Welcome to

Garuda Residence

GARUDA RESIDENCE accommodation is perfectly located in the heart of town, Our accommodation is only 2 minute to PT Chevron, town center, cafes, restaurants, shops, hospitals, banks and other great attractions

Our accommodation boasts 40 guest rooms all with unsuits bath rooms, a host of special features including free WIFI, warm hospitality, TV Cable, air conditioning, & attractive rates and security, Monthly rate included Electricity, Water, TV Cable, Wifi and 24/7 Security Services Garuda Residence accommodation is the best place to stay while visiting Duri, Riau, Indonesia

 

Garuda Construction Team is a professional team that can handle your building project from start to finish We will handle your project and transform your blueprints to reality with incredible commitment and timely completion

 

Start since 2011 for Construction as multitalented general contractor committed to proving efficiency and reality with every job. Project completed include commercial and residential construction, historical renovations, Themed restaurant and industrial development. Your Project will develop on time on budget, and well-organized project Management

 

 

We also provide work for Piping such as,

  1. Pipe line

  2. Pipe support

  3. Piping Work

 

We have Welder Class-1 GTAW & SMAW (Combination Welder), Welder GTAW/SMAW, and also GTAW Welder both of them already certify from Authorize Dept in Government of Indonesia

 

 

 

 

Instead of Piping and Construction, we also work for Pilling, we have 3 Tons and 5 Tons Diesel Hammers complete with operators

 

 

 

 

All of our projects are now functioning and running well without any complaints from clients

We Look forward to working with you



 
 

 

What does it mean Information and Technology ???

The IT department ensures that the organization’s systems, networks, data and applications all connect and function properly. The IT team handles three major areas:

  • Deploys and maintains business applications, services and infrastructure (servers, networks, storage);

  • Monitors, optimizes and troubleshoots the performance of applications, services and infrastructure; and

  • Oversees the security and governance of applications, services and infrastructure.

 

Chase the future with step of Information and Techology

 

The process how Information will connect and working in the future with Techonoly

Most IT Staff have a different Responsibilities within the team that break into several key area Including

 

Help desk staff specialize in answering questions, gathering information and directing troubleshooting efforts for hardware and software. IT support often includes IT asset and change management, helping admins with procurement, handling backup and recovery of data and applications, monitoring and analyzing logs and other performance monitoring tools and following established support workflows and processes.

 

Administration. Administrators handle the day-to-day deployment, operation and monitoring of an IT environment, including systems, networks and applications. Admins often perform a range of other duties such as software upgrades, user training, software license management, procurement, security, data management and observing adherence to business process and compliance requirements.

 

Applications.

Businesses rely on software to perform work. Some applications are procured and deployed from third parties, such as email server applications. But many organizations retain a staff of skilled developers that create the applications and interfaces example APIs needed to deliver critical business capabilities and services. Applications might be coded in a wide array of popular languages and integrated with other applications to create smooth and seamless interactions between different applications. Developers might also be tasked with creating interactive business websites and building mobile applications. The trend toward agile or continuous development paradigms require developers to be increasingly involved with IT operations, such as deploying and monitoring applications.

 

Compliance.

Businesses are obligated to observe varied government and industry driven regulatory requirements. IT staff play a major role in securing and monitoring access to business data and applications to ensure that such resources are used according to established business governance policy that meets regulatory requirements. Such staff are deeply involved with security tasks and routinely interact with legal and business teams to prevent, detect, investigate and report possible breaches.

 

 

Information technology

 

So how is IT actually involved in day-to-day business? Consider five common examples of IT and teams at work:

 

  1. Server upgrade. One or more data center servers near the end of their operational and maintenance lifecycle. IT staff will select and procure replacement servers, configure and deploy the new servers, backup applications and data on existing servers, transfer that data and applications to the new servers, validate that the new servers are working properly and then repurpose or decommission and dispose of the old servers.

  2. Security monitoring. Businesses routinely employ tools to monitor and log activity in applications, networks and system IT staff receive alerts of potential threats or noncompliant behavior such as a user attempting to access a restricted file — check logs and other reporting tools to investigate and determine the root cause of the alert and take prompt action to address and remediate the threat, often driving changes and improvements to security posture that can prevent similar events in the future.

  3. New software. The business determines a need for a new mobile application that can allow customers to log in and access account information or conduct other transactions from smartphones and tablets. Developers work to create and refine a suitable application according to a planned roadmap. Operations staff posts each iteration of the new mobile application for download and deploy the back-end components of the app to the organization’s infrastructure.

  4. Business improvement. A business requires more availability from a critical application to help with revenue or business continuance strategies. The IT staff might be called upon to architect a high availability cluster to provide greater performance and resilience for the application to ensure that the application can continue to function in the face of single outages. This can be paired with enhancements to data storage protection and recovery.

  5. User support. Developers are building a major upgrade for a vital business application. Developers and admins will collaborate to create new documentation for the upgrade. IT staff might deploy the upgrade for limited beta testing allowing a select group of users to try the new version while also developing and delivering comprehensive training that prepares all users for the new version’s eventual release.

Software vs. hardware

IT includes several layers of physical equipment (hardware), virtualization, management systems, automation tools, operating systems, other system software and applications used to perform essential functions. User devices, peripherals and software can be included in the IT domain. IT can also refer to the architectures, methodologies and regulations governing the use and storage of data.

 

Software

There are two categories of software: system software and applications. System software encompasses the computer programs that manage the basic computing functions. They include the following:

 

 

 

1.    Oses

2.    BIOSes;

3.    boot programs;

4.    assemblers; and

5.    device drivers.

 

Business Applications Include 

Databases, such as SQL Server;

  • Transactional systems, such as real-time order entry;

  • Email servers, like Microsoft Exchange

  • Web servers, like Apache and Microsoft’s Internet Information Services (IIS);

  • Customer relationship management, such as Oracle NetSuite and HubSpot; and

  • Enterprise resource planning systems, such as SAP S/4HANA.

These applications make use of programmed instructions to manipulate, consolidate, disperse and otherwise work with data for a business purpose.

Mobile applications that run on smartphones, tablets and other portable devices typically connect with cloud or data center applications over the internet. These applications have expanded the scope of computing and created a new category of software and telecommunications that requires special expertise to maintain.

Hardware

There are many different types of computer hardware. Computer servers run business applications. Servers interact with client devices in the client-server model. They also communicate with other servers across computer networks, which typically link to the internet.

Storage is another type of hardware. It’s any technology that holds information as data. Storage may be local on a specific server or shared among many servers, and it may be installed on premises or accessed via a cloud service. Information that is stored can take many forms, including file, multimedia, telephony, and web and sensors data. Storage hardware includes volatile random-access memory (RAM) as well as non-volatile tape, hard disk drives and solid-state drives. Telecom equipment, comprising network interface cards (NICs), cabling, wireless communications and switching devices, connect the hardware elements together and to external networks

 

Our Responsibilities

We will provide compensation for the loss of the insured object in the form of cash (Cash), demand deposits, securities (Bank Notes), postal money orders, stamp duty, Checks, Money Orders belonging to the insured due to being robbed during the transportation process.

Integrated general service and cash management solutions make the operation safer, efficient and low cost!

  1. Standardized business workflow

  2. Besides employee and vehicle, manage all goods

  3. Monitoring the whole process of order execution to avoid risks

  4. Scheduled order execution plan and route mapping intelligently

  5. Intelligent operation efficiency analysis and report generation

  6. ATM Cash Replacement

In its daily operations, all Garuda crew are equipped with equipment that inline accordance with international standards also with special vehicles for Cash Transferred.

 

Security Training

There are 3 levels of security guard training, namely:

 

Gada Pratama (Basic)

Gada Madya (Supervisor)

Gada Utama (Manager Level and Up)

Basic (Gada Pratama)

This is a mandatory basic training for prospective security guards. The duration of the training is four weeks with a total minimum of 232 lesson hours. Training materials such as:  

  • Interpersonal Skills

  • Professional ethics

  • Main Duties, Functions and Roles of Security Guards, Limited Police Capability

  • Self-defense

  • Introduction of Explosives; Valuables and Shooting Practice

  • Knowledge of Narcotics, Psychotropics and Other Addictive Substances

  • Use of Police Sticks and Handcuffs; Knowledge Line Marching and Respect.

 

 

Supervisor (Gada Madya),

This is an advanced training for members of security guards who already have Gada Pratama qualifications. The duration of the training is two weeks with a total minum of 160 lessons.

The purpose of the Gada Madya security training is to produce security guards who have personality mental attitudes, physical abilities, and basic managerial skills with supervisor qualifications.

Security Manager and Up (Gada Utama)

is a training that can be attended by anyone at the manager level, namely the chief security officer or security manager with a total minum 100 hours of lessons. In addition to state police educational institutions such as the State Police School, only companies that already have an operational permit from the Head of the National Police as a business entity for security education and training services may conduct basic security training and advanced training. Metropolitan Police, Metropolitan Police, Resort Police, Sector Police only conduct capacity maintenance/refreshment training for members of Gada Pratama and Gada Madya security guards who have qualifications.

 

Vision and Mission

 

Vision  Garuda

Become the leading integrated  Security service providers based on security principles

Mission Garuda

Our company is dedicated to provide integrated Security services to protect client assets and personnel by ensuring that our employees have the training standards and equipment to prepare them in facing all security challenge.

Ensure each employee has the highest standards of training and equipment to prepare them in facing all kinds of challenges.

Object

 

To introduce our business entity PT. Garuda Jaya Sakti as a biggest local Integrated Riau security services

To seek and formulate a  mutually beneficial and potential cooperative relationships with our clients.

Ensure each employee has the highest standards of training and equipment to prepare them in facing all kinds of challenges.

BASIC PRINCIPLES

 

Safe, Reliable and continuence is our Basic Principles of Sustainable Services

 

Scroll to top
Translate »