Fahmi Rizwansyah says:
Mungkin ada yang butuh pelayanan charter pesawat, ini ada artikel buat overview.
Charter Aircraft Average Pricing
King Air
Turbo Prop
Rate: $1200/hr
Block Speed: 230 Kts.
No. Of Passengers: up to 9
Range: 500 - 1000 sm
Lavatory: Yes
Hot/Cold Catering: Both
All the comfort of an Executive Jet at half the cost, a great airplane for medium trips spacious cabin. Has the same short field runway capability as the piston twins.
Citation
Light Jet
Rate: $1,850/hr
Block Speed: 330 Kts.
No. Of Passengers: 4-6
Range: 1500 sm
Lavatory: Yes
Hot/Cold Catering: Both
Luxurious, economic, the light jet category is perfect for one-day business meetings. If efficiency is important, this is the perfect aircraft and it includes all the amenities.
Lear
Medium Jet
Rate: $2,650/hr
Block Speed: 360 Kts.
No. Of Passengers: 6-8
Range: 2,500 sm
Lavatory: Yes
Hot/Cold Catering: Both
Our medium jet category enables you to take your marketing team or your family on long trips. Increase your productivity or even hold a meeting on board Time is Money.
Gulfstream
Heavy Jet
Rate: $4,900/hr
Block Speed: 400 Kts.
No. Of Passengers: 12 to 15
Range: 4000 to 4900sm
Lavatory: Yes
Hot/Cold Catering: Both
The perfect airplane for coast-to-coast or global trips, New York to LA or New York to Europe Once you fly on One of these Jets you will never fly on the airlines again. Large spacious cabin ideal for setting up a mobile office, Along with the convenience of a personal flight attendant, you also will have access to on-board Flight Phone, Sat Phone, DVD, Internet and teleconferencing capabilities.
* The Above Hourly prices will vary up and down depending on the 135 operator, aircraft model and aircraft age including current fuel surcharges.
by http://www.privatejetcharters.com/Charterprices.htm
Cheers, frizzy2008.
Relaxing Articles for the real estate, flower shop, news, computers, gadget, entertainment, traveling, personal and Indonesia
Blog campur-campur
Cloud Computing
Fahmi Rizwansyah says:
by some resources
Cloud computing provides a cost-effective architecture that has enabled new business models including Platform-as-a-Service (Paas) and Software-as-a-Service (SaaS). The financial crisis might spell good news for cloud providers up and down the stack. According recent articles, IDC predicts that the current economic crisis in the U.S. will contribute to cloud computing growth over the next five years and spending on IT cloud services will reach $42 billion by 2012. Frank Gens, senior vice president and chief analyst at IDC believes, "The disruptive vectors of the market will be among the highest growth sectors in 2009 as their advantages are magnified in a down economy, and suppliers who slow down their transformation will limit long-term viability and miss near-term growth."
John Horrigan at Pew Research offered this look at cloud adoption in the consumer space, which has been driving the growth of the big public platforms long before the economic downturn. As IT organizations are pressured to find yet more efficiency it will be interesting to see how quickly they find the confidence in providers to follow consumers to the cloud. At a snap poll of attendees conducted this week at Gartner’s Data Center Conference the results appear promising.
Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.
Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.
InfoWorld talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing. Based on those discussions, here's a rough breakdown of what cloud computing is all about:
1. SaaS
This type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS "desktop" applications, such as Google Apps and Zoho Office?
2. Utility computing
The idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera's AppLogic and Cohesive Flexible Technologies' Elastic Server on Demand. Liquid Computing's LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network.
3. Web services in the cloud
Closely related to SaaS, Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications. They range from providers offering discrete business services -- such as Strike Iron and Xignite -- to the full range of APIs offered by Google Maps, ADP payroll processing, the U.S. Postal Service, Bloomberg, and even conventional credit card processing services.
4. Platform as a service
Another SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider's infrastructure and are delivered to your users via the Internet from the provider's servers. Like Legos, these services are constrained by the vendor's design and capabilities, so you don't get complete freedom, but you do get predictability and pre-integration. Prime examples include Salesforce.com's Force.com, Coghead and the new Google App Engine. For extremely lightweight development, cloud-based mashup platforms abound, such as Yahoo Pipes or Dapper.net.
5. MSP (managed service providers)
One of the oldest forms of cloud computing, a managed service is basically an application exposed to IT rather than to end-users, such as a virus scanning service for e-mail or an application monitoring service (which Mercury, among others, provides). Managed security services delivered by SecureWorks, IBM, and Verizon fall into this category, as do such cloud-based anti-spam services as Postini, recently acquired by Google. Other offerings include desktop management services, such as those offered by CenterBeam or Everdream.
6. Service commerce platforms
A hybrid of SaaS and MSP, this cloud computing service offers a service hub that users interact with. They're most common in trading environments, such as expense management systems that allow users to order travel or secretarial services from a common platform that then coordinates the service delivery and pricing within the specifications set by the user. Think of it as an automated service bureau. Well-known examples include Rearden Commerce and Ariba.
7. Internet integration
The integration of cloud-based services is in its early days. OpSource, which mainly concerns itself with serving SaaS providers, recently introduced the OpSource Services Bus, which employs in-the-cloud integration technology from a little startup called Boomi. SaaS provider Workday recently acquired another player in this space, CapeClear, an ESB (enterprise service bus) provider that was edging toward b-to-b integration. Way ahead of its time, Grand Central -- which wanted to be a universal "bus in the cloud" to connect SaaS providers and provide integrated solutions to customers -- flamed out in 2005.
Another cloud computing resources:
Ini bukan gaya-gayaan sob, tapi ini adalah tren komputer ke depan, dimana kita harus bisa dan siap mengadopsinya.
Cheers, frizzy2008.
by some resources
Cloud computing provides a cost-effective architecture that has enabled new business models including Platform-as-a-Service (Paas) and Software-as-a-Service (SaaS). The financial crisis might spell good news for cloud providers up and down the stack. According recent articles, IDC predicts that the current economic crisis in the U.S. will contribute to cloud computing growth over the next five years and spending on IT cloud services will reach $42 billion by 2012. Frank Gens, senior vice president and chief analyst at IDC believes, "The disruptive vectors of the market will be among the highest growth sectors in 2009 as their advantages are magnified in a down economy, and suppliers who slow down their transformation will limit long-term viability and miss near-term growth."
John Horrigan at Pew Research offered this look at cloud adoption in the consumer space, which has been driving the growth of the big public platforms long before the economic downturn. As IT organizations are pressured to find yet more efficiency it will be interesting to see how quickly they find the confidence in providers to follow consumers to the cloud. At a snap poll of attendees conducted this week at Gartner’s Data Center Conference the results appear promising.
Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.
Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.
InfoWorld talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing. Based on those discussions, here's a rough breakdown of what cloud computing is all about:
1. SaaS
This type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS "desktop" applications, such as Google Apps and Zoho Office?
2. Utility computing
The idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera's AppLogic and Cohesive Flexible Technologies' Elastic Server on Demand. Liquid Computing's LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network.
3. Web services in the cloud
Closely related to SaaS, Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications. They range from providers offering discrete business services -- such as Strike Iron and Xignite -- to the full range of APIs offered by Google Maps, ADP payroll processing, the U.S. Postal Service, Bloomberg, and even conventional credit card processing services.
4. Platform as a service
Another SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider's infrastructure and are delivered to your users via the Internet from the provider's servers. Like Legos, these services are constrained by the vendor's design and capabilities, so you don't get complete freedom, but you do get predictability and pre-integration. Prime examples include Salesforce.com's Force.com, Coghead and the new Google App Engine. For extremely lightweight development, cloud-based mashup platforms abound, such as Yahoo Pipes or Dapper.net.
5. MSP (managed service providers)
One of the oldest forms of cloud computing, a managed service is basically an application exposed to IT rather than to end-users, such as a virus scanning service for e-mail or an application monitoring service (which Mercury, among others, provides). Managed security services delivered by SecureWorks, IBM, and Verizon fall into this category, as do such cloud-based anti-spam services as Postini, recently acquired by Google. Other offerings include desktop management services, such as those offered by CenterBeam or Everdream.
6. Service commerce platforms
A hybrid of SaaS and MSP, this cloud computing service offers a service hub that users interact with. They're most common in trading environments, such as expense management systems that allow users to order travel or secretarial services from a common platform that then coordinates the service delivery and pricing within the specifications set by the user. Think of it as an automated service bureau. Well-known examples include Rearden Commerce and Ariba.
7. Internet integration
The integration of cloud-based services is in its early days. OpSource, which mainly concerns itself with serving SaaS providers, recently introduced the OpSource Services Bus, which employs in-the-cloud integration technology from a little startup called Boomi. SaaS provider Workday recently acquired another player in this space, CapeClear, an ESB (enterprise service bus) provider that was edging toward b-to-b integration. Way ahead of its time, Grand Central -- which wanted to be a universal "bus in the cloud" to connect SaaS providers and provide integrated solutions to customers -- flamed out in 2005.
Another cloud computing resources:
- http://en.community.dell.com/blogs/cloudcomputing/default.aspx
- http://www.microsoft.com/presspass/press/2008/oct08/10-27PDCDay1PR.mspx
- http://www.microsoft.com/azure/default.mspx
- http://en.wikipedia.org/wiki/Cloud_computing
Ini bukan gaya-gayaan sob, tapi ini adalah tren komputer ke depan, dimana kita harus bisa dan siap mengadopsinya.
Cheers, frizzy2008.
Gaul dan terminologinya
Fahmi Rizwansyah says:
Gue anak gaul nih --> konotasinya adalah anak muda yg mudah bergaul
Bergaullah dengan temanmu sebaik-baiknya --> nasehat orang tua pada anaknya waktu mau berangkat ke sekolah
Kita hidup dalam pergaulan modern --> pidato Presiden
Gaulilah istrimu/suamimu dengan sebaik-baiknya --> nasehat perkawinan
tapi gimana kalo begini yaa
Gue anak yang mudah digauli nih???
Gaulilah temanmu sebanyak-banyaknya????
Ada masukan gak sobbb, lagi mau gaul niiii...
Cheers, frizzy2008.
Gue anak gaul nih --> konotasinya adalah anak muda yg mudah bergaul
Bergaullah dengan temanmu sebaik-baiknya --> nasehat orang tua pada anaknya waktu mau berangkat ke sekolah
Kita hidup dalam pergaulan modern --> pidato Presiden
Gaulilah istrimu/suamimu dengan sebaik-baiknya --> nasehat perkawinan
tapi gimana kalo begini yaa
Gue anak yang mudah digauli nih???
Gaulilah temanmu sebanyak-banyaknya????
Ada masukan gak sobbb, lagi mau gaul niiii...
Cheers, frizzy2008.
Dell - The Future of Computing Tour
Fahmi Rizwansyah says:
Pagi-pagi dah mampir ke Ritz Charlton, Pacific Place untuk menghadiri acara The Future of Computing Tour yang diselenggarakan oleh Dell Indonesia.
Seru banget acaranya, semua keynote speakernya berceramah dengan semangat mengenai produk-produk Dell untuk sistem komputasi masa depan.
Ok deh, habis kenyang makan-makan prasmanan gratis, balik kantor, meeting sama beberapa klien then posting the blog.
Cheers, frizzy2008.
Pagi-pagi dah mampir ke Ritz Charlton, Pacific Place untuk menghadiri acara The Future of Computing Tour yang diselenggarakan oleh Dell Indonesia.
Seru banget acaranya, semua keynote speakernya berceramah dengan semangat mengenai produk-produk Dell untuk sistem komputasi masa depan.
Ok deh, habis kenyang makan-makan prasmanan gratis, balik kantor, meeting sama beberapa klien then posting the blog.
Cheers, frizzy2008.
Network Security Appliances Overview
Fahmi Rizwansyah says:
Network Monitoring
The purpose of network monitoring is the collection of useful information from various parts of the network so that the network can be managed and controlled using the collected information. Most of the network devices are located in remote locations and they usually don't have directly connected terminals. Hence specialized tools are required to facilitate the network management application to monitor their status easily.
Bandwidth management
Heavy downloading can take its toll on network performance. Congestion and lack of responsiveness are often the result of large amounts of traffic being used by a small number of users. Sometimes even a single user can bring an entire network to a crawl as the internet gateway gets flooded with network traffic. By using Bandwidth management tools, the administrator can have full control over the network using tools to allocate desired bandwidth to specified users for specified tasks.
Traffic Analysis
Traffic analysis is the Inference or deduction of useful intelligence from patterns of observable characteristics of data flow(s), even when the data is encrypted or otherwise not directly available. The characteristics used for the evolution of such patterns include the identities and locations of the source(s) and destination(s), and the presence, amount, frequency, and duration of occurrence.
Penetration Testing
The portion of security testing in which the evaluators attempt to circumvent the security features of a system. The evaluators may be assumed to use all system design and implementation documentation, that may include listings of system source code, manuals, and circuit diagrams. The evaluators work under the same constraints applied to ordinary users. Ethical Hacking of a commissioned system is an integral part of penetration testing.
Vulnerability Analysis
Vulnerability analysis is the systematic examination of an AIS (Automated Information System for acquisition, storage, manipulation, control, display, transmission, or reception of data etc.) or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation.
Network audit
It is the process of assessing the various components and the operating environment of a computer network for vulnerabilities and other loopholes that might occur in the process of installing, configuring, or securing the network. This process may range from a relatively simple Automated audit to check a network for known vulnerabilities in the operating system through a black box or even a white box or manual audit to determine the network's overall status as compared to the prevailing "best practice".
Cheers, frizzy2008.
Network Monitoring
The purpose of network monitoring is the collection of useful information from various parts of the network so that the network can be managed and controlled using the collected information. Most of the network devices are located in remote locations and they usually don't have directly connected terminals. Hence specialized tools are required to facilitate the network management application to monitor their status easily.
Bandwidth management
Heavy downloading can take its toll on network performance. Congestion and lack of responsiveness are often the result of large amounts of traffic being used by a small number of users. Sometimes even a single user can bring an entire network to a crawl as the internet gateway gets flooded with network traffic. By using Bandwidth management tools, the administrator can have full control over the network using tools to allocate desired bandwidth to specified users for specified tasks.
Traffic Analysis
Traffic analysis is the Inference or deduction of useful intelligence from patterns of observable characteristics of data flow(s), even when the data is encrypted or otherwise not directly available. The characteristics used for the evolution of such patterns include the identities and locations of the source(s) and destination(s), and the presence, amount, frequency, and duration of occurrence.
Penetration Testing
The portion of security testing in which the evaluators attempt to circumvent the security features of a system. The evaluators may be assumed to use all system design and implementation documentation, that may include listings of system source code, manuals, and circuit diagrams. The evaluators work under the same constraints applied to ordinary users. Ethical Hacking of a commissioned system is an integral part of penetration testing.
Vulnerability Analysis
Vulnerability analysis is the systematic examination of an AIS (Automated Information System for acquisition, storage, manipulation, control, display, transmission, or reception of data etc.) or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation.
Network audit
It is the process of assessing the various components and the operating environment of a computer network for vulnerabilities and other loopholes that might occur in the process of installing, configuring, or securing the network. This process may range from a relatively simple Automated audit to check a network for known vulnerabilities in the operating system through a black box or even a white box or manual audit to determine the network's overall status as compared to the prevailing "best practice".
Cheers, frizzy2008.
Subscribe to:
Posts (Atom)