Monday 31 August 2020

Free Software Assurance Training

If your company has acquired Software Assurance for Microsoft products, the Network Technologies Training Center invites you to take advantage of the opportunity to receive free training in our training center!

For training, you must use special vouchers (Training Vouchers), which provide an opportunity to complete training for free. Each voucher is eligible for a specific number of training days based on the number of Software Assurance licenses (see Microsoft's website for more information ).

Training can be completed on any Microsoft product, regardless of which product has been purchased with Software Assurance licenses!

The Training Center "Network Technologies" recommends that you check the availability of vouchers for free training in your company and apply for training as soon as possible!

How do I get Software Assurance voucher training?

In order to undergo the most suitable training for you, to optimally plan the order of completion and dates of courses, we recommend the following procedure: amazon solutions architect

You need to go to Microsoft ( Volume Licensing Service Center (VLSC) ) and check the available number of training days for Software Assurance vouchers.

After that, go to the website of the Networking Technologies Training Center and choose an available course from the full list of Microsoft courses or choose the nearest training from the schedule for the next few months (if you cannot choose a suitable course, please contact the consultants of the Training Center ).

Then you need to agree on the course you have chosen, the date of its completion and the number of participants with the Training Center "Network Technologies". This can be done by phone +380 (44) 390-73-35 , e-mail edu@techexpert.ua or via Skype (ec.nt.ua),

After agreeing on all the organizational issues, you need to go to the Microsoft website and activate the required number of vouchers according to all the parameters you have chosen. The result of this step should be activated vouchers.

Received vouchers must be sent to the Training Center "Network Technologies" at the contacts below.

The most interesting step is to go through the ordered training from the best teachers of Ukraine on Microsoft products and technologies!

You can find detailed information on the terms of activation and use of vouchers, as well as the required number of licenses on the Microsoft website .

Microsoft Software Assurance Implementation Planning Services (xDPS)

Deployment Planning Services is a Software Assurance benefit for Microsoft customers. With xDPS implementation, customers can improve the efficiency of their infrastructure. This service is provided free of charge as a Software Assurance benefit. Customers receive vouchers from Microsoft that can be used to pay for TechExpert's development and delivery of a deployment plan

Friday 28 August 2020

Free TechExpert cloud testing month

All listeners of the Network Technologies TC are given 1 month of testing the TechExpert cloud instead of the standard 2 weeks. A test request can be submitted through your personal account , section Hosting - Catalog. Indicate in the comment that you are a CA listener.

Also get a voucher for a free test for 2 weeks of the following resource pool with the onbizdemo promo code : infrastructure architecture certification

12 vCPU,

36GB RAM,

500GB SSD,

500GB SATA.

To get a pool of resources, enter the onbizdemo promo code in your personal account , section Hosting - Catalog, here you can also familiarize yourself with the TechExpert cloud virtual server configurations available for testing:



  


Thursday 27 August 2020

Audit and modeling of business processes

Striving for high efficiency in project management sometimes requires changes in already established business processes in enterprises and organizations. Such a change should be carried out in several stages, the most important of which are the audit of existing and modeling of business processes, as well as the development and implementation of new business processes five nine solutions salary.

Business process audit allows you to describe the existing system of relationships between structural units of an organization and between employees. It is carried out if business owners are dissatisfied with the economic result of the organization's work, the cost structure is not clear, and the management system is not transparent. The audit allows you to define the situation “as is” and use the results as a starting point for further changes. It is carried out in several stages, the main ones of which are document analysis, interviews with employees, reporting and presentation of results. The audit takes into account the specifics of the organization's business activities. Separately, offers of goods and services can be considered from the point of view of their relevance, territory and location where the organization operates,

After the audit, procedures for modeling business processes can be carried out. Models help define and understand existing business processes in an organization “as is”. They can also be used to simplify, optimize, and improve manageability. Model building is carried out on the basis of preliminary audit using various methods and tools, for example, graphical IDEF, BPMN, ARIS, ArchiMate, MindMap and others. Visio, ARIS, BPWim, ARCHI and others can also be used.

An audit of business processes of an enterprise should be carried out regularly, this will help monitor the development of interactions between business units in a company. You can learn this in specialized courses on business process audit .

Microsoft 365 capabilities

Microsoft announces that Office 365 will become Microsoft 365 on April 21, 2020.

Business has long had the opportunity to experience all the benefits of an end-to-end cloud solution Microsoft 365 . And for home users, Microsoft 365 is probably a new product.

What is Microsoft 365, what programs are included, and what are the benefits of using it on home computers and mobile devices?

Enjoy all the features of the premium version of Office programs: the programs are available from both PCs and mobile devices on iOS or Android.

Top notch protection and reliability: automatic backups, 1TB cloud storage per user, OneDrive safe for your most sensitive and critical data at&t engineer salary.

The price for home users is $ 6.99 per month per user, however there is a family subscription (up to 6 users) - $ 9.99 per month, respectively.

And some more interesting tricks that Microsoft announced:

Fast Skype. A Meeting feature will appear in Skype for quickly organizing video meetings.

Family Teams. Teams will expand from business solutions for teamwork, conferencing and webinars to a family-friendly solution with the new Family Mode — plan, communicate, share with your family.

Safer Edge. Microsoft will supplement the functionality of its browser by checking dangerous passwords against the data leakage database. There will also be a new reading mode with the ability to edit text and "smart copy" - now the data copied from the browser will be inserted into the document, changing under the document formatting.

New Family Safety app. Manage screen time and online time of your children, stay on top of your family's movements with the new family app.

Improved Word. The Editor checking system will become better, now you can check not only grammar, but also text style. However, this functionality will be available in English.

Smart PowerPoint. The new Smart Assistant feature will help you effectively deliver a presentation - to make an accent or pause.

Integrated Excel. The Excel program for financial management will integrate with Microsoft Money. A bank account can now be directly connected to a spreadsheet, but this feature will only be available in the United States.

Tuesday 25 August 2020

Microsoft Azure certification changes

Microsoft has announced the next changes in the certification of specialists. This time, the changes affected courses and exams for the Microsoft Azure software solution. Microsoft is updating the AZ-103 exam and course. Starting April 2, 2020, a new version of this AZ-104 exam and the AZ-104T00 Microsoft Azure Admin course are available . Nevertheless, the AZ-103 exam will be available for delivery until August 31, 2020.

The changes also affected the AZ-203 exam. On February 24, 2020, the new AZ-204 exam and the AZ-204T00 course Developing Solutions for Microsoft Azure became available . But candidates who were preparing for the AZ-203 exam will be able to get certified by August 31, 2020. Recall that after passing this exam, you are awarded the Microsoft Certified: Azure Developer Associate certification cloud certification.

The changes will also affect AZ-400, one of the exams required for Microsoft Certified: DevOps Engineer Expert certification. Although the exam code remains the same, the exam program has changed significantly. The changes will take effect on June 15, 2020. Therefore, be careful when preparing for the delivery of the AZ-400.

Comparison of old and new exam AZ-400

Source: Microsoft

It is also worth noting that the structure of the AZ-400T00 course has also changed, which prepares you for this exam. Previously, the course was 7-day and the listeners were offered a choice of 2 types of training: passing the full course or one of seven modules to choose from. Now this course is 5 days long and there is no opportunity to listen to any module separately. You can get acquainted with the updated program of the course AZ-400T00 Development and implementation of Microsoft DevOps solutions on our website .

Monday 24 August 2020

5 enterprise cloud strategy trends for 2020

Architecting hybrid cloud environments and teaching IT staff how to work with and manage them are top of mind for CIOs seeking innovation from cloud computing services in 2020. 

Clint BoultonBy Clint Boulton

5 enterprise cloud strategy trends for 2019

What does a cloud architect do

Cloud computing has become the model of choice for modernizing IT portfolios, with companies gaining agility and speed to market by renting public cloud software.

But more and more CIOs are standing up so-called hybrid cloud systems in which they shuttle business applications between public clouds from Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP) and private clouds running internally, or even hosted off-site by a provider.

Stay on budget with these 6 cloud cost management tips, learn the 5 fundamentals of effective cloud management and beware hidden cloud migration gotchas. Get the latest cloud computing insights by signing up for our newsletter.

“In the early days of cloud, many organizations chose one cloud services provider to work with exclusively,” says Charlie Li, Capgemini’s chief cloud officer. “Today, that approach doesn’t go far enough, and organizations are recognizing the benefits of multi-cloud, such as improved organizational flexibility, efficiency, and performance, as well as avoidance of vendor lock-in.”

CIO.com looks at the key trends that will shape cloud adoption in 2020.

Saturday 22 August 2020

Cars in the clouds

Terrafugia - an airplane car that handles and parks like a car, but can fly - was unveiled at the New York Auto Show.

True, the mass production of such a flying car is still very far away, but now there are truly "cloud cars".

Crew Systems, a Japanese telemetry company, has developed "black boxes" for cars - akin to black boxes on airplanes. Now all information about accidents, about normal and dangerous driving, GPS-navigator data, cameras and audio for each car - everything is recorded and stored in the cloud. All large trucking companies are required to make daily reports on the performance of their drivers based on the data received. And Japanese parents are demanding that such "smart gizmos" be installed on all school buses technical customer service.

In this case, clouds play the role of storing information from various sources and are practically the only convenient option for such a resource-intensive task.

Friday 21 August 2020

A useful tool is snapshots: how they are created and what they can do

Data security and safety is an important issue for any business. Unlike physical servers, clouds have much broader capabilities. For example, you can completely restore a virtual machine disk from the past. This is available thanks to the useful tool snapshots. Earlier we already wrote what it is and why they are called a time machine. Now let's tell in more detail under what conditions snapshots are created and how storage of two snapshots of each disk of the client virtual machine is achieved.

What are snapshots and why are they needed

Snapshots are complete snapshots of customer virtual machine disks that we take on a regular basis. For all users of TuchaFlex + and TuchaBit services, we take snapshots and store the last two of them for each client disk. The cost of creating and storing snapshots is already included in the cost of renting servers.  

What are snapshots for? A snapshot can be used to restore a machine disk to the state it was in when the snapshot was taken. Also, the snapshot can be uploaded for further use as an image of a new virtual machine, or added as an additional disk to any server within our cloud infrastructure.

How snapshots are created tech support engineer job description

Let's recall how snapshots are created. The virtual machine is stopped during the snapshot creation. The pause can last from a few seconds to several minutes - it all depends on the size of the disk and the size of the data that has changed since the last snapshot. At this time, the snapshot has the status Creating . When the snapshot is taken, it gets the BackingUp statusand the virtual machine resumes its work. Then the snapshot is copied from the main storage to the backup. This process takes from several minutes to several hours, the exact time depends on the volume of the disc. This does not affect the operation of the virtual machine. After that, the snapshot is deleted from the main storage, and the virtual machine briefly stops working at this time. When the snapshot is deleted from the main storage, the virtual machine will continue working, and the snapshot saved in the backup storage will receive the BackedUp status. 

Snapshot time

We take pictures from 20:00 to 06:00. For one storage, no more than two snapshots are created at the same time, while in the Creating phase there can be only one snapshot. It is assumed that one more snapshot at this time has a BackingUp state . 

In what order are the images taken? In the queue, those disks for which the last saved snapshot was created before the others have higher priority. There is an intelligent algorithm that determines their queue, taking into account the "age" of the last images and the load on the infrastructure.

Is it possible to change the time of taking pictures

For a specific virtual machine, you can shift the snapshot time or make the interval narrower. However, it is worth considering this: if you narrow the time period too much, then the likelihood that the picture will be taken during this period is significantly reduced. This happens because another probability increases: during the specified time interval, the storage will already create a snapshot of another disk. Therefore, if the user still wants to narrow the time interval for taking pictures, we recommend setting the gap width at least 3-4 hours. 

A virtual machine can also give up its turn in another case: if at the moment when the snapshot queue comes up to it, it performs operations with a disk with an intensity of more than 1024 KB / s. It is for this reason that pictures are not always taken strictly every night.

Of course, you can ignore the shared queue and virtual machine activity metrics. That is, to create pictures strictly at certain hours and days (for example, once a day at 4:20). However, there are certain risks involved. For example, the risk of data corruption inside the server itself, since the operating system, when creating a snapshot, may begin to write any data that will not be added due to a pause in the virtual machine, which is necessary to take a snapshot. As a result, the file system can theoretically lose its consistency (integrity), which will lead to damage or loss of some data.

If the client finds it convenient to take a different snapshot time, you can change the schedule. To do this, you just need to contact our technical support service , and we will organize everything.

Thursday 20 August 2020

Data security in the clouds

For a modern company that wants to remain competitive, information has become the main value - work data, customer base, business contacts, developments, accounting information, etc. Loss or, even worse, leakage of data to competitors or free access today is often tantamount to bankruptcy. Therefore, information security issues are given close attention in any serious business. The traditional approach - local or dedicated servers - no longer satisfies most companies, because the risks are too great: equipment failure, theft or seizure can seriously harm.

Given the situation, management and administrators are looking towards cloud solutions that are designed to protect against most negative scenarios. In addition, cloud infrastructure is also cheaper than maintaining a fleet of equipment, and the desire to save money becomes another factor when choosing a remote service. On the other hand, the lack of cloud knowledge scares potential customers. So should you be afraid of storing data in the cloud?

Some cloud use cases service desk analyst job description

Those companies that are not familiar with modern cloud solutions often perceive such services rather narrowly - as a regular file storage, only remote. However, this is only one of the many options for using the cloud, because today solutions based on virtualization technologies allow:

automatically create and store backups (data backups). You no longer need to worry that a backup that is not made in time will lead to the loss of important data - the remote server is responsible for this according to the established schedule. It is just as easy to restore data from backup storage, literally in a few clicks;

keep accounting in 1C: Accounting or another familiar environment - both the software and all the necessary environment can be deployed on a cloud server and provide access to trusted employees. All working data, databases are also conveniently and safely stored in the cloud;

launch and maintain the work of CMS 1C-Bitrix and corporate sites that operate under its control, as well as any other CMS on which the company's sites are built. This solution allows you to provide sites with almost 100% uptime;

any other software packages that your company works with - office applications, CRM systems, databases, IP telephony and much more. This allows you to completely transfer office work to the cloud and save on equipment. At the same time, there is no need to retrain employees - for them the working environment will remain familiar, but the necessary flexibility and mobility will be added.

Cloud technologies leave customers complete freedom - to install any operating systems, accompanying software, customize and configure the environment for themselves - there are practically no restrictions.

Why is the cloud secure?

For a business service provider, the security of customer information is a top priority. At Tucha, we make sure that every byte of data is securely protected. And here are the main things we do for this:

we place equipment in a Tier III data center located in Western Europe (Frankfurt, Germany). This level of protection means that all main engineering and network communications (electricity supply, ventilation, temperature control, access to the network) are duplicated, repair or replacement of one of the components does not require the equipment to be suspended. Even force majeure, such as, for example, a power outage, will not lead to a work stoppage or loss of data;

we use network equipment and carrier-class servers from top vendors, no low-end hardware;

we regularly replace worn-out elements, we replicate data on parallel media;

for additional protection, we regularly create system snapshots and data backups (for some services this service is included in the default price, for others it is available upon request).


Wednesday 19 August 2020

TuchaHosting website and mail hosting test plan

Setting up and starting to use our hosting is not difficult. But not all customers who have ordered a test period know what and in what sequence to do in order for the testing to pass with maximum benefit. Therefore, we decided to draw up a small test plan for the TuchaHosting service .

Let's see how in just a few clicks: it support engineer

create a WWW domain;

create a subdomain;

install an SSL certificate;

change MX- and A-record;

set up a mail domain and mailbox;

create an FTP user;

set up an account password;

create a database;

upload site to hosting.

WWW-domain creation

1. Open WWW domains and click Create .

2. Fill in the fields and click OK.

Subdomain creation

1. Open WWW domains again and click Create .

2. Fill in all the fields with a subdomain in the Name field.

3. Click OK to save.

Installing an SSL Certificate

1. Open SSL Certificates and click Create .

2. Select the type of certificate: Self-signed or Existing (if you already have a previously purchased certificate) and fill in the required fields.

* Learn more about SSL certificates

3. Open WWW -domains , select the required domain and click Change . Check the box next to Secure connection ( SSL ) and select a certificate.

Changing MX and A records

1. Open Domain Names , select the required domain and click Records .

2. Select an entry and click Edit .

3. Edit the required data and save the changes.

Setting up a mail domain and mailbox

1. Go to Mail > Mail Domains and click Create .

2. Complete the fields and save your changes.

3. Open Mailboxes and click Create .

4. Enter the required information and save the changes.

5. If you want to turn off the box in the future, press Off. (blue light).

Create FTP user

1. Open FTP Users and click Create .

2. Complete the fields and save your changes.

Change account password

1. Highlight your account name in the upper right corner and select Settings .

2. Change the password and save the changes.

Database creation

1. Open Databases and click Create .

2. Fill in the required fields and save your changes.

Uploading a site to hosting

1. Open the File Manager .

2. Enter your site directory: www > my-new-site.com . Click Upload .

3. Download the required site files. If you downloaded an archive, unzip it by clicking Extract . Select the path where the files will be unpacked.

4. That, in fact, is all - the site is uploaded to the hosting. Nothing complicated, right?

Tuesday 18 August 2020

IP telephony for business - benefits and opportunities

Friends, we are always happy to share useful tools that will help your business work more efficiently. Among them, for example, complex telephony. So, together with Stream Telecom, which provides a virtual PBX service, we have prepared an article on the possibilities of IP telephony for business and the benefits of its placement in the clouds.

Modern business must have an exceptional relationship with customers and partners. Outdated telephony technologies do not help in this matter. If you keep people waiting or listening to annoying busy beeps, your connection may be outdated and of poor quality. The modern IP telephony capabilities are suitable for companies of any level. You can get the benefits of uninterrupted, high-quality and cheap communication that takes into account all the specifics of your business edge programmer tech support.

What are the benefits of cloud IP telephony?

Cloud IP telephony is the placement of a service on a virtual server on which all calls are processed. Previously, companies had to buy automatic telephone exchanges, connect them to landline networks and pay big money for each call and fax. Today everything has changed. Now you choose the operators yourself and you can optimize your tariffs, you get a functional and modern telephone line, and you can also refuse to purchase expensive stations.

Benefits of cloud telephony for business:

Communication from any device - smartphones, tablets, computers, IP phones.

Cost optimization. You can use the services of all operators, the virtual PBX itself will choose the best tariffs.

Multichannel numbers. One number can serve several lines at once, there is no need to buy dozens of SIM-cards.

Free calls to the internal network. Your employees can communicate with each other using short numbers.

Integration with CRM. Call statistics, generation of automatic reports, full control and optimization of managers' work.

High-quality communication. You get a fast and convenient phone service that is optimized for your business.

Given these advantages, you can significantly increase the number of successful calls, implement mailing lists for clients, create an IVR menu to automatically inform clients. These are just the most popular IP telephony features that guarantee flexible and high-quality communication with partners, customers and employees. Opportunities will be customized for each company.

How do you know if you need cloud telephony?

In the modern world, you need IP telephony in any case when communicating with clients and partners using calls. A virtual PBX from our partner Stream Telecom is a convenient and high-quality connection for your business. Cloud telephony saves you money on IT infrastructure and allows your entire team or individuals to work from anywhere. Even small companies with a small team will benefit from properly configured cloud telephony. And this, in turn, will contribute to business development and simplify the company's business processes.

Implement IP telephony and other modern useful IT tools and host them in the clouds from Tucha to keep your business running smoothly.

Monday 17 August 2020

How to use KeePass easily

We often hear about the need to create strong passwords. However, there is neither time nor desire to invent and memorize complex combinations. Plus, there doesn't seem to be much of a need for it.

And creating a password that hackers can easily pick up is not a whim, but an important cybersecurity event. Proper storage of passwords is equally important. For example, writing them down on sheets of paper, using a single combination for all accounts, or assigning them to your own memory is the key to your data, which you give to the attackers yourself. However, this is easy enough to prevent. Password managers come in handy. More passwords only for specialized applications with a good reputation. In this article, we will look at one of the most common programs for generating and storing passwords - KeePass. We have prepared a visual instruction for you: functions, features and a description of the main operations. We'll also show you how to properly set up and use KeePass.

General introduction to password managers

Password Manager is software that helps you securely manage passwords and PINs. In such programs, usually a local database or files containing encrypted password data. Some password managers also act as form placeholders. This means they fill in the User field and Password data automatically in the forms. These types of software are predominantly installed as a browser extension.

KeePass features

KeePass is one of the first free open source password managers that has all the basic password manager capabilities for personal use. The utility supports not only Windows, but also Mac, iOS, Android, Linux. KeePass itself is saved in a file that can be synced using Dropbox or removable media. In KeePass, the password database is encrypted using the AES-256 algorithm. In addition, various security methods can be used, for example: Master password, Key file and / or Windows user account. If you will only use the Master password to open the database, you must remember it well. In case you will use the Key file, you can select any file. However, we advise you to stop at something that has a lot of random data. The key file must not be changed, as it might prevent the database from opening. If you need to use a different key file, you should change the master key and use a new (or different) key file. Key files should be backed up. This is important to avoid the hassle of opening the database in the event of a hard drive failure, modification, or repair.

Let's take a look at another KeePass feature. This password manager can create a database according to the current Windows user account. If you enable this option, you will be able to open the databases only when authorization in the system took place with the same Windows account and when these databases were created. However, you can confidently change the password for a Windows user account: it will not affect the KeePass database computer technical support services.

And remember, there are no backdoors or generic keys to open KeePass databases!

Description of the main operations

1. The first step in working with KeePass is software configuration. At the beginning the password manager is automatically installed with an English interface. In order to change the interface language , go to the View -> Change Language ... tab and select the desired language:

KeePass_1

To ensure maximum protection and preservation of the password database , use the special program settings: Tools -> Options -> Security .

KeePass_2

2. The next step is to create a database. You can create a new Password Database as follows: go to the File -> New tab or press the Ctrl + N key combination :

KeePass_3

Next, you need to confirm your actions

KeePass_4

After confirming the actions, KeePass prompts you to select a location to save the database and come up with a complex Master password :

KeePass_5

You can also use Key file and Windows user account for additional protection of the password database (Composite Master Key). Then all the main sources (password, key file, Windows account), if any, will be required to unlock the password database .

Next, you can set personalized parameters for the base that you just created, namely: default login, base color, encryption algorithm, and the like. In the program, it looks like this:

KeePass_6

3. Now let's go directly to working with the database. There are several ways to save the password to the database : click the corresponding button in the quick access panel, go to the Edit -> Add Entry tab, or press Ctrl + I :

KeePass_7

As you can see in the image, the following parameters can be specified in the database: Title, User name, Password, URL (address), Note (Note).

In addition, we can immediately change the password display icon:

KeePass_8

To introduce changes to an entry that already exists , right-click on it and select Edit / View Entry . Or you can do it differently: go to the Edit -> Edit / View Entry tab or press the Return key :

KeePass_9

Now let's look at how to copy the username to the clipboard . To do this, click on the desired entry with the right mouse button and select the Copy User Name item , or press the Ctrl + B key combination . The button on the quick access panel is also used for this:

KeePass_10

Let's go ahead and find out how to copy the password to the clipboard . Click on the required entry with the right mouse button and select the Copy Password item . Another option is to press the keyboard shortcut Ctrl + C. For this, there is also a button on the Quick Access Toolbar, it looks like this:

KeePass_11

In both cases, in the lower right corner of the program window, we will see that a counter (strip) has started, during which the data will be available for insertion:

KeePass_12

Records can be organized , grouped and sorted . A simple drag and drop (copying) and the creation of appropriate groups will come to the rescue. Create a new group as follows: right-click on the directory, exists, or on the root (name of the base). You can also just go to the Edit -> Add Group tab :

KeePass_13

Groups can be easily edited ( Edit Group ), as well as give them different names, add descriptions and change icons.

To take advantage of additional grouping and sorting functions, select the View -> Sort By / Grouping in Entry List menu :

KeePass_14

A neat advantage of KeePass is that you don't have to manually fill in the form every time. For this there is an autocomplete form. To use the provided option, just leave the first login data field active for authorization and switch to KeePass. And the keyboard shortcut Ctrl + V or the button on the Perform Auto-Type quick access panel will do everything for you and start the auto-complete process:

KeePass_15

So, we've covered the basic steps with KeePass. As you can see, understanding and working with the password manager is not at all difficult. And even easier with our visual instructions! So try this powerful tool in combination with our cloud solutions and keep your work safe. If you have any additional questions, need help or advice on the application and services, call or write to us . We are in touch 24/7!

Thursday 13 August 2020

Nikolay Troyanchuk, head of the department for work with partners of "Stream Telecom"

About the importance of partnership.

For us, partnership is definitely the best thing that can be in business. This reminds me of a situation from my childhood: “Hi, my name is Kolya. Let's be friends". And after that, you and your new friend (partner) begin to build a joint huge sand castle (a profitable business), which you yourself could not build so quickly. You help and support each other, you understand that through joint efforts you can achieve success much faster. 

We try to build the most friendly relations with each partner, as can be seen from the example of cooperation with Tucha. Our partners work in various fields: CRM integrators, data centers and hosting providers, system administrators, telecom operators, Internet providers, consulting agencies, web studios, digital agencies, and each of them has its own approach.

On the principles of choice.

First of all, I would like to draw your attention to the extent to which our partner and I have the same values ​​in life and in working with clients. There were even cases when we personally refused partnerships to large companies, when we realized that our values ​​in working with clients differ radically. We try to select for ourselves only those partners with whom it will be comfortable for us and our clients to work. 

About inadmissible in partnership.

Everything is simple here: the partner should not blush in front of the client for his recommendations. 

About partnership with Tucha.  

The decisive moment when we realized that Tucha and I were on the way was a business conference in Zaporozhye. Although we had known each other for a long time, after this conference everything became clear after we talked personally about the specifics of the work, about clients, about cases and about the partner network. These are our people, they can be recommended with confidence. We really appreciate the approach to work and to clients. Tucha adheres to the same values ​​as our company, which is very cool. The whole team is great. Continuing in the same spirit, Tucha has the best service in the cloud! 

About Tucha's recommendation to his clients.

I will say more: we are Tucha's hidden sales force. ;-) When we understand that somewhere else there is a partner to whom we can be useful, we recommend Tucha to him. And this is the highest mark of the company's work.

Working at home tech support jobs

Maxim Rabochiy, executive director of "ItUA"

About the importance of partnership.

For me, partnership is a mutually beneficial form of cooperation, in which a business symbiosis occurs between all interested parties. If everyone benefits from cooperation, then this is true partnership.

As for the importance of partnership, it plays a key role in business. If you are not Batman, then you will not be able to cover all the key needs (yours or the client's). After all, you cannot be good in everything, and even more so to be in several places at once. The Emirates cannot be built alone without reliable partners.

Our partners are time-tested people from different business areas. There are both well-known market players and companies that are just starting their journey. We help the latter with our experience and expertise, and they often recommend us for this. In this case, both they feel good, and we are pleased.

On the principles of choice.

When choosing a partner, we most often pay attention to his expertise, cases, reputation and values. Even if the partner does not yet have the necessary competence, cases and reputation, but is similar to us in values, this is our partner. 

The main principles we are guided by are honesty, reliability, decency, respect and sincerity.

About inadmissible in partnership.

There is such a concept in business as "environmental friendliness". We respect our relationships and agreements with partners and will never allow ourselves the following things: cheating, default on obligations, putting a partner in an unfavorable light in front of a third party, as well as poaching customers or employees. We expect the same from our partners, because this is what builds a strong foundation for long-term and mutually beneficial relations.

About partnership with Tucha.  

We met at a partner event organized by Bitrix24. However, as it turned out, they were indirectly familiar even before that. In partnership with Tucha, we value friendship and mutual understanding. If we talk about professional aspects, then this is customer focus and quality of service.

Over the entire period of cooperation, I have never heard any complaints from a client about Tucha services.

About Tucha's recommendation to his clients.

I advise Tucha clients as confidently as I recommend buying a Toyota car (after all, the Japanese know a lot about quality).

When working with Tucha services, our client gets a stable and secure infrastructure, and we, in turn, get peace of mind. After all, this way we can focus on our most beloved business - developing solutions that automate the client's business and free up his time.

Checklist: How to choose a cloud provider

So, you have decided that you cannot do without cloud services. The next step is to find a reliable provider. You drive the query "cloud provider" into the search engine and ... your eyes run wild. There are many offers, and all suppliers seem to you to be the same person: "quality service", "affordable price", "individual approach" and the like. How not to get lost among so many similar-looking sentences?

We share with you practical advice and a useful tool in the form of a table. For ease of use, you can download the checklist . Be sure to ask questions from the list below to potential suppliers, mark the answers in the table and choose the best option according to the criteria that are most important to you.

Download checklist

Find out the reliability of the data centers where your data will be stored

This is one of the main selection criteria. The reliability of data centers consists of several factors: geographical location, degree of security, physical security, availability of necessary communication sources (uninterruptible power supply, air conditioning, etc.). Let's look at everything in order.

Location of data centers. Data centers are located both in Ukraine and abroad. Each of the options has its own characteristics. Basically, data centers outside Ukraine boast a higher level of availability. The advantage of Ukrainian data centers is the budgetary cost of services.

We offer two options for virtual servers with different locations of data centers: TuchaBit and TuchaFlex + with data centers in Ukraine and Germany (mostly), respectively.

Physical security and security of data centers. It includes protection from unauthorized persons on the territory of data centers, the presence of electronic protection systems, centralized uninterruptible power supply, air conditioning and power supply systems, duplication of the main systems for ensuring the operability of the data center. A reliable data center must be certified.

It makes sense to trust only those providers who place equipment in data centers of Tier III and IV levels. Why? In the event of errors and system failures in data centers with Tier I and II security levels, work can be completely paralyzed. Tier III and IV keep systems up and running even during data center failures, maintenance and repair work.

For example, we only work with data centers with Tier III and higher levels. This ensures high levels of resiliency and data integrity in the clouds, as well as stable operation even during power outages.

All important communications (power supplies, internet, power lines, backup channels, cooling systems, etc.) are duplicated in our data centers. Thanks to this, the recovery processes are carried out without interrupting the operation of the equipment.

Make sure your provider provides a snapshot service

Before entrusting your important data to a provider, it is extremely important to make sure that the company provides a snapshot service. Snapshots are a guarantee of the reliability and security of storing your data in the clouds. And also the indicator of the provider's responsibility.

Alas, not all companies provide such a service, since it requires additional investments in equipment. But we took care of this to ensure the complete safety of your data. TuchaBit and TuchaFlex + services already include the cost of creating and storing the last two images. And if you need more snapshots, you can order additional snapshots as needed.

A snapshot (snapshot) is an image of a virtual machine disk, that is, the entire system with software and data that is stored on it at a certain point in time. The snapshot helps to restore the system to its original working state after any critical changes. For example, after a virus attack, use a snapshot to restore a machine disk to the state it was in when it was created it support job.

Do not confuse snapshots and backups (data backup). Making only backups is not enough, since they only create copies of individual files. Copies will help restore certain files, but only snapshots can restore the state of the system. Therefore, it is best to use these tools together.

Determine the quality of technical support work: availability, speed and efficiency of response

The availability of technical support in itself does not guarantee you a quick response to requests and quality assistance. Find out more about the technical support service of your provider: work schedule (for your convenience it should be 24/7), response speed, interest in the client's tasks. To check the availability of technical support in practice, contact it through different communication channels.

It's good when there are several ways to get through to tech support: phone, mail, ticket system. In technical support Tucha operate all of these channels. And you always have the opportunity to make sure of our availability.

Check out support levels, server administration capabilities

In order not to be left without help at the right time, check out the types of support from the provider in advance.

What kind of support does the provider provide? Let's take an example of the work of our company. We provide 4 types of support :

Free basic support . Employees of our service maintain the operability of our infrastructure, ensure its stability and availability. We do not have access to the operating system on your server, so we do not interfere with its work, limiting ourselves to professional advice.

Server administration is permanent. We get access to your system and can not only advise you, but also solve emerging problems related to the operating system and software installed on the server. The cost of the service is 50% of the server cost, but not less than 30 euros / month.

Server administration hourly... Administrator rights are issued to us only for the period of one-time work to eliminate errors on the OS and software side. The cost of the service is 20 euros / hour.

Warranty support . Essentially the same as server administration, but free. An important condition is a new virtual machine and only our employees have administrator rights. Only works for hosting websites, email, domain zones and files.

Before starting cooperation, check the availability and conditions of support with the provider.

Wednesday 12 August 2020

On the security of working in the cloud

As noted, the rental price for each virtual machine already includes a useful data protection tool - snapshots. Not so long ago, we prepared an article about the conditions under which snapshots are created and how two snapshots of each disk of the client's virtual machine are stored.

What are snapshots useful for? A snapshot can be useful for recovering a machine disk to the state it was in when the snapshot was taken. In addition, the snapshot can be uploaded and used as an image of a new virtual machine, or added as an additional disk to any server within our cloud infrastructure.

Additionally, backups will help to protect individual files and documents from loss. To do this, we propose to use the TuchaBackup service , which will reliably place backups in secure data centers outside Ukraine (mainly in Germany). The cost of the solution is quite affordable: the minimum configuration, which includes 50 GB of cloud storage, costs only 5 euros / month. If more storage is needed in the future, it is easy to expand it.

Among other things, we offer useful tools for protecting your data in the cloud: Technical and software knowledge and skills

special server templates with disk encryption enabled;

the ability to encrypt communication channels;

service "Anonymity on demand" ;

additional IP-addresses with Ukrainian or foreign geolocation;

additional full snapshots of virtual machines disks;

mechanisms of panic buttons.

Is it possible to test services before paying

Of course, you can test most of our services for free for 7 days. This period is usually enough to ensure the quality of our services, the prompt work of the technical support service and a quick response to any inquiries. We will also advise on working with a remote office and help you move employees' workplaces to the cloud.

How easy it is to migrate to the cloud

If you decide to move your office work to remote servers, you should take care of the safe migration of all data to the cloud so as not to lose anything. This can be done, for example, by your company's IT specialists, but if they are not there, just contact us. We will help you to transfer all programs and data for work with high quality, and the whole process for a small infrastructure usually takes place within one day. The cost of the migration service is the same as the amount of renting a virtual machine for 1 month.

About technical support

High-quality technical support is an important factor that determines the comfortable work in the clouds for the entire team. In numerous reviews of Tucha, clients and partners claim that our technical support is the best among Ukrainian (and not only) cloud providers.

We advise you to learn about the types of support and determine which one meets the company's needs best, already at the stage of testing services. In general, you can choose one of the following types:

Basic support (free).

Permanent server administration (50% of the server cost, but not less than 30 euros / month).

Hourly server administration (€ 20 / hour).

Warranty support (free).

More details about each of the types of support can be found on the website .

It is important that no matter what type of support you choose, our team will be in touch around the clock and will quickly help in solving any problems. Communication channels with the service include telephone, e-mail and ticket system. And to get the most out of working with the Tucha team, life hacks for working with the technical support service will help .

Some legal and financial issues

When working with Tucha, each client receives a full package of accounting documents: acts of completion, tax invoices (for those who need them), original invoices, etc. We also provide the possibility of electronic document management, but we also work with the help of "pigeon mail".

As for payment for services, a large selection of payment methods is available at your discretion: current account, card payment through Privat24 or PrivatBank terminals, LiqPay online payment. The fees for our services can be attributed to the expenses of the enterprise. Despite the fact that the prices are indicated in euros and are tied to its rate, payment for services is carried out in national currency at the NBU rate for the first day of the current month. Also, prices already include VAT (for those who are payers of this tax).

It is important that all our prices are transparent: they are published on the website and are initially the same for all customers. And cooperation with us is based on a public contract (offer) . If the client needs a paper version of these documents, we will also provide an application for joining the public offer agreement.

conclusions

Moving the team's workplaces to the clouds will allow you to set up high-quality remote work, wherever employees are at this time. Thanks to virtual servers, company data is securely located and additionally protected from losses and access to them by unauthorized persons. Tucha's technical support service will be in touch 24 × 7 and will do everything to ensure that the work of each individual employee is comfortable.

Tuesday 11 August 2020

Data security in the clouds

For a modern company that wants to remain competitive, information has become the main value - work data, customer base, business contacts, developments, accounting information, etc. Losing or, even worse, leaking data to competitors or free access today is often tantamount to bankruptcy. Therefore, close attention is paid to information security issues in any serious business. The traditional approach - local or dedicated servers - no longer satisfies most companies, because the risks are too great: equipment failure, theft or seizure can seriously harm.

Given the situation, management and administrators are looking towards cloud solutions that are designed to protect against most negative scenarios. In addition, cloud infrastructure is also cheaper than maintaining a fleet of equipment, and the desire to save money becomes another factor when choosing a remote service. On the other hand, the lack of cloud knowledge scares potential customers. So should you be afraid of storing data in the cloud?

Some cloud use cases technical support engineer jobs

Those companies that are little familiar with modern cloud solutions often perceive such services rather narrowly - as a regular file storage, only remote. However, this is only one of the many options for using the cloud, because today solutions based on virtualization technologies allow:

automatically create and store backups (data backups). You no longer need to worry that a backup that is not made in time will lead to the loss of important data - the remote server is responsible for this according to the established schedule. It is just as easy to restore data from the backup storage, literally in a few clicks;

keep accounting in 1C: Accounting or other familiar environment - both the software and all the necessary environment can be deployed on a cloud server and provide access to trusted employees. All working data, databases are also conveniently and safely stored in the cloud;

launch and maintain the work of CMS 1C-Bitrix and corporate sites that run under its control, as well as any other CMS on which the company's sites are built. This solution allows you to provide sites with almost 100% uptime;

any other software packages your company works with - office applications, CRM systems, databases, IP telephony and much more. This allows you to completely transfer office work to the cloud and save on equipment. At the same time, there is no need to retrain employees - for them the working environment will remain familiar, but the necessary flexibility and mobility will be added.

Cloud technologies leave customers complete freedom - to install any operating systems, accompanying software, customize and configure the environment for themselves - there are practically no restrictions.

Why is the cloud secure?

For a business service provider, the security of customer information is a top priority. At Tucha, we make sure that every byte of data is reliably protected. And here are the main things we do for this:

we place equipment in a Tier III data center located in Western Europe (Frankfurt, Germany). This level of protection means that all main engineering and network communications (electricity supply, ventilation, temperature control, access to the network) are duplicated, repair or replacement of one of the components does not require the equipment to be suspended. Even force majeure, such as, for example, a power outage, will not lead to a shutdown or loss of data;

we use network equipment and carrier-class servers from top vendors, no low-end hardware;

we regularly replace worn-out elements, we replicate data on parallel media;

for additional protection, we regularly create system snapshots and data backups (for some services this service is included in the default price, for others it is available upon request)

This combination of techniques allows you to guarantee uptime from 99% to 99.9%, depending on the service.

In a world where the cost of information is many times higher than the cost of the material base, security comes first. And we can really ensure the physical safety of your data and take care of your interests in any situation. Apply for competent advice, we are always in touch!

Sunday 9 August 2020

Why tech support is unbearable

yourself a balanced person. Calm, calm when others lose patience. But this feeling goes down the drain if you call tech support. First comes the irritation. Then the face turns red. You will end up yelling words into the phone that will horrify your mom.

This is called support anger syndrome.

You are not alone. If you get into a loop - waiting on the line, interacting with automated systems, talking with a person who reads a useless script from the manual aloud, waiting on the line again - then such a specific type of influence on the psyche, according to psychologists, can provoke anger even in the most seasoned human.

Worse, exactly as you suspected, companies are quite aware of the torture that customers are subjected to.

According to a survey conducted last year by the industry's International Customer Management Institute (ICMI), 92% of customer service managers believe their employees could be more efficient, and 74% of managers believe that the company's procedures Prevents support operators from delivering satisfactory results.

Moreover, 73% of those surveyed said that the complexity of inquiries from customers is increasing because people become more technical and can solve simple problems on their own.

Many organizations have implemented a cost-per-contact accounting system. It limits the amount of time an agent can spend talking to you, hence the agony of switching between specialists and constant call hold ("please wait on the line"), explains Justin Robbins, who was himself a technical support operator. and now holds one of the management positions at ICMI.

“Don't even think that companies haven't studied how far they can go in providing the lowest possible level of service. Says Robbins. - Some organizations have even monetized calls. They specifically make it so that you have to wait at least an hour to talk to someone from the technical support, and while waiting you hear messages like “If you want to activate the priority support service, dial this number, and for a certain amount you will be connected to a specialist immediately ””.

The most notorious offenders are companies like cable providers, cellular operators, and Internet service providers in sectors where there is least competition and whose subscribers are bound by contracts or will experience significant inconvenience if canceled. Unsurprisingly, cable and cellular providers have traditionally ranked among the top companies with the worst customer support .

AT&T, Comcast, and Verizon Communications did not respond to our requests for comment.

It is especially frustrating when a conversation with tech support is like one-way communication, because you are not understood - you are either trying to communicate with a robot, or with a person who has been trained to speak like a robot. This is for perceived quality control, or because he is so poor in English that he is afraid to deviate from the printed script it help desk jobs description.

"Not a single gap"
“It’s absolutely maddening because the nature of the conversation is that when I tell you something, I assume I’ll have an impact on the conversation,” explains Art Markman, professor of psychology at the University of Texas at Austin and co-author. podcast " Two Guys in Your Head ." "And when you answer with something that has no meaning, it becomes clear that all the words I said had no effect at all on what was happening."

When events become meaningless and feel like they’re out of control, mental health professionals instinctively feel threatened. While you might want to think that you can act intelligently in such a situation, in reality each of us is just a collection of nerve impulses and primary responses. In a state of threat, instincts push you to take decisive action, but there is nothing you can do about it, because you are stuck on the phone, it provokes anger.

Of course, those companies that do have really good tech support often sell products or services at a higher price, or they may charge a fee for better tech support, so the cost of help is included, like with AppleCare and Amazon Prime .

You can also find great support in highly competitive markets like domain name registrars, where operators like Hover and GoDaddy get high ratings. Also good are “hungry newbies” who are trying to break into markets traditionally dominated by large national companies. Take regional ISPs and carriers like Logix and WOW , for example , they rank at the top of the user ratings.

Experienced tech support specialists and psychologists say that there are other ways to get better support, or at least make it more bearable. First, one should at all costs keep oneself in hand. Take a deep breath. Count to ten. Letting off steam on the tech support operator is not a way to speed up the solution to the problem. Rather the opposite.

“I definitely remember [during my support job] discovering personality traits that I didn't know about when I got irritated and used passive-aggressive behavior,” says John Valenti, a video producer in Rochester. he worked as a tech support operator for an Internet service provider from 2007 to 2012 to earn money for his graduate school. He made an absurd film about thisfor his thesis at the Rochester Institute of Technology.

Valenti, like some other support workers who have posted confessions on the Internet, reports cases of rudeness when an operator puts a client on hold for a long time or "accidentally" disconnects it. It also happens that the operator helps to "fix" the momentary manifestation of the problem, but not its cause. Therefore, next time the person will have to call again about the same issue.

Also, do not bother with the requirement to call your boss. You will simply be switched to another operator, who will be warned in advance that the customer is upset, says Justin Robbins. Also, keep in mind that your words are recorded and later can be printed on posters that support staff hang on the walls to cheer up.

“I've seen companies make T-shirts with the cruel, terrible words people say,” Robbins said. He added that these T-shirts can be an incentive to improve customer support because they demonstrate how people can be brought to a state, "but they [T-shirts] can also just show that some people have really come out of the madhouse."

Customer support experts recommend using social media, including Twitter and Facebook, to contact the company rather than making a phone call. You can get an answer even faster through social media, not only because fewer people use such a communication channel, but also because your use of social media indicates that you know a way to convey your displeasure to a wider audience if your needs will not be met, or praise for good service.

To get the best service over the phone, it is recommended to dial the sales number, then you will almost always be switched to a local employee, while technical support is usually overseas with corresponding language problems communication difficulties [Indian technical support is common in many American companies - approx. per.

You can search sites like DialAHuman.com and GetHuman.com for help on which phone numbers and which numbers to press to quickly bypass the automatic system and switch to a person.

If that fails, there are mobile apps like Lucy Phone and Fast Customer.that will hang on the line for you and give a signal when a live person answered the phone. There is no need to accumulate anger listening to an annoying melody on hold .

Addendum : From the company's point of view, it is perfectly reasonable to keep the customer on the line for a while before connecting to the operator. It's a matter of balancing right. If you answer too quickly and too well, then the user will not learn, but will start calling for the slightest reason, even about the same problem that occurs repeatedly.

Aruba HPE Instant On Small Business Access Point Overview

Features of the Aruba brand and the Instant On line The Aruba brand is owned by the American company Hewlett Packard Enterprise (HPE) and is...