Monday, August 31, 2020

Interview. Andrey Shokhanov about IT security

In his interview after the course М2821 "Development and management of public key infrastructure in a Windows environment", which was held a few weeks ago at the TC "Network Technologies", Andrey said: what is a cloud architect

“As a trainer, I would like to note that course 2821 is one of the most important in the line of infrastructure courses. Today, there are practically no software products that do not use cryptography or digital signature. And one of the most frequent questions that I hear from IT specialists is “For some reason I have something swearing about a certificate”. And for the frequent question of what the error is, you cannot immediately answer. And when you figure it out, it turns out that initially the entire infrastructure was built incorrectly, which leads to a new headache “how to live further”.

As part of the course, we consider not only the basic principles of designing and managing a public key infrastructure, but also how to further develop their infrastructure to a level where companies can exchange information completely transparently and safely, while not spending a lot of effort on integration between different infrastructures.

For my part, I would like to note that one of the most interesting moments that I happened to see in the framework of this course is the organization of access to the corporate network using the citizen's identifier, which every citizen of Georgia has (this is about to start here).

Summing up, I can say that if an IT specialist does not know Active Directory or PKI, then it is simply pointless to study any products, be it Exchange Server, Lync Server System or SharePoint and the Dynamics product line. "

The depth, completeness of the course and the usefulness of the material were highly appreciated by the training participants. Several interviews with them:

Igor Bondarenko, "ProCredit Bank"

“I had been planning to take course 2821 for a long time, but in Kiev it is not read so often. One of the main selection criteria was the coach - I repeatedly visited the training grounds, which were led by Andrey, it was always interesting and useful.

It so happened that course 2821 was read at intervals of several days in different training centers, but it is more convenient for me to get to Network Technologies, there is an opportunity to park my car and there is no need to leave the building for lunch.

The course itself is built on the basis of outdated Windows 2003, but this was not a problem - Andrey showed how the functionality and settings look like on the current OS versions. The trainer is well aware of other topics on which the course is based and is happy to answer questions, therefore, during the training, we received much more useful information than was provided by the "training manual".

Soon I will have to implement a lot of what was discussed in the course. The knowledge gained and the support that the TC provides after the training to the trainees instill confidence that this implementation will be successful. "

Roman Cheremisin, TRK Ukraina

“The course that Andrei Shokhanov read, as well as many others that he read and reads, was very interesting both in terms of topics and in the provision of material.

The only drawback is that the course is focused on systems with 20,030 servers. Since almost all industries use a public key structure (PKI), not excluding ours, it became necessary to take this course so that there was not only an understanding of what PKI is, but also a certain practical skill in managing certificates, electronic signatures, certification authorities and other.

In the learning process, we have developed a fairly good atmosphere for the perception of theoretical material and the solution of practical problems. In my humble opinion, the courses taught by A. Shokhanov are one of the most interesting and easily perceived. Thank!"


Friday, August 28, 2020

The evening schedule is available again!

Don't miss  course M20767 Implementing Data Warehouses in Microsoft SQL Server 2016. Take training at a convenient evening and weekend! The course is open.

By popular demand of the listeners, the Training Center "Network Technologies" returns to the schedule courses with a non-standard schedule cloud architect salary.

The nearest course with a non-standard schedule starts on November 5. This is course M20767 Implementing Data Warehouses in Microsoft SQL Server 2016.

Students will acquire the knowledge and skills necessary to implement a data warehouse for BI solutions. The course covers creating a data warehouse in Microsoft SQL Server 2016, using ETL with SQL Server Integration Services, validating and cleaning data using SQL Server Data Quality Services and SQL Server Master Data Services.

You can get acquainted with the program and schedule of classes on the course page.

We remind you that almost any course at the Network Technologies Training Center can be taken remotely. You can also choose a convenient time for corporate group classes and even prepare an individual training program or develop a special course that meets the training needs of your employees.

Thursday, August 27, 2020

Features of business practices based on the new PMI PMBOK

The concepts of the new PMI PMBOK standard will help: google cloud solution architect

understand the level of maturity of project management systems;

audit existing business processes;

to standardize approaches to project management in companies.

By implementing PMI PMBOK v.6 practices, companies will be able to meet the cultural and transformational challenges of today's markets.

Application of PMI PMBOK v.6 standard

The new PMI PMBOK recommends actively involving people interested in their successful completion in project implementation processes. This way you can use the experience of participation in project activities of project initiators.

In special cases, for example, when developing software applications, it is recommended to consider the possibility of implementing projects without direct supervision, only by highly qualified performers. It is believed that professionals will quickly figure out how to effectively implement a project and present a working solution prototype to customers in a short time.

PMI PMBOK recommends bold use of alternative standards and methodology approaches. For example, to ensure flexibility, the Agile methodology is used, which provides for an iterative, sequential approximation of the project result to the ideal, to the way the customer sees it.

Any management standard is based on the willingness and desire to understand the way of thinking of project team members, partners and clients. Interaction between the project team and the initiators of the project, as well as within the project team, is possible based on the application of the values ​​of ITIL and DevOps approaches.

Based on the PMI PMBOK, you can develop effective strategies for the development of enterprises and organizations, then easily move to changes and improve the quality of project management.

Project management methodology training using PMI PMBOK v.6

How to achieve three times more productivity without a project manager?

How to effectively use a combination of PMI PMBOK v.6 and other alternative methodologies?

How do you understand the thinking patterns of managers in other companies?

How to move from belief in methodology to direct change and implement PMI PMBOK v.6 standard in your business?

Cloud technology trends in 2020

Cloud computing is one of the most promising and rapidly developing areas in IT. Information technology experts believe that cloud services will soon come first among all technologies to solve most business problems and achieve business goals. According to the International Data Corporation (IDC), at least half of IT spending is in the cloud, and according to Forbes, in 2020, 83% of enterprise workloads will be in the cloud.

We've listed the top five cloud computing trends in 2020. So be prepared to invest in the best technology and knowledge to maximize your ROI and stay in the loop it infrastructure engineer salary.

Hybrid cloud

Hybrid cloud computing involves a mix of both on-premises and public cloud services. Hybrid cloud gives users the flexibility to easily move workloads between on-premises and public clouds based on their computing needs. It provides stable and reliable server performance, advanced security features, SaaS capabilities, high performance, and customized settings.

The hybrid cloud market is expected to grow to $ 97.64 billion by 2023, according to a report released by Marketsand Markets. Tech giants like Amazon and Microsoft are already investing heavily in hybrid cloud computing as a product.

Training Center "Networking Technologies" conducts courses on Microsoft Azure and Office 365 , which train specialists who can prevent and solve problem situations in the operation of cloud IT infrastructure, connect to cloud services, deploy or migrate familiar corporate applications to the clouds, and integrate them with external systems.

IoT platform

In the era of the hyper-connected world, one of the most popular cloud computing trends is the rise of IoT platforms. The Internet of Things (IoT) platform is a cloud platform that acts as an intermediary and allows computing devices to transfer data among themselves over a network. This means that data is collected and transmitted over the Internet using embedded technologies without any manual intervention.

A Gartner study says the number of networked machines and systems will grow to 25 billion by 2021.

Growth and development of Kubernetes

Kubernetes is an open source, extensible portable platform designed to handle containerized workloads and services. This facilitates both automation and declarative customization. Kubernetes is a Google product currently managed by the Cloud Native Computing Foundation and is the result of 15 years of extensive experience running production workloads, combined with the best ideas and community practices. With the rise of containerized architecture, tools like Kubernetes will become more and more important in the future.

Redmonk conducted a survey that says Fortune 100 has already had 54% Kubernetes usage and is now the established standard for container orchestration.

The Networking Technologies Learning Center implements comprehensive   containerization and management training programs on the Docker platform.

Artificial Intelligence

As technology advances, artificial intelligence is a cloud computing trend to watch out for as it drives an organization's workflows more efficiently. Artificial intelligence relies heavily on cloud computing and enables computing platforms to be more efficient. Artificial intelligence empowers organizations to automate and intelligently manage processes, scale quickly, and adapt to changing business needs. Tech giants are increasingly using artificial intelligence to process large amounts of data.

An IBM study shows that 65% of organizations believe artificial intelligence is essential to their growth and success.

Cloud Security

Data leakage, data theft, deletion is a serious problem even for traditional IT infrastructures. But as more companies move to cloud platforms, it is imperative that cloud service providers can build strong security and ensure the safety of their customers' data.

Cloud security is not just the trend of cloud computing this year, but a necessity that is put at the forefront of every organization. With the introduction of General Data Privacy and Governance (GDPR) in late 2018, organizations are faced with the need to comply with security requirements. Consequently, in 2020 there is a huge demand for specialists who are able to provide cloud security and data protection in the cloud.

Tuesday, August 25, 2020

Data Analysis and Visualization Webinar

Every day we deal with data: going to the store or planning a vacation, analytics and sales plans, competitor analysis or company financial statements. Currently, the amount of data that almost everyone works with is growing rapidly. In this regard, the question of business analysis tools (Business Intelligence, BI), which allows solving the following issues, is more acute than ever: aws careers

data collection;

saving data;

data analysis;

data visualization;

shared data access;

data-driven decision making.

We understand that nearly every training center currently offers courses in Business Analysis or Microsoft Excel. That is why  on June 15 at 17:00 (Kyiv time) we  invite you to join the webinar  "Effective tools for data analysis and visualization", where we will present our NT-Excel BI course  . Power BI Business intelligence using Microsoft Excel and Power BI .

We will introduce you to modern analytics and data visualization tools, including Microsoft Excel, Power BI and Power BI Desktop.

The webinar will be useful to everyone who analyzes any amount of data obtained from different sources, namely:

Leaders:  to dynamically monitor performance and trends.

For managers : for detailed inspection and accelerated business analysis.

Analysts: To find new opportunities and bottlenecks.

Anyone who works and deals with data.

At the webinar, we will look at the following tools:

Power Pivot

Power View

Power Query

Power Map

Power BI Desktop

Power BI cloud service

Monday, August 24, 2020

Cloud architect skills

Cloud architects are responsible for communicating with vendors to negotiate third-party contracts for hardware, software and other cloud technologies. It’s a constantly evolving field, and the job requires someone who can stay on top of the latest trends and technologies.

IT INSIGHTS

6 trends shaping IT cloud strategies today

Related video: 6 trends shaping IT cloud strategies today 

“The cloud architect should have a variety of technical and nontechnical skills, but above all, the cloud architect must be a great collaborator in order to empower and connect with a variety of other architecture roles in your organization,” says Gartner analyst Kyle Hilgendorf.

While strong communication skills and an ability to remain agile are crucial for a cloud architect, there are plenty of other technical and soft skills required for the job. According to Gartner, these include:

Application architecture

Automation and orchestration

Governance

I&O (input and output)

Integration architecture

ITSM/ITOM

Outsourcing and external hosting

Security

Communication and collaboration

Company and vertical experience

Delegation

Finance and legal experience

Procurement and vendor management

Program leadership

Thought leadership and change agency

Becoming a cloud architect


What is a cloud architect

There are plenty of paths to becoming a cloud architect — if you’re still early in your career, you might want to consider a formal degree program. But for those with experience in IT, Gartner suggests IT pros with the following skills and experience will find the transition easiest:

Enterprise architects: Hilgendorf notes that the role of a cloud architect is “a new form of an enterprise architect,” and that it’s an easy transition from enterprise to cloud architect. However, the report cautions it’s best suited to those with “real hands-on program leadership.”

I&O (virtualization): Those with virtualization or infrastructure architecture experience are often a good fit for the cloud architect role, since “many cloud programs begin with simple IaaS projects, and virtualization architects are best-positioned to understand the technical nuances of a ‘virtualizationlike’ environment,” says Hilgendorf.

Integration architecture (network, identity, services and data): Some of the biggest issues with cloud adoption arise with integration across the company. Integration architects are adept at working with complex systems, and they’re typically skilled at working across departments.

Business liaisons: Employees who are known for rocking the boat or pushing the envelope with technology can serve as valuable liaisons to encourage company buy-in to new cloud technologies.

You might even find there’s an “extremely technically savvy individual in a business unit,” who has the right skills and background to bring value to enterprise cloud adoption, says Hilgendorf. If your organization finds it difficult to land the right skills outside your company, there might be someone well suited to the role in another business unit who can transition to cloud architect with a small investment in training and education.


Saturday, August 22, 2020

New features for e-shop hosting from Tucha

Online commerce is rapidly spreading around the world. Already more than 70% of shoppers prefer online shopping. To a large extent, the success of an e-shop depends on the website loading speed and its stable operation. How clouds help to provide quality hosting for online stores, we recently discussed in our article. And during this time, something important happened: for hosting web projects, including online stores based on the Bitrix: Site Management platform, we opened the TuchaBit service. This brought new possibilities for online shopping in the clouds from Tucha. How now you can save even more and ensure the reliable operation of your online store - read in our article.

Why you can't do without quality e-shop hosting

Fast and stable operation of an online store is one of those factors that are crucial for the buyer. It is especially disappointing to lose sales if all the processes in the online store have already been established: a user-friendly website, an attractive design, a good selection of goods, fast processing and dispatch of orders, and the like. Even so, a 1 second delay in website loading can reduce conversions by 7%. By the way, the world's fastest online store loads in less than 0.5 seconds! Therefore, the slow operation of the e-shop affects customer loyalty, the number of orders and the conversion rate. But is it always necessary to invest in powerful and expensive IT resources to keep the business meeting the needs and expectations of online shoppers? Not at all. There is a better solution for this - clouds.

Benefits of cloud solutions for online stores best tech support

Consider what the implementation of cloud solutions provides for a business.

Fast loading, uninterrupted site operation and reliable data placement

Tucha clouds help to ensure high-quality and stable online store operation. The availability of our cloud services is 99.0% and 99.9% depending on the chosen service. All services operate in a computing cloud based on data centers with a security level of Tier 3 and higher.

High level of fault tolerance of the system and work with services even in case of power outages

Tucha clouds guarantee high system resiliency. At the same time, the client's business does not depend on the stability of the power supply and operates reliably even under critical loads and peak influx of visitors.

Saving money on IT equipment

With clouds, you don't have to spend money on setting up your own server room, maintaining it, replacing resources, and keeping IT specialists who know about hardware. This is especially important for online stores that are just opening, because clouds do not require an initial investment in the purchase of equipment for growth. With clouds, you only pay for the resources you need right now.

Flexibility and easy scaling of resources

Increasing resources in physical servers each time requires new financial investments and the involvement of specialists. And if resources turn out to be too much over time, some of them will simply not be used. And this, again, is an additional cost.

When working with virtual servers, resources scale much faster. A new server configuration, if necessary, is agreed upon in a matter of minutes.

Easy website management from any device 24/7

To access the working environment, you can use a device with any characteristics, even the least demanding. And of course, you can manage your online store around the clock and from anywhere in the world.

24/7 multilingual technical support

Tucha's technical support service is available 24/7, so we are always ready to answer questions and help solve problems.

Friday, August 21, 2020

Forwarding a local printer to a terminal server

Configuring RDP Access to a Local Printer

1. Enable forwarding in RDP settings. For this:

right-click on the RDP shortcut and click "Change" ;

go to "Local Resources" and check the box "Printers" ;

save your changes.

remote desktop connection systems support analyst

If you are using TS Easy Print technology, you will most likely be able to print to a local printer after the first step. But note, more is not better. If you use both TS Easy Print and a standard printing system on a terminal server in parallel, this can only harm and cause a number of problems. Therefore, we recommend that you implement TS Easy Print only if the operation of the standard system does not suit you at all.

2. Install the printer driver on the terminal server. If you are not using TS Easy Print, you need to install the drivers for the correct printer model on the server:

download the driver from the official website of the printer manufacturer;

go to Server Manager and add the Print and Document Services role ;

server manager

add your account in the "Print Operators" group through the server manager ;

add the driver in the Drivers section and run log off / log on on the terminal server.

3. Configure access rights. Users must have Read, Write, Execute, and List Folder Contents rights to use the printer.

Printing problems and solutions

If you have installed the drivers and configured permissions and the printer is still silent, please note the following points.

Identity of drivers. Here, probably, everything is clear as two or two - the printer drivers for the user and on the server must be identical.

Printing system. If the standard printing system still fails you, try TS Easy Print. The main advantage of this technology is that you do not have to install drivers for each individual printer, just one is enough - Remote Desktop Easy Print.

Thursday, August 20, 2020

Virtual versus physical servers: what the experts recommend

Almost every company has a choice between virtual and physical servers. The decision is usually influenced by several factors, including: Systems support analyst

personal experience in the past;

advice from colleagues or acquaintances;

user reviews on the Internet and more.

How can you make a smart choice? Our experts, renowned specialists in the IT industry - Spartak Polishchuk , founder of Rubicon , and Roman Gershtun , founder of ProCRM , share their opinions, which were formed on the basis of personal experience and the experience of their clients .

Despite the fact that more and more companies are moving to the cloud, some business owners are still convinced that only the presence of iron in the office guarantees them peace and security for data.

Roman Gershtun also notes this : there is one point that clients often talk about - this is the desire to have their own server and manage it, in a word, to have a certain ownership right. But in fact, if you have your own server, you need to invest in it and constantly look after it. That is why a physical server works well only if the company has its own IT department and the ability to administer these servers, maintain their operability and timely upgrade. Therefore, if you do not have your own IT staff, it is best not to set up physical servers in your office.

Spartak Polishchuk noted that in the IT field, prejudices, in the literal sense of the word, do not exist. Most likely, they can be called fears. For example, fear of the security of their personal data, coupled with a lack of fundamental knowledge of the cloud, can lead customers to use physical servers.

Roman Gershtun

In addition to possible biases, there are still many myths surrounding virtual servers. For example, that clouds are expensive or dangerous. But how is everything really?

Roman Gershtun notes that there are usually three such myths. The first is cost, the second is security, and finally privacy. “Let's consider each of them. For example, that clouds are expensive. What is expensive? When you invest in a physical server, you pay the cost, the work of the system administrator. Then spend money on upgrades and technical support for that server. And with clouds, all these services are already included in the cost of services, ”says our partner.

The second point, as Roman Gershtun notes, is safety: “Let's simulate two situations. Fire in the office or "visit" of intruders. If the server is located in your office, its level of security is significantly inferior to virtual servers. "

And the third point is confidentiality. According to the expert, if even the American Pentagon can be broken, then it is easy to guess which server is more secure: a server of a specialized organization providing cloud solutions, or a server run by a system administrator who may not even have sufficient qualifications to ensure the proper protection level.

Roman Gershtun also expresses the opinion that one should not be afraid that information may be lost on a certain server, but that the data may disappear. This is a much bigger loss than just copying data to another resource. Of course, any cloud service has a much higher level of security than a physical server.

Wednesday, August 19, 2020

Warranty support: what is it and who will benefit from it?

Hello friends! Today we will talk about something without which comfortable and productive work in the cloud can not happen - about high-quality technical support. If you've probably already heard about our basic support and server administration , then warranty support is a new support solution that we will introduce you to now.

To begin with, let's take a closer look at what each of the three types of our technical support technician.

Free basic support . This is a free option, in which we do not have access details to the system, and we have no right to interfere with its work. In this case, we maintain the system's operability and advise clients to resolve issues related to the operation of the virtual machine. Well, if our direct intervention is required, there is an option to activate the server administration option both on an ongoing basis and hourly.

Extended support (aka server administration ). With this level of support, our services take the server on a special account to constantly monitor the state of the system. Unlike basic support, here we have access rights to the system, so we can not only advise, but also carry out work to resolve certain issues. As already mentioned, server administration can be activated not only on a monthly basis (from 30 euros / month), but also for several hours (20 euros / hour), if you need one-time help, and not constant monitoring.

Warranty support . This service is relatively new, so it makes sense to dwell on it in more detail. Basically, you get the same level of technical support as when administering servers, but for free. However, there are three prerequisites for this.

A new virtual machine, from which we have never transferred administrator rights to the client.

Only we have administrator rights, the client can use the server only as a user.

A system based on ISPmanager, VestaCP and BitrixVM is installed on the server from our templates, sharpened exclusively for hosting websites, e-mail, domains and files.

What's the point? This is comparable to buying a TV: the manufacturer will repair it for free, but if you decide to fit in with a screwdriver yourself - do not blame me, the further serviceability of the TV is already under your responsibility. Unless, unlike a TV, there is no fixed period of validity of our warranty support, it will be valid exactly as long as we are the only owners of administrator rights.

If you suddenly need all the rights - no question, we will immediately provide them to you. But this will automatically be considered the end of the warranty support. Then you can use either basic or extended technical support.

Tuesday, August 18, 2020

Cloud remote? Give two! [UPD]

Hello friends!

Let's go on vacation and the server is still running? Need an urgent reboot while you're on the road? The office is bursting with tours of the comedian corpse "Masks", and it would be nice to turn off the server out of harm's way?

Then we have two news - good and very good.

Let's start with the first one. Now you can manage the server directly from your phone. We are still launching a mobile application to make it even more convenient to steer virtual machines.

And the very good news is that this thing is incredibly easy to use. Look here.

1. Launch the application

2. Log in with your account details

The application will automatically remember the entered data.

3. Choosing the right car

In the window that opens, you can quickly peep the necessary information about the virtual machine: contract number (in the domain field), IP address, configuration. Here are the magic buttons On / Off. and Reboot . Everything is simple and convenient what are entry level it jobs

Tucha Client app will be available for free download from Google Play, App Store and Microsoft Store. We will announce the release date in more detail soon, it is not far off.

Well, if you still have questions and wishes about the application, or you want to learn more about other cloud utilities, please contact us for 24/7 advice .

Monday, August 17, 2020

How to create and where to store a strong password

Cybersecurity is one of the most pressing issues in the modern world. Since each of us uses social networks, email, instant messengers and various online services, it is important to know how to reliably protect your data. And for owners of websites, online stores, blogs, secure access to accounts is an integral part of the successful existence of a business.

The main assistant in the fight for cybersecurity is a password that is difficult for hackers. We are sharing with you how to create a strong password, where and how to store it correctly, and what measures must be taken to ensure that it provides stable protection against intruders.

password-100

Why is it important to store passwords correctly?

Using passwords is an important part of working with any software or resource. Moreover, passwords are an integral part of the company's information security. They protect user accounts, user data, and access to it. Using a weak password can lead to unauthorized persons gaining access to the data. It can also disrupt the operation of information systems of other companies (for example, a hosting provider).

Therefore, company employees, suppliers, contractors or visitors - all users who have access to the company's information systems are responsible for the secure creation of passwords and their protection.

What are weak and strong passwords

Each of us uses passwords for many purposes. The most common of them are logging into a computer, e-mail, authorization on various web resources, and the like. With only a few exceptions, there are systems with one-time passwords. Mostly we use passwords multiple times, so every user should know the requirements for creating strong passwords help desk it jobs.

Let's take a closer look at what a secure password should be and what combinations should be avoided.

Signs of a weak password:

contains less than 12 characters;

word from the dictionary;

a word used in everyday life, for example, the names or surnames of friends, colleagues, actors or fairy-tale characters, animal nicknames;

computer term, command, site name, hardware or software;

variations of company name or brand name;

birthday or other personal information, such as address, phone number, etc .;

regular sequences of characters and numbers, for example, 111111, abcde, qwerty, and the like;

any of the above in reverse;

any of the above with the addition of a digit at the beginning or at the end.

For example, among the most common passwords around the world, the following combinations and words have remained for many years: 123456, 123456789, 123123, 123321, 111111, password, qwerty, qwerty123, iloveyou, princess, admin. Passwords often contain names of sweets or car brands, for example, cocacola, snickers, mercedes, ferrari. Heroes from films and cartoons, in particular superman and spiderman, as well as the names of popular world groups (for example, metallica), are also in the lead. Unfortunately, in 2019, the trend remains unchanged. The list has just been replenished with No less used words, for example, football, monkey, donald, charlie.

Now let's look at what elements a strong password should consist of.

Characteristic features of a strong password:

contains large and small letters;

contains large and small letters;

contains numbers and symbols;

more than 8 characters long;

is not a word in any of the languages, dialects, jargons, slang;

is not based on personal information.

Also, a secure password should not be stored in paper or electronic form without appropriate media protection.

Thursday, August 13, 2020

Meet the updated version of TuchaClient!

We are pleased to announce that an updated version of the TuchaClient mobile application is now available. This means that working with Tucha cloud services has become even easier and safer!

We remind you that TuchaClient is an application for managing one or several Tucha virtual machines. With its help, from your phone you can turn on or off the machine at any time, reboot it, and also get data about it: configuration, IP address, contract number, etc.

What's new in TuchaClient?

First of all, the ability to save the details of access to multiple accounts has been added. This feature will be especially useful for partners who cooperate with several clients with different accounts at once.

In addition, user authentication using FaceID and TouchID has become available. Therefore, access to and use of the application has become even more secure technical support jobs near me.

You can install the updated version now for Android and IOS.

Download the TuchaClient app and see that managing virtual machines is now even easier!

Wednesday, August 12, 2020

How much does the migration of a Bitrix24 box to the cloud cost?

About data security

All our facilities are located in data centers that meet the security level of Tier 3 and higher. In such data centers, the main communication channels are duplicated, for example, the Internet, sources of electricity, etc. This means that the system will be available even during repair work in the data center itself.

Backups, which will also be stored in the cloud, will help to strengthen the solution and additionally protect data from loss. The TuchaBackup service will help with this . It will securely place backups on remote servers outside of Ukraine (mainly in Germany). The minimum configuration of the service includes 50 GB of cloud storage and costs 5 € / month. In the future, if necessary, the storage capacity can be easily expanded.

And if you need even more security

In this case, we recommend using additional information protection tools. Some of them are already provided in our services. For example, as already mentioned, for all clients of TuchaFlex + and TuchaBit services, we store the last two full snapshots of the virtual machine disks. If you need to create and store a larger number of images, this can be easily done for an additional fee, simply by contacting us with such a request.

You can also connect other useful tools, for example: Help desk support job description

Additional dedicated IP-addresses with geolocation in Ukraine or abroad.

Ready-made server templates with disk encryption enabled.

The ability to encrypt communication channels.

Panic buttons.

Is it possible to test the services

Before purchasing, our customers can test the services TuchaFlex + and TuchaBit for free for 7 days. This period is usually enough to evaluate the convenience of working on virtual servers and the quality of Tucha's technical support. Already at the testing stage, we will provide consulting support, and, if necessary, we will help to transfer data and existing settings to the cloud.

About technical support

It is important for each client that his server runs without downtime and is available 24 × 7 even during heavy loads. Tucha's technical support service works around the clock and does everything to ensure that the system works smoothly. There are 4 types of technical support to choose from:

Basic. We provide it for free.

Permanent server administration - 50% of the server cost, but not less than 30 euros / month.

Hourly server administration. The cost of this type of technical support is 20 euros / hour.

Warranty support. We provide it free of charge under certain conditions. 

You can find out more about what opportunities you get with each type of support here . 

About payment for services and closing documents

Despite the fact that prices for all our services are tied to euros, payment is made in hryvnia. At the same time, the course is quite humane, since the cost is fixed for the whole month at the NBU rate on the first day of each month. The price already contains VAT (for those who are payers of this tax). When paying for services in Ukraine, the following options are available: 

checking account;

payment by credit card through the Privat24 application or PrivatBank terminals;

online payment using LiqPay.

For each client, we prepare all the necessary closing accounting documents: acts of completion, tax invoices, original invoices, etc. We prefer electronic document management, but we are still close friends with postal services, so if you need documents on analog media, we will definitely provide.

Legal Issues

The basis of cooperation with us is a public contract (offer) . If the client needs a paper version of the document, we will promptly prepare an application for joining the offer agreement.

conclusions

Hosting a boxed version of Bitrix24 in the Tucha cloud is convenient, reliable and profitable. The data is stored on remote servers, and access to them is possible 24 × 7 from anywhere in the world. At the same time, the technical support team is always in touch and ready to help in transferring data and settings to our cloud.

Tuesday, August 11, 2020

EaseuS Todo Backup

Powerful and functional program for creating backups for Windows.

system-clone

Cost : there is both a free version with limited functionality and paid options (from $ 29 per license)

Languages : support for 6 languages, no Ukrainian and Russian

Operating system support : Windows XP / Vista / 7/8 / 8.1 / 10

Interface : intuitive, simple, there are "wizards" for performing basic operations - creating a backup copy, restoring data, preparing a boot disk, etc. Ample opportunities to customize the software.

Key features :

automatic and manual creation of backups. Scheduled launch can be configured for a specific day, time;

creating both a complete copy of the disk and separate partitions / directories / files. There is also the possibility of sector-by-sector disk copying to save the entire file structure (for example, to switch to an SSD or a new hard disk);

support for various file systems, RAID, UEFI, WinPE;

copies can be stored locally, saved to a removable drive, uploaded to a remote server via FTP or cloud storage ( TuchaBackup , Google Drive, OneDrive or Dropbox);

creating a bootable disk or flash drive that will allow you to boot the computer and restore its state, including installed programs and settings, if the primary media fails.

Disadvantages:

the free version lacks the ability to launch on an event (for example, after a Windows update);

no support for Ukrainian and Russian languages;

free and home versions lack remote control of the program;

old operating systems and third-party operating systems are not supported.

Conclusions : EaseuS Todo Backup is a powerful and efficient utility for creating backups for Windows. Despite the limitations in the free version, it is suitable for various use cases.

FBackup

A simple but effective and functional utility that can create backups and full copies of PC disks.

main-window

Cost : Free

Languages : support for over 20 languages, there is Russian and Ukrainian

Operating system support : Windows XP / Vista / 7/8 / 8.1 / 10

Interface: exists in two versions - simple for inexperienced users, which allows you to perform basic actions in a few clicks, and advanced - with a lot of settings.

Key features :

creation of backups in manual and automatic mode, support for running on a schedule at a specific hour / day, on a timer, when starting or shutting down the computer;

creating exact copies of a disk, volume, partition, folder or set of files. Even archiving of open files and running programs is supported thanks to the use of shadow copying;

support for plugins that add new functionality to the program. There are add-ons for working with popular programs - browsers, antiviruses, instant messengers, games, office and graphics software, archivers, download managers, etc. Thus, you can make backup copies of application profiles, anti-virus databases, game saves and other working files and easily transfer them to other computers or restore if necessary;

creating compressed backups to save disk space;

two modes of operation - simple for all users and advanced - for those who need additional features;

built-in ability to check the integrity of a backup or individual files in it;

Create bootable disks / flash drives for system crash recovery.

Disadvantages:

there is no way to upload backups to a remote server or save in the cloud;

management of the program via the network or the Internet is not supported;

third-party operating systems are not supported.

Conclusions: FBackup is a simple and convenient utility for working with backups under Windows, but its use is limited due to the lack of support for network operations. The functionality is significantly expanded by third-party plugins.

Comodo BackUp

A powerful and very functional program for working with backups from a well-known manufacturer.

largeImg

Cost : Free (there is a paid version for commercial use)

Languages : support for several European languages, no Ukrainian and Russian

Operating system support : Windows XP / Vista / 7/2008

Interface: rather complex, overloaded interface, which is not easy for a beginner to understand. There are many settings for professionals.

Key features : IT support jobs description

creating backups in manual and automatic mode. There is a built-in task scheduler that allows you to flexibly configure the time for creating backups;

support for saving copies on a local or network drive, on an FTP server or your own cloud storage;

informing the user by E-mail about completed operations;

support for copying the entire disk, individual partitions, files or folders, including in the shadow mode;

the ability to encrypt a backup and protect it with a password;

support for scripts to set complex backup parameters.

Disadvantages:

no version for other OS;

no translation into Ukrainian and Russian;

the program has not been updated since 2014, there is no official support for Windows 8 and older;

confusing interface for beginners.

Conclusions: Comodo Backup is a functional backup utility suitable for advanced users and IT professionals. It has not been updated for a long time, which limits its use on new systems.

Aomei backupper

A modern and functional program for working with backups, which is distinguished by its speed of work and support for new technologies.

system-clone

Cost : free in the Standart version with limited functionality, there are paid advanced versions

Languages : support for several European languages, no Ukrainian and Russian

Operating system support : Windows XP / Vista / 7/2008/8 / 8.1 / 10

Interface: simple and intuitive, suitable for both beginners and advanced users. Basic functions can be performed from the main screen with a few clicks.

Key features :

full, partial or incremental (updates only) copying of files;

work in manual mode or on a schedule;

the ability to save a disk sector by sector, copy individual volumes and partitions;

saving backups locally and to a network drive;

protection of archives with encryption and password;

support for shadow copying to save open files;

checking the integrity of the created backup;

creating bootable disks for Windows and Linux.

Disadvantages:

no version for other OS;

no translation into Ukrainian and Russian;

stripped down functionality in the free version;

no cloud storage support.

Conclusions: Aomei Backupper is a convenient and functional software for various options for data backup and quick recovery. Use by beginners is difficult due to the lack of translation into Ukrainian / Russian. For maximum functionality, you need to purchase a license.

conclusions

As you can see, there are many tools, there is plenty to choose from. Focus on your tasks and current ideas about beauty. And remember: whatever program you choose to collect and process backups, you need to keep them in a safe place. We know one such thing . :) See reviews  about our work and ask  for competent advice. Protect your data and yourself!

Sunday, August 9, 2020

Support issues you probably have

Lack of training is another problem. Yes, in a company where there is technical support (well, or just any customer service), formal training is always carried out: somewhere this is a course for a young fighter, somewhere a lecture for a couple of hours, somewhere a strict boss who broadcasts rudely for 15 minutes the fact that the company should be called exclusively Astroservice Technologies Group Elesi Company, and the client's name should be mentioned at least 7 times in a conversation, the rest is not so important. This, of course, is all wrong. There are several best practices for training helpdesk / service personnel, among which the most universal can be distinguished. 

Perfect option. After recruiting a group of specialists, a mentor from among experienced employees is assigned to every 2-3 support personnel, who conducts detailed desk training and immediately consolidates knowledge in practice. This way the information is absorbed as quickly as possible and it is possible to avoid discrepancies.
An acceptable option. Classroom training is carried out in several runs, and the senior specialist only answers questions that arise and periodically analyzes calls / letters / chats with newcomers after the fact. In this situation, the likelihood that a newbie will screw up is higher.
Option "well, at least something." As in the two previous cases, you have formed a knowledge base, which contains typical cases and problems (well, or simply there is access to old tickets) and the new employee analyzes the situations for a couple of weeks, and then passes something like an exam. Of course, something will remain in my head, but the effect is similar to reading Stroustrup's book without a computer and IDE in front of my nose and credit on a piece of paper. Therefore, the junior sees the compiler and is afraid of it. So here too - a telephone headset or a letter will put the novice operator into a stupor. 


As great as the company is, technical support will always be the unit with the highest turnover. Therefore, selection and training must initially be put on a professional track, otherwise everything will be worse and worse.


Endless and boring scripts

Total "scripting" is another scourge of technical support and, in general, any customer service. The speech of specialists is sometimes so scripted that even we, IT specialists, have a suspicion that a robot with an unfinished intellect is on the other side. Of course, certain tips for different situations are urgently needed, but communication should take place in human language. Compare the two dialogues.

1.

- Hello. Welcome to the Astroservice Technologies Group Elesi Company support service. We are glad to hear from you. What is your problem?
- Hello. I can't log into the admin area on your site to complete a purchase. Writes that the login does not exist.
- We are very glad to receive your request and are ready to answer your questions. Answer the question, when did you register on our site?
- About three years ago. Yesterday it went fine.
- Thanks for the detailed answer. What is your login?
- hellboy.
- Thanks for the detailed answer.

2.

- Good afternoon, Astroservice company, my name is Vasily. How can I help you?
- Hello. I can't log into the admin area on your site to complete a purchase. Writes that the login does not exist.
- When did you register on our site? How long has this problem been?
- About three years ago. Yesterday it went fine. 
- What is your login?
- hellboy.
- So, now we'll figure it out. I'm looking at your username, yeah, you've run out 

More specifics, less irritation and words, after which the topic of the conversation is already blurred. By the way, this also applies to sales.

Referral by specialists is sometimes a necessary and even correct measure - it is much better to wait a minute for a response from a specialized specialist than to try to get something from the first line. However, when the chain acquires several links, each of which needs to repeat all the information about the problem, you want to quit communication and go to Google. And if, in the event of an urgent appeal to a bank or, for example, a clinic, such a readdressing with explanations is justified, then in the case of a written solution of the issue in the mail, chat or messenger, this is at least indecent.

Information about the client's problem must be quickly and accurately recorded and saved in order to convey it to the performer, without forcing the client to retell for the tenth time how his warm floor did “pshshsh, then a crack-crack, then trrrr and shibanul oo as and for sure because the cat- I did pick a corner and confused it with a tray. " This can be done in any form, for example, in a separate chat, as a note to a card in a CRM system, or directly in a ticket inside the helpdesk. This is how it is implemented in the ZEDLine Support cloud helpdesk: there is a description of the task from the client, the operator can clarify the information, request screenshots and files, and then simply delegate the task to a colleague competent in this matter. At the same time, the client himself on the client portal will see who is engaged in his task and at what stage. And since versionZEDLine Support 2.2 , which is already available, now has internal messages in the system - operators can discuss a task among themselves, and the client will not see those comments that he does not need to see.