Blog campur-campur

Contract Management Software

Fahmi Rizwansyah says:

Contract Management Software allows organizations to effectively manage the various types of contracts they engage in, including: buy side, sell side, and non monetary.

In general, the benefits of implementing Contract Management Software are seen in the reduction in time and effort and improvements in the contracting process. Specific areas that see improvement are:

* Improved information related to contracts and the activities governed by those contracts - better information and more of it.
* Streamlined processes that result in reduced operating expenses.
* Maximum realization of revenue and/or cost savings potential by maximizing the benefits of each contract through event management and performance and compliance monitoring.
* Maximum involvement of stakeholders through an online, paperless contracting process.
* Improved relationships with all stakeholders including staff, customers and suppliers.
* Strategic sourcing benefits - maximize buying power through better managed contracts.
* Business Intelligence through proper analysis of information about contracts and contracted activities.
* ensure visibility is available across all contracts to the authorized people,
* notify stakeholders of impending trigger points ensuring that contract management is pro-active, not re-active,
* validate payments, deliverables, commitments and compliance terms that are established in the actual contract, and
* ensure compliance to negotiated terms and conditions including rates, discounts, and rebates.

It delivers extensive benefit in each of these areas out of the box, but when coupled with business process improvement that is aimed at maximizing the functionality of the contract management process, organizations further improve their strategic benefits significantly.

Contract management software suppliers include: Accruent, Advanced Software Concepts, ARM Group, Blueridge Software, Capterra, CMSI, CobbleStone Systems, Covigna, Determine, diCarta, Ecteon, Exari, FieldCentrix, I-many, Ketera, Omniware, Open Windows Contracts, Procure, Salesforce.com, SAP and UpsideSoft.

General Features
* End-to-end Contract Management Solution
* Extremely flexible with user defined business rules and customized workflow
* Ability to manage various types of contracts
* Corporate repository of clauses, templates, and management indicator
* Completely Web-based
* Ensures contract and RFx (i.e. RFP, RFI, RFQ, etc.) visibility, monitoring, & reporting for all stakeholders
* Personal 'Dashboard'
* User-role-based functional view and navigation control

Advanced Workflow Management
* Template-based (static), business rules-based (dynamic) and organizational hierarchy-based workflow determination capabilities are supported
* Workflow determination and management can be applied in most modules of the system

Procurement Management
* Template-based RFx creation
* Dynamic workflow to manage RFx creation
* Structured RFx management
* Vendor access and participation

Request Processing
* Highly configurable, ‘wizard-like’ interface to capture user requests for:
o new RFXs and associated procurement activities
o new contracts,
o change orders,
o supplements,
o renewals, and
o terminations.

Contract Creation
* Template-based contract creation
* Dynamic workflow to manage contract creation
* Related documents can be scanned and attached
* Online negotiation
* Contract calculations
* PDF support
* Rich text editor

Contract Management
* Notification and alerts for required tasks and events
* Performance monitoring
* Compliance monitoring
* Renewal, amendments and change management

Financial & Budget Monitoring and Management
* Manage contract commitments
* Automate payments
* Manage holdbacks
* Integration with UpsideBilling

Integration with Other Systems
* Interface with any ERP/Financial system
* Fills in the gap between ERP and CRM systems
* Integrates other systems used in business processes

Management Information
* Business Intelligence Support
* Management Reporting
* Ad Hoc Reporting

Reports can also be provided in Crystal Web format and includes the data dictionary so that external reporting using Crystal Reports can be performed.

2000 Pulau di Indonesia Terancam Hilang, haruskah???

Fahmi Rizwansyah says:

Mengajak kepada seluruh blogger Indonesia untuk turut menyuarakan keprihatinan serta meningkatkan persatuan dalam wacana Bhineka Tunggal Ika.

Kutipan dari Antara.
Sedikit-dikitnya 2000 pulau kecil terancam hilang akibat produksi penambangan yang belebihan dan kegiatan lain yang tidak ramah terhadap lingkungan laut dan daratan.

"Tapi herannya kenapa semua pada diam termasuk perguruan tinggi baik negeri maupun swasta yang jumlahnya ratusan ini tidak melakukan apa-apa untuk menghentikan kegiatan yang bisa menghilangkan pulau-pulau kecil itu," kata Menteri Kelautan dan Perikanan Freddy Numberi di Malang, Sabtu. Selengkapnya

Cheers, frizzy2008.

Shopwiki for Video Games

Fahmi Rizwansyah says:


For the needs of video games, you the game freak need not hesitate to visit the Shopwiki Video Games reach for trinkets of all equipment. Review all the shopping places easier you to determine where you can get your favorite items.

All types of favorite consoles, such as Nintendo Wii and Xbox 360 doesn't need to make a consideration because Shopwiki provides a very complete Buying Guide.

Shopwiki revolutionizes the way you spend on online shopping. Supported by 30,000 stores make you lucky goal in each of the deals and better with a cheaper cost.
So what are you waiting for, go Shopwiki ...

Cheers, frizzy.

Storage

Fahmi Rizwansyah says:

Archiving, Backup, Backup & recovery, Backup Exec, Backup Exec 12, Backup servers, Backup software, Computer Associates, DASD, Defragmentation, Dell Storage, Disaster Recovery, Disk drives, Disk quota management, Email archiving, EMC, External hard drives, Fibre channel, Hard drives, iSCSI, LUN, Mirroring, NAS, NFS, NTBackup, NTFS, Partitioning, Partitions, RAID, RAID 1, RAID 5, RAID configuration, Replication, Restore, SAN, SATA, SCSI, Storage Area Networks, Storage management, Storage products and equipment, Storage servers, Storage strategy, Symantec Backup Exec 11D, Tape Backups, Tape drives, Tape drives/Libraries, Tape libraries, USB Flash drives, Veritas Backup Exec

Cheers, frizzy.

IT Knowledges

Fahmi Rizwansyah says:

, Development, Networking, Exchange, AS/400, DataCenter, Security, SQL Server, Database, Lotus Domino, Storage, SAP, Oracle, Outlook, Servers, DataManagement, Tech support, CIO, Exchange 2003, Windows Server 2003, Desktops, SQL, RPG, Hardware, Management, OS, Active Directory, Routers, Linux, Windows XP, Mobile, SQL Server 2005, DNS, Wireless, Lotus Notes, VPN, DB2, VoIP, CRM, Outlook 2003, iSeries, DHCP, Switches, Backup & recovery, RPGLE, Firewalls, Microsoft Excel, Cisco, Virtualization, Networking services, Visual Basic, Exchange 2007, Network security, Application development, Cabling, Microsoft Access, SQL Server 2000, Career development, Intrusion management, Windows, Incident response, Forensics, Software, SAP careers, Exchange security, Instant Messaging, Windows 2000 Server,

Microsoft Office, Hubs, DB2 Universal Database, Certifications, Outlook 2007, CLP, Help Desk, Encryption, ABAP, Printing, Basis, Backup, Network protocols, Web development, Disaster Recovery, Bandwidth, Availability, Application security, Data analysis, secure coding, Oracle 10g, CL, Network connectivity, Outlook Web Access, Compliance, Java, Policies, Network management software, OWA, Network monitoring, LotusScript, COBOL, Crystal Reports, IT careers, i5, Domain Controller, TCP, VB.NET, Single sign-on, Biometrics, Channel, AS/400 printing, VB, Software testing, Viruses, VMware, Identity & Access Management, provisioning, SAP development, OS/400, Security tokens, Exchange Server, Digital certificates, Risk management, ERP, Security Program Management, Desktop management applications, Oracle 9i, Installation, SAN, Spyware, Outlook calendar, Outlook error messages, Web security, SBS 2003, PC/Windows Connectivity, BlackBerry, Trojans, Lotus Notes 6.x, Project management, Hacking, Performance management, Security management, Vista, VBA, Group Policy, RPG/400, worms, SMTP, Email, configuration, R/3, User Permissions, Current threats, backdoors, Exchange 2000, human factors, Printers, Access, Software Quality Assurance, Browsers, Ethernet, Database programming, Network design, Access control, IT architecture, Patch management, SharePoint, Platform Security, SSL/TLS, patching, vulnerability management, Mainframe, PEN testing, Platform Issues, Remote management, VBScript, RPG ILE, Programming Languages, SQL Server errors, filtering, ASP.NET, Domino Designer, Stored Procedures, Oracle development, Spam, Network testing, Database Management Systems, Visual Basic 6, Migration, MySAP, C, XML, IBM, Lifecycle development, RAID, Networking Equipment, FTP, Web services, SBS, Storage products and equipment, Training, Ping, E-mail applications, JavaScript, Remote access, Excel 2003, LAN, Microsoft Word, SQL Query, Administration, Network, Excel macros, Exchange error messages, Vendors, Third-party services, MySQL, Windows Vista, Interoperability, Calendar, Business/IT alignment, Web site design & management, NetWeaver, CCNA, SQL Server database, V5R4, Oracle error messages, Systems management software, E-business, Vendor support, Oracle 8i, Lotus Notes 7.x, Network applications management, Networking certifications, NIC, Performance/Tuning, Router configuration, IP addressing, Unix, Microsoft Systems Management Server, IPv4, Public folders, .PST files, SAP certifications, Exchange migration, Query, Data warehousing applications, POP3, SQL Database, AS/400 Query, AS/400 backup, Spool files, Windows 2000 desktop, Lotus development, AS/400 errors, LDAP, Software testing tools, SAP HR, SAP BI, Domain management, Implementation, PHP, Storage management, Visual Basic for Applications, Wireless networking, Excel 2007, VMware ESX, Visual Basic .NET, PL/SQL, SAP BW, Access 2007, IFS, VB 6, Exchange 5.5, ISA Server, EDI, 390, Windows Security, IIS, T-SQL, Software Quality, GAL, VLAN, Outlook Express, Windows client administration and maintenance, Upgrades / implementations, Protocol analysis, Web development tools, RPGILE, Physical files, Windows Server 2008, GPO, Symantec, standards, Oracle administration, ODBC, Call Centers, Antivirus, V5R3, IT jobs, Hard drives, ASP, Virtual Machines, C#, SQL Server backup, Lotus Sametime, 3Com, Distribution Lists, SQL Server migration, Access 2003, Data center operations, Data center design, Security products, Wireless routers, HTML, Data mining/analysis, NAS, BlackBerry email, AS/400 administration, AS/400 security, Synchronization, Architecture/Design, Outlook contacts, Bind, SQL Server upgrades, CL/400, Lotus error messages, NetBIOS, Domain, Enterprise Desktop, Lotus Notes 8.x, Exchange administration, PDF, Tools, mySAP Financials, Cisco Routers, Global Address List, Oracle Forms, Careers, SQL Server performance, tips and tricks, Network administration, Auditing, iNotes, Scripting, Outsourcing, Outlook meetings, Exchange user settings, SAP FI, Subfile, Financials, SIP, Disk drives, Registry, Laws, Regulations, DB2/400, Email forwarding, Lotus Notes Database, Oracle Reports, IPv6, PTFs, J2EE, Network performance, Budgeting, Lotus Domino Server 6.x, SAP CRM, SAP APO, ED, SSIS, Password, Information risk management, TR, NFS, mySAP Human Resources, FI, CO, Microsoft Outlook, TCP/IP, CICS, SAP Transaction Codes, WAN, DDS, Cisco certifications, Domino 6.5, Workflow, Billing Support Systems, Business Information Warehouse, Lotus, Planning, Address book, Billing and customer care, WINS, Shared folders, Backup Exec, RAID 5, SAP MM, Delphi, Application software, Dell, Operating system platforms, Fault isolation, SQL Server stored procedures, SharePoint 2007, Lotus Notes 6.5, AS/400 development, SQL Server 2008, SQL Server tables, Veritas, Lotus email, mySAP Accounting, SQL Server administration, Service and support, Tape Backups, ECC6, MCSE, AS/400 FTP, Database connectivity, IP address, SAP FICO, Cisco switches, ROI & cost justification, VB.NET 2005, Avaya, z/OS, Benchmarking, CLLE, Internet Explorer, Oracle import/export, AS/400 performance, Subnets, Arrays, MPLS, Frame Relay, Windows Mobile, CSV, Mapped drives, BES, Non-Delivery Reports, Office 2003, iSCSI, BlackBerry Enterprise Server, Lotus Notes Calendar, Power management, mySAP Enterprise, zSeries, General Directories, Vulnerability Assessment & Audit, Hewlett-Packard, Wireless Access Points, EMC, Wi-Fi, Software development, SQL Server Reporting Services, SQL statements, Lotus Domino Server 7.x, Vista compatibility, Red Hat Enterprise Linux, mySAP Application Link Enabling, SQL Server security, Network Interface Cards, Exchange Server ActiveSync, McAfee, ActiveX, PIX, SELECT statement, Ubuntu Linux, iSeries development, Routing and switching, BRMS, Oracle SQL, Lotus Agents, ComboBox, Visual Basic 2005, .NET, Computer Associates, Nortel, Mobile synchronization, Strategic Enterprise Management, Intel, Server management, Oracle Application Server, Juniper Networks, Domino Server, mySAP Supplier Relationship Management, AS/400 Client Access, AS/400 careers, V5R2, AS/400 user profiles, ISP, CL programming, Word 2007, Telecom, RPG IV, mySAP CRM, Integration/Connectivity, Novell NDS, JSP, Web, SCSI, User access, Exchange 2003 SP2, Access Database

Cheers, frizzy.

VoIP

Fahmi Rizwansyah says:

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cheers, frizzy.

Customer Relationship Management

Fahmi Rizwansyah says:

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cheers, frizzy.

Tanggapan: Masyarakat Tradisional Vs. Kapitalis = Pembangunan

Fahmi Rizwansyah says:

Tulisan 1 (pertama) dari 2 (dua) tulisan.
Tanggapan artikel Masyarakat Tradisional Vs. Kapitalis = Pembangunan
Tulisan Mr. Abdul Wahab Kiak

Pertama-tama aku akan mengenalkan background dan pola berpikirku. Aku telah bekerja di bidang System Integrator selama lebih dari 14 tahun.
Dalam memberikan solusi, metode yang kupakai adalah Engineering. Suatu metode pemecahan masalah yang menggunakan analisa dari seluruh hal-hal yang saling berkaitan.
Permasalahan yang diselesaikan tanpa analisa yang lengkap, hanya akan menyimpan permasalahan yang menggunung. Yang terlihat bisa dijalankan untuk sementara, namun akan gagal untuk ke depannya.

Berbicara mengenai pembangunan pada sektor kehutanan. Hal yang mendasar adalah kita harus mengetahui seluruh potensi hutan yang ada, berikut seluruh sumber daya alam pendukungnya dan yang paling penting adalah sumber daya manusianya. Ketika bicara tentang semua hal ini, tentunya kita memerlukan analis-analis dalam bidangnya.
Aku tidak pernah setuju pada sebuah keputusan yang tidak didasari oleh analisa yang tepat dan akurat. Apalagi keputusan yang hanya diputuskan oleh seseorang tanpa alasan yang komprehensif. Please dong ah, kita sekarang hidup di alam yang penuh teknologi modern, teknologi yang dibangun dengan proses analisa yang mendalam sehingga sebuah teknologi, dari yang sederhana sampai yang canggih dan rumit sekalipun dapat diterima oleh seluruh lapisan masyarakat di seluruh dunia. Aku contohkan misalnya satu set tool box, furnitur dengan disain modern, handphone, sampai prosesor komputer yang proses pembuatannya sangat2 rumit dll. Amazing isn't it!

Maaf saudara, sekarang bukan waktunya lagi seorang pejabat pengambil keputusan bisa berlagak layaknya manusia super yang berwibawa di seluruh jagad raya. Aku sering tertawa membaca tulisan2 di prasasti2 kuno yang terlalu memuji seorang raja secara hiperbolis yang jelas kebangetan tapi mampu mempengaruhi masyarakat yang berpendidikan rendah.

Berikut adalah para analis yang dibutuhkan dalam pembangunan sektor kehutanan.
1. Analis Antropologi/Budaya/Adat Istiadat/Agama
2. Analis Hukum, Teritorial dan keamanan
3. Analis Kehutanan dan Perkebunan
4. Analis Politik
5. Analis Sumber Daya Manusia
6. Analis Resiko
7. Analis Komunikasi/Hubungan Kemasyarakatan
8. Analis Keuangan/Finansial
9. Analis Perpajakan
10. Analis Operasional
11. Analis Akuntansi
11. Analis Kualitas
12. Analis Kepatuhan (Compliance)
13. Analis Teknologi
14. Analis Produk
15. Analis Pemasaran dan penjualan
16. ...dll yang belum terpikirkan

Para analis di atas adalah panita yang merumuskan masalah, memberikan ide, memberikan batasan-batasan, memberikan arahan, mencari kesepakatan dan mencari keputusan.
Masalah teknis produksi, pemasaran, penjualan dan pemeliharaan tidak dicantumkan di sini, karena scope tersebut adalah sesuatu hal kompleks yang lain lagi.

Ingat!, hutan adalah pemberian Tuhan, bukan buatan manusia. Maaf, bukan maksud menggurui tapi memang inilah yang ada dalam otakku.
Sekali lagi saudaraku, janganlah keputusan yang sangat penting ini dibebankan/dibiarkan kepada satu orang/satu golongan saja. Agama mengajarkan kita untuk menyerahkan setiap persoalan kepada ahlinya bukan kepada orang yang tidak paham apalagi yang sok paham. Untuk itu, hindarilah pemujian yang berlebihan kepada seseorang atau golongan tertentu. Mari kita ubah paradigma tersebut bersama-sama yaa.

Masyarakat Tradisional Vs. Kapitalis = Pembangunan
sebelumnya aku akan membuat definisi Masyarakat Tradisional, Kapitalis dan Pembangunan. Ketiga hal ini aku sebut entiti, setiap entiti punya karakter/sifat yang berbeda sehingga penanganan dan pemecahan masalahnya pun berbeda.
Namun patut diingat bahwa ulasan aku berasal dari berita-berita umum yang ada, sehingga point of viewnya jelas berbeda dengan orang2 yang menghadapinya secara langsung.

Berbicara masyarakat tradisional pasti berbicara masalah struktur masyarakat adat. Sebagai orang yang hidup di era modern seperti sekarang, aku sangat jauh dari mengerti mengenai struktur adat. Ditambah dengan paham nasionalis dan demokratis yang aku anut, sebagai orang yang hanya diberi pengertian bahwa aku adalah orang dan manusia Indonesia yang harus hidup dengan ideologi Pancasila, aku tidak akan mengkotak-kotakan suku bangsa yang satu dengan yang lain. Namun aku sangat menghargai penduduk asli yang telah sepaham menganggap bahwa tanah kelahirannya adalah haknya mereka, meskipun bukan mereka yang membuatnya (mohon dibaca dengan pikiran terbuka dan modern).
Oke, mari kita lanjutkan. Aku menganggap struktur yang sekarang ada harus dijaga namun TETAP harus dikembangkan, disesuaikan dan dialokasikan sumber dayanya untuk menghadapi kompetisi global.
Kenapa aku bicara kompetisi? Karena dalam agama kita ditekankan untuk tidak iri dan dengki, namun diwajibkan untuk menuntut ilmu setinggi-tingginya untuk bersaing dalam perdagangan, menolak riba dan mencari ridha Allah SWT seluas-luasnya.
Sebuah tim (struktur adat) yang kaku tidak akan mampu menghadapi variasi kompetisi yang berbeda-beda. Karena tiap potensi kehutanan di suatu daerah pasti berbeda dengan yang lainnya. Semua pihak yang terkait harus jujur menyatakan potensi dirinya, tidak boleh ada yang merasa superior jika kita bicara sumber daya. Pandangan hanya penguasa yang mengerti akan keadaan teritorialnya adalah pandangan yang lemah dan sulit diterima oleh masyarakatnya saat ini. Sebagai profesional, mungkin aku bisa sarankan untuk merombak tatanan struktural yang ada dengan tetap melibatkan nafas budaya yang dianut meskipun itu pasti ditentang oleh 'masyarakatnya'.
Dari sini diharapkan semua pihak akhirnya sadar, aware akan potensinya dan mensosialisasikan kepada masyarakat lainnya di seluruh Indonesia. Sehingga jika ternyata ada pihak masyarakat dari daerahlain menyatakan bisa membantu, kita tidak perlu lagi bantuan dari negara lain.

Sob, segitu dulu ya, karena aku mau ngurusin pendaftaran sekolah anak. Aku akan teruskan tulisan ini di posting berikutnya.

Cheers, frizzy.

Google Adsense Analysis 4 - Riwayat Pembayaran Kedua

Fahmi Rizwansyah says:

Ini adalah laporan riwayat pembayaran per tanggal 5 Februari 2009. Hasilnya si cukup lumayan buat pemula seperti aku. Tapi yaa itu sob, deg-degan ni, bener bisa payout lagi gak yaa???


Mohon pencerahan kepada mpu-mpu blogger yang sudah pada sukses.
Terima kasih aku haturkan kepada semua yang mendukung blogku ini, spesial kepada clicker bloggerousss, yang sudah memberikan kliknya tanpa diminta (atau memang dah janjian upsshhh).

Cheers, frizzy.

Do good for Indonesia and become guest blogger on About.com

Fahmi Rizwansyah says:

Do good for Indonesia and become guest blogger on About.com
To members of Official Indonesian Bloggers Group
Enda Nasution
Today at 4:20pm

Thanks to Mike Aquino the editor for Southeast Asia Travel http://goseasia.about.com/ section on About.com and one of our invited blogger that came to Pesta Blogger 2008.
About.com is one of the oldest source on the Internet and recently become a part of the New York Times Company http://www.nytco.com/

By become as a guest blogger on the site your post will be read by a lot of visitor from US and around the worl AND you are doing something good for Indonesia because you are promoting the country and specially the places that you love.

So, interested?
Here’s how you can become a guest blogger on Southeast Asia Travel About.com
* Write something about the not-so-familiar places of Indonesia, places that they think foreigners should visit instead of the regular tourist spot.
* Write in English doesn’t have to be perfect, but has to be very descriptive with a lot of information
* You can submit several posts
* Each post should have at least three supporting images.
* Each post should recommend at least three places to stay.
* Each post should have info on how to get there/get around/leave.

Mike will pick ten best blog entries in English, which he will feature on his blog and in a separate article inside (”Top Ten ‘Hidden’ Spots in Indonesia”).
While English-only bloggers are welcome to join, he’ll take a closer look at non-English bloggers.
Runners-up will still be featured in a blog entry of their own.
Once you are finish, post the link to your entry on the comment section of this post: http://pestablogger.com/2009/02/03/do-good-for-indonesia-and-see-your-post-on-aboutcom/

This gig came with bags of kudos, heart warming tools knowing that you do something good for the country and GIANT bragging rights. :D
What are you waiting for? Start writing now!

Cheers, frizzy.

Consider Indonesia!

Fahmi Rizwansyah says:

Consider Indonesia!

Are you aware that Indonesia currently ranks number five worldwide in Export Success Stories? And number one in Southeast Asia?
Wouldn't you like your company to share in that success?




Here's a few fact that you might not be aware of:
* Indonesia is the world's fourth largest country, with a population of over 230 million.
* Indonesia's GDP is growing at over 6% annually, and is expected to reach 6.8% this year.
* Indonesia has by far the largest economy in Southeast Asia.
* Indonesia is the world's third largest democracy, with a thriving open economy.

Isn't this a market your clients ought to consider?

by http://www.buyusa.gov/indonesia/en/considerindonesia.html
Cheers, frizzy2008.

Options Trading

Fahmi Rizwansyah says:

7 Reasons Why You Should Consider Options Trading!

1. You can make more money – faster – in a bad economy
2. Good economies are still a cash-cow
3. There is no overhead
4. No employees
5. No boss breathing down your neck
6. You can do it from anywhere in the world...all you need is a laptop
7. You can get started on a shoestring

Complex or Simple?
Option trading isn't a fad or gimmicky business that will be here today and gone tomorrow. It is a proven investing technique that has been used for more than 70 years by the “super-wealthy” to exploit market swings for 100% to 500% gains in a matter of weeks. I'm talking about institutional investors, hedge fund managers, and private equity have all used options to make a fortune.

Despite a wide-spread belief that options are complicated, they are actually very simple. Sure there are those who believe in “efficient markets” and employ sophisticated “option pricing models” that are theoretically “fool-proof”.

But it was reliance on these “fail-safe” models that caused the collapse of Long Term Capital Management in 98' and once again damn near brought down the “house” as the sophists behind these pricing models divided up sub-prime mortgage paper and “miraculously” turned it into AAA paper.

The only thing we've learned through all of this, is that the “efficient market theory” isn't efficient at all, and eventually blows up in your face.
Markets are NOT efficient. How can they be when they are made up of a bunch of tightly-wound human “creatures” whose emotions of greed and fear often hit ten on the Richter scale?

When you understand that the market constantly gyrates back and forth between these two emotional extremes, using options to grow wealthy becomes a very simple and predictable process.
It may come as a shock, but greed & fear are patterned and repeat over and over in every stock.....in every market.....and in every time frame, from a one-minute chart to a multi-year chart. I'll tell you all about it in just a moment. But first a word from the worlds richest man.

by someone which I forgot, sorry
Cheers, frizzy.

Selamat Pagi Bulan Februari

Fahmi Rizwansyah says:

Selamat pagi sobat semua. Ini aku tulis pada tanggal 1 Februari 2009 pukul 1:37 am.
Semoga semua sobat bloggerous sehat wal afiyat, terus giat berkarya dan makin cinta akan persahabatan.
Mulai hari ini aku launching project baru di www.lagunabiru.com, sebagai wadah berekspresi berikutnya. Semua yang ingin berpartisipasi akan aku terima dengan terbuka.

Love your visiting, your friendship and your posting...

Cheers, frizzy.

Lawyer Responsibilities

Fahmi Rizwansyah says:

Responsibilities
In most countries, particularly civil law countries, there has been a tradition of giving many legal tasks to a variety of civil law notaries, clerks, and scriveners. These countries do not have "lawyers" in the American sense, insofar as that term refers to a single type of general-purpose legal services provider; rather, their legal professions consist of a large number of different kinds of law-trained persons, known as jurists, of which only some are advocates who are licensed to practice in the courts. It is difficult to formulate accurate generalizations that cover all the countries with multiple legal professions, because each country has traditionally had its own peculiar method of dividing up legal work among all its different types of legal professionals.

Notably, England, the mother of the common law jurisdictions, emerged from the Dark Ages with similar complexity in its legal professions, but then evolved by the 19th century to a single dichotomy between barristers and solicitors. An equivalent dichotomy developed between advocates and procurators in some civil law countries, though these two types did not always monopolize the practice of law as much as barristers and solicitors, in that they always coexisted with civil law notaries.
Several countries that originally had two or more legal professions have since fused or united their professions into a single type of lawyer. Most countries in this category are common law countries, though France, a civil law country, merged together its jurists in 1990 and 1991 in response to Anglo-American competition. In countries with fused professions, a lawyer is usually permitted to carry out all or nearly all the responsibilities listed below.


Oral argument in the courts
Arguing a client's case before a judge or jury in a court of law is the traditional province of the barrister in England, and of advocates in some civil law jurisdictions. However, the boundary between barristers and solicitors has evolved. In England today, the barrister monopoly covers only appellate courts, and barristers must compete directly with solicitors in many trial courts. In countries like the United States that have fused legal professions, there are trial lawyers who specialize in trying cases in court, but trial lawyers do not have a de jure monopoly like barristers.
In some countries, litigants have the option of arguing pro se, or on their own behalf. It is common for litigants to appear unrepresented before certain courts like small claims courts; indeed, many such courts do not allow lawyers to speak for their clients, in an effort to save money for all participants in a small case. In other countries, like Venezuela, no one may appear before a judge unless represented by a lawyer. The advantage of the latter regime is that lawyers are familiar with the court's customs and procedures, and make the legal system more efficient for all involved. Unrepresented parties often damage their own credibility or slow the court down as a result of their inexperience.

Research and drafting of court papers
Often, lawyers brief a court in writing on the issues in a case before the issues can be orally argued. They may have to perform extensive research into relevant facts and law while drafting legal papers and preparing for oral argument.
In England, the usual division of labour is that a solicitor will obtain the facts of the case from the client and then brief a barrister (usually in writing). The barrister then researches and drafts the necessary court pleadings (which will be filed and served by the solicitor) and orally argues the case.

Advocacy (written and oral) in administrative hearings
In most developed countries, the legislature has granted original jurisdiction over highly technical matters to executive branch administrative agencies which oversee such things. As a result, some lawyers have become specialists in administrative law. In a few countries, there is a special category of jurists with a monopoly over this form of advocacy; for example, France formerly had conseil juridiques (who were merged into the main legal profession in 1991). In other countries, like the United States, lawyers have been effectively barred by statute from certain types of administrative hearings in order to preserve their informality.

Client intake and counseling (with regard to pending litigation)
An important aspect of a lawyer's job is developing and managing relationships with clients (or the client's employees, if the lawyer works in-house for a government or corporation). The client-lawyer relationship often begins with an intake interview where the lawyer gets to know the client personally, discovers the facts of the client's case, clarifies what the client wants to accomplish, shapes the client's expectations as to what actually can be accomplished, begins to develop various claims or defenses, and explains his or her fees to the client.
In England, only solicitors were traditionally in direct contact with the client. The solicitor retained a barrister if one was necessary and acted as an intermediary between the barrister and the client. In most cases a barrister would be obliged, under what is known as the "cab rank rule", to accept instructions for a case in an area in which they held themselves out as practising, at a court at which they normally appeared and at their usual rates.

Legal advice
Legal advice is the application of abstract principles of law to the concrete facts of the client's case in order to advise the client about what they should do next. In many countries, only a properly licensed lawyer may provide legal advice to clients for good consideration, even if no lawsuit is contemplated or is in progress. Therefore, even conveyancers and corporate in-house counsel must first get a license to practice, though they may actually spend very little of their careers in court. Failure to obey such a rule is the crime of unauthorized practice of law.
In other countries, jurists who hold law degrees are allowed to provide legal advice to individuals or to corporations, and it is irrelevant if they lack a license and cannot appear in court. Some countries go further; in England and Wales, there is no general prohibition on the giving of legal advice. Sometimes civil law notaries are allowed to give legal advice, as in Belgium. In many countries, non-jurist accountants may provide what is technically legal advice in tax and accounting matters.

Protecting intellectual property
In virtually all countries, patents, trademarks, industrial designs and other forms of intellectual property must be formally registered with a government agency in order to receive maximum protection under the law. The division of such work among lawyers, licensed non-lawyer jurists/agents, and ordinary clerks or scriveners varies greatly from one country to the next.

Negotiating and drafting contracts
In some countries, the negotiating and drafting of contracts is considered to be similar to the provision of legal advice, so that it is subject to the licensing requirement explained above. In others, jurists or notaries may negotiate or draft contracts.
Lawyers in some civil law countries traditionally deprecated "transactional law" or "business law" as beneath them. French law firms developed transactional departments only in the 1990s when they started to lose business to international firms based in the United States and the United Kingdom (where solicitors have always done transactional work).

Conveyancing
Conveyancing is the drafting of the documents necessary for the transfer of real property, such as deeds and mortgages. In some jurisdictions, all real estate transactions must be carried out by a lawyer (or a solicitor where that distinction still exists). Such a monopoly is quite valuable from the lawyer's point of view; historically, conveyancing accounted for about half of English solicitors' income (though this has since changed), and a 1978 study showed that conveyancing "accounts for as much as 80 percent of solicitor-client contact in New South Wales." In most common law jurisdictions outside of the United States, this monopoly arose from an 1804 law that was introduced by William Pitt the Younger as a quid pro quo for the raising of fees on the certification of legal professionals such as barristers, solicitors, attorneys and notaries.
In others, the use of a lawyer is optional and banks, title companies, or realtors may be used instead. In some civil law jurisdictions, real estate transactions are handled by civil law notaries. In England and Wales a special class of legal professional–the licensed conveyancer–is also allowed to carry out conveyancing services for reward.

Carrying out the intent of the deceased
In many countries, only lawyers have the legal authority to do drafting of wills, trusts, and any other documents that ensure the efficient disposition of a person's property after death. In some civil law countries this responsibility is handled by civil law notaries.
In the United States, the estates of the deceased must be administered by a court through probate. American lawyers have a profitable monopoly on dispensing advice about probate law (which has been heavily criticized).

Prosecution and defense of criminal suspects
In many civil law countries, prosecutors are trained and employed as part of the judiciary; they are law-trained jurists, but may not necessarily be lawyers in the sense that the word is used in the common law world. In common law countries, prosecutors are usually lawyers holding regular licenses who simply happen to work for the government office that files criminal charges against suspects. Criminal defense lawyers specialize in the defense of those charged with any crimes.

taken from Wikipedia.
Cheers, frizzy.

Let's be inspired

Fahmi Rizwansyah says:

What Virgin does…

I’m not good at theory. Almost everything I’ve learned, I’ve learned by doing. However, Muhammad’s opinions excite me. They confirm a lot of the gut feelings I’ve developed about business over the years. And topping my list of gut feelings is this: business has to give people enriching, rewarding lives, or it’s simply not worth doing.

I think of our Virgin brand as one of the premier ‘way of life’ brands in the world. Whether you’re in the United States, Australia and New Zealand, Japan, South Africa, India, Europe, Russia, South America or China, the Virgin brand means something. The Virgin brand is about enjoying life to the full. By offering customers excellent value for money in so many areas of their lives, we aim to make them happier.
Most businesses concentrate on one thing, and for the best of reasons: because their founders and leaders care about one thing, above all others, and they want to devote their lives to that thing. They’re not limited in their thinking. They’re focused. The conventional wisdom at business school is that you stick with what you know. Of the top twenty brands in the world, nineteen ply a well-defined trade.
Coca-Cola specialises in soft drinks, Microsoft’s into computers, Nike makes sports shoes and gear. The exception in this list is Virgin – and the fact that we’re worth $5 billion and counting really gets up the noses of people who think they know ‘the rules of business’ (whatever they are). We’re the only one of the top twenty that has diversified into a range of business activities, including airlines, trains, holidays, mobile phones, media – including television, radio and cable – the Internet, financial services and healthcare.
Hopefully what I’ve written here is relevant to your business no matter what sector you are in.

taken from http://entrepreneur.virgin.com/2009/01/05/what-virgin-does/

Cheers, frizzy.

Sensasi Seks di Tempat Umum

Fahmi Rizwansyah says:

La Rose Djayasupena - Belanda
Hoi Zev en KoKiers,

Untuk sebagian orang seks di muka umum mungkin sangat mengerikan dan memalukan melakukannya, tetapi untuk sebagian orang justru adalah suatu sensasi yang tak ternilai sangat indah dan menyenangkan untuk melakukannya.

Biasanya, kita dengan pasangan, pertama memulainya dengan sekedar ciuman saja sambil berpelukan di muka umum dan tanpa disadari saking enak dan nikmatnya.. ceilee..malah ciuman pun berubah tidak hanya sekedar cap..cup.. cap.. cup..hingga memainkan lidah masing-masing sampai muter dan merem-melek segala, padahal kita saat itu sebenarnya lagi berada di tempat umum, paling orang yang lewat hanya geleng-geleng kepala sambil senyum-senyum.

Di Belanda melakukan hubungan intim sangat mudah di tempat umum atau ruangan terbuka, sensasinya...hhmm.. ehem..ehem..bener - bener mengasyikan dan menyenangkan.

http://community.kompas.com/index.php/read/artikel/2192<--original posting.

Cheers, frizzy.

Virtualization...continue

Fahmi Rizwansyah says:

Following are some (possibly overlapping) representative reasons for and benefits of virtualization.


* Virtual machines can be used to consolidate the workloads of several under-utilized servers to fewer machines, perhaps a single machine (server consolidation). Related benefits (perceived or real, but often cited by vendors) are savings on hardware, environmental costs, management, and administration of the server infrastructure.
* The need to run legacy applications is served well by virtual machines. A legacy application might simply not run on newer hardware and/or operating systems. Even if it does, if may under-utilize the server, so as above, it makes sense to consolidate several applications. This may be difficult without virtualization as such applications are usually not written to co-exist within a single execution environment (consider applications with hard-coded System V IPC keys, as a trivial example).
* Virtual machines can be used to provide secure, isolated sandboxes for running untrusted applications. You could even create such an execution environment dynamically - on the fly - as you download something from the Internet and run it. You can think of creative schemes, such as those involving address obfuscation. Virtualization is an important concept in building secure computing platforms.
* Virtual machines can be used to create operating systems, or execution environments with resource limits, and given the right schedulers, resource guarantees. Partitioning usually goes hand-in-hand with quality of service in the creation of QoS-enabled operating systems.
* Virtual machines can provide the illusion of hardware, or hardware configuration that you do not have (such as SCSI devices, multiple processors, ...) Virtualization can also be used to simulate networks of independent computers.
* Virtual machines can be used to run multiple operating systems simultaneously: different versions, or even entirely different systems, which can be on hot standby. Some such systems may be hard or impossible to run on newer real hardware.
* Virtual machines allow for powerful debugging and performance monitoring. You can put such tools in the virtual machine monitor, for example. Operating systems can be debugged without losing productivity, or setting up more complicated debugging scenarios.
* Virtual machines can isolate what they run, so they provide fault and error containment. You can inject faults proactively into software to study its subsequent behavior.
* Virtual machines make software easier to migrate, thus aiding application and system mobility.
* You can treat application suites as appliances by "packaging" and running each in a virtual machine.
* Virtual machines are great tools for research and academic experiments. Since they provide isolation, they are safer to work with. They encapsulate the entire state of a running system: you can save the state, examine it, modify it, reload it, and so on. The state also provides an abstraction of the workload being run.
* Virtualization can enable existing operating systems to run on shared memory multiprocessors.
* Virtual machines can be used to create arbitrary test scenarios, and can lead to some very imaginative, effective quality assurance.
* Virtualization can be used to retrofit new features in existing operating systems without "too much" work.
* Virtualization can make tasks such as system migration, backup, and recovery easier and more manageable.
* Virtualization can be an effective means of providing binary compatibility.
* Virtualization on commodity hardware has been popular in co-located hosting. Many of the above benefits make such hosting secure, cost-effective, and appealing in general.
* Virtualization is fun.
* Plenty of other reasons ...

Variations
Generically speaking, in order to virtualize, you would use a layer of software that provides the illusion of a "real" machine to multiple instances of "virtual machines". This layer is traditionally called the Virtual Machine Monitor (VMM).

There are many (often intertwined) high-level ways to think about a virtualization system's architecture. Consider some scenarios:
A VMM could itself run directly on the real hardware - without requiring a "host" operating system. In this case, the VMM is the (minimal) OS.

A VMM could be hosted, and would run entirely as an application on top of a host operating system. It would use the host OS API to do everything. Furthermore, depending on whether the host and the virtual machine's architectures are identical or not, instruction set emulation may be involved.
From the point of view of how (and where) instructions get executed: you can handle all instructions that execute on a virtual machine in software; you can execute most of the instructions (maybe even some privileged instructions) directly on the real processor, with certain instructions handled in software; you can handle all privileged instructions in software ...
A different approach, with rather different goals, is that of complete machine simulation. SimOS and Simics, as discussed later, are examples of this approach.
Although architectures have been designed explicitly with virtualizationWhy Virtualization in mind, a typical hardware platform, and a typical operating system, both are not very conducive to virtualization.

As mentioned above, many architectures have privileged and non-privileged instructions. Assuming the programs you want to run on the various virtual machines on a system are all native to the architecture (in other words, it would not necessitate emulation of the instruction set). Thus, the virtual machine can be run in non-privileged mode. One would imagine that non-privileged instructions can be directly executed (without involving the VMM), and since the privileged instructions would cause a trap (since they are being executed in non-privileged mode), they can be "caught" by the VMM, and appropriate action can be taken (they can be simulated by the VMM in software, say). Problems arise from the fact that there may be instructions that are non-privileged, but their behavior depends on the processor mode - these instructions are sensitive, but they do not cause traps.

Cheers, frizzy.

Virtualization

Fahmi Rizwansyah says:

Virtualization Management
Virtualization technologies can deliver sea-changing benefits to your organization. But, as Thomas Bittman, Gartner analyst, adroitly noted, "Virtualization without good management is more dangerous than not using virtualization in the first place."
As an organization's computing environment gets more virtualized, it also gets more abstract. Increasing abstraction can increase complexity, making it harder for IT staff to control their world and undermining the benefits of virtualization.


Integrating physical and virtual management enables you to realize the full promise of virtualization while minimizing its risks. An integrated approach is critical because all IT infrastructures—even those with a significant amount of virtualization—include both virtual and physical components. Even if you have a management system that effectively handles virtualized systems, if it doesn't manage physical systems you will still have to manage many separate "islands"—and you will consume much more time and resources than you would with a management system that can handle all your assets. By using comprehensive virtualization management technology, you keep complexity at a minimum and streamline operations. A common virtualization management environment reduces training, ensures uniform policy application and simplifies maintenance.

Effective physical and virtual management can optimize the benefits of using virtualization technologies. This includes monitoring and managing hardware and software in a distributed environment. By allowing operations staff to monitor both the software running on physical machines and the physical machines themselves, it lets them know what's happening in their environment. It also lets them respond appropriately, running tasks and taking other actions to fix problems that occur.

Another unavoidable concern for people who manage virtualized, distributed environments is installing software and managing how that software is configured. While it's possible to perform these tasks by hand, end-to-end virtualization management technology can automate and accelerate this process.

Tools that work in both the physical and virtual worlds are highly effective and attractive. Yet think about an environment that has dozens or even hundreds of VMs installed. How are these machines built, changed and depreciated? And how are other VM-specific management functions performed? Addressing these questions requires a comprehensive toolset that includes managing virtualized hardware. Among other benefits, it can help operations staff choose workloads for virtualization, create the VMs that will run those workloads, and transfer the applications to their new homes.

Server Virtualization
For most IT people, the word "virtualization" conjures up thoughts of running multiple operating systems on a single physical machine. This is hardware virtualization, and while it's not the only important kind of virtualization, it is unquestionably the most visible today.
The core idea of hardware virtualization is simple: Use software to create a virtual machine that emulates a physical computer. This creates a separate OS environment that is logically isolated from the host server. By providing multiple VMs at once, this approach allows running several operating systems simultaneously on a single physical machine.

Rather than paying for many under-utilized server machines, each dedicated to a specific workload, server virtualization allows consolidating those workloads onto a smaller number of more fully-used machines. This implies fewer people to manage those computers, less space to house them, and fewer kilowatt hours of power to run them, all of which saves money.
Server virtualization also makes restoring failed systems easier. VMs are stored as files, and so restoring a failed system can be as simple as copying its file onto a new machine. Since VMs can have different hardware configurations from the physical machine on which they're running, this approach also allows restoring a failed system onto any available machine. There's no requirement to use a physically identical system.

Application Virtualization
In a physical environment, every application depends on its OS for a range of services, including memory allocation, device drivers, and much more. Incompatibilities between an application and its operating system can be addressed by either server virtualization or presentation virtualization. But for incompatibilities between two applications installed on the same instance of an OS, you need application virtualization.
Applications installed on the same device commonly share configuration elements, yet this sharing can be problematic. For example, one application might require a specific version of a dynamic link library (DLL) to function, while another application on that system might require a different version of the same DLL. Installing both applications creates a situation, where one of them overwrites the version required by the other causing the application to malfunction or crash. To avoid this, organizations often perform extensive compatibility testing before installing a new application, an approach that's workable but quite time-consuming and expensive.

Application virtualization solves this problem by creating application-specific copies of all shared resources. The configurations an application might share with other applications on its system—registry entries, specific DLLs, and more—are instead packaged with it and execute in the machine's cache, creating a virtual application. When a virtual application is deployed, it uses its own copy of these shared resources.
Application virtualization makes deployment significantly easier. Since applications no longer compete for DLL versions or other shared aspects of their environment, there's little need to test new applications for conflicts with existing applications before they're rolled out. And these virtual applications can run alongside ordinary, installed applications—so not everything needs to be virtualized, although doing so avoids many problems and decreases the time end-users spend with the helpdesk trying to resolve them. An effective application virtualization solution also enables you to manage both virtual applications and installed applications from a common interface.

Storage Virtualization
Generally speaking, storage virtualization refers to providing a logical, abstracted view of physical storage devices. It provides a way for many users or applications to access storage without being concerned with where or how that storage is physically located or managed. It enables the physical storage in an environment to be shared across multiple application servers, and physical devices behind the virtualization layer to be viewed and managed as if they were one large storage pool with no physical boundaries.

Virtualizing storage networks enables two key additional capabilities:
* The ability to mask or hide volumes from servers that are not authorized to access those volumes, providing an additional level of security.
* The ability to change and grow volumes on the fly to meet the needs of individual servers.

Essentially, anything other than a locally attached disk drive might be viewed in this light. Typically, storage virtualization applies to larger SAN (storage area network) arrays, but it is just as accurately applied to the logical partitioning of a local desktop hard drive, redundant array of independent disks (RAID), volume management, virtual memory, file systems and virtual tape. A very simple example is folder redirection in Windows, which lets the information in a folder be stored on any network-accessible drive. Much more powerful (and more complex) approaches include SANs. Large enterprises have long benefited from SAN technologies, in which storage is uncoupled from servers and attached directly to the network. By sharing storage on the network, SANs enable highly scalable and flexible storage resource allocation, high efficiency backup solutions, and better storage utilization.

Sources: http://www.microsoft.com/virtualization/products.mspx
Cheers, frizzy2008.

Load Balancing

Fahmi Rizwansyah says:

From Wikipedia, the free encyclopedia

In computer networking, load balancing is a technique to spread work between two or more computers, network links, CPUs, hard drives, or other resources, in order to get optimal resource utilization, maximize throughput, and minimize response time. Using multiple components with load balancing, instead of a single component, may increase reliability through redundancy. The balancing service is usually provided by a dedicated program or hardware device (such as a multilayer switch).
It is commonly used to mediate internal communications in computer clusters, especially high-availability clusters.


For Internet services
One of the most common applications of load balancing is to provide a single Internet service from multiple servers, sometimes known as a server farm. Commonly load-balanced systems include popular web sites, large Internet Relay Chat networks, high-bandwidth File Transfer Protocol sites, NNTP servers and DNS servers.
For Internet services, the load balancer is usually a software program which is listening on the port where external clients connect to access services. The load balancer forwards requests to one of the "backend" servers, which usually replies to the load balancer. This allows the load balancer to reply to the client without the client ever knowing about the internal separation of functions. It also prevents clients from contacting backend servers directly, which may have security benefits by hiding the structure of the internal network and preventing attacks on the kernel's network stack or unrelated services running on other ports.
Some load balancers provide a mechanism for doing something special in the event that all backend servers are unavailable. This might include forwarding to a backup load balancer, or displaying a message regarding the outage.
An alternate method of load balancing which does not necessarily require a dedicated software or hardware node, is called round robin DNS. In this technique, multiple IP addresses are associated with a single domain name (i.e. www.example.org); clients themselves are expected to choose which server to connect. Unlike the use of a dedicated load balancer, this technique is not "transparent" to clients, because it exposes the existence of multiple backend servers. The technique has other advantages and disadvantages, depending on the degree of control over the DNS server and the granularity of load balancing which is desired.
A variety of scheduling algorithms are used by load balancers to determine which backend server to send a request to. Simple algorithms include random choice or round robin. More sophisticated load balancers may take into account additional factors, such as a server's reported load, recent response times, up/down status (determined by a monitoring poll of some kind), number of active connections, geographic location, capabilities, or how much traffic it has recently been assigned. High-performance systems may use multiple layers of load balancing.
In addition to using dedicated hardware load balancers, software-only solutions are available, including open source options. Examples of the latter include the Apache web server's mod_proxy_balancer extension and the Pound reverse proxy and load balancer.


Persistence
An important issue when operating a load-balanced service is how to handle information that must be kept across the multiple requests in a user's session. If this information is stored locally on one back end server, then subsequent requests going to different back end servers would not be able to find it. This might be cached information that can be recomputed, in which case load-balancing a request to a different back end server just introduces a performance issue.
One solution to the session data issue is to send all requests in a user session consistently to the same back end server. This is known as "persistence" or "stickiness". A large downside to this technique is its lack of automatic failover: if a backend server goes down, its per-session information becomes inaccessible, and sessions depending on it are lost.
Assignment to a particular server might be based on a username, client IP address, or random assignment. Due to DHCP, Network Address Translation, and web proxies, the client's IP address may change across requests, and so this method can be somewhat unreliable. Random assignments must be remembered by the load balancer, which creates a storage burden. If the load balancer is replaced or fails, this information can be lost, and assignments may need to be deleted after a timeout period or during periods of high load, to avoid exceeding the space available for the assignment table. The random assignment method also requires that clients maintain some state, which can be a problem, for example when a web browser has disabled storage of cookies. Sophisticated load balancers use multiple persistence techniques to avoid some of the shortcomings of any one method.
Another solution is to keep the per-session data in a database. Generally this is bad for performance since it increases the load on the database: the database is best used to store information less transient than per-session data. (Interestingly, to prevent a database from becoming a single point of failure, and to improve scalability, the database is often replicated across multiple machines, and load balancing is used to spread the query load across those replicas.)
Fortunately there are more efficient approaches. In the very common case where the client is a web browser, per-session data can be stored in the browser itself. One technique is to use a browser cookie, suitably time-stamped and encrypted. Another is URL rewriting. Storing session data on the client is generally the preferred solution: then the load balancer is free to pick any backend server to handle a request.

Load balancer features
Hardware and software load balancers can come with a variety of special features.

* Asymmetric load: A ratio can be manually assigned to cause some backend servers to get a greater share of the workload than others. This is sometimes used as a crude way to account for some servers being faster than others.
* Priority activation: When the number of available servers drops below a certain number, or load gets too high, standby servers can be brought online
* SSL Offload and Acceleration: SSL applications can be a heavy burden on the resources of a Web Server, especially on the CPU and the end users may see a slow response (or at the very least the servers are spending a lot of cycles doing things they weren't designed to do). To resolve these kinds of issues, a Load Balancer capable of handling SSL Offloading in specialized hardware may be used. When Load Balancers are taking the SSL connections, the burden on the Web Servers is reduced and performance will not degrade for the end users.
* Distributed Denial of Service (DDoS) attack protection: load balancers can provide features such as SYN cookies and delayed-binding (the back-end servers don't see the client until it finishes its TCP handshake) to mitigate SYN flood attacks and generally offload work from the servers to a more efficient platform.
* HTTP compression: reduces amount of data to be transferred for HTTP objects by utilizing gzip compression available in all modern web browsers
* TCP offload: different vendors use different terms for this, but the idea is that normally each HTTP request from each client is a different TCP connection. This feature utilizes HTTP/1.1 to consolidate multiple HTTP requests from multiple clients into a single TCP socket to the back-end servers.
* TCP buffering: the load balancer can buffer responses from the server and spoon-feed the data out to slow clients, allowing the server to move on to other tasks.
* HTTP caching: the load balancer can store static content so that some requests can be handled without contacting the web servers.
* Content Filtering: some load balancers can arbitrarily modify traffic on the way through.
* HTTP security: some load balancers can hide HTTP error pages, remove server identification headers from HTTP responses, and encrypt cookies so end users can't manipulate them.
* Priority queuing: also known as rate shaping, the ability to give different priority to different traffic.
* Content aware switching: most load balancers can send requests to different servers based on the URL being requested.
* Client authentication: authenticate users against a variety of authentication sources before allowing them access to a website.
* Programmatic traffic manipulation: at least one load balancer allows the use of a scripting language to allow custom load balancing methods, arbitrary traffic manipulations, and more.
* Firewall: Direct connections to backend servers are prevented, for security reasons

In telecommunications
Load balancing can be useful when dealing with redundant communications links. For example, a company may have multiple Internet connections ensuring network access even if one of the connections should fail.
A failover arrangement would mean that one link is designated for normal use, while the second link is used only if the first one fails.
With load balancing, both links can be in use all the time. A device or program decides which of the available links to send packets along, being careful not to send packets along any link if it has failed. The ability to use multiple links simultaneously increases the available bandwidth.
Major telecommunications companies have multiple routes through their networks or to external networks. They use more sophisticated load balancing to shift traffic from one path to another to avoid network congestion on any particular link, and sometimes to minimize the cost of transit across external networks or improve network reliability.

Relationship with failover
Load balancing is often used to implement failover — the continuation of a service after the failure of one or more of its components. The components are monitored continually (e.g., web servers may be monitored by fetching known pages), and when one becomes non-responsive, the load balancer is informed and no longer sends traffic to it. And when a component comes back on line, the load balancer begins to route traffic to it again. For this to work, there must be at least one component in excess of the service's capacity. This is much less expensive and more flexible than failover approaches where a single "live" component is paired with a single "backup" component that takes over in the event of a failure. In a RAID disk controller, using RAID1 (mirroring) is analogous to the "live/backup" approach to failover, where RAID5 is analogous to load balancing failover.

Network Load Balancing Services (NLBS)
is a proprietary Microsoft implementation of clustering and load balancing that is intended to provide high availability and high reliability, as well as high scalability. NLBS is intended for applications with relatively small data sets that rarely change (one example would be web pages), and do not have long-running-in-memory states. These types of applications are called stateless applications, and typically include Web, File Transfer Protocol (FTP), and virtual private networking (VPN) servers. Every client request to a stateless application is a separate transaction, so it is possible to distribute the requests among multiple servers to balance the load. One attractive feature of NLBS is that all servers in a cluster monitor each other with a heartbeat signal, so there is no single point of failure.

Configuration Tips:
* The network load balancing service requires for all the machines to have the correct local time. Ensure the Windows Time Service is properly configured on all hosts to keep clocks synchronized. Unsyncronized times will cause a network login screen to pop up which doesn't accept valid login credentials.
* The server console can't have any network card dialogue boxes open when you are configuring the "Network Load Balancing Manager" from your client machine.
* You have to manually add each load balancing server individually to the load balancing cluster after you've created a cluster host.
* To allow communication between servers in the same NLB cluster, each server requires the following registry entry: a DWORD key named "UnicastInterHostCommSupport" and set to 1, for each network interface card's GUID (HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\WLBS\Parameters\Interface\{GUID})
* NLBS may conflict with some Cisco routers, which are not able to resolve the IP address of the server and must be configured with a static ARP entry.

Cheers, frizzy2008.

Tren visitor

Fahmi Rizwansyah says:

Dunia maya memang keras ya sob...


Dasar memang modalku cuma blogwalking, jadi nasibnya ya seperti ini. Kalo lagi rajin dan konsentrasi, mestinya bisa dapat tinggi. Tapi waktu harus share dengan keluarga dan meninggalkan aktifitas blogging, tren visitor langsung menukik tajam.
Gak papa, teteup semangat, setelah ini aku akan menganalisa http://xsemua.blogspot.com/ dan http://jokosupriyanto.com/. Mengapa mereka bisa sebegitu hebat trafficnya di http://www.indotopblog.com/.
Harus belajar lagi ni!!! mohon bantuannya yaa para bloggerous.

Cheers, frizzy.

Pagerank from Google Official Site

Fahmi Rizwansyah says:

Technology Overview <--original posting, translated by google.
Tinjauan teknologi

We stand alone in our focus on developing the "perfect search engine," defined by co-founder Larry Page as something that, "understands exactly what you mean and gives you back exactly what you want."
Kami berdiri sendiri dalam kami fokus pada pengembangan "mesin pencari sempurna," ditetapkan oleh pendiri bersama Larry Page sebagai sesuatu yang "mengerti apa yang Anda maksud dan memberikan kembali apa yang Anda inginkan."
To that end, we have persistently pursued innovation and refused to accept the limitations of existing models.
Untuk itu, kami telah diikuti persistently inovasi dan menolak untuk menerima keterbatasan model yang ada.


As a result, we developed our serving infrastructure and breakthrough PageRank™ technology that changed the way searches are conducted.
Akibatnya, kami mengembangkan infrastruktur kami melayani dan terobosan teknologi PageRank ™ yang mengubah cara pencarian dilakukan.

From the beginning, our developers recognized that providing the fastest, most accurate results required a new kind of server setup.
Dari awal, kami mengakui bahwa pengembang menyediakan tercepat dan paling akurat hasil diperlukan baru jenis server.
Whereas most search engines ran off a handful of large servers that often slowed under peak loads, ours employed linked PCs to quickly find each query's answer.
Sedangkan kebanyakan mesin pencari berlari off segelintir dari server besar yang sering melambat di bawah beban puncak, kami bekerja terhubung ke komputer dengan cepat menemukan jawaban dari setiap pencarian.
The innovation paid off in faster response times, greater scalability and lower costs.
Inovasi yang dibayar di respon kali lebih cepat, lebih rendah biaya dan skalabilitas.
It's an idea that others have since copied, while we have continued to refine our back-end technology to make it even more efficient.
Ada ide yang lain ada sejak disalin, sementara kami telah berlanjut untuk memperbaiki kami kembali akhir teknologi agar lebih efisien.

The software behind our search technology conducts a series of simultaneous calculations requiring only a fraction of a second.
Perangkat lunak di balik teknologi pencarian kami melakukan serangkaian kalkulasi serentak hanya memerlukan beberapa detik.
Traditional search engines rely heavily on how often a word appears on a web page.
Tradisional mesin pencari sangat bergantung pada seberapa sering sebuah kata muncul di halaman web.
We use more than 200 signals, including our patented PageRank™ algorithm, to examine the entire link structure of the web and determine which pages are most important.
Kami menggunakan lebih dari 200 sinyal, kami termasuk paten algoritma PageRank ™, untuk memeriksa seluruh struktur link di web dan menentukan halaman yang paling penting.
We then conduct hypertext-matching analysis to determine which pages are relevant to the specific search being conducted.
Kami kemudian melakukan hypertext-matching analisis untuk menentukan halaman mana yang relevan dengan pencarian khusus yang dilakukan.

By combining overall importance and query-specific relevance, we're able to put the most relevant and reliable results first.
Dengan menggabungkan seluruh kepentingan dan relevansi permintaan khusus, kami dapat menempatkan yang paling relevan dan dapat dipercaya hasil pertama.

PageRank Technology: PageRank reflects our view of the importance of web pages by considering more than 500 million variables and 2 billion terms.
Teknologi PageRank: PageRank mencerminkan pandangan kami akan pentingnya halaman web dengan mempertimbangkan lebih dari 500 juta variabel dan 2 miliar istilah.
Pages that we believe are important pages receive a higher PageRank and are more likely to appear at the top of the search results.
Halaman yang kami percaya adalah penting halaman menerima PageRank yang lebih tinggi dan lebih mungkin untuk muncul di bagian atas hasil pencarian.

PageRank also considers the importance of each page that casts a vote, as votes from some pages are considered to have greater value, thus giving the linked page greater value.
PageRank juga mempertimbangkan pentingnya setiap halaman yang membuat suara, karena dinilai dari beberapa halaman dianggap memiliki nilai lebih besar, sehingga memberikan nilai lebih besar halaman yang terhubung.
We have always taken a pragmatic approach to help improve search quality and create useful products, and our technology uses the collective intelligence of the web to determine a page's importance.
Kami selalu melakukan pendekatan pragmatis pencarian untuk membantu meningkatkan kualitas dan menciptakan produk yang bermanfaat, dan kami akan menggunakan teknologi intelijen kolektif dari web untuk menentukan kepentingan halaman.

Hypertext-Matching Analysis: Our search engine also analyzes page content.
Hypertext-Pencocokan Analisis: Kami mencari mesin juga menganalisis konten halaman.
However, instead of simply scanning for page-based text (which can be manipulated by site publishers through meta-tags), our technology analyzes the full content of a page and factors in fonts, subdivisions and the precise location of each word.
Namun, daripada hanya sekadar membaca sepintas teks berdasarkan halaman (yang dapat dimanipulasi oleh penerbit situs melalui meta-tag), teknologi kami menganalisis keseluruhan konten halaman dan berbagai faktor berupa font, subdivisi, dan lokasi dari setiap kata.
We also analyze the content of neighboring web pages to ensure the results returned are the most relevant to a user's query.
Kami juga menganalisis konten halaman web di sekitarnya untuk memastikan hasil yang paling relevan dengan permintaan pengguna.

Our innovations don't stop at the desktop.
Inovasi kami tidak berhenti pada desktop.
To give people access to the information they need, whenever and wherever they need it, we continue to develop new mobile applications and services that are more accessible and customizable.
Untuk memberikan akses masyarakat ke informasi yang mereka butuhkan, kapanpun dan dimanapun mereka memerlukannya, kami terus mengembangkan aplikasi baru ponsel dan layanan yang lebih mudah dan dapat diatur.
And we're partnering with industry-leading carriers and device manufacturers to deliver these innovative services globally.
Dan kami bermitra dengan industri terkemuka operator dan produsen perangkat ini inovatif untuk memberikan layanan global.
We're working with many of these industry leaders through the Open Handset Alliance to develop Android, the first complete, open, and free mobile platform, which will offer people a less expensive and better mobile experience.
Kami bekerja dengan banyak pemimpin industri ini melalui Open Handset Alliance untuk mengembangkan Android, pertama selesai, terbuka, dan bebas platform mobile, yang akan menawarkan orang-orang yang lebih mahal dan kurang pengalaman mobile.

Life of a Google Query
The life span of a Google query normally lasts less than half a second, yet involves a number of different steps that must be completed before results can be delivered to a person seeking information.



Cheers, frizzy.

Selamat Hari Raya Imlek

Fahmi Rizwansyah says:


Selamat Hari Raya Imlek
Bagi sobat-sobat yang merayakannya.
Mari kita bersatu dengan semangat Bhinneka Tunggal Ika, bekerja keras bersama-sama menuju masyarakat adil makmur sejahtera kertaraharja.

Cheers, frizzy.

Review my blog, please...

Fahmi Rizwansyah says:

Mau minta tolong sama teman-teman blogger untuk mereview blogku. Mohon reviewnya ditulis di comment. Jenis reviewnya bebas bisa mencakup seperti di bawah ini:
  1. Design, mulai dari template, warna, layout, penempatan banner dll
  2. Content, mulai dari artikel, gambar, banner dll
  3. Attractiveness, mulai dari visitor interaction, reply response dll
  4. Dan semua yang bisa direview/dikomentari.
Review/comment yang telah disubmit tidak akan dihapus termasuk yang bersifat offensive, mengandung pornografi, mengandung SARA, kecuali yang bersifat kekanak-kanakan (resiko tanggung sendiri yaa).

Bagi teman-teman yang berminat aku review, hendaknya membuat judul posting yang sama atau mirip atau apa saja yang penting mengandung subject yang dikhususkan untuk review.
Tujuan saling mereview ini adalah untuk belajar membaca, mendengar dan menuliskan kembali apa yang ada dalam benak blogger, sekaligus berlatih untuk menjadi reviewer dalam rangka terjun ke dalam bisnis Paid To Review.
Semoga ide ini bisa diterima yaa. Kalau pun tidak? yaa namanya juga usaha...Peace!!! --slanker mode: on--

Lumayan buat ngisi waktu libur panjang, itu juga kalo gak direcokin oleh anggota keluarga yang lain.


Cheers, frizzy2008.