customers (AT&T, Rackspace, Fidelity, eBay and NTT). What kind of scale are they achieving with your solutions?

Casado: We have production deployments with production traffic. I'm not allowed to give out the numbers because they are customer-sensitive. But I can tell you these are hundreds of servers and thousands of VMs. These aren't one rack, but are many hundreds of servers.

Are you specifically focused on cloud provider networks? At this point, what kind of enterprise would need this level of abstraction and control?

Casado: I don't characterize it as about cloud as much as it is about virtualization. I think people buy generally into [the idea behind] server virtualization, which is [that] you virtualize your servers and you should have some level of operational flexibility and vendor independence. But the truth is, you virtualize your servers and you have fairly limited operational flexibility and fairly limited vendor independence, particularly when it comes to the network. Our core focus is virtualized data centers, whether or not used in cloud model. We can add value just by unlocking all that latent potential for server virtualization.

Cohen: Because we have a software model, nobody has to buy a big box. We can start in the enterprise. The question is: Does the enterprise have the recognized need and the pain points? It's not a question of whether an enterprise is attracted to this value proposition. It's a question of where they are on the [virtualization] maturity curve.

Let us know what you think about the story; email: Shamus McGillicuddy, News Director


build-access-manage at dayaciptamandiri.com

7 kebiasaan sederhana untuk berdaya ingat kuat

Ada 7 kebiasaan sederhana mereka yang berdaya ingat kuat yang bisa
Anda terapkan sehari-hari untuk meningkatkan kemampuan otak.
Antara lain:
1. Tidak mengkonsumsi alkohol
Mereka dengan memori yang kuat ternyata jarang mengonsumsi
minuman-minuman beralkohol, karena ternyata alkohol dapat merusak sistem
saraf dan melemahkan kemampuan otak.
2. Menonton televisi tidak lebih dari satu jam setiap harinya
Orang-orang berdaya ingat kuat jarang melihat tontonan-tontonan yang
tidak terlalu penting, kecuali tontonan yang sifatnya mengedukasi.
Mereka lebih sering membaca ketimbang menonton.
3. Sering membaca novel
Dengan membaca novel, otak akan dilatih berpikir dan menebak-nebak apa
yang akan terjadi. Alur cerita novel yang berliku-liku akan membuat otak
terus berpikir tapi dalam bentuk petualangan otak yang lebih menarik
dan seru.
4. Selalu menyilang-nyilangkan dan menyambung-nyambungkan data
Kemampuan otak akan terus meningkat ketika data yang masuk ke dalamnya
terhubung satu sama lain. Dengan menghubung-hubungkan seperti itu,
sebuah data akan tersimpan dan tertanam dalam otak lebih kuat lagi.
5. Tidak pernah lupa mengonsumsi ikan
Ikan diketahui merupakan sumber protein yang berfungsi meregenerasi
sel-sel mati. Sel-sel otak pun harus terus diregenerasi. Beberapa jenis
ikan seperti salmon dan sarden mengandung omega 3 yang sangat baik untuk
perkembangan sel-sel otak dan kemampuan mengingat seseorang.
6. Meminum teh atau kopi
Teh dan kopi mengandung kafein yang bisa memacu kerja jantung dan otak
untuk terus terjaga dan bekerja lebih baik lagi. Namun konsumsi yang
berlebihan, terutama kopi bisa berakibat fatal. Minumlah dalam dosis
yang sewajarnya.
7. Selalu membuat catatan dalam bentuk jurnal atau notes kecil
Data yang masuk ke otak kita tanpa tercatat mungkin saja menempel dan
mungkin juga tidak. Namun jika data tersebut dicatat, maka kita dapat
melihatnya kembali ketika lupa. Mencatat juga ternyata bisa meningkatkan
kemampuan otak untuk menghafal hingga 20 persen.
Sumber: http://suropeji.com/
build-access-manage
at dayaciptamandiri.com

Saturday, July 21, 2012

Be Leader or Boss ?






Build, access, manage with www.dayaciptamandiri.com.

Beristirahat untuk Terbang Tinggi

Seringkali kita perlu beristirahat sejenak, mengumpulkan tenaga, untuk bersiap kembali, terbang lebih tinggi.

Manfaatkan bulan puasa ini untuk menstabilkan emosi kita, berupaya merapihkan hidup dan gaya hidup kita, dan bersiap untuk hidup yang lebih baik, dalam segala hal.

build-access-manage at dayaciptamandiri.com

Saturday, July 14, 2012

How to choose the right social media platform


Patrick Salyer is CEO of Gigya, the leading provider of social infrastructure for business. Gigya equips businesses like ABC, Pepsi, and Verizon with a comprehensive solution to socialize their online properties.

While much of the tech and financial world has been focused on Facebook's post-IPO performance, something else has happened that is starting to define the social marketplace. Savvy firms like Salesforce.com and Oracle have strategically gobbled up some of the top social vendors. These acquisitions signify that social business has become big business. The formulation of meaningful social categories is also taking shape, and marketers — particularly CMOs — should take note as they look to gain real ROI from social.

The best way to determine what social categories and tools you company should utilize is to look at what companies like Salesforce.com and Oracle are investing in. Both companies have identified and invested in three main categories of social technology: social media management, social media monitoring, and social infrastructure. By examining what these categories look like, and what technologies matter, you can determine where to focus your business resources.

Social Media Management Platforms

Social media management platforms have become critical components of every CMO's off-site strategy. Companies like Buddy Media, Vitrue, Wildfire, and ThisMoment all offer a variety of tools that allow you to manage multiple social channels and create specialized campaigns and pages to reach users on Facebook, Twitter, and LinkedIn. These companies have enjoyed success largely because they enhance existing social networks with brand engagement tools like contests, quizzes, polls, and branded content.

These technologies help you manage your brand's Facebook and Twitter pages, provide different social applications, and can even help you with advertising within Facebook. The sheer number of these types of companies along with the prominent types of clients using their platforms (Coca Cola, L'Oreal, HP, McDonald's, etc.) shows the need for off-site social marketing technologies.

Social Media Monitoring Platforms

Just as businesses have taken to technologies that help them speak to their users, they also understand the need to listen. To mitigate the challenges of trying to listen to and understand what social users say about brands, a number of social listening platforms have emerged in the last few years.

In essence, these companies help businesses make sense of online brand-relevant conversations. Players like Radian6 (now a Salesforce.com company) took an early lead in this marketplace by offering a hybrid self-serve/automated SaaS product that scoured public conversations across the social web while offering robust analytics to help marketers measure conversation by sentiment and demographic data. While other companies like Collective Intellect and Sysomos — both of which were acquired — have slightly different takes on social listening. Still, they all offer robust sets of tools that help you understand what customers and users are saying about your business.

Social Infrastructure

While social marketing and social listening platforms give brands the tools to reach users on social networks, users don't just want to be social on social networks anymore. Now users expect a social experience wherever they go, and businesses are reconfiguring their web properties to meet consumer demand. Look at any major media site — The Huffington Post, ABC.com, CBS.com — or a number of brand and ecommerce sites — Pepsi, Microsoft, Wal-mart and the NFL — and you'll see social network hooks in almost every piece of content. That's social infrastructure, and it's critical to keeping users engaged and to building relationships with them when they visit your web properties.

Social infrastructure companies like BazaarVoice, Mass Relevance, and others offer a number of tools designed to bring social experiences to websites. Products like social login, sharing, comments, and activity feeds are designed to give users a social experience while providing sites permission-based access to users' social data. In turn, you can use this data to offer those users a more personalized experience and market to them by accessing traits like users' interests, activities, and relationship statuses. It's essentially a virtual handshake where users grant you access to certain types of data and, in turn, your business agrees to responsibly use the data to offer better deals, content, and products to the users.

The social web has become a tricky amalgam of different vendors trying to carve out niches to call their own. Understandably, this has resulted in a fair bit of confusion for marketers trying to decide what types of technologies and products they must leverage to reach social users. But, it doesn't need to be so complicated. If you're a marketer, the questions you must ask yourself are: how do I reach and understand users when they're on social networks and how do I relate those users when they're on my site? The goals you must establish should center on how well this technology facilitates brand engagement, and whether it helps users consume your content or products.

Build, access, manage with www.dayaciptamandiri.com.