This is the first page. You can change the text into anything that suit your need.
Definition Monolithic architecture is a software development pattern in which an application is created with a single codebase, a single build system, a single executable binary and multiple modules for business or technical features. Its components work together, share the same memory space and resources.
Definition Microservices architecture is a collection of multiple loosely coupled services. It emerges from this definition that Microservices vs. monolithic architecture represents a single large mobile application divided into a set of small, independent services deployed in personal archives. When brought together, they use standard lightweight communication and work as a cohesive solution.
Definition In-memory computing is the storage of information in the main random access memory (RAM) of dedicated servers rather than in complicated relational databases operating on comparatively slow disk drives. In-memory computing helps business customers, including retailers, banks and utilities, to quickly detect patterns, analyze massive data volumes on the fly, and perform their operations quickly.
Many technology companies are making use of this technology. For example, the in-memory computing technology developed by SAP, called High-Speed Analytical Appliance (HANA), uses a technique called sophisticated data compression to store data in the random access memory. HANA's performance is 10,000 times faster when compared to standard disks, which allows companies to analyze data in a matter of seconds instead of long hours.
Datacenter Multiple Geographic Locations Certification – Rated-3 TIA-942 & PCI-DSS Operation Data Center – ISO 20000 & DCOS High Capacity Connectivity to Local Internet
International Cloud Exchange Connectivity Clean Internet Protection – DDoS Protection Service Cyber Security Service optional protection
10 Reason why should company consider DR ?
Because you can’t afford downtime Because your customers and prospects expect it Because you spent a lot in building your brand, and you need to protect it Because mother nature does not play favorites Because machine breaks Because we live in an always on world that requires always on capabilities Because compliance and regulations require it Because you can’t predict what data might be lost and the value it had for your company’s well being Because it will save your money Because we’re all human
DDoS Distributed Denial of Service (DDoS) attacks have evolved into complex and sophisticated security challenge for all of us. DDoS Protection Service by Datacomm provides organizations with comprehensive protection against the most challenging DDoS attacks, protecting their brand, customers and earning potential. With globally distributed cloud infrastructure prevents downtime on network assets, protects critical applications and ensures availability for domain resolution.
Monitoring Information security monitoring plays an important role to provides your company’s actual information security condition and to guarantee the implementation of good information security practices Sentriciti Secure Remote Monitoring (SRM) is a zero – near real-time detection services. 24/7 around-the-clock proactive security monitoring from Datacomm SOC. Security incident alert includes threat vector and landscape analysis, impact analysis and incident handling recommendation.
Benefit Faster monitoring service enablement. Fast and accurate security incident detection and effective recommendation. Reduced security incident risk and impact. Reduce human resources management hassles. Proven process to complement customer’s existing process.
Key Feature 24/7 around the clock monitoring. 24/7 helpdesk. ISO27001, ISO20001. Global threat intelligence. Staged and guaranteed SLA for alert. Experienced and certified security professional (GIAC, ISACA, ISC^2). Web-based user dashboard. Ad-hoc and periodic reporting.
Pentest To get a complete picture of your information security system condition enables you to improve the planning and development of your security posture. To help you conduct a thorough and objective information security assessment, Sentriciti Security Professional Service provides comprehensive vulnerability assessment and penetration testing service.
Base on Department of Defence (DOD) Directives 8570
OSCP (Offensive Security Certified Professional) * CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CISA (Certified Information Systems Auditor) GSEC (GIAC Security Essential Certification) GCIH (GIAC Certified Incident Handler) GCIA (GIAC Certified Intrusion Analyst) GPEN (GIAC Penetration Tester Certification) CNSE (Palo Alto Certified Network Security Engineer) JNCIP-SEC (Juniper Networks Certified Internet Professional – Security)
Scalability in cloud computing means flexibility, enabling your business to better respond to needs as they arise. It’s a crucial factor in helping your business grow and succeed. More users, more bandwidth, more storage—what your infrastructure can handle today, may not work tomorrow.
One of the best aspects of the Cloud today is that it’s now affordable for businesses of any size. In fact, a scalable cloud solution can save money over the on-premise alternative because you only pay for what you need at any given moment. If it’s a low traffic day and server requests are minimal, you’re not paying the electrical and hardware costs
Datacomm Cloud Business
PT. Datacomm Diangraha business division focusing on Cloud
opportunity in Indonesia. Our philosophy are Enterprise, Secure
Sentriciti – Security as a Service (SecaaS)
Cloudciti – Cloud Services (XaaS)
Datacomm Datacenter Federation
Datacomm Azure Stack
We are backed up by +28 years experiences and +500 people.
We have strong financial commitment, invested in it owns local
Data Center. We also certified by international standard: ISO
9001, ISO 27001 and ISO 20000.
Service Quality Standard
International Facility Certification
Infrastructure on cloud
o Compute: Virtual machines, Web sites & mobile services
o Data services: Storage, SQL databases
o Network services: Virtual private networks, load balancer
Local Support and Data center location
24x7 Help Desk Support Center
24x7 Network Support Center
24x7 Security Desk Support Center
Rated 3 Constructed
DCOS Maturity 4
Service Quality Standard
Datacomm is REGISTERED as
Cloud Service Provider operator
Monolithic vs. Microservices
Source : https://www.sam-solutions.com/blog/microservices-vs-monolithic-real-business-examples/
Database Database Database Database
In Memory Computing
7Source : https://www.techopedia.com/definition/28539/in-memory-computing
• The ability to cache countless amounts of data constantly.
This ensures extremely fast response times for searches.
• The ability to store session data, allowing for the
customization of live sessions and ensuring optimum
• The ability to process events for improved complex event
Some of the advantages of in-memory computing include :
Serving Customers Around the Clock Worldwide
Datacenter Disaster Recovery Connectivity Redundancy
Earning and Maintaining TRUST from Customers
DDoS Protection Services Monitoring Service Pentest
Capacity to handle customers request with auto scale
The concept of scalability is desirable in technology as well as business settings. The base concept is
consistent – the ability for a business or technology to accept increased volume without impacting
the contribution margin
Source : https://linksource.com/2018/03/08/how-on-demand-scalability-can-scale-business/
Scale up Scale out