tag:blogger.com,1999:blog-17874903233937878042024-03-08T01:50:12.418-05:00What's Up with IT?ACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.comBlogger26125tag:blogger.com,1999:blog-1787490323393787804.post-59853215942999237392011-02-17T20:51:00.000-05:002011-02-17T20:51:19.581-05:00How a Secure Network Impacts Your Bottom LineIn today’s global economy, one major measuring stick of a business’ success is how efficiently it can expand, or in other words, how effectively a company can reach out to new clients all over the world. Seeing that businesses are relying more and more heavily on digital media and computer technology, perhaps the major driving force behind expansion today is having a strong and secure network. Your company’s network is vital to your business’ bottom line in a number of ways. Not only does having a secure network allow you to reach out to new business partners through innovative communication tools such as video conferencing, but it enables you to protect the digital data you have already worked so hard to accumulate. Additionally, a secure network entails consolidating your company’s overall resources. Innovation, protection, and consolidation: each a precursor to increased revenue, all enabled by a secure computer network. <br />
Is your company looking to increase its revenue by expanding to other clients? If so, <a href="http://www.acs.com">ACS</a> is the company you need to call to help you establish a secure network. <a href="http://www.acs.com">ACS</a>’s skilled technicians work around the clock to meet any and all of your network needs. The tremendous praise we have received from our partners is an ongoing testament to our proficiency and professionalism in assisting the growth of businesses by setting up and maintaining their networks. Michael Canina, the vice president of our five year partner <a href="http://www.brocktonrox.com">Brockton Rox Professional Baseball Team</a>, went so far as to say that partnering with <a href="http://www.acs.com">ACS</a> is “…one of the smartest business decisions I’ve made, and I can’t imagine another way of moving forward with our business. They help us make money.” We are eager to make our partnership with your company the smartest business decision you have ever made. Let <a href="http://www.acs.com">ACS</a> help your business make money by helping you set up and maintain a network that enables you to expand your company today.ACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-63383094105667786882010-10-26T16:18:00.000-04:002010-10-26T16:18:24.141-04:00Putting into Perspective the Importance of a Secure Network....By Way of the NFL.When the New England Patriots take the field as a team during the season, the only concern of the players is to work together in order to get a win against that day’s opponent. For the New England Patriots as an organization, however, so much more happens behind the scenes leading up to each game than what fans see on the field. From the ownership to jersey sales to television coverage to vending to event security staff, the Patriots are a network that must operate efficiently on every level in order for each game day to occur without a hitch. Can you imagine how disastrous it would be for the entire Patriots’ organization if any aspect of this network just shut down completely? Just like the Patriots as an organization is at its best when their network of staff is working to the best of its ability, so is every company whose business relies on a computer based network. In our increasingly digital world, having a reliable network is more crucial than ever to businesses everywhere. At ACS, we are committed to ensuring that your business’ network is always functioning to full capacity. Our expert staff of technicians works around the clock to help your company meet its networking and data protection needs. Let <a href="http://www.acs.com">ACS</a> enable you to relax while you watch your favorite NFL team on Sundays, knowing that your network will be operating at its best when you go back to work Monday morning.ACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-90774156528400871242010-07-14T09:56:00.002-04:002010-07-14T09:56:49.713-04:00Is Your Head in the Clouds?Wikipedia defines cloud computing as: Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand. Basically, “Cloud” is a metaphor for the internet.<br />
It allows you to store, access and share all kinds of information from anywhere at any time. Cloud Computing is broken down into 3 categories. <br />
1. Software as a Service(SAAS) – customers save on cost, space, power consumption and facility.<br />
You pay a flat fee for the functionality. You are not required to purchase hardware, software or management of those applications.<br />
2. Infrastructure as a Service – this is total outsourcing. Everything is handled by the provider.<br />
3. Platform as a Service <br />
Small businesses are look at the harsh truth: there are technology applications that can improve their business but the cost of the hardware, software and maintenance stands in their way. The cloud gives small companies the flexibility to grow. These businesses can get top of the line technologies as a subscription service just by shifting the IT infrastructure and management to a Cloud Provider.<br />
These are some of the benefits:<br />
- Flexibility<br />
- Improved Performance<br />
- Sold on Demand<br />
- Use as much or a little as you need<br />
- Service is managed by the Provider<br />
- Reduced Hardware equipment<br />
- Lower Maintenance<br />
- Instant Software updates<br />
Technology is starting to see some big changes when it comes to how companies access information, share content and communicate. Google, Amazon and Microsoft are the leaders in Cloud Providers.<br />
Cloud Providers offer compelling options for saving money, while staying ahead of the innovation curve.<br />
So come on, get your head in the “clouds”.ACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-70986428242423679342010-02-12T07:51:00.001-05:002010-02-12T07:52:35.322-05:00Some quick facts of Motorola DroidA Motorola product, ‘The Motorola Droid’, is a smart phone enabled with Internet and Multimedia powered with Google’s Android Operating System. The Droid phone is the result of a three-way partnership. Motorola, the well respected brand, is responsible for the manufacture of hardware. The software is handled by Google and the network is provided by Verizon Wireless. This Smartphone is a direct competition for the Apple iPhone released in 2007. Television commercials and advertisements claim that there are several features available on Motorola that are not available on the iPhone. <br />
<br />
<br />
The phone runs Android version 2.0.1 and has the following features:<br />
<br />
• 5 mega-pixel low light capable digital camera.<br />
<br />
• Wi-Fi networking<br />
<br />
• Interchangeable battery<br />
<br />
• 3.7-inch 854 X 480 touch screen<br />
<br />
• Standard 35 mm headphone jack<br />
<br />
• Google Maps navigation<br />
<br />
• Micro SDHC support with 16 GB Card<br />
<br />
• Sliding QWERTY keyboard<br />
<br />
• Texas Instruments OMAP 3430 processor<br />
<br />
• Hearing aid compatibility (HAC) rating of M3/T3<br />
<br />
Google’s Android Operating System has several features that make the Motorola Droid Smartphone better than Apple iPhone. Following are some of the features of Android 2.0:<br />
<br />
• Quick Contact: Android 2.0 includes a feature called “Quick Contact” which simplifies communication. You can get detailed information about a contact. The menu bar with easy icons will provide e-mail, physical address, instant messaging and all other details that you have saved for that person. <br />
<br />
• Multiple Account Support: With this feature you can create a combined inbox and all the messages from all your accounts will be displayed in a single page. It will also let you to keep your contacts together.<br />
<br />
• Improved Camera: Android 2.0’s camera controls digital zoom and support flash. It has many options for scene mode, macro focus, color effects, white balance, etc.<br />
<br />
• Better Bluetooth: The Bluetooth 2.1 is fully supported and developers will be able to integrate Bluetooth functionality in a more improved way. <br />
<br />
• Better Browser: The browser supports HTML5 standards, including the usage of the geo location API and video tag. A new address bar supports for instant tap-driven searching and navigation, and double-tap zoom is supported throughout the browsing experience.<br />
<br />
• Other: Android 2.0 provides graphics architecture with better performance and improved hardware acceleration. It also brings SMS/MMS search and a handful of calendar improvements into the Operating System.<br />
<br />
To summarize all the features of Motorola Droid and Android 2.0, let us point out some of the pros and cons of this Smartphone.<br />
<br />
Pros:<br />
<br />
• Attractive touch-screen display<br />
<br />
• Improved web browsing<br />
<br />
• Google maps navigation<br />
<br />
• Multiple account support<br />
<br />
Cons:<br />
<br />
• All camera images are not clear<br />
<br />
• Flat keyboard makes it uncomfortable to type on<br />
<br />
Both Apple iPhone and Motorola Droid has gained remarkable market popularity. They have managed to make an impact on the industry. However, with the increase in the number of complaints by AT&T users regarding poor network and coverage, Verizon has gained market share and can be a major selling point. Customers find Verizon more reliable and hence are switching from AT&T. Now this is a positive sign for the developers of the Smartphone Motorola Droid. <br />
<br />
Let us discuss some major features and how they differ in both mobile phones:<br />
<br />
Apple iPhone Vs Motorola Droid<br />
<br />
• Hardware: Motorola Droid runs on the TI OMAP 3430 processor, one of the top processors in the market, which is also used in the Palm Pre. In addition to its application-switching capabilities, the TI OMAP 3430 is also a very fast processor. In fact, Droid is regarded as “the fastest Android device till date”.<br />
<br />
iPhone 3GS uses Samsung S5PC100 processor which also runs at 600MHz and includes a CPU, a graphics processing and a memory controller all on one chip. Even the iPhone’s processor is capable of application switching functionality, but Apple hasn’t utilized the feature as yet.<br />
<br />
• Operating Systems (OS): iPhone’s OS is highly reliable and easy to use. Whereas Android OS is being tested and used by different devices and manufactures but its utility is still unknown. We will have to wait and watch whether Android OS matches up with iPhone’s OS.<br />
<br />
• Keyboard and Display Screen: iPhone’s biggest drawback is that it lacks a QWERTY keyboard and Motorola Droid has taken full advantage of this. It also provides an attractive touch-screen which can display videos at 854 X 480 pixels, higher than the 640 X 450 pixel display of Apple iPhone.<br />
<br />
• Camera: iPhone has a 3 mega-pixel camera with video recording and editing features. On the other hand, Motorola Droid has a 5 mega-pixel camera and has video recording capabilities but with no editing features as yet.<br />
<br />
• Talk time and Battery Life: iPhone 3GS is powered by lithium-ion battery. On a 2G network, it can provide a talk time of upto 8 hours, while on a 3G network, it provides 5 hours of talk time.<br />
<br />
On the other hand, Motorola Droid is also powered by a built-in rechargeable lithium-ion battery, but Verizon claims that on its 2G network, it can provide talk time of upto 12 hours and on 3G a network, talk time of upto 6.4 hours.<br />
<br />
Sources of information:<br />
<br />
<a href="http://en.wikipedia.org/wiki/Motorola_Droid">http://en.wikipedia.org/wiki/Motorola_Droid</a><br />
<br />
<a href="http://www.pcworld.com/reviews/product/324707/review/droid.html">http://www.pcworld.com/reviews/product/324707/review/droid.html</a><br />
<br />
<a href="http://www.billshrink.com/blog/total-cost-of-ownership-motorola-droid-versus-iphone-3gs-versus-palm-pre/">http://www.billshrink.com/blog/total-cost-of-ownership-motorola-droid-versus-iphone-3gs-versus-palm-pre/</a><br />
<br />
<a href="http://www.androidcentral.com/total-cost-ownership-motorola-droid-verizon">http://www.androidcentral.com/total-cost-ownership-motorola-droid-verizon</a><br />
<br />
<br />
- Brian Kingsley, Director of Technical Services, ACS Services, BostonBrian Kingsleyhttp://www.blogger.com/profile/02442405968880858993noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-37033908598259799032010-02-10T01:24:00.000-05:002010-02-10T01:24:14.058-05:00Microsoft’s Windows AzureWindows Azure is a product of Microsoft and it provides various internet services that can be useful for both on-premises and off-premises environment. It is a cloud services operating system that serves as the development, service hosting and service management environment for the Windows Azure platform. Its production will start from January 1, 2010. <br />
<br />
<br />
Windows Azure Platform provides a simple and flexible environment for developers who want to create a cloud application. It can be easily implemented in your current environment and also supports multiple languages. Windows Azure supports the following: Microsoft Visual Studio, SOAP, REST, XML, and PHP. The following are the five services that are provided by the platform:<br />
<br />
• Live Services<br />
<br />
• SQL Services<br />
<br />
• NET Services<br />
<br />
• Share Point Services<br />
<br />
• Dynamics CRM Services<br />
<br />
Functions/ Usage of Windows Azure are:<br />
<br />
• Large-volume storage<br />
<br />
• Batch Processing<br />
<br />
• Complicated/ large-volume computations<br />
<br />
• Build, modify and distribute applications with minimum on-premises resources<br />
<br />
• Run commodity processes in the cloud<br />
<br />
• Create, test, debug and distribute Web services swiftly and economically<br />
<br />
The benefits of Windows Azure Platform are:<br />
<br />
• Reduces cost of building and extending on-premises resources<br />
<br />
• Cuts down the cost, time and effort of IT management<br />
<br />
• Your ideas/ applications will be brought to market faster than expected<br />
<br />
• Flexible platform adapts to the changes in business environment and customer needs<br />
<br />
• Choice of selecting the best suitable on/ off premises deployment model<br />
<br />
• Save energy and time by focusing less on managing operational resources and constraints<br />
<br />
• Eliminate the need of hardware management<br />
<br />
• Existing tools can be used to build cloud applications<br />
<br />
• Consistent on-premises development<br />
<br />
• Use computing resources only when required<br />
<br />
The launch of Windows Azure is significant as it is the first step of Microsoft in ‘Cloud Computing’ followed by ‘Microsoft Online Services’.<br />
<br />
- Brian Kingsley, Director of Technical Services, ACS Services, BostonBrian Kingsleyhttp://www.blogger.com/profile/02442405968880858993noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-36646614612180269912010-02-05T01:52:00.000-05:002010-02-05T01:52:07.839-05:00Facebook-Google Deal Results in Privacy ConcernsFacebook is one of the largest and most popular social networking websites having more than 350 million active users worldwide. Mark Zuckerberg created Facebook in his Harvard dorm room. <br />
<br />
<br />
Recently Facebook and ‘king of search’ - Google signed a deal where Google can display real-time results of public content from Facebook fan pages. It means that over 1.6 million active Facebook fan pages can now appear in Google as a search result. For example – If a person is searching for ‘Best real estate deals in California’ and you have recently updated your Facebook page writing ’10 best real estate deals’, then there are chances that you might get a customer instantly. This deal opened the gateway to a more efficient SEO. Hence, it is a great time to create a Facebook fan page and help your business grow. <br />
<br />
‘Google-Facebook’ deal has led some privacy setting changes which have created innumerous controversies and criticism among Facebook users. After the revamped privacy settings users have less control over their personal data and their information including private photos is also publicly available. This has annoyed many Facebook users and they have poured their negative comments on various blog sites. They demanded the old privacy settings back and posted comments that they want to deactivate their Facebook accounts. <br />
<br />
To summarize all let us discuss the advantages and disadvantages of the changed privacy settings by Facebook.<br />
<br />
Advantages:<br />
<br />
• Updates in Facebook page can appear as a Google search result which will help a business gain customers.<br />
<br />
• Increased online presence.<br />
<br />
• Finding people and connecting with them will be much easier.<br />
<br />
Disadvantages:<br />
<br />
• Personal information such as gender, date of birth, photos, etc is publicly available.<br />
<br />
• Less control over private information.<br />
<br />
• Enemies can find you easily.<br />
<br />
• Increased opportunities for Cybercrime.<br />
<br />
This is not the first time that Facebook has been criticized for changes. They have been questioned many times for their confusing privacy settings. However, the best part of Facebook is no matter whatever changes they make or how many users get annoyed, it is among the top-visited social networking websites with ever increasing number of users. Social Networking Forecast for 2010 predicts that Facebook will still top the list and will have over 500 million users worldwide till the end of 2010. <br />
<br />
For more information on Privacy Policy and Settings you can visit the following websites:<br />
<br />
<a href="http://www.facebook.com/policy.php">http://www.facebook.com/policy.php</a><br />
<br />
<a href="http://www.allfacebook.com/2009/02/facebook-privacy/">http://www.allfacebook.com/2009/02/facebook-privacy/</a><br />
<br />
<br />
- Brian Kingsley, Director of Technical Services, ACS Services, BostonBrian Kingsleyhttp://www.blogger.com/profile/02442405968880858993noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-88888745246974865332010-02-03T01:11:00.000-05:002010-02-03T01:11:49.412-05:00Monitoring and its importanceAccording to Wikipedia, “Monitoring generally means to be aware of the state of a system”. It is an essential part of any organization, state, government and even family. Monitoring helps us to avoid circumstances that may cause loss to time, money, resource, relation, etc. For instance, let us take a very simple example of a business organization lacking efficient internal monitoring system. This may lead to many circumstances such as server break down, power failure, etc. It causes delay in work, wastage of time, loss of money, loss of resources, etc plus an additional expense that the organization will have to bare to solve the issue. <br />
<br />
<br />
Being more specific, we can say that monitoring should be done appropriately according to priority. As I work in an IT industry, I know the importance of servers, network, computers, etc in an organization. Hence, these must be the first things to be monitored effectively and efficiently to avoid break downs and hindrances in smooth work flow. <br />
<br />
A computer network must be constantly monitored to avoid slow or failing network. Continuous monitoring is done be a system that notifies the network administrator in case of outages. An intrusion detection system monitors networks from outside threats, whereas an internal network monitoring system monitors network to avoid problems such as overload, network crash, etc. Network monitoring is a critical IT function that can aid in saving a lot of cost of the company in network performance, infrastructure, employee productivity and many other things. Following are some of the strategic tasks a network monitoring system can do for the organization:<br />
<br />
• Confirm regulatory and policy compliance<br />
<br />
• Search redundant resources and emphasizes on possible cost savings<br />
<br />
• Solve efficiency-sapping mysteries like dropped mail sessions<br />
<br />
• Help determine employee productivity<br />
<br />
• Spot overloaded equipment before it can bring down a network<br />
<br />
• Identify weak wide-area-network links and other bottlenecks<br />
<br />
• Measure latency, or the delayed transfer of data<br />
<br />
• Find anomalous internal traffic that might be indicate a security threat<br />
<br />
Server monitoring is done to have a check on the speed of the server, failures and other such problems. By this the owner will be able to know when one or all of his computer devices are down due to server issues. Monitoring if done regularly, can avoid outages and help company from losses due to major crashes and break downs. <br />
<br />
Monitoring equipments help to take immediate actions and respond to the problems before it becomes an unavoidable issue and start harming the devices, processes, time and cost. Network monitoring systems can be software or firmware, simple or complex. There are open-source tools available which are innovation and very inexpensive. They can work with most of the tools, platforms and environments. If you feel that your network is too complex and it requires professional skills to monitor, you can always outsource monitoring. Outsourcing companies offer wide level of services and packages that can suit your budget. Their professional touch will make it all the more advantageous for the organization. <br />
<br />
ACS Services is one such company that provides IT services for easy management. Its list of services includes:<br />
<br />
• Managed IT Services<br />
<br />
• Network Support<br />
<br />
• Server Support<br />
<br />
• PC Support<br />
<br />
• Help Desk Services<br />
<br />
• Help Desk On Demand<br />
<br />
• Setup and Configuration<br />
<br />
• Relocation Support<br />
<br />
• Data Protection<br />
<br />
• Total Server Protection<br />
<br />
• Disaster Recovery<br />
<br />
It is a one-stop destination for all your IT needs. Now professional monitoring is not too far away. For more information, visit:<br />
<br />
<a href="http://www.acs.com/">http://www.acs.com/</a><br />
<br />
Other sources:<br />
<br />
<a href="http://en.wikipedia.org/wiki/Network_monitoring">http://en.wikipedia.org/wiki/Network_monitoring</a><br />
<br />
<a href="http://en.wikipedia.org/wiki/Internet_server_monitoring">http://en.wikipedia.org/wiki/Internet_server_monitoring</a><br />
<br />
<a href="http://www.cio.com/article/133700/Network_Monitoring_Definition_and_Solutions">http://www.cio.com/article/133700/Network_Monitoring_Definition_and_Solutions</a><br />
<br />
<br />
- Brian Kingsley, Director of Technical Services, BostonBrian Kingsleyhttp://www.blogger.com/profile/02442405968880858993noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-51814988983631133822010-01-20T08:25:00.000-05:002010-01-20T08:25:28.781-05:00ACS Services deployed VMware View for AGAR SupplyAGAR Supply Co. is one of the largest independent food distributors in New England and thirteenth largest in United States. Last year AGAR Supply faced a massive desktop refresh due to its majority hardware nearing end of life. As much of their work depends upon high availability of desktops, they were searching for some software which could increase user productivity with minimal capital expenditure. Hence they selected VMware View and gave the responsibility of designing, testing and deploying the software to ACS Services. To know more about the scope of services of ACS, you can visit <a href="http://www.acs.com/">http://www.acs.com/</a><br />
<br />
Let us discuss about some of the main features of VMware and how was it helpful for AGAR Supply:<br />
<br />
• <strong>Simplified desktop management:</strong> As all work of AGAR is dependent on desktop availability, this feature helped their users to access their desktops from anywhere at any point of time regardless of hardware. <br />
<br />
• <strong>Superior End User Experience:</strong> It has a wide range of deployment options which ACS Services worked with, and due to this it provided the end users a high-performance desktop experience even with high latency and low bandwidth connections.<br />
<br />
• <strong>Built-in Security:</strong> End users of AGAR were able to access their personalized desktop, complete with applications and data, from any location, at any time without jeopardizing the corporate security policies. VMware View helps to secure the datacenter.<br />
<br />
• <strong>Availability:</strong> VMware View delivers high availability, with no single point of failure. It helped them to protect their desktop environment cost-effectively.<br />
<br />
• <strong>Offline Desktop:</strong> Offline Desktop, an experimental feature in VMware View 4, increases productivity by allowing you to run managed virtual desktops locally or in the datacenter through the same administration framework. Simply download a virtual desktop onto your local client device. All existing security policies for that virtual desktop continue to be applied and enforced. Later, you can check the desktop back into the datacenter for resynchronization.<br />
<br />
VMware View helps AGAR save their time, money (Up to $135,000 annually), energy and resources. It also helped them with smoother business continuity. “The implementation went smoothly and over 250 users are now leveraging VMware View desktops.” says Steve Weber, Network Administrator at AGAR Supply. Weber and his team worked closely with ACS Services, Inc. to design, test, and deploy VMware View. “We are extremely happy with the results”, he signs off.<br />
<br />
ACS Services is an IT outsourcing firm based in Boston. ACS is a leading provider of Small Business IT Support in Boston and the surrounding areas. Since 1985, ACS has prided itself on being a leader in Small Business IT Support, IT Managed Services and Data Protection, and has gained a reputation of providing outstanding services to our clients. ACS partners with top hardware and software vendors to provide our clients with effective and time-tested solutions for all of their Managed Services needs. With over 100 years of combined technology experience including Small Business IT Support, IT Managed Services, Network Support, Server Support, Disaster Recovery, and IT Consultation, you can rest assured that your every technology need will be met with ACS. <br />
<br />
<strong>Sources of information:</strong><br />
<br />
<a href="http://www.vmware.com/a/customers/customer/567/AGAR+Supply">http://www.vmware.com/a/customers/customer/567/AGAR+Supply</a><br />
<br />
<a href="http://en.wikipedia.org/wiki/VMware_View">http://en.wikipedia.org/wiki/VMware_View</a><br />
<br />
<a href="http://www.agarsupply.com/">http://www.agarsupply.com/</a><br />
<br />
<a href="http://www.acs.com/">http://www.acs.com/</a><br />
<br />
<br />
<br />
- Brian Kingsley, Director of Technical Services, ACS Services, BostonBrian Kingsleyhttp://www.blogger.com/profile/02442405968880858993noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-52746507344250190372010-01-06T03:46:00.000-05:002010-01-06T03:46:55.451-05:00Blackberry Internet Service (BIS) Vs Blackberry Enterprise Server (BES)Blackberry is a wide range of mobile devices owned by a Canadian company, ‘Research In Motion’ (RIM). Blackberry’s main targets are people whose internet usage is high. These are generally businessmen, corporate executives, professionals, lawyers, etc. <br />
<br />
<br />
BIS stand for Blackberry Internet Service and it is offered free when you purchase a data plan of any blackberry phone. BIS facilitates a blackberry customer with internet browsing, e-mail checking, online chatting, etc. A BIS account is created for you where you can integrate up to 10 e-mail accounts. You can visit the following websites to create an account for yourself if you have purchased a new blackberry phone:<br />
<br />
AT&T: https://bis.na.blackberry.com/html?brand=mycingular<br />
<br />
Nextel: https://bis.na.blackberry.com/html?brand=nextel<br />
<br />
Sprint: https://bis.na.blackberry.com/html?brand=sprint<br />
<br />
T-Mobile: https://my.t-mobile.com/Login/Default.aspx<br />
<br />
Verizon: https://bis.na.blackberry.com/html?brand=vzw<br />
<br />
Optus (Australia): https://bis.na.blackberry.com/html?brand=vzw<br />
<br />
Telstra (Australia): https://bis.ap.blackberry.com/html/?brand=telstra<br />
<br />
Three (Australia): https://bis.ap.blackberry.com/html/?brand=three<br />
<br />
All you need to do is create an account and attach it to your webmail site and mailbox. This process does not take more than 15 minutes. It is basically a free version of blackberry software and has no centralized management. Each device needs to be managed individually. <br />
<br />
People generally get confused between BIS and BIS. Let me explain what BES is, to make things clear.<br />
<br />
BES or Blackberry Enterprise Server is a software package that operates as a centralized link between wireless mobile devices, enterprise applications and wireless networks. This is mainly designed to meet the needs of enterprise. With this software you can have access to all your e-mails, contacts, calendar, memo, schedules, tasks, etc. It is costlier than BIS but management will be much easier. Companies are advised to purchase this software if there are at least 10 blackberries in the office. This device helps to include wipe and lock command in case your phone gets stolen. Let me brief you up with some of the key feature of BES:<br />
<br />
• Forwards e-mail from your corporate ID<br />
<br />
• Compatible with Microsoft® exchange, IBM® Lotus® Domino®, Novell® GroupWise®<br />
<br />
• You can view your MS office attachment<br />
<br />
• Browse your websites as per corporate policy. <br />
<br />
• Provides access to personal information management tools such as calendar and address book. <br />
<br />
• It contains Integrated Security Triple Data Encryption Standard (DES) or Advanced Encryption Standard (AES) to protect confidentiality of data.<br />
<br />
• You can instantly synchronize data and organize and update your calendar.<br />
<br />
• Wireless automatic backup to BlackBerry 8830 device setting and preferences over the wireless network.<br />
<br />
Even though you have hosted BIS on your own BES server, RIM receive all communications as it is a centralized delivery. This has led to security issues as RIM is a Canadian company and US government feels that important and sensitive messages are going out of the country. However, RIM issues security patches for Blackberry phones for higher security. It asked corporate customers to install an interim patch for the BlackBerry Enterprise Server and an interim patch for the BlackBerry Professional Software. RIM also advised BlackBerry users to open PDF attachments only from "trusted sources”. <br />
<br />
- Brian Kingsley, Director of Technical Services, ACS Services, Boston<br />
<br />
http://www.acs.com/Brian Kingsleyhttp://www.blogger.com/profile/02442405968880858993noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-60399471963900086672010-01-05T13:30:00.000-05:002010-01-05T13:30:26.443-05:00How to cut costs in 2010In today’s Business Environment there are two key ways to increase profits. One way is to sell more of your product. This is always the primary goal and should be for good reason. The second way to increase profits is to trim expenses. This is a common practice for most Business Owner/C-Level employees, but there is an area that is overlooked by many.<br />
<br />
Where, you ask, is an area that you can cut expenses without harming the output of the department? This is a tough question. What you’re asking is to dedicate less resource and grow output. In most areas of the business this is impossible, that is except for one key area. The IT Department.<br />
<br />
The most common area money is wasted in business today is the practice of hiring full time, internal IT people. The perception is that you need to have an in-house IT person or even a team of technical people. Aside from giving yourself a sense of security by having that person sitting across the hall, you have actually achieved nothing, in fact you're most likely overspending and receiving a lower level of service than you should. <br />
<br />
Here is the common scenario. Management will recruit and hire what they consider a technical expert. More than not this person is not an expert, but merely a technical professional that knows more than management in regards to technology. They come into an environment and make changes based on their vision of how things “should be”. This vision was created from how they were trained at their last position. The training was built around the previous employer’s budget for purchasing solutions, i.e. the person only knows what they needed to know about their former employer’s infrastructure.<br />
<br />
As time goes on, not only is this person stuck on what their own vision of IT, but he also doesn't have hands on access to the latest tools and technologies that the industry has to offer, they are stuck in the fishbowl that is your infrastructure which again is based on what he was trained in prior to coming aboard or on what you could afford to purchase for him.<br />
<br />
ACS Services Inc, a provider of IT Services, touches hundreds of unique clients per year. This gives our team hands on working knowledge of best in class solutions, both large and small. Our staff is trained, by the top Vendors, to be experts in the latest solutions, so that they will sell the solutions for the vendor. ACS is given bonuses in the way of back end rebates and commissions to become knowledgeable, to achieve expert status, and continue their training so they know the products and solutions inside and out. When u measure the knowledge of the average "full time" IT employee vs. that of an Engineer employed by a Service Provider, it’s an unfair comparison.<br />
<br />
The nature of an “IT Person” is to have access to the latest and greatest technology. When you (the client) recruits and hires your “Expert” you will find one of two people. <br />
<br />
• One person who will crave the latest toys the industry has to offer and once your budget cannot deliver, will grow stale and will move on to greener pastures. <br />
<br />
• The other person who is ok working on yesterday’s technology, because your budget doesn’t allow for major upgrades every six months, which by definition is not a quality Technology professional.Your “Expert” is now in charge of stretching your Technology budget as far as they can vs. thinking out of the box and giving your organization a competitive advantage, which is the underlying reason all employees are ultimately hired.<br />
<br />
Assuming you are the exception to the rule and do find that Key Person to man your staff, how do you manage him or her? <br />
<br />
Most C-level/Business Owners know very little about technology, which gives two options:<br />
<br />
• Hire a business minded IT professional, either at the C level or upper management level, to hold the IT staff accountable.<br />
<br />
• Assume the job is getting done. <br />
<br />
Would you hire a sales team without a VP of sales? Would you hire an accounting team without a CFO/Controller? How can you hire an IT person/Team without a CTO/Dir of IT? Your investment in an expert just became greater.<br />
<br />
Lets again assume that you hired this Key Person and have also, without breaking the bank, have a way to manage this person, you need to provide them with the tools required to complete the task at hand, which is manage your Technology Infrastructure.<br />
<br />
Do you own a ticketing system/Crm to handle support issues? Were you able to dedicate 6 months to train your team on the package? Did you purchase a monitoring system? Did your team spend the months required to become experts with the system so they can effectively run it? This is an average of $150k+ in tools alone, that are an absolute necessity in order to support an SMB's network.<br />
<br />
I could go on but I think the information above gives a clear enough picture that Technology is an area where you can spend less (in some cases 50% less) and receive a greater level of support, in turn gaining a competitive leg up on the competition.<br />
<br />
If you’re looking for a competitive advantage in 2010, please feel free to contact me, I would be glad to discuss with you how your business could benefit. <br />
<br />
Thank you, I hope you found this information helpful.<br />
<br />
William Adams Jr.<br />
wjajr@acs.com<br />
508-238-6334ACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-31947698603426741932009-12-31T01:56:00.000-05:002009-12-31T01:56:44.943-05:00AT&T Vs VerizonAT&T is one of the largest service providers in the telecommunication industry in United States. With more than 150 million customers it is the second largest wireless service provider in United States. It was honored with ‘Technology & Engineering Emmy Awards’ in 2008 for developing the ‘Coaxial Cable Technology’. The company’s range of products includes Telephone, Internet and Television. <br />
<br />
<br />
AT&T has innumerous network and coverage issues and many of its customers are complaining. Recently it had a coverage issue in New England area when almost 60% of the international calls were shut down. Its long-distance service delivery is very poor in this area and this led many dissatisfied customers, switch to other telecom networks. Some common complaints are call dropping, dead/ no coverage areas; incoming calls go directly to voice mails, overcharges, poor customer service quality and many more. Though its has pros such as flexible plans, excellent data services, coverage on major highways and roadways, however, it still is unable to work well in rural areas and its coverage is really bad in northern New England.<br />
<br />
Verizon Communications is one such American broadband and telecommunications company that is taking advantage of the current situation of AT&T. The market opportunity is bright enough for Verizon to grab as much market share as they can and they are putting in efforts well to do so. The high quality of customer service, better network and coverage, cheaper call rates are some of the factors where Verizon is playing to gain market share. According to a research report, Verizon’s ‘Dropped Call’ rate for 90 days is only 2.7% where as AT&T has a 3.6% rate. The customer satisfaction level on the basis of the service deliver is also higher for Verizon being 43% and on the other hand AT&T has only 29%. <br />
<br />
AT&T even though is having coverage issues; it still has an important share in the market. The main reason for that is: The Apple iPhone. But customers cannot do without proper coverage. They will soon switch to other networks. Thus, the company is finding ways to satisfy their customers. Recently, AT&T released free application to report network problems. Just like we report crashes in Windows or Mac OS X, we can now mark the spot where and what network problems we faced and submit it so that it can be reviewed and rectified by the company. <br />
<br />
If you travel a lot, then AT&T can be very annoying, but if you stay in an area where coverage is good, then you must opt for AT&T. You can see the coverage of AT&T’s network in your location by entering your area in this website:<br />
<br />
<a href="http://www.wireless.att.com/coverageviewer/#?type=voice">http://www.wireless.att.com/coverageviewer/#?type=voice</a><br />
<br />
When two large telecom companies compete with each other, the result is always excellent. The one who will benefit is the customer. Verizon and AT&T are trying their best to win the loyalty of their customers. Hence, an excellent product and a fantabulous service experience can be expected soon.<br />
<br />
- Brian Kingsley, Director of Technical Services, ACS Services, BostonBrian Kingsleyhttp://www.blogger.com/profile/02442405968880858993noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-13303372358515221712009-12-29T02:22:00.000-05:002009-12-29T02:22:20.727-05:00Web 2.0 – Positive Vs Negative EffectsIn all cases one-way communication always lacks efficiency. Due to many disadvantages of Web 1.0, Web 2.0 came into existence. The term Web 2.0 is usually associated with web applications that help in two-way communication. It is basically a user-centered design that is associated with terms such as interactive, collaborative, information/ knowledge sharing, etc. Earlier, only the advertisers, publishers and website owners were allowed to share their knowledge and information in the worldwide web. Today, it is more than just sharing knowledge and information. Web 2.0 gives the freedom to each and every individual to post their thoughts, views, philosophies, likes and dislikes. It is all about interaction, sharing and networking.<br />
<br />
<br />
Web 2.0 websites include some of the following features:<br />
<br />
• <strong>Information Search:</strong> Search engine helps in finding relevant information for the keywords entered. It includes website designing, website ranking in search engine, keyword research, etc.<br />
<br />
• <strong>Links:</strong> Low-barrier social tool. It includes one-way linking, link exchange, etc.<br />
<br />
• <strong>Authoring:</strong> This gives the right to create, publish and upload content, videos, audios of your own. It includes blogs, press releases, articles, newsletters, etc.<br />
<br />
• <strong>Tags:</strong> These are one word descriptions of the entire content written by the owner. <br />
<br />
• <strong>Extensions:</strong> It is software that makes web an application platform as well as a document server.<br />
<br />
• <strong>Signals:</strong> It is the use of syndicate technology that informs users of content changes. RSS, Really Simple Syndication, is a tool from where you can get the latest updates of your area of interest.<br />
<br />
Things that you can do in Web 2.0:<br />
<br />
• Social Networking<br />
<br />
• Content writing and submission<br />
<br />
• Post blogs<br />
<br />
• Post comments, reviews, etc.<br />
<br />
• Information Search<br />
<br />
• Slide share<br />
<br />
• Social Bookmarking<br />
<br />
• RSS feeds<br />
<br />
• Online Gaming<br />
<br />
• And many more<br />
<br />
Now let’s discuss few of the pros and cons of Web 2.0<br />
<br />
<strong>Pros:</strong><br />
<br />
• Social Media Marketing and Search Engine Optimization.<br />
<br />
• Equal chance to all to post their views and comments.<br />
<br />
• Increase the circle of friends and contacts through social networking.<br />
<br />
• Latest update and content can be received if you are a RSS reader.<br />
<br />
• Online promotion of businesses, products and services.<br />
<br />
• Engaging the customers. Customers can write their views about the products and services.<br />
<br />
<strong>Cons:</strong><br />
<br />
• Information overload. Too much information is daily posted by many people with different thought. This creates confusion for the readers and the quality of the content is not reliable.<br />
<br />
• Freedom to post views and comments provides good opportunities for competitors and rivals to post negative comments about other companies.<br />
<br />
• Too many fake ID’s and spammers.<br />
<br />
• Forgeries and hackers commit crimes.<br />
<br />
<strong>SOCIAL MEDIA MARKETING</strong> is one of the biggest and most significant results of Web 2.0. Websites like Facebook, Orkut, LinkedIn, Twitter, MySpace, You Tube, etc are the top visited websites. It is because networking is one of the most essential needs in today’s world. Efficient networking is backed by internet. Thus, two-thirds of the total number of internet users visit social media websites daily. It has become an addiction to many. Again this brings many advantages and disadvantages along with it. Few of them are:<br />
<br />
<strong>Advantages:</strong><br />
<br />
• Create a large and strong network.<br />
<br />
• Increase in number of friends.<br />
<br />
• More interaction leads to higher exchange of knowledge.<br />
<br />
• Build strong relationships.<br />
<br />
<strong>Disadvantages:</strong><br />
<br />
• People are highly dependent on internet to network.<br />
<br />
• Wastage of time.<br />
<br />
• High number of frauds and hackers.<br />
<br />
People now-a-days are so addicted to update their Facebook and LinkedIn accounts that they do not realize the amount of time they are spending in such activities.<br />
<br />
According to a survey, every individual working in an organization spends an average time of about 40 minutes daily on social media websites. This incurs loss to the organizations as their valuable and knowledgeable employees are busy chatting online with their friends. The organizations are taking the following steps to eliminate this problem:<br />
<br />
• Organizations now-a-days block all social media websites.<br />
<br />
• They encourage employees to indulge in activities organized within the company, where they can socialize and relax.<br />
<br />
• An interesting work environment can help employees to concentrate more on their work.<br />
<br />
<br />
- Brian Kingsley, Director of Technical Services, ACS Services, BostonBrian Kingsleyhttp://www.blogger.com/profile/02442405968880858993noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-50819695816155300492009-12-23T16:05:00.000-05:002009-12-23T16:06:33.462-05:00Enterprise Networking with VLANSNetworking in the Enterprise Environment can be very challenging. With hundreds of devices on a network, broadcasts can get of control. Fortunately, there are methods to design a network to virtually eliminate the adverse effects of too many computers on the network.<br /><br />VLANS, or Virtual LANS, are the building blocks to a better Enterprise Network. A VLAN is a logical network provisioned on a switch. This effectively segments the traffic on the network ports of the switch. A single switch can have hundreds of VLANS or may have just a few, or even as little as one. The network switches in production today have a very robust feature set to enable the configuration of VLANS.<br /><br />Enabling a VLAN is a simple process and typically can be done in very little time. Once a switch has multiple VLANS configured you would need to add in some sort of router to enable traffic between the VLANS. Years ago, at the first introduction to VLAN technology and managed switches, the routing had to be done with an actual router. This could be a router that was just attached with a single connection or a router switch module installed in a chassis switch. Cisco’s Catalyst 4000 was one of these switches. The advantage to the chassis switch was the high speed backplane that the switch modules communicated on. This made the routing happen at near wire speed. Todays layer three and four switches perform the routing function as part of its feature set. These high speed switches can route packets at wire speed. <br /><br />Best practice network design includes separate VLANS for at least the networking equipment, servers and users. This will reduce processor utilization of the servers and allow for a protected management network for the switches. This can be taken much further and VLANS for departments, printers, wireless and other groups can also be provisioned. <br /><br />The next step in the design of an Enterprise network will be the ACL list. This is a security list that a switch, router or firewall uses to allow or deny traffic. Once a solid VLAN design is implemented ACLS can be applied to enhance the network’s performance and security. <br /><br />Stay tuned, next month I will talk about ACL configuration in the Enterprise network.<br /><br />Howard Cathcart<br />Director of Enterprise ServicesUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-53517944405430245792009-12-23T12:52:00.000-05:002009-12-23T12:52:39.422-05:00What should you expect from a Chief Technology Officer?A CTO will typically be someone with 10-15 or more years experience in technology. Ideally a CTO will have owned and run a business and have 5 years or more experience in an executive technology planning capacity. A CTO’s business experience is every bit as important as their technology experience and will be invaluable in helping you make critical business decisions.<br />
<br />
Most small and medium size businesses don’t have the resources or the need to hire a full time CTO. However it is vital for many of them that they have the opportunity to consult regularly with a senior technology manager who understands the big picture for their business and their technology. <a href="http://www.acs.com">ACS</a> has on staff several CTO level executives who have collectively managed the technology for scores of businesses including: hedge funds, venture funds, biotech, non-profits, general business, law firms, accounting firms, PR & marketing firms, property management companies, medical device manufacturers, start ups of various kinds and just about every other vertical in the small and medium sized business world.<br />
<br />
A CTO from <a href="http://www.acs.com">ACS</a> can help guide you through growth and technology planning for the coming year or the next three years depending on your needs. We will work with you on everything from business continuity and disaster recovery to the evaluation of 3rd party software applications. Other areas where an <a href="http://www.acs.com">ACS</a> CTO can help you include:<br />
- Backup strategy<br />
- Security auditing<br />
- Email management, archiving and regulatory compliance<br />
- Compliance with privacy laws and financial records keeping regulations<br />
- Bandwidth usage, traffic control, and monitoring<br />
- PC purchasing and lifecycle planning<br />
- Server capacity and lifecycle planning<br />
- Routing and network infrastructure evaluation<br />
- Technically intensive business strategizing<br />
- Employee productivity & efficiency evaluation<br />
- And many others<br />
Call <a href="http://www.acs.com">ACS</a> today for a free initial consultation and find out what our CTO’s can do to help you improve your business. ACS: 877-227-7773ACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-42209610211231137532009-12-17T08:30:00.000-05:002009-12-17T08:30:19.473-05:00GOOGLE VOICE/ GOOGLE WAVE<strong>GOOGLE VOICE</strong><br />
<br />
Previously known as “Grand Central”, Google Voice is a phone answering service provided by Google launched in March 2009 where the user account gets a US phone number from selected area codes, mimicking a regular phone number. With simple change in settings, the calls can then be forwarded to any other 6 phones. To summarize, unified communication to manage all of the communication channels of an individual. Google Voice is to voice mail like Gmail is to email.<br />
The inbound and outbound calls within US (incl. Alaska and Hawaii, though the quality of service here is criticized) and Canada are free of charge and international calls are rated according to Google Voice website schedule at highly competitive rates.<br />
<br />
The add-on beauty is that the user can forward to a one group of phones in the day and another group in the night. The account holder is also at total liberty to block the spam callers or play around sending directly to voice mails. Choose to have specific numbers forward differently than the others. <br />
So you want to be notified wherever/whenever you receive a voice mail? Simply set for SMS or email on receipt of a voicemail. So now you have absolute access anytime to your voicemails. How the question arises how do we read these voicemails from email? Interestingly, Google Voice transcribes the voice messages into text messages, thereby enabling readability in an email. <br />
How does the service work?<br />
GV is not a mobile phone service; it's not linked to a specific handset. It’s not a VoIP line, it's not matched with an IP address. It’s not a landline service, a Google Voice number isn't tied to a geographical location. It’s tied to you, your account. So moving? No hassles, you still control your mobile, home and work numbers through the same GV number.<br />
Google Voice is, IMHO, a refined GUI within a fairly standard VoIP version of unified messaging with number portability thrown in.<br />
<br />
Set along the style of Gmail, Google Voice is configured as a web-based application. Having a local established U.S. telephone service is a must to activate and use the service. Once configured appropriately by the user, additional phone numbers can be made to ring. <br />
<br />
Internet calls work differently on Google Voice than on Skype. Rather than starting a call from a computer, a specialized phone or an application on a mobile device, Google Voice users call into their voice mail service from any phone. Once there, they can push a button to get a dial tone and call a different number. As such, the service is not set up to handle video calls, though Google offers simple video-chatting capabilities through Google Talk, its instant-messaging service. <br />
<br />
In essence, <br />
<br />
• A single Google forwarding number to all of the user's phones <br />
<br />
• Free calls and SMS in the US and Canada <br />
<br />
• Calling international phone numbers for as low as US$0.02 per minute <br />
<br />
• Call screening. Announcement of callers based on their number or by an automated identification request for blocked numbers <br />
<br />
• Listening in on someone's recording of a voice message before taking a call <br />
<br />
• Blocking calls from specified numbers <br />
<br />
• Send, receive, and store SMS online <br />
<br />
• Answering incoming calls on any configured phone <br />
<br />
• Call routing. Selection of phones that should ring based on calling number <br />
<br />
• Voicemail transcripts. Reading of voicemail messages online <br />
<br />
• Listening to voicemail online or from a phone <br />
<br />
• Notification of voicemail messages via email or SMS <br />
<br />
• Personalized greetings based on calling number <br />
<br />
• Forward or downloading of voicemails <br />
<br />
• Conference calling <br />
<br />
• Call recording and online archiving <br />
<br />
• Switching of phones during a call <br />
<br />
• Viewing the web inbox from a mobile device/phone <br />
<br />
• Customize preferences for contacts by group <br />
<br />
• Ability to change your number for a fee <br />
<br />
• Specifying an existing phone number instead of the Google Voice number on initial setup for use with limited functionality, such as some voicemail functions and using the voice mail system for the user's phone number (mobile devices only)<br />
<br />
Cons: <br />
<br />
• There is always the interference of accent, pronunciation and intonation, ambiguity of linguistics that influences these transcribed messages.<br />
<br />
• One of the main disadvantages of Google Voice appears to be the fact that users won't be able to use their Google number as their outgoing caller ID when dialing directly from a cell phone, which means that the contacts that are in the habit of calling back based on the last caller ID will have a harder time adjusting.<br />
<br />
• spotty SMS reception and overall reliability is a concern hence not a choice as a main line<br />
<br />
• Privacy concerns with the ability to record cell phone conversations without the caller first being told that the call may be recorded<br />
<br />
• The service starts the user on a brand new number, and lack of portability of the existing phone number is a major inconvenience<br />
<br />
• The ability to transfer a call feature not available. For ex: When the user is on the phone and need to switch from home to cell phone, being able to "put the caller on hold" and then pick up the call on the or to be able to transfer to "another extension" to another cell phone or so is not available. <br />
<br />
• An easier tool/process for recording calls <br />
<br />
What does the technical world think about Google Voice?<br />
<br />
Google’s take on the telecommunications industry with a free service called Google Voice that, if successful, could chip away at the revenue of companies big and small, like eBay, which owns Skype, telephone companies and a string of technology start-up firms<br />
<br />
As regards the technical aspects of it, GV has rave reviews on routing power, screening, SMS, Voice Mail and mid-call capabilities. However has also raised quite a concern amongst the privacy obsessed population. The common concerns raised are privacy, advertisements, reliability, caller id confusion, number changing hassles.<br />
<br />
If you have multiple phones, having a single number to reach them all can make you and your callers' lives a bit easier, and it can save space on your business card by not having to list separate numbers. The concept is simple: people are trying to reach you--not one of your phones--and Google Voice lets you decide how to route the calls. <br />
<br />
The cost is interesting. Outgoing calls to US numbers are free. The choice to listen or read, tweak out the calls you want to receive and personalized messages makes it a great tool to use.<br />
<br />
<strong>GOOGLE WAVE</strong><br />
What is wave?<br />
Google has a very strong hold on the online ad market, but it’s facing new types of pressures from technology, as well as new business models.<br />
Launched on 30th September’09 to about 100000 users, Google Wave is creating waves with its real-time communication platform combining aspects of email, instant messaging, wikis, web chat, social networking, and project management to be built in one elegant, in-browser communication client. The service seems to combine G-mail and Google Docs into an interesting free-form workspace that could be used to write documents collaboratively, plan events, play games or discuss recent news.<br />
How does it work?<br />
Google Wave is designed as a new Internet communications platform. It is written in Java using Open JDK and its web interface uses the Google Web Toolkit. Waves are hosted XML documents that permits low latency concurrent modifications. Edits and replies are called blips and each blip can be replied to by individuals. Any participant can respond anywhere within the message, edit, add participants at any point in the process. Recipients get notifications on changes and can review in chronological order when they open wave again. Wave can function as emails and threaded conversations as well while also being an instant messenger service when many participants are online at the same. The shifting between email and IM is purely based on number of users using concurrently. Wave can be used at any location and this makes creating/editing collaborative documents easy and possible. In simple terms, it can be termed as very advanced forums.<br />
• A wave can be both a conversation and a document where people can discuss and work together using richly formatted text, photos, videos, maps, and more. Any of the participants can respond and reply anywhere in the message, edit the content and can also add participants at any point during the process. Wave also enables playback and any of the participant can rewind the wave to see who said what and when in the conversation.<br />
<br />
• The best part of all is that it enables faster conversations, edits and enables interact with extensions, all in real-time with live transmission<br />
The service combines G-mail and Google Docs into an interesting free-form workspace that could be used to write documents collaboratively, plan events, play games or discuss recent news.<br />
<br />
Group projects, photo sharing, meeting notes, brainstorming sessions, interactive games are some best examples of appropriate use of Google wave.<br />
To put the crux of features in a nutshell:<br />
<br />
- Real-time: In most instances, you can see what someone else is typing, character-by-character.<br />
<br />
- Embeddability: Waves can be embedded on any blog or website.<br />
<br />
- Applications and Extensions: Just like a Facebook application or an iGoogle gadget, developers can build their own apps within waves. They can be anything from bots to complex real-time games.<br />
<br />
- Wiki functionality: Anything written within a Google Wave can be edited by anyone else, because all conversations within the platform are shared. Thus, you can correct information, append information, or add your own commentary within a developing conversation.<br />
<br />
- Open source: The Google Wave code will be open source, to foster innovation and adoption amongst developers.<br />
<br />
- Playback: You can playback any part of the wave to see what was said.<br />
<br />
- Natural language: Google Wave can autocorrect your spelling, even going as far as knowing the difference between similar words, like “been” and “bean.” It can also auto-translate on-the-fly.<br />
<br />
- Drag-and-drop file sharing: No attachments; just drag your file and drop it inside Google Wave and everyone will have access<br />
<br />
Wave can run any iGoogle or OpenSocial gadget. This makes it very versatile and thousands on existing applications will work with it. On the other hand, the advantage is of live interaction with multiple users if it’s a gadget built within. A live online game with active participation from all the users would be a good example. So now it sounds similar to Facebook/MySpace which takes advantage of your friend network to make games, quizzes, and applications more meaningful and useful. However the difference is that gadgets are specific to individual waves, rather than to specific users and thus its not like having a Facebook app on your profile and the gadget belongs to everyone within the wave. They also do not have titles, to better integrate with the actual conversation. Some of such gadgets already built include a Sudoku gadget, Bidder (which turns your wave into an auction), and Maps (which allows for collaboration on a Google Map).<br />
What does the tech world think about Google Wave?<br />
Tech world generally raves about Wave offering a very sleek and easy way to navigate and participate in communication on the web that makes both email and instant messaging look stale.<br />
The reviews can’t get over the magic of wave on the ability to watch your co-waver type in real-time. One can reply to an entire wave like an IM or an email by clicking the reply button on a wave's toolbar. The ability to reply to bits of a message inline which lets the user and other collaborators annotate the wave as they go is seen as the coolest thing.<br />
<br />
Possibility of spamming is looked as a big negativity. For example, one can waltz up to someone else’s wave/blip and added his own line to it and could easily add a link or files as well. Wave’s API freely available to use makes it a big opportunity for spammers and hacked accounts could tune Wave into the biggest spam-fest since Twitter.<br />
<br />
For more information on ACS Services, please visit:<br />
<br />
http://www.acs.com/<br />
<br />
Contact: <strong>Brian Kingsley</strong><br />
<strong><br />
</strong><br />
<strong>Director of Technical Services<br />
</strong><br />
Sources used for the content for Google voice are as follows:<br />
<br />
http://google.about.com/od/g/g/GoogleVoice_def.htm<br />
<br />
http://www.pcadvisor.co.uk/reviews/index.cfm?reviewid=113166<br />
<br />
http://en.wikipedia.org/wiki/Google_Voice<br />
<br />
<a href="http://voip.about.com/od/unifiedcommunications/fr/GoogleVoiceRvw.htm">http://voip.about.com/od/unifiedcommunications/fr/GoogleVoiceRvw.htm</a><br />
Sources use for Google Voice Reviews:<br />
http://www.pcworld.com/article/167424/google_voice_5_reasons_to_use_it_5_reasons_to_think_twice.html<br />
<br />
http://news.cnet.com/google-voice-flawed-but-still-awesome/<br />
<br />
http://voip.about.com/od/unifiedcommunications/fr/GoogleVoiceRvw.htm<br />
<br />
http://www.maketherightturn.com/blog/reviews/google-voice-pros-and-cons.htm<br />
<br />
Sources used for Google Wave Reviews:<br />
http://www.techcrunch.com/2009/05/28/google-wave-drips-with-ambition-can-it-fulfill-googles-grand-web-vision/<br />
<br />
http://lifehacker.com/5370738/google-wave-first-look<br />
<br />
http://thecoffeedesk.com/news/index.php/2009/11/03/google-wave-review/Brian Kingsleyhttp://www.blogger.com/profile/02442405968880858993noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-29898088248334094722009-12-08T01:41:00.000-05:002009-12-08T01:41:42.041-05:00Massachusetts 201 CMR 17.00 - Deadline extended201 CMR 17.00 is a Massachusetts data protection law managed by ‘Office of Consumer Affairs and Business Regulation’ (OCABR). It contains the ‘Standards for the Protection of Personal Information of Residents of the Commonwealth’. The provisions of this regulation applies to all who own, store, license or maintain any personal information about a resident of the Commonwealth. This regulation is established to safeguard the personal information contained in paper and electronic records. The other purposes for this regulation can be:<br />
<br />
• Maintain the security and confidentiality of personal information in a manner that is consistent with industry standards.<br />
• Protection against threats or hazards to the security or integrity of such information.<br />
• Protection against unauthorized access to personal information.<br />
<br />
The law was supposed to go into effect on January 1, 2009 but due to some changes which are being made to the new version it has been postponed to May 1, 2010. Also some additional time has also been granted to business people to comply with the ‘Identity Theft Preventive Regulations’. Identification of fraud and theft will be easier after the implementation of this law. This law is basically for retailers and businesses involved in commerce as they are the ones who store and use personal information of residents of Commonwealth. If any personal information of a Massachusetts’s resident is leaked or misused, there could be serious actions taken against the business and people associated with the business. <br />
<br />
According to the regulation, companies involved in commerce are required to maintain a written security plan to safeguard the personal information of the residents of Massachusetts. The following points will be considered to see whether the information security program is in compliance with the regulations:<br />
• Size, scope and type of business of the person obliged to protect the personal information.<br />
• Amount of resources available to such persons.<br />
• Amount of stored data.<br />
• Need for security and confidentiality of personal information of the residents.<br />
<br />
To find more information about this protection law, you can visit the following websites:<br />
<br />
http://www.mass.gov/pageID=ocaterminal&L=4&L0=Home&L1=Consumer&L2=Privacy&L3=Identity+Theft&sid=Eoca&b=terminalcontent&f=reg201cmr17&csid=Eoca<br />
<br />
http://www.mass.gov/Eoca/docs/idtheft/compliance_checklist.pdf<br />
<br />
<br />
Brian Kingsley – Director of Technical ServicesACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-7965745570011253162009-12-06T20:55:00.003-05:002009-12-06T21:06:34.657-05:00<strong>Use the Economic Stimulus Act to fund critical infrastructure improvements.<br /></strong><br />With 2009 winding down, companies are taking in all the money that they can, and budgeting for the future. Many companies are unaware of the tax deductions that they qualify for when entering this planning process, especially those outlined in Section 179. “Section 179" refers to Section 179 of the Internal Revenue Service Tax code, and can prove extremely profitable for companies. It allows them to deduct for certain purchases and expenses – in some cases, before they are even paid in full. Many see this as the best feature of the economic stimulus act, as it’s great to have the option of not making the full payment before year end so that you can opt for an equipment lease if cash flow is an issue.<br /><br />Another benefit of the economic stimulus act is enhancements to Section 179 that allow for higher dollar limitation for equipment purchased before December 31, 2009. In addition, this deduction is not based on the number of days this equipment has been in service. Another perk that comes with Section 179: it allows a business to take a current year deduction on an equipment purchase instead of depreciating the newly acquired equipment over the course of several years. The bonus being that more money is back in your pocket, faster.<br /><br />If you’re looking to make a big (or even small) equipment purchase, do it sooner than later! To find out more about Section 179, <a href="http://www.section179.org/">click here</a>.<br /><br />It’s smart to speak with your tax adviser to figure out what moves will be most financially advantageous to your company, and you may find yourself with a cash flow advantage in 2010.<br /><br />James Cranshaw<br />Sr. Sales EngineerJames Cranshawhttp://www.blogger.com/profile/09299690020779265934noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-12902330803564385182009-12-04T14:33:00.000-05:002009-12-04T14:39:45.677-05:00The right tool for the right jobWell the end of the year is rapidly approaching, and as is often the case the scramble is on to close out IT budgets. To that end many of you are looking at the purchase of new hardware to replaceme legacy systems. One of the questions that we hear often is “what kind of laptop/desktop/server should I get?”<br /> <br />Unfortunately, there is no quick answer to that. <br /><br />There are a myriad of factors that should be given very careful consideration before settling on a particular make or model as not all systems are created equal.<br /><br />If you are looking at replacing a workstation, whether it be a laptop for a mobile worker or a desktop for your marketing guru, the first question that should be answered is what are you going to be doing with this computer? The processing needs, graphics rendering, and storage requirements of your accounting department are vastly different from those of your PR , web development, or marketing crew. The workstation that your bookkeeper has been using for the last two years and is absolutely thrilled with would hardly provide even marginally acceptable performance for the web designer/illustrator whose day is filled with editing photos, creating multimedia presentations, and rendering DVD’s for trade shows. <br /><br />The same philosophy holds true when considering the replacement of your servers. The requirements for a basic FTP server will differ enormously from those of that new server that you are planning on running your latest implementation of virtual servers/workstations on. Of course, with these differing requirements are the associated costs. The basic FTP server mentioned above is going cost much less than the hardware for a new virtual machine consolidation. <br /> <br />Not only are the day-to-day uses of the machines to be taken into consideration, we also need to attempt to look into the future. How long are you planning (or hoping) that this workstation/server last? If you’re like most of us, you only want to go through this process every 3-5 years. So, how do we decide what hardware to focus on? As I mentioned above the role that the machine is going to fill is the first/best step in the process. Once this is determined then we can begin looking at the makes/models that provide hearty enough hardware. Although the FTP vs. virtual server comparison above rather drastic, all too often we have had new clients come to us and ask us to determine “why is machine X so slow?” often times the poor performance is due to the fact that insufficient consideration to the role the machine was going to fulfill was taken. After all, you “can” drive a nail with a pair of pliers, but who would recommend that? In addition to substandard performance, forcing an under-powered machine to fulfill an overly demanding role will very likely reduce the serviceable lifespan of the machine since it will be working at such a higher level than it was designed for, ultimately resulting in the requirement to replace it earlier than had been planned.<br /> <br />In short, if you look closely at what roles the machines will fill on a daily basis and adjust your focus properly, add a small cushion to accommodate for future growth coupled with future processing and storage demands, there is no reason that well-selected hardware fit all of your needs and provide exceptional performance for several years.<br /><br />- Kevin Sheedy, Project ManagerACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-15578759208945094012009-12-03T22:47:00.000-05:002009-12-03T22:53:26.428-05:00Microsoft Windows 7Microsoft Corporation is a global company founded by Bill Gates and Paul Allen in 1975. It builds up, manufactures and licenses a wide range of software products for computers. Its most profitable product ‘Microsoft Windows’ enjoys 91% of the market share worldwide. Microsoft Windows is a software operating system and has a wide range of series such as Windows XP, Windows Vista, Windows 2000, Windows 7 and many more.<br /><br />Windows 7 is the latest version of Microsoft Windows as is available since October 22, 2009. Bill Gates quoted this version to “be more user-centric”. I would like to list out the new and changed features contained in this latest version.<br /><ul><li>Multi-touch support </li><li>Handwriting recognition </li><li>Enhanced multi-core processors </li><li>mproved boot performance </li><li>Support for virtual hard disks </li><li>Direct access </li><li>Kernel improvements</li><li>Supports for systems using Heterogeneous Multi-adapter </li><li>Better media features </li><li>New items like Clear Type Text Tuner, Gadgets, Recovery, Display Color Calibration Wizard, Troubleshooting, etc are added to ‘Control Panel’ </li><li>Windows Security Center will now be known as Windows Action Center </li><li>And many more… </li></ul><p><br />With the uncountable features added, there are many others that are removed from Windows 7 that was earlier a part of Windows Vista. They are: </p><ul><li>Windows Photo Gallery </li><li>Windows Movie Maker </li><li>Windows Calendar </li><li>Windows Mail </li></ul><br />It’s amazing to know that it received huge number of orders through amazon.co.uk. It exceeded the total demand of Windows Vista for the first 17 weeks in only eight hours. It also broke Amazon’s pre-order record previously made by the seventh Harry Potter Book.<br /><br />For more detailed information on Windows 7, you can visit the following URLs:<br /><a href="http://www.microsoft.com/windows/windows-7/">http://www.microsoft.com/windows/windows-7/</a><br /><a href="http://en.wikipedia.org/wiki/Windows_7">http://en.wikipedia.org/wiki/Windows_7</a><br /><br />- Brian Kingsley, Director of Technical ServicesACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-38146190825240253482009-11-30T04:47:00.000-05:002009-11-30T04:53:15.531-05:00Spamming World<div align="justify">Spam is an electronic messaging system that is used by individuals, frauds and companies to send e-mails in bulk. It can be used to spread computer viruses like Trojan horses and other software, etc. The most common is e-mail spam whereas there are many other media such as mobile phone messaging spamming, search engine spam, forum spam, social networking spam, etc. It is highly annoying for the recipient of the spam as too many junk e-mails reduce the visibility of important e-mails and hence an important message can be overlooked which might sometimes cost a lot. Mainly advertisers and frauds use e-mail spamming as it does not involve operating costs and it has no/ less barriers to entry. The only thing they have to do is compose a spam e-mail and send it across to innumerable e-mail IDs. The only people who suffer are the recipient of these e-mails. </div><div align="justify"><br />The reasons why spam is considered to be ‘bad’ are that they are innumerous; they are offensive and fake. Statistics reveal that large ISPs (Internet Service Providers) notice more than 80% spammers. With this huge number of spam e-mails, meaningful and important e-mails are lost. Filtering e-mails are also not so effective now-a-days. Identification of spam messages has become difficult. I will give you a very simple example to explain the impact of spam on people. If suppose a bank is sending thousands of e-mails, mobile phone messages, etc to its customers on a regular basis, the customers will feel annoyed and will stop giving importance to these spam messages. Even if any important message will be sent by the bank, it will be ignored by the customer as he/she might feel that it is a spam. This drawback will then be suffered by both bank and the customer. Hence, sending spam messages will only trouble the recipient and waste the sender’s time. </div><div align="justify"><br />To identify a real message one must check its sender’s authentication. But usually it’s difficult to trace and compare a fake and an original ID. A 2007 statistical analysis showed that USA contributed around 28.4% for the total number of spam messages sent worldwide. There are many court cases running for the e-mail spamming done by various companies and they have been sent to prison or have given a huge sum of money for settlement of the case. However, there is no end to it. The only way to avoid spam messages is to report abuse and ignore the spam notices and warnings. A highly secured network will also help reduce spam e-mails. Spam still exists and is still difficult to find a solution to it. We can try and make incremental progress and can individually contribute little to reduce the number.<br /><br />Brian Kingsley - Director of Technical Services</div>ACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-39941737933672130752009-10-10T15:03:00.000-04:002009-11-25T20:57:55.745-05:00Antivirus is Not Enough with Today’s Hostile Internet Environment<br /><br />At this point, everyone pretty much realizes that every system needs Antivirus in order to stay protected. Those that didn’t want to spend the money or computer resources have already been burned and now see it as a necessary expense. Now, most individual users as well as companies are doing a good job at budgeting for this expense every year. So with the hundreds to thousands of dollars spent for this each year, the question remains: why are my systems still getting infected?<br /><br />As necessary as antivirus is these days, it’s simply not enough. It’s never been a perfect solution but has always been good enough to protect from the majority of the scripts created by the pimply faced kid in his parents’ basement. As time goes on, more is at stake. No longer is a virus simply a way to ruin someone’s day, or steal a piece of information, or even destroy a system. No, the virus of today is just another method of marketing (pop-ups), bumping a webpage’s stats in search engines (homepage hijacking), selling a product (rouge antivirus/antispyware ), assisting with an emailing campaign (spam bot), a form of activism (DDoS attacks), stealing your identity (backdoor Trojan), another place to store information (mIRC, FTP bot), or make a name for one’s self by spreading as much and as fast as possible (worm). Because there is more on the line, there are more resources on the side of evil than good.<br /><br />So what can you do?<br /><br />Well, all the major antivirus players seem to be doing two things. First, they are beefing up their antivirus programs to try to stop this. The side effect to this is an antivirus software that is now taking up 60% of your computer resources and creating little add-ins that require you to do more manual maintenance. From what I have seen, this is not really effective. All it's doing is slowing you down. If this was effective, then my laptop with 4 gig of ram, 2.4ghz processor, and a 100gb 7200 rpm hard drive that is bogged down with Symantec Endpoint 11 would not have just gotten the <a href="http://en.wikipedia.org/wiki/WinFixer">WinAntivirus 2010</a> virus from the spoofed UPS email I just opened. Or my desktop with 3gig of ram, 3ghz processor, 500gb 7200prm hard drive bogged down with McAfee would not have just downloaded a Russian speaking virus from my friends <a href="http://www.facebook.com/WJAJR?ref=profile">Facebook</a> profile. Trust me, by the numerous issues per day <a href="http://www.acs.com/">ACS</a> works on I know I am not alone. Yes, my antivirus was up to date, my Network threat protection was enabled, Tamper protection was enabled, the internet was marked as an untrusted zone, and I even verified that the firewall component was enabled. More features just bog me down, make it confusing, and leave more room for misconfiguration.<br /><br />These companies are also releasing different methods of protection. Most have been around for a while, but now are starting to get serious attention and are becoming more effective. It is very important to choose the right solution for your infrastructure and as your IT provider what’s best for your situation.<br /><br />So what are some of these methods:<br /><strong>The correct <a href="http://www.acs.com/Network-Support-Services-Boston.html">firewall</a></strong> – you can spend fifty or five thousand dollars. The correct one depends on your setup and need. The biggest mistake is most people make a decision based on price, and many firewalls I have seen implemented are doing more harm than good. Make sure you weigh all the factors before making a decision.<br /><strong><a href="http://www.acs.com/Network-Support-Services-Boston.html">Content filtering</a></strong> – while not a viable option for all companies this is usually a very effective way to protect your network. By using an effective content filter you can not only protect yourself from malicious programs, you can also protect your business from losing time/money due to employees goofing off.<br /><strong><a href="http://www.acs.com/Network-Support-Services-Boston.html">Gateway Antivirus</a> protection</strong> – Just one more way to filter your traffic, but at it's source. By adding this to your arsenal, you are removing viruses before they hit your machines.<br /><strong><a href="http://www.acs.com/Network-Support-Services-Boston.html">Managed Anti-spam</a> protection</strong> – Spam is a growing problem, but in addition to just wasting time deleting junk it's also a way to get malicious programs. A Managed Anti-Spam solution can eliminate the junk mail while saving your machines.<br /><strong><a href="http://www.acs.com/Network-Support-Services-Boston.html">Deep Packet Inspection</a></strong> - A powerful method for filtering traffic. DPI acts almost like a customizable antivirus/content filter. This is not meant to replace these functions but instead to add to them. DPI will scan for a pattern within a packet rather than the file itself like an antivirus solution will. DPI signatures were more effective in preventing the <a href="http://en.wikipedia.org/wiki/Conficker">Conficker virus</a> than the antivirus programs themselves when it first released.<br /><strong><a href="http://www.acs.com/PC-Support-Boston.html">Managed antispyware </a>protection</strong> – Antispyware is best to work in conjunction with antivirus software. A managed solution will ensure that your systems are fully updated and have the appropriate settings for your environment. While antivirus is necessary for preventing viruses they usually lack the protection of those pop-up campaigns, and rouge antivirus/spyware programs.<br /><strong><a href="http://www.acs.com/PC-Support-Boston.html">Managed Antivirus </a>protection</strong> – While antivirus has been the topic here, it still is necessary, and by having the appropriate managed solution you increase the effectiveness.<br /><br />Brian Kingsley - Director of Technical ServicesACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-80153287141020404392009-11-25T03:28:00.000-05:002009-11-25T03:31:46.765-05:00IT OutsourcingTechnology, in a layman’s language, is a concept that simplifies the tasks handled by human being. It helps man to control his work and environment with less complexity. He uses much of his brain rather than body. Technology can be used in fields of medical, construction, hardware, software, etc. Early man converted natural resources into simple tools, which were later converted into big machines and presently a sophisticated and easy to handle machines. This is how technology advanced day-by-day. The most common term used in the field of technology is ‘Information Technology’. It is the result of the combination of computer and communications technology.<br /><br />The latest trend in the IT sector is the boom in outsourcing. It is in boom as it requires a lot of technical expertise and skills. So, companies contact IT giants to outsource their computer or internet related work. It simplifies their task, helps them save cost and also relieve them from the strenuous hiring procedure for technical people. An IT service provider is typically known as a Managed Services Provider (MSP). Most of the IT companies specialize in providing a set of outsourcing services to their clients. They take the entire responsibility of the client’s entire computer and internet related tasks at a very reasonable price with extreme knowledge and expertise.<br /><br />Since 1985 ACS has been a name you can trust when it comes to IT Managed Services and Outsourced Support. We at ACS accept IT outsourcing work from our clients and are committed to give them the best possible services. We have a solid foundation and over 20 years experience in Managed IT Services. Our complete proactive Managed Services team is available to meet your every network need 24x7x365. Our services include; Network Support, Server Support, PC Support, Help Desk Services, Relocation Support, Set up and Configuration and many more. We believe in providing excellent and reliable services for a less price. We accept work from small and mid-sized companies and provide them with the IT support they need. Our engineers are available whenever you need them. So, if you have any technical work which you find difficult or expensive, we are ready to take it up and put in our best efforts to deliver the desired results.<br />For more information on ACS Services, please visit:<br /><a href="http://www.acs.com/">http://www.acs.com/</a><br /><br />Brian Kingsley - Director of Technical ServicesACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-33580760785553341322009-11-23T11:48:00.000-05:002009-11-23T11:49:46.012-05:00Cloud ComputingDo you ever get frustrated on how long your computer takes to boot up? I know that I do! It takes on average 45 seconds for even the fastest computers. Imagine a day where it takes 45 seconds or longer to login to <a href="http://www.facebook.com/">Facebook</a> or <a href="http://www.linkedin.com/profile?viewProfile=&key=17480542&trk=tab_pro">Linkedin</a>. Would you become impatient? <a href="http://www.facebook.com/">Facebook</a> and <a href="http://www.linkedin.com/profile?viewProfile=&key=17480542&trk=tab_pro">Linkedin</a> do not care which device you use to access your account, whether a PC or mobile device. Then why in the workforce do we put up with waiting several minutes for our PC’s to boot and for our email to load? Today, when we boot our computers, the biggest question is “How long will it take until I get on the Internet? We all spend most of our time on a Web Browser like you are right now reading this blog. Everything we do today is web based; Email, Social Networking, Creating Documents, News, and Video for example. Organizations are either practicing cloud computing or have future plans to implement a private cloud using a <a href="http://www.vmware.com/">VMware</a> or a <a href="http://www.citrix.com/English/ps2/products/product.asp?contentID=163057%20&ntref=prod_top">Citrix</a> solution.<br /><br /><a href="http://www.vmware.com/solutions/cloud-computing/">Cloud Computing</a> is not going away anytime soon. As more end-users are on the go and working from home, cloud computing gives them the ability to no longer worry about where applications and data are stored. It is highly automated allowing end users to store more data than on a traditional personal computer. Organizations are implementing <a href="http://www.vmware.com/solutions/cloud-services/">private clouds</a> utilizing virtualization, eliminating any exposed data on end-user computers, improving performance, and tightening security. Users can now access their data and applications from anywhere with an internet connection, using for example, a Virtual Desktop Infrastructure (VDI), and it is fast! <a href="http://www.vmware.com/products/view/">VMware View 4</a> is transforming the desktop from device-centric to user centric. This private cloud provides an organization with a significant cost savings and improves efficiency, flexibility, and control to access applications.<br /><br />Everyone is talking about <a href="http://www.hp.com/united-states/campaigns/mini1000/index.html#/Main/">Netbooks</a>! The idea behind <a href="http://www.hp.com/united-states/campaigns/mini1000/index.html#/Main/">Netbooks</a> is to have a travel friendly but mobile device that is fast for the end user. Next year, Google will be launching its Operating System that will be ideal for netbooks; “<a href="http://googleblog.blogspot.com/2009/11/releasing-chromium-os-open-source.html">Google Chrome OS</a>” Google has taken the OS from application based to web based. This new Google Chrome OS will boot in an average of 7 seconds currently, and they are working hard to make it faster! This is ideal for private clouds because all you need is a java enabled browser to access a <a href="http://www.vmware.com/products/view/">VMware View 4 Desktop</a>, which is fast, secure, and there are no worries of losing information because no information is stored on the device.<br /><br />The Massachusetts <a href="http://www.mass.gov/Eoca/docs/idtheft/compliance_checklist.pdf">201 CMR 17.00</a> compliance deadline is approaching, May 1, 2010. Cloud Computing is a great solution because all corporate data is encrypted and resides in the data center with no personal information stored on end user devices. Not ready for cloud computing quite yet? <a href="http://www.acs.com/">ACS</a> can provide a ROI analysis to see if cloud computing is a fit now or in future IT plans. In the mean time, <a href="http://www.acs.com/">ACS</a> can provide a security audit to help your organization prepare and maintain compliancy.<br /><br /><a href="http://www.acs.com/">ACS Services, Inc.</a> specializes in server, desktop, and application virtualization solutions for SMB, Enterprise, K-12, State and Local Government. Stay tuned for a success story that <a href="http://www.vmware.com/">VMware</a> is publishing on <a href="http://www.acs.com/">ACS</a> about one of my Enterprise clients!<br /><br />If you would like to learn more about cloud computing, VMware, or how <a href="http://www.acs.com/">ACS</a> can help your organization become <a href="http://www.mass.gov/Eoca/docs/idtheft/compliance_checklist.pdf">201 CMR 17.00</a> compliant, please contact me at <a href="mailto:bmcdonald@acs.com">bmcdonald@acs.com</a><br /><br />- Brian McDonald, Director of Enterprise SalesACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-36136094401590171512009-10-25T22:26:00.000-04:002009-10-25T23:06:27.524-04:00Organizing vCenterI have recently been asked what I thought was the best way to organize things in vCenter? I have personally used several different methods to organize virtual machines in different ways. I started to wonder how other VMware administrators were organizing their own environments and if there were any common methods to this. Let’s take a look at the different ways I have organized things in previous deployments.<br />The different methods that I have used to organize my environments have been mainly with the use of resource groups and folders. Each of these options is located in different views; resource groups are located in the host and clusters view and folders are located in the virtual machine and template view.<br />Starting with resource groups, I have built different groups in a few different ways in different clusters. Creating resource groups based on importance, such as high, med and low has been the most basic configuration that has been taught by VMware in the classroom and as examples when talking about resource groups. Resource group settings only take effect when contention happens on the host. If there is no contention, then these groups give you the ability to group virtual machines together based on operating system. I have used a “Windows” resource group as well as a “Linux” resource group to separate the different systems. This can also be used to separate teams and the virtual machines that each maintain, as well as having “high” and “low” groups for the most important and least important virtual machines. In other words, examples like the development or sales department virtual machines could be grouped in this manner. I have also created resource groups for VDI deployments, putting each VMware View pool in their own resource group limiting processor usage. I have also seen people create resource groups based on the type of application, but vSphere now gives the ability to use vApps to accomplish that type of configuration.<br />So, nothing too exciting with the resource groups, just a pretty straight forward configuration. Now, I have also organized Virtual Machines in the folders view. You can actually create different folders based on the application running on the virtual machine. One example would be to have all the exchange servers in one folder or to have all the virtual desktops organized in a folder and then create sub-folders by department. In one engagement, I actually created folders based on the virtual machine owner, so I would be able to determine who was responsible for each virtual machine if an issue arose. Moving forward, I started to use custom columns in vCenter for application owner and other information to be able to get in touch with that person. You can also create custom columns to turn the main virtual machine page into a main source of information about all of the virtual machines. Eventually these columns would have the same information that the server database would have and could replace the server database for any information about the virtual machines.<br />How do you organize your vCenter? Inquiring minds what to know!<br />by Howard Cathcart, Director of Enterprise Services October 25th, 2009ACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.com0tag:blogger.com,1999:blog-1787490323393787804.post-65828787002094941712009-10-18T10:17:00.000-04:002009-10-18T10:58:56.640-04:00Are you Social Networking for success?<div align="left">Over the last two years I have attended various events and presentations regarding “social networking”. I have read articles, had conversations and even presented on the topic. It has become clear to me that social networking is big and growing. People are either involved, getting involved or wondering if they should be involved. </div><div align="left"><br />And why not, it’s a great tool and easy to use. Right? Jump on line, sign up and search for people you know. Add friends to <a href="http://www.facebook.com/home.php#/group.php?gid=149714437556&ref=ts">Facebook</a>, <a href="http://http//www.linkedin.com/in/vincentverducci">“Link”</a> people in, “follow” people on <a href="http://www.twitter.com/">Twitter</a>. Great…now what? You are all signed up, you check the site every day, and occasionally post something. You are “social networking”. Now we can just sit back and watch our business grow, or the job opportunities roll in, or our brand recognition increase, etc.</div><div align="left"><br />Unfortunately that isn’t how it works in most cases. Joining <a href="http://http//www.linkedin.com/in/vincentverducci">Linkedin.com</a>, <a href="http://www.facebook.com/home.php#/group.php?gid=149714437556&ref=ts">facebook.com</a>, <a href="http://www.twitter.com/">twitter.com</a>, etc. are steps in the social networking process but are just the first steps. These are the tools that allow social networking to be effective. Now there needs to be a plan, a goal, a focused agenda for what you are trying to accomplish.</div><div align="left"><br />These goals may vary. Who is your target client? Are you selling retail or business to business? Is your responsibility marketing, PR or sales? Is your goal long term branding or are you trying to generate leads for today? These questions and more are going to be important in understanding which tool is best for you and leveraging that tool for results. </div><div align="left"><br />I was initially an offender. I am on <a href="http://www.facebook.com/home.php#/group.php?gid=149714437556&ref=ts">facebook</a>, <a href="http://www.twitter.com/">twitter</a>, <a href="http://http//www.linkedin.com/in/vincentverducci">linkedin</a> and a few other less main stream sites. I started on facebook and linkedin 3 years ago. Up until 6 months ago, these sites have had little to no positive impact on my ability to drive business for <a href="http://www.acs.com/">ACS Services</a>. This wasn’t the websites short comings, but my own. I spread myself too thin. I didn’t use these tools with a goal in mind. I was on the sites every day but had no understanding of why I was on the site, what I was looking for or how to best leverage them. </div><div align="left"><br />After researching, trial & error, speaking with others and asking myself some of the above questions, I determined that <a href="http://http//www.linkedin.com/in/vincentverducci">Linkedin</a> was best suited for me. <a href="http://www.acs.com/">ACS Services </a>sells outsourced IT services to small to mid-sized businesses in the Boston area. This is a very specific and target marketed. <a href="http://http//www.linkedin.com/in/vincentverducci">Linkedin</a> allows me to search candidates in the area and see if I have any contacts that are connected to them. This is great for referrals or to make a cold call a warm prospect. It has also allowed me to be strategic and efficient about finding good networking partners through Linkedin’s Groups. Unfortunately the use of this site effectively is a whole other blog.</div><div align="left"><br />I leave you with this thought. If you are currently “social networking”, think about how you are using these sites. Are you getting what you want from them? Do you have a goal in mind when using the sites? Ask other people how they utilize the different sites. I think we will all find that we are “leaving money on the table.” If you have any questions please feel free to email me at <a href="mailto:vverducci@acs.com">vverducci@acs.com</a> and good luck with your social networking. </div><div align="left"> </div><div align="left">-Vincent Verducci, Director of Business Development</div>ACShttp://www.blogger.com/profile/12574876195048353136noreply@blogger.com0