Hytera Solution POC (Push to talk Over Cellular) Solution

Hytera is a global leader in two-way radio communications, developing and manufacturing innovative solutions to address a wide variety of communication situations. Hytera provides high-quality, reliable, and feature-rich systems. You can find Hytera everywhere, from Shenzhen metro, Tanjung Priok Port, Balikpapan airport, rail links, conference centers, to various construction sites.

POC (Push-to-talk Over Cellular)

Push-to-talk (PTT) communication has proven to be efficient and reliable in the business world for decades. With the rapid development of cellular broadband networks, the demands of PTT users for data-intensive multimedia services, such as images and videos, cannot be met by the old narrowband radio systems. Utilizing an established broadband network, Hytera’s Push-ToTalk Over Cellular (PoC) solution provides PTT voice and large volumes of data with nationwide coverage without additional investment in wireless infrastructure.

Hytera HyTalk Solution

The Hytera HyTalk solution consists of the Hytera HyTalk service platform, user equipment (PoC radio, smartphone, etc.), Service Operation Platform (SOP), Delivery Platform (SmartOne Dispatch), Mobile Device Management Platform (Smart MDM), Multimedia Recording and Playback System (MRPS). The Hytera HyTalk solution can be used on public 3G, 4G, WLAN networks, as well as private LTE networks.

For more detailed product information contact us, ACS Group, an official partner of Hytera.

How Alibaba Cloud Increases Productivity For Organizations/Companies

These days, cloud computing is a prevalent option for data storage. This technology is cost-effective, increase productivity, speed, efficiency, performance, and security. So it’s no wonder that many companies use cloud to store their data.

Cloud computing is the provider of computing services—servers, storage, databases, networking, software, analytics, and artificial intelligence—via the Internet (“cloud”) to offer faster innovation, flexible resources, and economies of scale.

ACS Group together with Blue Power Technology, held the 22nd Virtual Event on August 24, 2022. This event, with “I Am Secure” theme, introduced Alibaba Cloud to various field professionals online via Zoom and also broadcasted live on Youtube. With Andre Onggara, Senior Channel Business Development Alibaba Cloud, and Ryandika Putra, Team Leader of Technical Sales Specialist Blue Power Technology as the speakers, this event discussed Cloud Data Security and Securing Infra to App at Alibaba Cloud in detail.

Alibaba Cloud, founded in 2009, is a global leader in cloud computing and artificial intelligence. providing services to thousands of enterprises, developers, and governments organizations in more than 200 countries and regions. Committed to the success of its customers, Alibaba Cloud provides reliable and secure cloud computing with superior data processing capabilities as part of its online solutions.

Various customers choose Alibaba Cloud as their trusted cloud service provider in Asia, utilizing 23 regions and 75 zones in Asia served by Alibaba Cloud. According to Gartner, Alibaba Cloud currently ranks 1st among cloud service providers in Asia Pacific and China and ranks 3rd as the best cloud service provider in the world.

You can re-watch the “I Am Secure” Virtual Event with Blue Power Technology and Extreme Network on ACS Group Youtube or by clicking on this link.

Barcode Highlighting Tips & Info

In a label consisting of several types of barcode symbology, such as 1D and 2D, some barcode types require visual identification of the barcode to be scanned or Barcode Highlight You can see the detail in the image below.

PDF417 barcodes are marked in orange, Code128 barcodes that are less than 13 characters in blue, and other types of barcodes in green. Zebra DataWedge introduces a new option that is effective in data capturing with one of its superior features which can highlight certain barcodes in a single label. This feature, known as Barcode Highlighting, functions to scan multiple barcodes in one label containing several types of barcodes and send them to the application according to the specified criteria.

Benefits of using Barcode Highlighting:

– Provides onscreen feedback on the screen and tells the operator which barcode to capture

– Assist the operator in finding items by highlighting the barcode

 

For details about RFID in the Manufacturing Industry, please read the Key to Success in Implementing RFID in the Manufacturing Industry

 

How to set Barcode Highlighting:

To configure barcode highlighting, set the DataWedge profile as follows :

1. Enable Barcode Highlighting on the Barcode input plugin

2. Press the ellipsis to display additional parameters

3. Define Barcode Highlighting:

– Create different rules for each type or color of barcode you want to display

– Can consist of several rules or roles with different colors

5. Define the conditions for the rule:

– Maximum/minimum length of the barcode

– Data String contained in it

– Barcode symbology.

6. Rules are executed in order of priority from top to bottom

7. Define a reporting rule, if you don’t specify a reporting rule, the barcode will not be sent to the application.

8. The reporting rule and the highlighting rule have different conditions, meaning you can choose to report a barcode that is different from the one currently being highlighted. However, it is recommended that these rules remain the same.

9. Define a reporting action so the barcode is sent back to the application.

For further explanation regarding this auto-id solution, you can contact us at +62 21 4208221 ext 315 or visit our website at www.acsgroup.co.id.

ACS GROUP (PT. AUTOJAYA IDETECH & PT. SOLUSI PERIFERAL) as a professional company that was founded in 1992, has provided appropriate solutions for thousands of Enterprises throughout Indonesia both for AIDC solutions, IT Infrastructure, Enterprise Security Systems and Enterprise Business Solutions. Our company has 4 branches, namely in Cikarang, Semarang, Surabaya and Denpasar.

For more detailed information, please see the video on ACS Group’s youtube “Development & Benefits of RFID and Barcodes for Industry”.

Security Convergence between Information Technology (IT) and Operational Technology (OT) in Industry

In this digital industrial development era, manufacturing companies can use various connected devices to monitor and remotely control or change devices (machines/tools) such as conveyor belts, valves, fans, pumps, and others.

However, this also increases the potential consequential threats or disruptions to the sustainability of the factory supply chain.

Every device connected to TCP/IP gives irresponsible parties the opportunity to intrude and jeopardize production activities and factory KPIs. Understanding and cooperation between IT and OT elements are needed to mitigate this threat.

 

For details on OT Security Please Read on The Importance of Cybersecurity in the OT Sector

 

The main concern of this IT-OT convergence is visibility. Hundreds of PLC-DCS sensors should be able to be monitored not only via HMI/SCADA, but also can be securely monitored remotely. The database must be able to create Big Data for follow-up actions. For this reason, security solutions are needed to keep them running normally. These preventive solutions are required in order to identify & counteract these risks.

 

NGFW (New Generation Firewall)

The primary security measure for this convergence is a powerful Next Gen Firewall toolkit.

This device that also functions as a gateway will monitor network traffic, perform filtration, and allow only safe traffic.

NGFW will constantly update you when something interferes with network performance and the number of individuals accessing the network and give you a comprehensive assessment needed to select sufficient capacity devices.

No matter how sophisticated your security devices are in protecting lanes, internal threats also need to be anticipated. We can approach it from the end-user side that performs on-site maintenance by connecting the laptop to the HMI directly for configuration. In general, these machines still use the old Operating System which is known to be stable. This is a risky move if it is connected anywhere because there is no security update available for that version. This is where the Endpoint Detection & Response agent needs to be installed on the HMI.

 

EDR (Endpoint Detection & Response)

EDR functions as a protective barrier, where the maintenance staff can safely configure/maintain machines. For devices that are connected to the local wifi, the security measure on the access point device can be a barrier.

 

Sandboxing

Sandboxing is required because the development of malware and viruses, like Zero-Day attacks, are increasingly frequent and common. For optimal prevention, Sandboxing technology can be used for early testing in a self-contained environment, as a filter for files, attachments, URLs, and programs from incoming/outgoing traffic.

In implementing these various security solutions, especially in the Operational Technology aspect, good integration is needed in terms of the specific environment per factory and the technology used so your investment can be optimal.

You can contact us ACS Group, to discuss what solutions are suitable for your business organization.

One Platform for Data Services With Private Cloud

These days, information technologies (IT) operational activities are still saddled with various traditional data storage systems to accommodate both structured and unstructured data. Not only costly and challenging to manage, but it also limits critical business data insight and complicates or hinders the data integration process.

With Private Cloud, you can combine all data services on a single platform that supports computing resources in enterprise organizations. This way you can eliminate the need to design and manage distinct data storage solutions or SILOs.

A Private Cloud is a single, flexible, and scalable storage pool. Accordingly, the supply and management process can be simplified while increasing capacity utilization.

To get to know Private Cloud, please read on Memperkuat Bisnis Anda dengan Private Cloud

In addition to providing virtual disk storage at the hypervisor layer, Private Cloud also provides data services to handle the various application and workload needs, such as:

  • Display storage volumes as iSCSI (Internet Small Computer System Interface) disks to multiple VMs (Virtual Machines) and physical server devices. Workloads that require shared storage like Microsoft clustering and Oracle RAC are easy to deploy and manage.
  • Create file shares from NFS (Network File System) and SMB (Server Message Block) protocols as part of a Private Cloud cluster to support VDI (Virtual Desktop Infrastructure) profiles, user directories, and other file sharing need, and eliminate separate NAS (Network-Attached Storage) system needs.
  • Provide S3-compatible object storage that functions to store and archive unstructured data and to fulfill application needs with cloud-native capabilities.

*Some terminology or terms from the description above:

  1. Hypervisor or Virtual Machine Monitor VMM, also known as a virtualizer, is a type of emulator that can take the form of software, firmware, or computer hardware. Its function is to create and run virtual machines.
  2. ISCSI (Internet Small Computer System Interface) is a transport layer protocol that describes how data packets from the Small Computer System Interface (SCSI) are transported over a TCP/IP network.
  3. NFS or Network File System, is a data share on a network protocol for computers.
  4. SMB or Server Message Block, is a file sharing and other resources (such as printer devices) protocol over a local network.
  5. VDI (Virtual Desktop Infrastructure) is a computer technology to host a desktop environment on a central server.
  6. S3-compatible object storage is a storage media that uses Application Programming Interface or S3 API (Simple Storage Service) as its “language.” Apps with S3 API must be able to be applied in plug and play manner with S3 compatible storage.
  7. NAS (Network-Attached Storage) is a data storage device connected to a network and provides file access services to computer systems. NAS uses file access protocols such as NFS or CIFS.
  8. Cloud native is an application and service descriptor specifically created for cloud computing. It is also a method to create applications and services.

With a Private Cloud, data management will be more integrated so that it can activate and run new applications and services for business needs and reduce complexity and costs.

Nutanix offers an infrastructure that is easy to operate and scale. This infrastructure is also combined with consolidated data services, intelligent operation, automation, self-service, and is equipped with data protection. Network security and its.

For more detailed information, please see the video on ACS Group’s youtube ACS Group’s youtube “Improve Business with a Flexible and Dynamic Cloud

The importance of cyber security in OT sector

The development of digitalization on the OT aspect often doesn’t go as smoothly as on the IT side. Unlike IT, which priority is to update system and security to the latest version, system updates in the OT area can put critical activities at risk at the plant. Nevertheless, adopting various devices as a way to digitalization is inevitable to keep up with the trend and staying relevant.

From this, risks associated with OT arise. Listed below are some examples of conditions that are common on the production floor:

  • Variations of DCS, PLC, and HMI (Human Machine Interface) from various brands.
  • Serial Type PLC configured via PC/laptop plug-in directly into the HMI.
  • The displays of the machines have adapted to digital, but the OS is rarely / never updated to prevent hampered operations in the downtime. OS in the OT area usually still uses an outdated system like WinCE/Win7.
  • Automatic Updates disabled.
  • The OT (factory) will only operate with systems that have been proven stable. Usually, these systems are not the latest and have outdated in-house security standards that require a lot of retrofits (added features).
  • OT control is decentralized and unique per location. Therefore, remote access is impossible when an issue arises.
  • Staff / System Integrators who perform maintenance on OT devices generally do direct plug-ins on-site.

Various international cases emphasize the importance of securing OT along with developing working methods and data exchange. Production shutdown that starts from Ransomware will threaten KPI significantly.

In following the INDI 4.0 standardization and the development of data protection regulations and cloud computing (public) trends, we need to consider that OT area security ideally can provide:

  • Visibility
  • Distinct segmentation: what is accessible to certain staff.
  • Remote secure access for efficiency.

The solution that can be implemented is placing the NGFW appliance at the right point in the OT environment. The type of NGFW must be suitable so as not to hamper the ongoing operational and routine maintenance processes. Protection of production lines from various intrusions can be done in several approaches, either from regular maintenance executioners or from machines that need to be secured.

References:
1) https://www.fortinet.com/content/dam/fortinet/assets/white-papers/wp-secure-access-ot.pdf
2) https://www.fortinet.com/solutions/industries/scada-industrial-control-systems/what-is-ot-security

Empowering Business with Rugged Devices & Mobile Solutions from Samsung

Together with Helios Informatika Nusantara and Samsung, ACS Group held a Virtual Event with “Tough Behavior: Empowering Your Business with Rugged Device & Mobile Solution” as the theme. This virtual event took place on April 6th, 2022, and was held online via Zoom and live on Youtube. This virtual event was held to introduce Samsung’s latest innovations in the industrial world, the Samsung Galaxy Xcover 5 and Samsung Galaxy Tab Active3, featuring their advanced feature.

The Samsung Galaxy Xcover 5 has a compact design which makes it easy to grip and carry. Even so, a compact design does not equal being frail. The Galaxy Xcover 5 has an IP68 rating and meets MIL-STD 810H standards, so neither rain nor bumps and shocks will prevent you from getting your job done. With a bigger screen, Galaxy Xcover 5 offers a better viewing experience. Galaxy Xcover 5 also has heightened screen sensitivity so the screen will work fine even when we wear gloves. With Dual LED Flash, Galaxy Xcover 5 can also function as a light.

Samsung also launched the Galaxy Tab Active3 which is no less sophisticated than the Samsung Galaxy Xcover 5. With a rugged design, water and dust resistance, shock resistance from a height of 1.5m, and a replaceable battery, the Galaxy Tab Active3 is reliable in a harsh environment. This tab is also equipped with a no-battery mode which allows you to connect and supply continuous power to the device via a cable when the battery is removed. Equipped with Samsung DeX and NFC, this tablet is designed to increase productivity. Just like the Galaxy Xcover 5, its sensitive screen makes it easier to use when the user is wearing gloves. This tablet is also equipped with Touch sensitivity settings, an Active Button, and S Pen.

With their superior design and features, the Galaxy Xcover 5 and Galaxy Tab Active3 no doubt can increase the effectiveness and productivity of your business.

Discover the advanced features of these powerful devices in more detail in “Tough Behavior: Empowering Your Business with Rugged Device & Mobile Solution” with Helios Informatika Nusantara and Samsung on ACS Group Youtube channel or by clicking this link.

Real Time Location System Technology Solution Using Passive RFID

The increasing transfer speed of the main object (such as goods, assets, and people) makes the location data and transaction status ever-changing.

Therefore, we need a system to help synergize human involvement in getting identification information. To achieve this, we need a technology system as a solution. Technological developments are now able to answer these needs, namely with Real-Time Locating System (RTLS) using Passive RFID.

This solution from ACS Group helps users locate an item or asset without contact so it can be monitored automatically based on checkpoints.

With this technology, users can observe the assets/goods movement, especially their location and status Real-Time with a relatively low investment.

In the application of RTLS with RFID technology, there are several supporting components, namely:

1. Tag RFID

It is a Tag with no power source, uses an antenna, and integrated circuit (IC). The reader transmits a radio wave that powers the IC within the reader zone. This RFID tag is affixed to the checkpoints so its position can be tracked or managed.

2. RFID Reader

  • RFID Antenna placed in front of the forklift to read passive RFID from the goods’ pallet.
  • 8 Port Vehicle RFID Reader to read all passives on the pallet and provide information on forklift position.

3. RFID Antenna

Reads & transmits RFID Grid position signals.

4. Rugged Vehicle Computer

Rugged Vehicle Computer for receiving work orders within the tags reading range.

5. Network infrastructure (Wireless AP)

Useful for disseminating information from the main tag/object to the reader with RTLS Application System.

6. RTLS Application System

To manage, analyze, and export all data received from various tag positions.


In its implementation, some of the passive RFID tags will be installed on the warehouse ceiling with a grid configuration. Each passive RFID tag works as a checkpoint to locate assets/goods movement.

1. Registration

The first thing to do is register all Passive RFID Tags, whether the RFID for forklift tracking or RFID for pallets’ names. The tags are reusable and can be used as many times as needed.

2. Login Process

Forklifts with an RFID reader enter the warehouse and will pass through the door, which was set as a checkpoint while carrying assets/goods to start the operational process.

The forklift operator will start his work to load goods/assets according to the instructions listed on the PC monitor and then place them in the appropriate rack. All tag data sent by wireless AP will be automatically displayed.

3. Putaway Process

In this process, the forklift operator will move the asset/goods according to the instructions listed on the monitor. The goods that have been equipped with the RFID tag will be moved from the shelf at Checkpoint 1 to the shelf at Checkpoint 4.

4. Dashboard Mapping

The warehouse manager can monitor the RFID Tag location on the goods by referring to the passive RFID Tag grid which will both send signals through the antenna to the RLTS Application in real-time.

While carrying Assets/Goods, the forklift’s exact movement can be monitored. The time it moves away from Check-point 1 and approaches Check-point 4 will be recorded so the exact position of the goods can be known.

This is an example of a Real-Time Location System (RTLS) operational activity with the Passive RFID Tag – all activities can be monitored at any time.

The following are operational benefits:

  1. (Productivity) Improved operational activities with more efficient monitoring and managing assets/goods process.
  2. (Traceability) Able to monitor inventories, forklifts, equipment, workers, and asset movement in real-time.
  3. (Excess Stock) Able to find out the number of Assets/goods whether it is ready, bereft, sufficient, less, or more.
  4. (Lifecycle Monitoring) The inventory (RFID, Reader, Antenna), forklift, and equipment working performance can be reviewed so maintenance time can be known.
  5. Competitive advantage: More efficient operations, reduced costs, better decision making, and new dynamic offers to ensure a competitive advantage for most RTLS systems’ initial adopters.

RTLS solutions are perfect for Cross-Industry, Supply Chain, Production Industry, Retail, or E-commerce. If you are interested in implementing this solution you can contact us at ACS Group, a pioneer of Automatic Identification and a leader in barcode systems since 1991.

Power Your Business with a Private Cloud Solution

The presence of the Cloud has a positive impact on companies, especially in terms of the scope and value of the benefits. Currently, many companies are completely dependent on this information technology in meeting and achieving business goals. These companies implement the advantages of Cloud technology in terms of availability, scalability, resources, network security, virtual storage for business operations.

Private Cloud is a “dedicated” or “internal” Cloud computing. Private Cloud solely serves all the needs of one company only. Private Cloud network data and resources are stored in a dedicated environment unaffected by other parties. Companies typically choose Private Clouds because of their network security, compliance, and scalability options. With a high volume of sensitive information, such as customer information, confidential internal documents containing, intellectual property, and business plans, natrually, companies need extra information system network defense and security.

Private Cloud is has been applied in many government, health, education, telecommunications organizations, and others. Private Cloud has many advantages that other Cloud computing alternatives don’t offer. Here are some of the benefits of Private Cloud technology:

1. Complete control

The main advantage of the Private Cloud is its complete control, complete independence, and does not depend on other parties’ aspects. Thus, the Private Cloud can be easier to access when needed. The management and change of the platform can also be done efficiently if needed. Things like downtime and bottle-necks in service delivery can be predicted and calculated. The use of resources per the company’s needs can be managed better. Compared to the Public Cloud, Public Cloud is more flexible in resources management.

2. Stability

Cloud offers flexibility to utilize various types of media in building a storage platform. With network security that is always ready with a comprehensive backup recovery and backup solution, Private Cloud is more stable. In the Private Cloud, everything is fully controlled by the scalable management of the company.

3. Customization & tailoring ability

Companies can configure a Private Cloud so it suits their business needs best. Private Clouds are also easy to adjust to fit the company’s development in terms of size, industry, overhead, goals, and other factors. The company can set the best requirements based on availability, security, and scalability needs.

4. Compliance

With complete control capabilities, the company has greater control over the infrastructure and the platform which complies with appropriate industry rules and regulations based on business objectives. Unlike the Private Cloud, data control in the Public Cloud will be more difficult and can be subject to external inspection or interception by outside parties.

5. Availability

Cloud Computing can scale resources as needed. The continuity of business operations is highly dependent on availability. In the Private Cloud, if there are resources that do not work, for example, there is a server device that is down, then the data will automatically be replicated to other resource locations. Therefore, the data will always be available at any time. When business operations are in peak periods, bandwidth and network resources can also be increased to support business needs.

6. The Obtained Value

When compared to a Public Cloud, the cost of implementing a Private Cloud will be noticeably more expensive. But the actual price of infrastructure will depend on many factors. While Public Clouds are a cost-effective option that can accommodate highly diverse or unpredictable enterprise needs, infrastructure costs for predictable Private Clouds workloads are much more cost-effective. Private Cloud investment as enterprise infrastructure will be valuable considering its unmatched integrity and network security value.

To meet growing business needs and rapid digital transformation, companies need a simple, secure, and scalable Private Cloud infrastructure for their VDI (Virtual Desktop Infrastructure), business applications, databases, analytics, Cloud Native needs, and so on.

Nutanix’s Private and Hybrid Cloud solutions that is built on hyper-converged infrastructure (HCI) software will bridge the infrastructure imbalance over the years. This solution is equipped with native protection, consolidated data services, and can operate automatically and intelligently, which is an ideal foundation for Private Cloud in the company.

Nutanix offers an infrastructure that is easy to operate and scale. This infrastructure is also combined with consolidated data services, intelligent operation, automation, self-service, and is equipped with data protection. Network security and its.

For more detailed information, please see the video on ACS Group’s youtube ACS Group’s youtube “Improve Business with a Flexible and Dynamic Cloud

Understanding Infinite Enterprise Cloud Computing with Extreme Network and Blue Power Technology

Cloud computing is a most sought-after technology that supports business activities. Cloud computing is an on-demand computer system resource, with data storage (cloud storage) and computing power feature, without direct active management by the user. The Cloud offers various services, such as data storage, servers, databases, networks, and software. Cloud computing is the primary choice for many companies because it has many advantages, such as cost savings, increased productivity, speed, efficiency, performance, and security in running business operations. Nowadays, Cloud computing is a crucial technology for IT professionals.

Together with Blue Power Technology and Extreme Network, ACS Group once again held a Virtual Event with the theme “Infinity and Beyond”. The Virtual Event, which took place on 17th March 2022, was held online via Zoom and broadcasted live on Youtube. This event focused on information about Extreme Company Overview, Extreme Product Knowledge, and  ExtremeCloud demonstrations/walkthroughs. With this event, ACS Group aims to informatively educate and introduce the Cloud solutions offered by Extreme Network to a nationwide audience, IT professionals and developers, and consumers and businesses.

Extreme Network itself has been number one in the Gartner Magic Quadrant four times in enterprise wiring and WLAN infrastructure. Extreme Network has also been recognized by Omdia, an independent analyst and consulting firm in global coverage of Telecommunications, Media, and Technology, as the fastest-growing Cloud network vendor. Focusing on three distinct pillars—simple, flexible, and secure—Extreme is the leading Cloud provider that many companies prefer. With end-to-end automation, Extreme offers simple network configurations that minimize human intervention. Smart management features equipped with AI (Artificial Intelligence) and anomaly alarms are also available to make it easier for users to monitor the network so precaution steps can be prepared before problems occur. Not only Cloud-based solutions but Extreme Network also provides on-premise solutions.

You can re-watch the Virtual Event “Infinity and Beyond” with Blue Power Technology and Extreme Network on ACS Group Youtube or by clicking this link.