<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4646058686247885856</id><updated>2024-10-07T04:50:41.470+01:00</updated><category term="сървър"/><category term="ефективност"/><category term="виртуален"/><category term="сигурност"/><category term="зелени технологии"/><category term="хардуер"/><category term="поддръжка"/><category term="софтуер"/><category term="HOW-TO"/><category term="ит отдел"/><category term="мобилен"/><category term="business"/><category term="management"/><category term="виртуализация"/><category term="пазар"/><category term="MailStore Home"/><category term="Tips and Tricks"/><category term="VMware"/><category term="market"/><category term="small business"/><category term="проекти"/><category term="терминал"/><category term="услуги"/><category term="VPN"/><category term="it management"/><category term="outsource"/><category term="strategy"/><category term="аутсорсинг"/><category term="мрежи"/><category term="образование"/><category term="риск"/><category term="FreeNAS"/><category term="consultancy"/><category term="services"/><category term="technologies"/><category term="vSphere ESXi 5.x"/><category term="лицензи"/><category term="природа"/><category term="Cisco"/><category term="IT"/><category term="NUT snmp-ups"/><category term="OpenTool"/><category term="PowerShell"/><category term="SME"/><category term="Script"/><category term="UCS"/><category term="UPS"/><category term="advisory"/><category term="business analysis"/><category term="digital"/><category term="disruptive"/><category term="infrastructure"/><category term="innovation"/><category term="it services"/><category term="managed"/><category term="model"/><category term="project"/><category term="remote"/><category term="road warrior"/><category term="support"/><category term="transformation"/><category term="vSAN"/><category term="vSphere Client"/><category term="ИТ управление"/><category term="ИТ услуги"/><category term="училище"/><title type='text'>IT analyses blog</title><subtitle type='html'>High technologies on simple business language and some useful tricks for techie geeks.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default?start-index=26&amp;max-results=25'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>71</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-5796027487086726139</id><published>2016-06-20T16:25:00.000+01:00</published><updated>2016-06-20T16:25:16.797+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business analysis"/><category scheme="http://www.blogger.com/atom/ns#" term="it management"/><title type='text'>Financial comparison of IT services delivery models</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;prose&quot; itemprop=&quot;articleBody&quot;&gt;
  
  
  &lt;strong&gt;Preparation&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
 
  &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfvDt9ac3DamA9Ju-WICG_htZAt7IgLGctTWhpwy2YyORhJWpig_EYdJF5v0eHM1cnGlIWNhcdUTI0iXP3j3bHK6UhnhdBcAx1GRR4k5kCBCrTu80x918vwP7CT31wIF3CQ1wYps26qmU/s1600/IT+governance.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;177&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfvDt9ac3DamA9Ju-WICG_htZAt7IgLGctTWhpwy2YyORhJWpig_EYdJF5v0eHM1cnGlIWNhcdUTI0iXP3j3bHK6UhnhdBcAx1GRR4k5kCBCrTu80x918vwP7CT31wIF3CQ1wYps26qmU/s320/IT+governance.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;All details and related context should be taken in consideration 
before any comparison takes place. If you do not have the experience and
 in order to avoid incorrect evaluation, it is better to hire 
&lt;br /&gt;
independent business and IT consultants. Some documents ought to be 
created or if they are in place, to be updated, before you start the 
process. The consultants will help you to finalise the documents in the 
required depth and scope.&lt;br /&gt;
&lt;br /&gt;
 
  &lt;strong&gt;1. Business Strategy.&lt;/strong&gt; Every business has a 
development plan. However small business managers keep that plan only in
 their heads. While managers combine multiple roles and juggle with 
various operational activities or they simply under-valuate the 
importance of the business plan, it will be fated not to be a structured
 document. Its purpose is to describe development intentions and 
expected changes in the business model and organisation. Most of the 
companies maintain a 3 years’ plan. &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;It is recommended to revise it every
 3 months, to find out what has been achieved in that time, the lessons 
that have been learned, what the further plan will be and set 
priorities.&lt;br /&gt;
 
  Just remember! There is no consultant who can look directly into 
your mind and extract your business strategy from there. What would 
happen if you try just to story tell it in brief? Are you sure that a 
key piece of information won’t be missed?&lt;br /&gt;
 
  It is even more dangerous to accept unquestioningly the best 
practices for your sector from well-reputed consultancy, as they will 
provide common and widely adopted practices which will lead to average 
results. Do not sow the common unless you are happy to reap the average.
 The example with the stock market index is indicative – it is a 
measurement of the value of a section of the stock market. It is 
computed from the prices of selected stocks (typically a weighted 
average). I am sure you are looking for more than average, aren’t you?&lt;br /&gt;
&lt;br /&gt;
 
  &lt;strong&gt;2. Business Services Catalogue.&lt;/strong&gt; It includes 
functions (think of it as departments) and their activities. There is a 
description for each service, required activities, availability, 
disaster recovery, recovery time and point objective and underpinning 
services. Business services are split in two main categories – vital and
 underpinning. Small business usually outsource accountancy, unless the 
small business is not an accountancy practice itself. It is the same 
with the other business services. The old rule is to keep vital business
 functions and activities within the organisation. You can easily 
recognise them – they generate income. All the rest of the business 
services can be outsourced and it is a question of analysis and informed
 decision to do so.&lt;br /&gt;
&lt;br /&gt;
 
  &lt;strong&gt;3. IT Strategy&lt;/strong&gt;. This is a plan with all current 
and those in the pipeline IT services. It ought to have an expert 
selection of all known and at the same time potentially beneficial for 
the business organisation technologies processes and systems. There are 
two approaches. The first is a rear-view, where IT strategy follows 
Business strategy. While there is nothing wrong with it, the approach is
 passive. The active approach is constantly looking for positive impact 
of the business by implementing new technologies, even if the business 
model should be changed. The “fancy” word is Digital Transformation and 
the idea behind is technology and IT specialists to participate actively
 in business model development in order to achieve competitive 
advantages, market share extension, or even entering new markets. The 
digital age assumes that IT specialists have to be engaged actively in 
business planning and strategy discussions. The managers, who do not do 
this, have to read Charles Darwin’s “The origin of species” theory as 
soon as possible. It’s applicable to companies too.&lt;br /&gt;
 
  &lt;strong&gt;Why not even Digital Disruption?&lt;/strong&gt; The constantly 
emerging and evolving technologies could transform the business model in
 a way, where the whole sector can be turned upside down, making new 
joiners the leaders. Is it hard to imagine? Ask Uber or Airbnb.&lt;br /&gt;
&lt;br /&gt;
 
  &lt;strong&gt;4. IT Services Catalogue.&lt;/strong&gt; It should dynamically 
keep information about all IT services as description, SLR (Service 
Level Requirements), SLA (Service Level Agreement), context and 
relationships between services. One IT service can be consumed by more 
than one user group. This would dictate to have different SLRs and SLAs,
 urgency and impact on the business. If there is an inconsistency in the
 documentation it is easy to conduct internal interviews and to fulfil 
the gaps. Your IT specialist would be of great help when putting in 
order all the documents.&lt;br /&gt;
&lt;br /&gt;
 
  &lt;strong&gt;Cost models&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
 
  Every single IT service can be provided internally or externally or
 a mixture of both. There is a need of a unified comparison model of all
 available proposals.&lt;br /&gt;
&lt;br /&gt;
 
  &lt;strong&gt;1. Invoicing.&lt;/strong&gt; As this is the only one viable model
 applicable to external IT organisations, it can be applied to the 
internal one, only if it is split from the mother company. This approach
 would lead to new external IT organisation even though it is owned by 
the mother company. The finances are under strict control, the customer 
is fully aware about expenditures and the details depend on preparation 
quality. The incomes of newly formed IT organisation are coming mainly 
from the parent company. In rare cases more customers are being 
attracted and this finishes the transformation of the internal to 
external IT provider. The disadvantage for the business is that it has 
invested in the development of IT provider and has to use his services, 
regardless of price and quality. Instead of a quick change of the 
provider, additional investment in marketing, sales and all other 
business functions is required. In case of growth, saving due scale 
could be expected, which lead to a more competitive price and better 
quality. In theory at least.&lt;br /&gt;
&lt;br /&gt;
 
  &lt;strong&gt;2. Chargeback.&lt;/strong&gt; It is analogical to the invoicing. 
However the invoices are dummy and the IT organisation remains internal.
 The model is handy to the business management in order to keep an eye 
on the IT expenditures and to be able to compare with alternative 
providers. Presumably the vital IT services for the business remain 
in-sourced, while the rest are seeking the best quality and price from 
both, internal, external or a mixture of providers. The reasons are 
described in the &quot;&lt;a href=&quot;http://itanalyses.blogspot.co.uk/2016/06/why-small-business-outsource-it-services.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Why small business outsource IT services?&lt;/a&gt;“
 post. The dummy invoices are provided from the internal IT organisation
 and usually this is new activity. It consumes significant resource and 
time, moreover in the case in which there is only one IT specialist 
within IT organisation.&lt;br /&gt;
&lt;br /&gt;
 
  &lt;strong&gt;Cost components&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
 
  The price usually is based on time. Unfortunately the service is 
not something material and it cannot be produced, packaged and left on 
the shelf, waiting for a customer. The consumers’ expectations are to 
have it when they need it. Instant delivery on demand. All conditions 
have to be in place as availability, reliability, fault tolerance and 
disaster recovery.&lt;br /&gt;
 
  What is necessary to be taken into account to provide IT services internally?&lt;br /&gt;
&lt;br /&gt;
 
  &lt;strong&gt;1. IT specialist(s)&lt;/strong&gt;&lt;br /&gt;
 
  - Hire costs, HR management, leave costs&lt;br /&gt;- Salary, social and health insurance, indemnity, bonuses, company shares, etc.&lt;br /&gt;- Annual leave&lt;br /&gt;- Sick off, time off, etc.&lt;br /&gt;- Substitution&lt;br /&gt;- Learning (Induction period, knowledge development)&lt;br /&gt;- Contractors hire to supplement headcount in peak times or simply to expertise&lt;br /&gt;
&lt;br /&gt;
 
  &lt;strong&gt;2. Workspace&lt;/strong&gt;&lt;br /&gt;
 
  - Rent/mortgage interest (4 to 5 sq.m/per person on average)&lt;br /&gt;- Workplace utilities costs (electricity, heating, cooling, water, etc.)&lt;br /&gt;- Equipment and tools&lt;br /&gt;- Licenses&lt;br /&gt;- Office consumables and office maintenance&lt;br /&gt;
&lt;br /&gt;
 
  Your financial department can provide you with the information 
about the components mentioned above. Usually the report covers a period
 of one year. All expenses are divided by the effective working days 
(all working days without the annual leave and all other time-offs). The
 result is the price of the IT organisation per hour. In case where more
 than one specialist is present, the result is divided by the number of 
specialists. Let’s assume that all IT professionals have the same cost 
for the purpose of analysis simplification. In practice all of them have
 different levels of skills, experience and knowledge and costs 
differently to the all others.&lt;br /&gt;
&lt;br /&gt;
 
  &lt;strong&gt;&amp;nbsp;(IT specialist costs per year + Workspace costs per 
year)/(Effective work days per year)/7.5 hours per day = Total cost of 
and IT specialist per hour&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
 
  What portion of the time your IT specialist is utilised? What tasks
 is he charged with? Are they within his responsibilities? Is he/she too
 expensive for some tasks?&lt;br /&gt;
&lt;br /&gt;
 
  In order to have the correct assessment, we have to know in 
quantitative and qualitative terms the demand for every single IT 
service and task. The ticket system is widely used. For every single 
request for IT services a ticket has to be raised. The ticket itself is a
 record in an information system, which provides an interface to IT 
users, IT specialists and business managers. Once the IT specialist is 
notified he will start the work on the ticket, based on the priority. 
All parties kept communication in the same information system until the 
resolution and closure of the ticket. No work is allowed to be carried 
out without track of record in the system.&lt;br /&gt;
&lt;br /&gt;
 
  Business management will benefit from consolidated reports from all
 or filtered incidents, user requests, resolutions, recommendations, 
workarounds, etc. It is easy to analyse which are the most frequent 
incidents, the ones with most negative impact and where IT budgets are 
spent.&lt;br /&gt;
 
  The IT specialist will rely on the information system for 
prioritisation on all raised requests when it comes to prove why he/she 
decided to work on one task while put on hold another. It is useful to 
show evidence of how efficiently and effectively he/she used his/her 
time, and competence. Business management would be surprised how 
positive IT specialists are about implementing a ticket system.&lt;br /&gt;
 
  The current post describes just the rough outlines of the picture 
for wise IT governance, based on informed choices and decisions. You 
cannot manage without control and you cannot control without 
measurement.&lt;br /&gt;
&lt;br /&gt;
 
  In case you have met the problems described in &quot;&lt;a href=&quot;http://itanalyses.blogspot.co.uk/2016/06/one-man-as-it-department.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;One man as an IT department&lt;/a&gt;&quot;, it’s likely you have asked yourself about your current model. Is it the right fit for you? Does it require some changes?&lt;br /&gt;
 
  Do not forget the internal IT specialists work within the 
organisational frame created by the business management and that any 
change should be initiated by the management.&lt;br /&gt;
&lt;br /&gt;
 
  Back to the title – Have you switched off the autopilot for IT services management in your organisation?&lt;br /&gt;
  
 
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/5796027487086726139/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2016/06/financial-comparison-of-it-services.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/5796027487086726139'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/5796027487086726139'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2016/06/financial-comparison-of-it-services.html' title='Financial comparison of IT services delivery models'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfvDt9ac3DamA9Ju-WICG_htZAt7IgLGctTWhpwy2YyORhJWpig_EYdJF5v0eHM1cnGlIWNhcdUTI0iXP3j3bHK6UhnhdBcAx1GRR4k5kCBCrTu80x918vwP7CT31wIF3CQ1wYps26qmU/s72-c/IT+governance.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>London, UK</georss:featurename><georss:point>51.5073509 -0.12775829999998223</georss:point><georss:box>51.1912379 -0.77320529999998222 51.8234639 0.51768870000001777</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-918383087681359870</id><published>2016-06-14T08:54:00.004+01:00</published><updated>2017-11-05T21:38:44.417+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="it management"/><category scheme="http://www.blogger.com/atom/ns#" term="outsource"/><category scheme="http://www.blogger.com/atom/ns#" term="small business"/><title type='text'>Да върнем управлението на ИТ услугите към бизнес ръководителите</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;prose&quot; itemprop=&quot;articleBody&quot;&gt;
&lt;h3&gt;
Икономическо сравнение на модели за предоставяне на ИТ услуги&lt;/h3&gt;
(stay tuned for the English version)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Подготовка&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUWMDVqwISQSECnAtzpVH077NvC0GvQvFmekUUy-oHZfTmDEw9LPe7T86IqGC0rw9H9XkXVlw_s0kFlw92Ty57VshAkgjgoX1Hc5SDDMBto48G8-tyQfLc8D8OkAc1rOBpCQDHhqGhBTA/s1600/IT+governance.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;177&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUWMDVqwISQSECnAtzpVH077NvC0GvQvFmekUUy-oHZfTmDEw9LPe7T86IqGC0rw9H9XkXVlw_s0kFlw92Ty57VshAkgjgoX1Hc5SDDMBto48G8-tyQfLc8D8OkAc1rOBpCQDHhqGhBTA/s320/IT+governance.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Преди да се прави сравнение трябва да се вземат предвид всички 
детайли и техните взаимовръзки. За да се избегне некоректно сравнение, 
ако нямате познания по точките по-долу, можете да се обърнете към 
независими бизнес и ИТ консултанти. Преди да се обърнете към тях е важно
 да бъдат създадени или ако са налични да бъдат осъвременени няколко 
документа. Консултантите ще Ви помогнат да ги изчистите в необходимите 
детайли.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1. Бизнес стратегия (бизнес план).&lt;/b&gt; Малкия бизнес 
също има такъв план, но той често е само в главите на ръководството. 
Фактори от типа на голяма динамика, липса на време или просто поради 
подценяване на значимостта му го обричат да не съществува във вид на 
структуриран документ. Неговата цел е да опише плановете за развитие и 
очакваните промени в бизнеса. Обикновено се създават такива с период 3 
години напред и е препоръчително да се отчита на всеки 3 месеца какво е 
постигнато и да се нанасят корекции ако има такива за следващите 3 
години от новият момент напред във времето.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;
&lt;br /&gt;
Запомнете! Няма консултант, който да надникне в съзнанието Ви и да 
отгатне Вашата бизнес стратегия. Ако само го разкажете, дали няма да 
пропуснете нещо ключово?&lt;br /&gt;
Още по опасно е да приемете за чиста монета, външен консултант да 
Ви разкаже „добрите практики“ от индустрията. Не залагайте много на 
общоприетото, защото то дава осреднени резултати. Примерът с борсовият 
индекс е показателен – той е средно аритметичното представяне на всички 
компании листнати там, а Вие търсите повече, нали?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. Каталог на бизнес услугите.&lt;/b&gt; Това включва 
обикновено отделите и тяхната дейност. Описанието е за всяка отделна 
дейност, необходими поддържащи услуги и какви са изискванията за 
непрекъсваемост, срок за възстановяване, максимален период в който можем
 да допуснем неработоспособност. Бизнес услугите се делят на две основни
 категории – жизнено важни и поддържащи. Счетоводството често е изнесена
 услуга при малкия бизнес, освен ако малкият бизнес не е счетоводна 
къща. Същото е и с останалите бизнес услуги. Дейностите осигуряващи 
приходите по правило не се изнасят извън организацията. Всички останали е
 въпрос на анализ и бизнес решение.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. ИТ стратегия (ИТ план за развитие)&lt;/b&gt;. 
Представлява план за действие, комбиниран с текущи и планирани за 
стартиране на нови ИТ услуги. Съчетава експертен подбор от налични 
технологии, процеси и системи. Има два подхода. Първият е огледало за 
обратно виждане, при който ИТ стратегията следва бизнес стратегията. Той
 не е грешен, но е пасивен. При активния подход непрекъснато се търси 
начин за усъвършенстване посредством най-новите открития и технологии. 
Модният термин е Digital Transformation. Идеята е ИТ технологиите и 
специалистите да подпомагат активно промяната на бизнес модела с цел 
по-добри или нови конкурентни предимства, навлизане на нови пазари, 
разширяване на пазарен дял и дори създаване на нови пазари. В 
дигиталната ера ИТ специалистите трябва да вземат активно участие при 
дискусиите за бизнес плановете и стратегиите. Ръководителите на 
компании, които не го правят, нека прочетат теорията на Дарвин, час 
по-скоро, за оцеляването на видовете. Приложима е и при компаниите.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;А защо не и Digital Disruption?&lt;/b&gt; Понякога 
трансформацията на бизнес модела, предизвикана от технологиите може да 
обърне с главата надолу цял сектор и да направи едва влезлите лидери. Не
 Ви се вярва? Питайте Uber.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4. Каталог на ИТ услугите.&lt;/b&gt; Всички ИТ услуги – 
описание, SLR (рамка на изискванията към услугата, така, че тя да носи 
полза за бизнеса), SLA (договорени нива на услугата) за непрекъсваемост,
 срокове за възстановяване, максимален период за загубени данни, план Б и
 т.н. Една ИТ услуга може да се ползва от различни групи потребители и 
това да налага тя да има различни нива и приоритети за различните групи.&lt;br /&gt;
Ако документацията е непълна, можете да направите вътрешни 
интервюта и да откриете липсващите детайли. Вашият ИТ специалист със 
сигурност може да Ви помогне в структурирането на документа.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Модели на ценообразуване&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Всяка една отделна ИТ услуга може да бъде предоставяна от външна, 
вътрешна или съвместна организация. Необходим е единен модел за 
сравнение на предложенията от различните организации.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt; &lt;b&gt;Фактуриране.&lt;/b&gt; Това е единствения модел при 
външните ИТ организации, но за да се приложи при вътрешната, следва тя 
да се отдели от голямата организация и фактически да се превърне във 
външна (макар и собственост на компанията майка). Разходите и приходите в
 ИТ организацията са под строг контрол. Клиентът е наясно с разходите за
 ИТ, макар, че две взаимосвързани лица фактурират едно на друго. 
Детайлността зависи от качеството на подготовката. Приходната част на 
ново сформираният ИТ доставчик се формира основно от голямата 
организация. В редки случай се привличат допълнителни клиенти и с това 
завършва трансформацията на вътрешния към външния ИТ доставчик. 
Недостатъкът за бизнеса е, че е инвестирал в създаването на ИТ доставчик
 и трябва да ползва неговите услуги, без значение на цена или качество. 
Вместо бърза смяна на ИТ доставчик се налага допълнително инвестиране в 
маркетинг, продажби и всички останали бизнес функции, които да позволят 
растеж на доставчика. В случай, че има растеж, то може да се очакват 
икономии от мащаба и съответно по-добра цена и по-добро качество за 
бизнеса. Поне на теория.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2.&lt;/b&gt; &lt;b&gt;Псевдо фактуриране (проформи фактури).&lt;/b&gt; Аналог 
на предходния модел, но с тази разлика, че фактурите са фиктивни и ИТ 
организацията си остава вътрешна. Подходящ модел при желание, от страна 
на бизнес ръководството, непрекъснато да се следят ИТ разходите и да се 
прави сравнение с алтернативни доставчици. Предполага се, че има основни
 услуги, които си остават отговорност на вътрешната ИТ организация, но 
допълнителните ИТ услуги, често рутинни, могат да бъдат предоставени, 
както на външна, така и на вътрешна ИТ организация. Причините са описани
 в &quot;&lt;a href=&quot;http://itanalyses.blogspot.co.uk/2016/06/blog-post.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Защо малкият бизнес изнася ИТ услуги към външни доставчици?&lt;/a&gt;&quot;
 Докато услугите са предоставяни вътрешно се прави фиктивно фактуриране.
 При външен доставчик има реално фактуриране. Фиктивното фактуриране 
отнема сериозен ресурс на вътрешната ИТ организация и бизнес 
ръководството следва да бъде внимателно, особено при наличие на само 
един ИТ специалист.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Компоненти на ценообразуване&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
В повечето случаи цената на услугите се формира за време. Услугата 
не е материална, следователно не може да се произведе, пакетира и сложи 
на рафта, чакайки за потребител. В същото време очакването на 
потребителите е да я получат, когато им е необходима. За целта трябва да
 се осигурят условия за наличност, надеждност, отказоустойчивост и 
възстановяване при прекъсване.&lt;br /&gt;
Какво е необходимо да се вземе предвид за ИТ услугите предоставяни вътрешно?&lt;/div&gt;
&lt;div class=&quot;prose&quot; itemprop=&quot;articleBody&quot; style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;1. ИТ специалист(ти)&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;prose&quot; itemprop=&quot;articleBody&quot;&gt;
- разходи по наемане, управление на човешки ресурси и освобождаване&lt;br /&gt;
- заплата, осигуровки, застраховки, бонуси&lt;br /&gt;
- годишен (платен) отпуск&lt;br /&gt;
- отсъствия по болест, инциденти, семейни причини и т.н.&lt;br /&gt;
- заместване при отсъствие&lt;br /&gt;
- обучения&lt;br /&gt;
- наемане на външни ИТ специалисти при недостиг на експертиза&lt;/div&gt;
&lt;div class=&quot;prose&quot; itemprop=&quot;articleBody&quot; style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;2. Работно място&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;prose&quot; itemprop=&quot;articleBody&quot;&gt;
- наем/лихва по ипотека (средно 4 до 5 кв.м./човек)&lt;br /&gt;
- режийни разходи за работно място&lt;br /&gt;
- екипировка и инструменти необходими за осъществяване на дейността&lt;br /&gt;
- лицензи&lt;br /&gt;
- офис консумативи и поддръжка офис&lt;br /&gt;
Вашият финансово счетоводен отдел може да Ви предостави 
информацията от горните два компонента. Обикновено справката обхваща 
срок от една година. Всички разходи се разделят на ефективно 
отработените дни (всички работни дни без годишният отпуск и всички 
отсъствия), а след това на 8 часа (при осем часов работен ден). 
Резултата е себестойност на ИТ организацията на час. В случай, че има 
повече от един специалист този резултат се разделя на броя на 
специалистите. Нека приемем, само за улесняване на анализа, че всички ИТ
 специалисти струват еднакво на организацията. В практиката всеки 
специалист е с различен опит, умения и знания и е различно заплатен от 
останалите.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;(Разходи за ИТ специалист/г. + Разходи за работно 
място/г.)/(Ефективно отработени дни/г.)/8 часа (при осем часов работен 
ден)= Себестойност на ИТ специалист на час&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Каква част от времето е натоварен ИТ специалиста? С какви задачи е 
натоварен? Влизат ли в неговите отговорности? Не е ли прекалено скъп за 
някои от дейностите, които извършва?&lt;br /&gt;
С цел по точна оценка е необходимо да знаем количеството търсене на
 съответните ИТ услуги. Широко разпространена е така наречената тикет 
„билет“ система. При всяко обръщение по нов случай на ИТ потребител към 
ИТ специалист се „вдига тикет“. Тикетът е &amp;nbsp;запис в информационна 
система, която предоставя интерфейс на ИТ потребителите, техните 
ръководители и ИТ поддръжката. ИТ специалистът е известен и започва 
работа по съответния случай. Всички страни записват комуникацията си до 
решението на случая. Не се допуска работа по нерегистрирани в системата 
случаи.&lt;br /&gt;
&lt;br /&gt;
Бизнес ръководството има възможност да следи обобщени доклади от 
всички инциденти, събития, консултации, помощ и т.н. Лесно се анализират
 кои са най-често срещаните, кои са най-негативно въздействащи върху 
бизнеса и не на последно място – колко точно струват ИТ услугите.&lt;br /&gt;
&lt;br /&gt;
ИТ специалистът(тите) ще може да ползва система за приоритизация на
 всички случаи, чакащи разрешаване и ще бъде в състояние да защити 
твърденията си доколко ефективно е използван той, колко е ефикасен при 
изпълнението на задълженията си, колко е търсенето на неговите услуги и в
 коя област е то. Бизнес ръководството ще остане изненадано, колко 
позитивно са настроени ИТ специалистите за стартирането на тикет 
система.&lt;br /&gt;
&lt;br /&gt;
Всичко описано в този пост показва в груби щрихи пътят за мъдро 
управление на ИТ услуги базирано на набор от информирани избори и 
решения. Не може да има управление без контрол, а контролът е невъзможен
 без измерване.&lt;br /&gt;
В случай, че срещате проблемите описани в &quot;&lt;a href=&quot;http://itanalyses.blogspot.co.uk/2016/05/blog-post.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Човекът ИТ отдел в малкият бизнес&lt;/a&gt;&quot;,
 вероятно сте си задавали въпроси дали сегашния модел е правилния, дали 
няма нужда от промяна. Не забравяйте, че ИТ специалистите работят в 
рамките на организационната структура създадена от бизнес ръководството.
 Промяната трябва да се инициира от същото бизнес ръководство.&lt;br /&gt;
&lt;br /&gt;
Обратно към заглавието - изключихте ли автопилота при управлението на ИТ услугите във Вашата организация?&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/918383087681359870/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2016/06/blog-post_14.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/918383087681359870'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/918383087681359870'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2016/06/blog-post_14.html' title='Да върнем управлението на ИТ услугите към бизнес ръководителите'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUWMDVqwISQSECnAtzpVH077NvC0GvQvFmekUUy-oHZfTmDEw9LPe7T86IqGC0rw9H9XkXVlw_s0kFlw92Ty57VshAkgjgoX1Hc5SDDMBto48G8-tyQfLc8D8OkAc1rOBpCQDHhqGhBTA/s72-c/IT+governance.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>London, UK</georss:featurename><georss:point>51.5073509 -0.12775829999998223</georss:point><georss:box>51.1912379 -0.77320529999998222 51.8234639 0.51768870000001777</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-143003916040290463</id><published>2016-06-07T09:15:00.000+01:00</published><updated>2016-06-07T09:15:12.950+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="it management"/><category scheme="http://www.blogger.com/atom/ns#" term="it services"/><category scheme="http://www.blogger.com/atom/ns#" term="outsource"/><category scheme="http://www.blogger.com/atom/ns#" term="small business"/><title type='text'>Why small business outsource IT services?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizs6QCKDqRtGFgQ4faywyaALhl8lxpOv7R6B2odlj6m0w4WCsFw8dxqeHZLR3t6RKg_Vv4E9cMpMwRMgnG_FJEJodvxGH5YDya0cvbGQUhcBMjn3gOZjN_SiI67gWnS8X0Vu4DZpNMCDM/s1600/6reasonsforoutsorcing.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizs6QCKDqRtGFgQ4faywyaALhl8lxpOv7R6B2odlj6m0w4WCsFw8dxqeHZLR3t6RKg_Vv4E9cMpMwRMgnG_FJEJodvxGH5YDya0cvbGQUhcBMjn3gOZjN_SiI67gWnS8X0Vu4DZpNMCDM/s320/6reasonsforoutsorcing.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
In the latest post &lt;a data-mce-href=&quot;http://itanalyses.blogspot.co.uk/2016/06/one-man-as-it-department.html&quot; href=&quot;http://itanalyses.blogspot.co.uk/2016/06/one-man-as-it-department.html&quot; target=&quot;_blank&quot;&gt;&quot;One man as an IT department&quot;&lt;/a&gt;
 we have discovered the most commonly met &lt;br /&gt;
problems of all three parties –
 the internal IT specialist, the business and the IT users. Now we will 
progress to figure out what the main reasons for outsourcing IT services
 are.&lt;br /&gt;
The scale of the market participants dictates their 
behaviour. Every business, no matter how small it is, needs almost the 
same IT services as large corporations do. The difference is that large 
players have got a scale and ability to establish and maintain internal 
IT organisations, while smaller ones have no option, but to use shared 
resources. Firstly they do not need those resources at all times and 
furthermore they cannot afford to pay for the resources full time.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;So what should the small businesses do?&lt;/strong&gt;&lt;br /&gt;
How can you get the same services with the same or even better quality and all of that at a better price?!&lt;br /&gt;
How would it work, bearing in mind, it is cost prohibitive to hire an IT specialist on a permanent basis?&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
The small business can barely utilise his time… But is that really true?! In a &lt;a data-mce-href=&quot;http://itanalyses.blogspot.co.uk/2016/06/one-man-as-it-department.html&quot; href=&quot;http://itanalyses.blogspot.co.uk/2016/06/one-man-as-it-department.html&quot; target=&quot;_blank&quot;&gt;previous post&lt;/a&gt;
 I said the sole IT specialist is overwhelmed with various tasks and he 
works more than 9 to 5. I am right here and I was back then, too. While 
an IT specialist is busy all the time, he perform various tasks. Most of
 these tasks are routine ones and do not require all his knowledge, 
experience and skills. Controversially he has to be knowledgeable to all
 technologies employed in the business he is working for. The business 
is well aware that hiring an overqualified permanent employee is not 
making sense for a long term.&lt;br /&gt;
The small business in Europe 
represent 92% of all businesses and most of them rely on external IT 
service providers. Managed IT service providers deliver shared resources
 and opportunities with a variety of customers. There are numerous 
reasons for the transition of one, several or all IT services to 
external service providers. The list below does not claim to be 
exhaustive, but sheds a light on the motives in making such decisions.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;The 6 main reasons of IT services outsourcing&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;1. Insufficient or lack of IT personnel.&lt;/strong&gt;&lt;br /&gt;
Expectedly you already have some or all problems described in &lt;a data-mce-href=&quot;http://itanalyses.blogspot.co.uk/2016/06/one-man-as-it-department.html&quot; href=&quot;http://itanalyses.blogspot.co.uk/2016/06/one-man-as-it-department.html&quot; target=&quot;_blank&quot;&gt;“One man as an IT department”&lt;/a&gt;.&amp;nbsp;
 In addition to your internal IT specialist you can extend the workforce
 on a temporary basis by hiring a contractor. If you do that only in 
case of a raising problem, you have to expect for a solution focused in 
just the current problem. Obviously there is a lack of strategic 
approach and consideration of the big picture and inter-related factors.
 Usually the long-term contract with an external provider of IT 
services, who’s interested to solve problems effectively and 
efficiently, due to pursue of its own interest, significantly reduces 
the risk of recurring incidents. The services move from firefighting to 
proactive approach with great decrease of negative impact on the 
business.&amp;nbsp; Is that mission possible? Yes, it is a matter of accurate 
allocation of responsibilities between internal IT specialist and 
long-term strategy.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;2. Lack or at least insufficiency of necessary knowledge, skills or experience.&lt;/strong&gt;&lt;br /&gt;
We
 live in a world of dynamic competition between many emerging and 
evolving technologies. The differences in two generations of the same 
technology are commensurable to the technology progress in the sector. 
Otherwise it will be outperformed by another technology and will die 
silently on the shelf of the oblivion. The continuous updating of 
knowledge is the new status quo. Outsourcing of IT services allows you 
to take advantage of the collective knowledge and experience which is 
dynamically updated within the external providers’ teams.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&amp;nbsp;3. The cost to value ration.&lt;/strong&gt;&lt;br /&gt;
The
 external IT services provider offers a lower price for the same or 
better quality and reliability of the services. While paying for 
external IT services actually you have got on top of that tested 
processes, real life proven models and consistent approach for 
integrating the most beneficial in the world of technology for your 
business. The provider sells services in various sectors to various 
customers. The mixture of sources to collect knowledge and experience, 
not only in IT is much faster and in a larger spectrum rather than 
working within one business only. An unexpected bonus could be the 
exchange of contacts between customers of one provider, usually 
expressed in new sale opportunities. Remember that the growth of the 
customer is one of the fundamental interests of its suppliers.&lt;br /&gt;
&lt;br /&gt;
Does your IT services provider help you in that way?&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;4. Focus on the core business activities. &lt;/strong&gt;&lt;br /&gt;
Hybrid
 model – the widely used approach is to export mainly trivial and 
routine IT services, while line-of-business ones are kept under 
responsibility of the internal IT specialist. IT services that do not 
support core business functions can easily be delegated to specialised 
external supplier. All the rest IT services are supported by your IT 
specialist. Already focused, he will have more time to optimise and 
automate IT processes and services. Last but not least there will be 
time for meaningful communication with the business management and IT 
users in order to improve services and speed up implementation of new 
projects.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;5. Your business sector is seriously influenced by the technologies.&lt;/strong&gt;&lt;br /&gt;
Not
 long ago we have entered the digital age. However, the technologies 
evolve exponentially and constantly. Only in the case, where business’s 
main focus is not on the IT, it is desirable to reduce resources and 
time spent in the management of IT services and to concentrate the 
effort on the core business functions. The fast growth of the reliance 
on technologies by the business is inevitable. The new generations would
 become the new customers, new partners and new competitors. They grow 
up surrounded by technologies and have set up high expectations about 
how they can be employed in any area of the modern life.&lt;br /&gt;
&lt;br /&gt;
The main aim of every business is growth, isn’t it?&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;strong&gt;6. Business flexibility and adaptiveness.&lt;/strong&gt;&lt;br /&gt;
Every
 single business is as adaptable as it is capable to do more successful 
projects for a less time. Can you think of any business project without 
IT services involved? Starting from correct interpretation of the 
business strategy to unlock and make possible simple and sustainable 
design and followed by the rapid and successful implementation are key 
success factors of the project.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;What business would survive without flexibility in responding to constantly changing business environment?&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
The
 cloud computing evolved enough for the last decades and liberates the 
market of enterprise locked expensive technology to be shared among many
 users and the lower price. The customer’s infrastructure shrinks every 
next year at the expense of cloud services in one form or another. Your 
internal IT specialist migrates maintenance of hardware and software to 
Managed IT Service providers. The unexpected side effect for the 
business when outsourcing the infrastructure is that some services are 
also being outsourced.&lt;br /&gt;
&lt;br /&gt;
Why are the infrastructure and services 
bound? The managed IT services providers are lending their 
infrastructure not just for the profit, which is very low and comparable
 with the distributors’ one. The difference between the two types of 
suppliers is that the provider has to make capital expenses for 
equipment and to maintain operational payments for qualified IT experts 
and running data centre in order to keep the services available during 
the ROI period. Unfortunately all risks are owned by the managed IT 
services provider according to how efficiently resources are utilised. 
The equipment ages quickly which adds up to the fact that in case of 
insufficient utilisation and related income it is possible to extend the
 period for ROI. The worst case scenario is when income cannot support 
even the operational expenditures. The distributors on the other hand 
sell the equipment and receive the payment in full.&lt;br /&gt;
&lt;br /&gt;
The symbiosis 
when pursuing the interests of both the customer and the infrastructure 
lender could coalesce best when providing additional services. This 
might be management of back-ups, archives, disaster recovery, system 
administration, etc. The provider can realise additional income from the
 same customer, with larger margins of profit, since he is more optimal 
when it comes to using his IT specialists’ time. To keep it short and 
clear – there is no increase in operational costs. On the other hand the
 customer is outsourcing the infrastructure, its management and the base
 services to a highly specialised in this provider, at a lower price, 
while not compromising quality.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Do you know which of your IT services make sense to outsource, economically-wise?&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
How to do review of the IT services and business analysis… stay tuned for the next posts or contact us - &lt;a data-mce-href=&quot;http://www.primaconsult.co.uk/&quot; href=&quot;http://www.primaconsult.co.uk/&quot; target=&quot;_blank&quot;&gt;www.primaconsult.co.uk&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;em&gt;I
 will leave the discussion open and would appreciate comments and 
proposals from all parties – IT specialists, IT users and their 
managers. If you are totally agree or you do not have an opinion you are
 still welcomed to share the post so it can reach more of your 
colleagues, friends and contacts.&lt;/em&gt;&lt;br /&gt;
&lt;em&gt;It will be beneficial to collect more opinions.&lt;/em&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;em&gt;Thank you in advance!&lt;/em&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/143003916040290463/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2016/06/why-small-business-outsource-it-services.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/143003916040290463'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/143003916040290463'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2016/06/why-small-business-outsource-it-services.html' title='Why small business outsource IT services?'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizs6QCKDqRtGFgQ4faywyaALhl8lxpOv7R6B2odlj6m0w4WCsFw8dxqeHZLR3t6RKg_Vv4E9cMpMwRMgnG_FJEJodvxGH5YDya0cvbGQUhcBMjn3gOZjN_SiI67gWnS8X0Vu4DZpNMCDM/s72-c/6reasonsforoutsorcing.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>London, UK</georss:featurename><georss:point>51.5073509 -0.12775829999998223</georss:point><georss:box>51.1912379 -0.77320529999998222 51.8234639 0.51768870000001777</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-8950761474829232484</id><published>2016-06-06T08:43:00.000+01:00</published><updated>2016-06-06T08:43:13.563+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="management"/><category scheme="http://www.blogger.com/atom/ns#" term="small business"/><category scheme="http://www.blogger.com/atom/ns#" term="strategy"/><category scheme="http://www.blogger.com/atom/ns#" term="technologies"/><title type='text'>Защо малкият бизнес изнася ИТ услуги към външни доставчици?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;article-body&quot; dir=&quot;ltr&quot; itemprop=&quot;articleBody&quot;&gt;
(stay tuned for the English version)&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCb139YHv0mpDWYOp5hS_ipzGAi6pPsAWsl8YNd1hvXxGJaBOy0JsAvnph82oDgoxLVLS-hfGp3TpPKuIzleEJXCg7sqL0XkjKgmRHL6eX2huzWf6LIzmh9fePEBsVr5WUjncrZfBW7Fo/s1600/6reasonsforoutsorcing.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCb139YHv0mpDWYOp5hS_ipzGAi6pPsAWsl8YNd1hvXxGJaBOy0JsAvnph82oDgoxLVLS-hfGp3TpPKuIzleEJXCg7sqL0XkjKgmRHL6eX2huzWf6LIzmh9fePEBsVr5WUjncrZfBW7Fo/s320/6reasonsforoutsorcing.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;В продължение към предишния пост &lt;a href=&quot;http://itanalyses.blogspot.co.uk/2016/05/blog-post.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;„Човекът ИТ отдел в малкия бизнес“ &lt;/a&gt;тук
 ще разгледаме &lt;br /&gt;
основните мотиви за изнасяне на ИТ услуги. Малкият мащаб 
на пазара в България и неговите участници предопределят необходимостта 
от споделен ресурс. Всеки бизнес, колкото и малък да е той, има нужда от
 почти същите услуги, аналогично на големите корпорации. Разликата е, че
 големите имат мащаба и възможностите да създадат и поддържат вътрешна 
ИТ организация. &lt;br /&gt;
А какво да прави малкият бизнес? Да получи същите услуги със същото 
или дори по-добро качество при това на по-ниска цена?!?! Как е възможно 
при условие, че дори наемането на един специалист трудно оправдава 
разходите от гледна точка на това колко и с какви задачи е натоварен 
той? &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Основният виновник е мащаба.&lt;br /&gt;
Малкият бизнес представлява 92% от целият бизнес в Европа и в 
голямата си част той е доверил ИТ услугите на външни доставчици. 
Последните предоставят на разнообразни клиенти ИТ услуги и по този начин
 споделят ресурса си и възможностите си с тях. Има многобройни причини 
за изнасяне на една, няколко или всички ИТ услуги към външен доставчик 
или доставчици. Списъкът по-долу няма претенциите да е пълен, но дава 
обща картина за мотивите при вземане на подобни решения.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;6-те основни причини за изнасяне на ИТ услуги&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1. Нямате никакъв или достатъчно ИТ персонал&lt;/b&gt;&lt;br /&gt;
Вероятно срещате част или всички проблеми описани в поста &lt;a href=&quot;http://itanalyses.blogspot.co.uk/2016/05/blog-post.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;„Човекът ИТ отдел в малкия бизнес“&lt;/a&gt;.&amp;nbsp;
 В допълнение към вътрешния ИТ специалист можете да се обръщате към 
външен специалист само в случай на възникнал проблем, но решението е 
само на този проблем. Липсва стратегически подход и съобразяване на 
всички останали и взаимно свързани фактори. Дългосрочен договор с външен
 доставчик на ИТ услуги, пряко заинтересован да реши ефективно появилите
 се проблеми за да не се налага да пилее ресурси отново, значително 
понижава риска от повтарящи се инциденти. Правилният подход е 
разпределение на отговорностите и дългосрочна стратегия.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. Липсват необходимите знания, умения или опит&lt;/b&gt;&lt;br /&gt;
Технологиите са много и в непрекъсната конкуренция. Дори да мигрирате
 към по-новото поколение на същият продукт, то разликите в технологиите 
са съизмерими с напредъка в сектора. Непрекъснатото обновяване на 
знанията е новото статукво. Изнасянето на ИТ услуги позволява да се 
възползвате от колективното познание и непрекъснато осъвременяващ се 
опит на външния доставчик.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. Съотношение цена/стойност&lt;/b&gt;&lt;br /&gt;
Външният доставчик Ви предлага по-ниска цена при същото или по-добро 
качество и надеждност на ИТ услугите. В повечето случай, плащайки за 
външни ИТ услуги, всъщност получавате освен тях и проверени процеси, 
работещи модели и подход за интегриране на най-полезното от света на 
технологиите за Вашият бизнес. Външният ИТ доставчик предоставя услуги в
 различни сектори, към разнообразни клиенти. Събирането на знания и 
опит, не само в ИТ, е много по-бързо и в много по-голям спектър. 
Неочакван бонус може да се окаже размяната на контакти между клиентите 
на един &amp;nbsp;доставчик, обикновено изразяващо се в нови продажби. Не 
забравяйте, че растежа на клиента е един от основните интереси на 
неговите доставчици.&lt;br /&gt;
А вашият ИТ доставчик помага ли Ви в тази насока?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4. Фокусиране върху основната дейност&lt;/b&gt;&lt;br /&gt;
Хибриден модел – изнасяте основно тривиалните и рутинни ИТ услуги, 
докато жизнено важните за бизнеса остават отговорност на вътрешния ИТ 
специалист. ИТ услугите, които не поддържат основни бизнес функции, 
могат лесно да се поемат от външен доставчик. Останалите ИТ услуги се 
поддържат от Вашия ИТ специалист. Вече фокусиран, той ще разполага с 
повече време да оптимизира и автоматизира ИТ процесите и услугите. Не на
 последно място ще има време за ползотворна комуникация с ръководството и
 ИТ потребителите за подобряване на услугите и внедряване на нови 
проекти.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;5. Бизнес секторът в които работите е сериозно повлиян от технологиите&lt;/b&gt;&lt;br /&gt;
Отдавна сме навлезли в дигиталната ера. Технологиите еволюират 
експоненциално. Само в случай, че основната дейност не е в сферата на 
ИТ, бизнесът е желателно да редуцира ресурси в управлението на ИТ услуги
 и да се концентрира върху основната си дейност. Зависимостта от 
технологиите расте с не по-бавни темпове. Новите поколения са новите 
клиенти, новите партньори и новите конкуренти. Те растат заобиколени от 
технологии и очакват да им бъдат в помощ при всекидневните задачи.&lt;br /&gt;
А задачата на всеки бизнес е растеж, нали?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;6. Адаптивност на бизнеса&lt;/b&gt;&lt;br /&gt;
Един бизнес е толкова адаптивен, колкото повече успешни проекти може 
да реализира за същото или по-кратко време. Идва ли Ви наум поне един 
нов бизнес проект, който да не се нуждае от ИТ услуги под някаква форма?
 Правилното интерпретиране на бизнес стратегията, отключващи прост и 
устойчив дизайн и допълнени с бързата и успешна имплементация са ключови
 фактори за успех на проекта.&lt;br /&gt;
Кой бизнес би оцелял без способността да отговори на постоянно променящата се бизнес среда?&lt;br /&gt;
&lt;br /&gt;
Появата на облачните изчисления позволи скъпите технологии да бъдат 
споделени между много потребители и това да понижи цената. 
Инфраструктурата при клиентите намалява с всяка изминала година за 
сметка на облачни услуги под една или друга форма. Вашият ИТ специалист 
мигрира от поддръжка на хардуер и софтуер към управление на доставчици 
на ИТ услуги. Важна особеност, но често подценявана от страна на бизнеса
 е, че изнасянето на инфраструктура в една или друга степен изнася и 
услуги.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Защо инфраструктурата и услугите са свързани?&lt;/b&gt; 
Доставчиците на външни услуги предоставят своята инфраструктура далеч не
 заради печалбите. Те са изключително малки и съизмерими с тези на 
дистрибуторите на същите устройства и софтуер. Разликата между двата 
вида доставчици е в това, че доставчикът на инфраструктурни (облачни) 
услуги трябва да закупи цялото оборудване и софтуер, да поддържа 
квалифициран екип, условия и разходи в дейтацентъра за да бъде налична 
услугата. Остават всички рискове дали ще бъдат натоварени ресурсите в 
необходимият обем за да се покриват оперативните разходи и да се изплати
 оборудването, което старее морално доста бързо. Дистрибуторите продават
 „стоката“ и получават заплащането напълно в момента на продажбата или 
след договореният период.&lt;br /&gt;
Симбиозата при преследване интересите и на клиента и на доставчика на
 инфраструктура, като услуга, могат да съвпаднат най-добре при 
предоставяне на допълнителни услуги. Това може да бъде бекъп, 
архивиране, възстановяване в друг дейтацентър при авария, системна 
поддръжка и т.н. Доставчикът може да реализира допълнителни приходи от 
същият клиент и с по-голям процент печалба, като натовари по-оптимално 
своите ИТ специалисти. На бизнес език - без да увеличава оперативните 
разходи. Клиента от своя страна изнася инфраструктурата, нейното 
управление и базовите услуги на тясно специализиран в това доставчик на 
по-ниска цена и при по-високо качество.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
А Вие знаете ли кои ИТ услуги е икономически обосновано Вашата организация да изнася към външен доставчик?&lt;br /&gt;
&lt;br /&gt;
Как се прави преглед на ИТ услугите и икономически анализ… следете следващите постове.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Оставям темата отворена и приветствам коментари и предложения, 
както от колеги от ИТ бранша, така и от консуматорите на ИТ услуги - ИТ 
потребители и техните ръководители. Ако сте напълно съгласни или пък 
нямате мнение за коментар, то също споделете поста с Ваши колеги, 
приятели и познати. Ще е интересно да съберем повече мнения.&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Благодаря Ви предварително!&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/8950761474829232484/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2016/06/blog-post.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/8950761474829232484'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/8950761474829232484'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2016/06/blog-post.html' title='Защо малкият бизнес изнася ИТ услуги към външни доставчици?'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCb139YHv0mpDWYOp5hS_ipzGAi6pPsAWsl8YNd1hvXxGJaBOy0JsAvnph82oDgoxLVLS-hfGp3TpPKuIzleEJXCg7sqL0XkjKgmRHL6eX2huzWf6LIzmh9fePEBsVr5WUjncrZfBW7Fo/s72-c/6reasonsforoutsorcing.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>London, UK</georss:featurename><georss:point>51.5073509 -0.12775829999998223</georss:point><georss:box>51.1912379 -0.77320529999998222 51.8234639 0.51768870000001777</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-3561694505336251172</id><published>2016-06-05T11:42:00.000+01:00</published><updated>2016-06-05T11:42:01.780+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="consultancy"/><category scheme="http://www.blogger.com/atom/ns#" term="management"/><category scheme="http://www.blogger.com/atom/ns#" term="services"/><category scheme="http://www.blogger.com/atom/ns#" term="support"/><title type='text'>One man as an IT department</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-GB&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;
   &lt;m:brkBin m:val=&quot;before&quot;/&gt;
   &lt;m:brkBinSub m:val=&quot;&amp;#45;-&quot;/&gt;
   &lt;m:smallFrac m:val=&quot;off&quot;/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val=&quot;0&quot;/&gt;
   &lt;m:rMargin m:val=&quot;0&quot;/&gt;
   &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;
   &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;
   &lt;m:intLim m:val=&quot;subSup&quot;/&gt;
   &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;false&quot;
  DefSemiHidden=&quot;false&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;371&quot;&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;toc 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal Indent&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footnote text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;header&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footer&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;index heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;table of figures&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;envelope address&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;envelope return&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;footnote reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;line number&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;page number&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;endnote reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;endnote text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;table of authorities&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;macro&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;toa heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Bullet 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Number 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Closing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Signature&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;Default Paragraph Font&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;List Continue 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Message Header&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Salutation&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Date&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text First Indent&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text First Indent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Note Heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Body Text Indent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Block Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Hyperlink&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;FollowedHyperlink&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Document Map&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Plain Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;E-mail Signature&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Top of Form&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Bottom of Form&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal (Web)&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Acronym&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Address&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Cite&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Code&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Definition&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Keyboard&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Preformatted&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Sample&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Typewriter&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;HTML Variable&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Normal Table&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;annotation subject&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;No List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Outline List 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Simple 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Classic 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Colorful 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Columns 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Grid 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table List 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table 3D effects 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Contemporary&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Elegant&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Professional&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Subtle 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Subtle 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Web 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Balloon Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;Table Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; UnhideWhenUsed=&quot;true&quot;
   Name=&quot;Table Theme&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; Name=&quot;Placeholder Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; SemiHidden=&quot;true&quot; Name=&quot;Revision&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; QFormat=&quot;true&quot;
   Name=&quot;List Paragraph&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; Name=&quot;Light List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; Name=&quot;Dark List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; QFormat=&quot;true&quot;
   Name=&quot;Subtle Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; QFormat=&quot;true&quot;
   Name=&quot;Subtle Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; QFormat=&quot;true&quot;
   Name=&quot;Intense Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; Name=&quot;Bibliography&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; SemiHidden=&quot;true&quot;
   UnhideWhenUsed=&quot;true&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;41&quot; Name=&quot;Plain Table 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;42&quot; Name=&quot;Plain Table 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;43&quot; Name=&quot;Plain Table 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;44&quot; Name=&quot;Plain Table 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;45&quot; Name=&quot;Plain Table 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;40&quot; Name=&quot;Grid Table Light&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot; Name=&quot;Grid Table 1 Light&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot; Name=&quot;Grid Table 6 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot; Name=&quot;Grid Table 7 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;Grid Table 1 Light Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;Grid Table 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;Grid Table 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;Grid Table 4 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;Grid Table 5 Dark Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;Grid Table 6 Colorful Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;Grid Table 7 Colorful Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot; Name=&quot;List Table 1 Light&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot; Name=&quot;List Table 6 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot; Name=&quot;List Table 7 Colorful&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;46&quot;
   Name=&quot;List Table 1 Light Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;47&quot; Name=&quot;List Table 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;48&quot; Name=&quot;List Table 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;49&quot; Name=&quot;List Table 4 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;50&quot; Name=&quot;List Table 5 Dark Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;51&quot;
   Name=&quot;List Table 6 Colorful Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;52&quot;
   Name=&quot;List Table 7 Colorful Accent 6&quot;/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
 mso-para-margin-top:0cm;
 mso-para-margin-right:0cm;
 mso-para-margin-bottom:8.0pt;
 mso-para-margin-left:0cm;
 line-height:107%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:&quot;Calibri&quot;,sans-serif;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;
 mso-fareast-language:EN-US;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The challenges for small businesses&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
What are the 10 most frequent issues affecting the solely
working IT specialist?&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;1.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;No one to
bounce ideas off of&lt;/b&gt;.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg04nksMHR-1hnSOuOV2CnalaJlc6F2BpJvV5Gus8MPon_ShORua7-oGJnHPvrl3PQ9UhRxp04FynbVEii1Q3cMHnewxEB1W0wyRzOTnZrEohqCuskI0XcHWP1j7ZNPrwSNhG3jqFl4I9U/s1600/ITsupport.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;168&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg04nksMHR-1hnSOuOV2CnalaJlc6F2BpJvV5Gus8MPon_ShORua7-oGJnHPvrl3PQ9UhRxp04FynbVEii1Q3cMHnewxEB1W0wyRzOTnZrEohqCuskI0XcHWP1j7ZNPrwSNhG3jqFl4I9U/s320/ITsupport.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
It sometimes helps to think out loud, to
speak, and get some feedback from someone who actually understands what you are
doing. Without someone like that around, IT guys might start talking to themselves!
The business risk is suppliers often are collocutors for the IT specialist,
however they are in between the two roles – trusted advisor and sales force.
They will provide the best advice, for sure, but the question is - who would it
be best for. It is a little ambiguous – the company that the IT &lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;specialist is
working for, the IT specialist himself or the supplier. Obviously suppliers
have to push their sales.&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;2.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;No time for R&amp;amp;D&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
If the IT specialist is overwhelmed with
support requests and new implementations, it is highly unlikely that he will
have the time to research on a new technology to develop better tools for you.&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;3.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Slow response to business change demand&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
The market is extremely dynamic and
business is pushed to react, adapt and proactively move forward. Implementation&lt;span style=&quot;mso-ansi-language: BG;&quot;&gt; &lt;/span&gt;of&lt;span style=&quot;mso-ansi-language: BG;&quot;&gt; &lt;/span&gt;new&lt;span style=&quot;mso-ansi-language: BG;&quot;&gt; &lt;/span&gt;technologies is not as quick&lt;span style=&quot;mso-ansi-language: BG;&quot;&gt; &lt;/span&gt;as the management would like it to be. New
projects require additional resources&lt;span style=&quot;mso-ansi-language: BG;&quot;&gt; &lt;/span&gt;from
the only one existing IT specialist.&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;4.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;No replacement
for the IT specialist during days off&lt;/b&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
What&lt;span style=&quot;mso-ansi-language: BG;&quot;&gt; &lt;/span&gt;about&lt;span style=&quot;mso-ansi-language: BG;&quot;&gt; &lt;/span&gt;being sick&lt;span style=&quot;mso-ansi-language: BG;&quot;&gt; &lt;/span&gt;off or on&lt;span style=&quot;mso-ansi-language: BG;&quot;&gt; &lt;/span&gt;annual&lt;span style=&quot;mso-ansi-language: BG;&quot;&gt; &lt;/span&gt;leave&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;?&lt;/span&gt;&lt;span lang=&quot;BG&quot;&gt; &lt;/span&gt;Should he do remoting from the bed whilst ill?
Or just try to picture yourself in his family’s shoes during that dreamed
vacation! Needless to mention “quick calls” during the weekend for consultancy
and help.&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;5.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Company
knowledge is in IT specialist’ head&lt;/b&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
What would happen if the IT specialist
leaves the company? It is stressful due to poor to nil level of knowledge
transfer and handover. “Business as usual” operations do not leave room for maintaining
up-to-date documentation. It is extremely difficult and in most cases
impossible for an overwhelmed IT specialist to help himself by moving from
firefighting to proactive approach, since he has no time to do it.&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;6.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Keeping
high ROI in the IT left IT specialist behind his fellows &lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
The business has expectation to get
maximised return on investments made in technologies. Usually the technology
vendors provide 3 years warranty and support contracts, expandable to 5 years
as an option. The small business uses one technology 7 to 8 years on average. However
every next generation of the same technology is introduced to the market on
every 2 to 3 years. How one internal IT specialist could possibly be up-to-date
with all this new information, if there are no changes for this period? If he
is made redundant for any reason, how could he be competitive against other jobseekers?
Probably he would be, if the new employer still uses the same old technologies.
But then, the same question comes up again - what would happen if he loses his
job again…? Do not be surprised if salary raise is not enough to keep him!&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;7.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Being
on call at any time and any case&lt;/b&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
It’s hardly doable in case of incidents
that impact big groups of users. The Hamlet’s question – “Do I have to answer all
the users’ calls explaining one by one what happened and when I anticipate to
fix it, or to start immediately fixing the problem and to reduce the time and
negative impact on the business?” raise every time. &lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
What about 20 calls, most of them sparkling
of emotions? Sending an e-mail just raises a new storm of questions. When IT maintenance
require one or more services to be temporarily unavailable (or at least with
decreased performance), businesses demand this have to be performed out of
business hours. &lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
At the other hand new technologies allow business
hours to be stretched due to remote access. Some employees can finalise the
PowerPoint presentation or to catch-up with the analysis during the weekend.
Time windows left for maintenance are constantly squeezing and pushed to small
hours.&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
IT maintenance and help desk 24/7 by only
one IT specialist? &lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
I would leave aside the questions about
labour law and humanity, but what about the performance and the mood of your
poor IT guy?&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;8.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Wide
profile IT specialist. Really?&lt;/b&gt; &lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
How anyone could state he is an expert in a
certain technology, if he implements it by skipping three to four generations?
On average every two to three years a new generation of the same technology
appears. Sometimes during a major incident everything should be implemented
from scratch before restoring the data. IT specialists reveal that they
struggle to recon how exactly they did it last time, since it’s been a few
years ago. What about not only one, but multiple technologies? Even if he is
positive and eager to learn, he can be good at only few of them in theory and
not in practice.&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;9.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;Blending
IT expertise with understanding business model and processes?&lt;/b&gt;&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
It might take the IT specialist 5 to 10
years to understand in depth the business he is working for. He can play a
reactive and support role till then as it takes time and depends on the
business’s complexity. The added value rarely includes proactively enable entering
to new markets, increase of the current market share or completely new
competitive advantages.&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;10.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;IT
specialists with plain English are required&lt;/b&gt;&lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpLast&quot;&gt;
Unless the business is not an IT itself, both
users and managers are not IT&lt;span style=&quot;mso-ansi-language: BG;&quot;&gt; &lt;/span&gt;specialists&lt;span style=&quot;mso-ansi-language: BG;&quot;&gt; &lt;span lang=&quot;BG&quot;&gt;and &lt;/span&gt;&lt;/span&gt;all of them &lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;re&lt;/span&gt;quire simple business and jargon
free language. This is a significant challenge and effort requirement for the IT
specialist, bearing in mind the overbooked calendar, while his phone is
constantly ringing. To be polite, he thoroughly explains every step or process
undertaken with obvious examples for comparison, leaving him failing to
accomplish most urgent tasks as he has no time. &lt;span lang=&quot;BG&quot; style=&quot;mso-ansi-language: BG;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
All the examples above are not pretending to be the
exhaustive list, just fragments from the whole picture. However only the
mentioned ones are self-sufficient to raise passive behaviour or worse –
“burn-out” of the IT specialist. It is not acceptable for any business to have
an IT specialist who shrugs his shoulders or wildly expresses his emotions
which sometimes ends up with him leaving the company, denial to perform
knowledge transfer, handover or even to provide credentials.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
The IT service value is based on fit to purpose (utility)
and fit to use (warranty). The first factor means capability of the IT
specialist – knowledge, skills and experience. Second, but not least factor,
means reliability – IT users to have access to the IT specialist when they need
it. Both hypothesis – largely capable, but not reliable (i.e. cannot be found
when required), or always responding, but not capable of doing the job are
simply not acceptable.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
What business management should do?&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;i&gt;I will leave the discussion open and would appreciate comments and
proposals from all parties – IT specialists, IT users and their managers. If
you are totally agree or you do not have an opinion you are still welcomed to share
the post so it can reach more of your colleagues, friends and contacts.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;It will be beneficial to collect more opinions.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;Thank you in advance!&lt;/i&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/3561694505336251172/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2016/06/one-man-as-it-department.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/3561694505336251172'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/3561694505336251172'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2016/06/one-man-as-it-department.html' title='One man as an IT department'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg04nksMHR-1hnSOuOV2CnalaJlc6F2BpJvV5Gus8MPon_ShORua7-oGJnHPvrl3PQ9UhRxp04FynbVEii1Q3cMHnewxEB1W0wyRzOTnZrEohqCuskI0XcHWP1j7ZNPrwSNhG3jqFl4I9U/s72-c/ITsupport.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>London, UK</georss:featurename><georss:point>51.5073509 -0.12775829999998223</georss:point><georss:box>51.1912379 -0.77320529999998222 51.8234639 0.51768870000001777</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-4928208885435989182</id><published>2016-05-30T09:12:00.000+01:00</published><updated>2016-05-30T09:12:06.392+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ИТ управление"/><category scheme="http://www.blogger.com/atom/ns#" term="ИТ услуги"/><category scheme="http://www.blogger.com/atom/ns#" term="поддръжка"/><title type='text'>Човекът ИТ отдел в малкия бизнес</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;article-body&quot; dir=&quot;ltr&quot; itemprop=&quot;articleBody&quot;&gt;


&lt;h2&gt;
Предизвикателства пред бизнеса&lt;/h2&gt;
(stay tuned for the English version)&lt;br /&gt;

Кои са 10-те най-често срещани проблема струпани върху самия ИТ специалист?&lt;br /&gt;

&lt;ol&gt;
&lt;li&gt;Няма с кой да сподели и обсъди идеите си. Сверяване на часовника, но
 с кого? Най-често с доставчиците, но те са в опасното съчетание на роли
 – търговец и съветник. Те със сигурност ще го посъветват най-доброто, 
но оставя неясен въпроса за кой е най-доброто. За компанията за която 
работи ИТ специалиста, за него самия или за доставчика.&lt;/li&gt;
&lt;li&gt;Тестване на нови технологии е почти невъзможно поради липса на време
 и в повечето случай на ресурси. Винаги с приоритет е поддръжката на 
текущите ИТ услуги за потребителите.&lt;/li&gt;
&lt;li&gt;Внедряване на нови технологии обикновено е бавен процес. Новият 
проект изисква допълнителни ресурси, но ИТ специалистът е само един.&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Няма кой да го замести при отсъствие, болест или отпуск. Това налага
 той да се включва дистанционно и да отговаря на обаждания дори когато е
 болен. За кратко се поставете на мястото на неговото семейство по време
 на отпуск! Подминаваме обажданията през уикенда за кратки консултации и
 помощ.&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN0QMEhZFKcluj6GbdwVASNZRxoAAosK1jnmFcDWBoVNt5h9Nh8vCTiTwakA82Xz1sWyDyC1y5qVUxvFknCGCFQexhXdLMMR78oFXHdV_J4-A95vBUxk0p7mrcCiDqQQUnVEsDfbFBMhw/s1600/ITsupport.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;210&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN0QMEhZFKcluj6GbdwVASNZRxoAAosK1jnmFcDWBoVNt5h9Nh8vCTiTwakA82Xz1sWyDyC1y5qVUxvFknCGCFQexhXdLMMR78oFXHdV_J4-A95vBUxk0p7mrcCiDqQQUnVEsDfbFBMhw/s400/ITsupport.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;При напускане прехвърлянето на знания е незадоволително или клонящо 
към нула. Оперативната работа не оставя много време за поддържане и 
обновяване на детайлна документация. Изключително трудно е за един човек
 да пренесе поддръжката от реактивна (реагиране на инциденти) към 
проактивна (пълно наблюдение и автоматизирани реакции при определени 
условия и събития), а с гасене на пожари е трудно да се поддържат 
процеси по управление и документация на ИТ услугите.&lt;/li&gt;
&lt;li&gt;Трудно се поддържа ниво по отношение на новите технологии. 
Очакването на бизнеса е да оползотвори в максимална степен инвестициите 
направени в технологиите. Производителите обикновено дават 3 години 
гаранция, разширяема до 5 с допълнително заплащане. Малкия и среден 
бизнес обикновено използват технологиите около 7 – 8 години. Как един ИТ
 специалист ще си поддържа нивото не само на осведоменост, но и на опит,
 ако той работи с едни и същи технологии толкова дълъг период? Ако 
остане по някаква причина без работа, дали ще бъде конкурентен със 
знанията си за старите технологии? Вероятно да, но само за компании със 
също толкова стари или дори още по-стари технологии. И ако още веднъж 
остане без работа ?!?!&lt;/li&gt;
&lt;li&gt;Да бъде на разположение на всички потребители по всяко време. Никак 
лека задача особено в случаите на инциденти с услуги засягащи цели групи
 от потребители. Вечния Хамлетовски въпрос – Да отговарям на обажданията
 на потребителите и да обясня какво се е случило и кога ще го поправя 
или да се заема с поправянето и да намаля времето на престой и 
негативното въздействие върху бизнеса? Ами ако получа 20 обаждания, 
често част от тях емоционални?!?! Известяването с е-мейл поражда нова 
буря с въпроси. За ИТ дейности, налагащи спиране на услуги, бизнеса 
налага да се извършват извън стандартното работно време. От друга страна
 новите технологии, позволяващи на служителите да работят дистанционно, 
правят работното време доста разтегливо понятие. Могат да си довършат 
кореспонденцията или презентацията след вечеря или да наваксат с анализа
 през уикенда. Времевия прозорец през който ИТ специалиста може да 
извършва профилактики, бекъп, инсталиране на кръпки по сигурността, 
ъпгрейди и всичко налагащо спиране на услуги или поне намаляване на 
тяхната производителност става все по малък и все по-изместен към 
малките часове на нощта. ИТ поддръжка 24/7 ?!?! От един човек ?!?! 
Оставям настрана дали е законно и хуманно, но на следващия ден каква би 
била работоспособността на този ИТ специалист?&lt;/li&gt;
&lt;li&gt;Широк ИТ специалист. Как би могъл някой да твърди, че е експерт в 
определена технология ако му се налага да я внедрява през две, три или 
дори четири поколения, при това веднъж? Средно на 2 до 3 години се 
появява следващото поколение на същата технология. Много често при 
сериозен инцидент се налага всичко да се внедри отначало и се оказва, че
 ИТ специалиста не си спомня това което е правил самият той преди 
няколко години. Сега сложете накуп всички технологии, които му се налага
 да поддържа. При най-добро желание той може да е тесен специалист само в
 няколко от тях.&lt;/li&gt;
&lt;li&gt;Да разбира в дълбочина бизнес процесите и как може да допринесе ИТ 
услугите да носят повече стойност за потребителите. Обикновено това се 
получава след поне 5 до около 10 години работа за конкретна компания. 
Добавената стойност изключително рядко включва навлизане в нови пазари, 
разширяване на пазарен дял или нови конкуренти предимства.&lt;/li&gt;
&lt;li&gt;Комуникация с ИТ потребители и ръководството… Общото е, че те не са 
ИТ специалисти и имат нужда от обяснение на език изчистен от термини и 
жаргони. Нелека задача предвид натоварената програма, постоянно 
звънящият телефон и необходимите усилия да се намират правилни сравнения
 извън цифровия свят.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;

Изброените примери по-горе са само част от глобалната картина, но 
дори и само те са достатъчни да предизвикат пасивност или по-лошо – 
състояние познато, като „прегаряне“. Няма бизнес, който да се задоволи с
 ИТ специалист по поддръжката вечно вдигащ рамене или изразяващ бурно 
своите емоции, понякога завършващи със скандално напускане – отказ да 
предаде работата на следващия колега или дори самите пароли за достъп.&lt;br /&gt;

Стойността на ИТ услугите се базира на два фактора – капацитет и 
надеждност. Първият фактор означава ИТ специалиста да има капацитета да 
изпълнява задачите си, а вторият – да бъде наличен, когато има нужда от 
него. Вариант с компютърен експерт, но неоткриваем по телефон, 
електронна поща и т.н. е абсолютно равнозначен на вариант с 
некомпетентен специалист, който винаги се отзовава, но не е в състояние 
да реши проблемите.&lt;br /&gt;

&lt;strong&gt;Какво да предприеме бизнес ръководството?&lt;/strong&gt;&lt;br /&gt;

&lt;strong&gt;Да подмени сегашния ИТ специалист с друг ?!?!&lt;/strong&gt; 
Колкото по-опитен експерт се наеме, толкова по-голям разход има за 
заплата, но всички останали проблеми остават. Обикновено това е 
краткосрочно решение и по-скоро трябва да се мисли за временно нает 
експерт по определени и много добре дефинирани проекти. Все пак 
експертите не са широки специалисти.&lt;br /&gt;

&lt;strong&gt;Да увеличи персонала в ИТ отдела ?!?!&lt;/strong&gt; Разделението 
на труда винаги води до по-добри резултати. Необходима е организационна 
йерархия, т.е. кой ще поеме ролята на ИТ ръководител и как ще бъдат 
разделени отговорностите и дейностите. Разходите тук растат не само с 
размера на заплатата, но и с новото работно място и необходимия 
инструментариум. Допълнителен негатив е проблема с изоставането от 
новите технологии и трудностите при тяхното тестване.&lt;br /&gt;

&lt;strong&gt;Изнасяне на ИТ услугите към външен доставчик ?!?!&lt;/strong&gt; 
Обикновено е очевидното решение, освен ако няма специални регулаторни 
изисквания ИТ услугите да се доставят от вътрешна ИТ организация. Но… 
това, следващия път.&lt;br /&gt;

&lt;em&gt;Оставям темата отворена и приветствам коментари и предложения, 
както от колеги от ИТ бранша, така и от консуматорите на ИТ услуги - ИТ 
потребители и техните ръководители. Ако сте напълно съгласни или пък 
нямате мнение за коментар, то споделете поста с Ваши колеги, приятели и 
познати. Ще е интересно да съберем повече мнения.&lt;/em&gt;&lt;br /&gt;

&lt;em&gt;Благодаря Ви предварително!&lt;/em&gt;&lt;br /&gt;


&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/4928208885435989182/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2016/05/blog-post.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/4928208885435989182'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/4928208885435989182'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2016/05/blog-post.html' title='Човекът ИТ отдел в малкия бизнес'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN0QMEhZFKcluj6GbdwVASNZRxoAAosK1jnmFcDWBoVNt5h9Nh8vCTiTwakA82Xz1sWyDyC1y5qVUxvFknCGCFQexhXdLMMR78oFXHdV_J4-A95vBUxk0p7mrcCiDqQQUnVEsDfbFBMhw/s72-c/ITsupport.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>London, UK</georss:featurename><georss:point>51.5073509 -0.12775829999998223</georss:point><georss:box>51.1912379 -0.77320529999998222 51.8234639 0.51768870000001777</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-1397170895686806925</id><published>2016-05-25T11:14:00.000+01:00</published><updated>2016-05-25T11:14:01.282+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="disruptive"/><category scheme="http://www.blogger.com/atom/ns#" term="innovation"/><category scheme="http://www.blogger.com/atom/ns#" term="model"/><category scheme="http://www.blogger.com/atom/ns#" term="technologies"/><title type='text'>Digital Disruption</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;article-body&quot; dir=&quot;ltr&quot; itemprop=&quot;articleBody&quot;&gt;
&lt;h2&gt;
&lt;b&gt;Very short survival guide&lt;/b&gt;&lt;/h2&gt;
&lt;br /&gt;
Digital Disruption in the last years marked a shift in the collective
 consciousness of businesses. No longer was disruption a mythical buzz 
word concocted to stir up fear, but a general state of business reality 
in world governed by technology.&lt;br /&gt;
It’s like a democratization of experience. If you look at Uber, it 
allows everybody to have a limo service at a relatively inexpensive 
rate. Things that perhaps only the one percent could afford, are now 
being moved to the broader base through technology. You can call it 
disruption, give it different words, but what it’s doing is allowing 
everybody to purchase experiences that traditionally would have cost a 
lot of time and money. It’s not the same way of doing business, it’s 
certainly exciting times.&lt;br /&gt;
The term digital disruption has become &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;something of a cliché in 
recent years and is often misused to describe any product involving 
digital technology or the use of digitization to better compete against 
marketplace peers. It is often confused with the term disruptive 
technology, a term coined by Harvard Business School professor Clayton 
M. Christensen to describe a new technology that displaces an 
established technology.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkPjlx43jjpKYbFMmdaNrNa2CxRD31lY51SCzvb9qkOtoAQQrLVTcxRvqNQUB0FDAoG6pbMtEW6QFioeA05HNUjoOQklaq_VgJLJFiSHcrh9Wl8f5Pd5DNtoj3FhlqnEBM9FPSuSRirq0/s1600/business_model.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;201&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkPjlx43jjpKYbFMmdaNrNa2CxRD31lY51SCzvb9qkOtoAQQrLVTcxRvqNQUB0FDAoG6pbMtEW6QFioeA05HNUjoOQklaq_VgJLJFiSHcrh9Wl8f5Pd5DNtoj3FhlqnEBM9FPSuSRirq0/s320/business_model.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;i&gt;Disruption isn’t about technology, it is about the velocity of change. In other words a change of a business model.&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
We have to focus on the velocity of disruption, setting up our 
organisations for the new state of business and how we can leverage 
disruption to grow. And the key to staying ahead of the curve, depends 
on keeping up with the pace of change.&lt;br /&gt;
&lt;h3&gt;
&lt;b&gt;How to achieve the above?&lt;/b&gt;&lt;/h3&gt;
The following list is not pretend to be exhaustive, but is good starting point:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Start from the scratch: Rethinking Value Creation&lt;/li&gt;
&lt;li&gt;Miners wanted as Data is the new Gold: Leveraging Data to Build Competitiveness&lt;/li&gt;
&lt;li&gt;Cultural shift: Anticipating and Preparing for Future Disruption&lt;/li&gt;
&lt;li&gt;Entrepreneurial approach: Eliminating Siloes and Collaborating for Disruptive Innovation&lt;/li&gt;
&lt;li&gt;Evaluation in time: Desirability, Viability and Feasibility of Innovation&lt;/li&gt;
&lt;li&gt;Unlimited opportunities: Building partnerships to foster innovation&lt;/li&gt;
&lt;li&gt;Creating a culture for innovation and empowering employees to be entrepreneurs&lt;/li&gt;
&lt;li&gt;Organisational change: Rethinking Existing Processes and Structures&lt;/li&gt;
&lt;li&gt;Identifying the Best Placed team to Drive Disruptive Innovation within Organisation&lt;/li&gt;
&lt;li&gt;Rethinking Product Design to Improve Value Creation&lt;/li&gt;
&lt;li&gt;A CDO (Chief Digital Officer) role: Acquire and Promote an Effective Digital Leader&lt;/li&gt;
&lt;li&gt;Identifying Benchmarks and Measuring Success of Digital Transformation&lt;/li&gt;
&lt;li&gt;Navigating Diverse and Complex Technologies and Identifying the Best fit for the Business&lt;/li&gt;
&lt;li&gt;Embedding Agility to Improve Speed to Market&lt;/li&gt;
&lt;li&gt;Social Capital Management: Building and Maintaining Deep Relationships with Customers, Partners and Stakeholders&lt;/li&gt;
&lt;li&gt;AI is not part of the future anymore: Exploring the Scope and Impact of Machine Learning&lt;/li&gt;
&lt;li&gt;Anywhere, anytime from any device: Creating a Collaborative and Creative Work place&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Still not sure how to achieve that? Call me for a free digital disruption health check.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/1397170895686806925/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2016/05/digital-disruption.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/1397170895686806925'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/1397170895686806925'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2016/05/digital-disruption.html' title='Digital Disruption'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkPjlx43jjpKYbFMmdaNrNa2CxRD31lY51SCzvb9qkOtoAQQrLVTcxRvqNQUB0FDAoG6pbMtEW6QFioeA05HNUjoOQklaq_VgJLJFiSHcrh9Wl8f5Pd5DNtoj3FhlqnEBM9FPSuSRirq0/s72-c/business_model.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>London, UK</georss:featurename><georss:point>51.5073509 -0.12775829999998223</georss:point><georss:box>51.1912379 -0.77320529999998222 51.8234639 0.51768870000001777</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-6975712972672502328</id><published>2016-05-20T10:04:00.000+01:00</published><updated>2016-05-20T10:04:05.234+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="advisory"/><category scheme="http://www.blogger.com/atom/ns#" term="consultancy"/><category scheme="http://www.blogger.com/atom/ns#" term="small business"/><category scheme="http://www.blogger.com/atom/ns#" term="SME"/><title type='text'>Small businesses’ challenges consultants can help to overcome</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;article-body&quot; dir=&quot;ltr&quot; itemprop=&quot;articleBody&quot;&gt;
&lt;h2&gt;
&lt;b&gt;Ready for a flight?&lt;/b&gt;&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheUiKYHmNmKp08k4X04gHd4YdJJE3w5Xq8TfzErTvw6Nb67HmV8oaRKvbAIAiW6fO53PnhfzbNEwsU9YFgFSCrREFEVtjbUAxG-CJwgXvkD0brG_UFeo55SIV9wWcnarzltHD7PnvWhA0/s1600/confident-endeavors-business-consulting.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheUiKYHmNmKp08k4X04gHd4YdJJE3w5Xq8TfzErTvw6Nb67HmV8oaRKvbAIAiW6fO53PnhfzbNEwsU9YFgFSCrREFEVtjbUAxG-CJwgXvkD0brG_UFeo55SIV9wWcnarzltHD7PnvWhA0/s320/confident-endeavors-business-consulting.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
We live in interesting times, especially for small businesses. 
Consider that, in just less than 10 years, businesses have had to adapt 
to entirely new marketing channels through Internet as social networks, 
decide how to invest in and utilize new technologies, and compete on a 
local and now on a global stage — things that were barely imaginable to 
just a half generation ago. The small business yesterday is the new big 
online business today.&lt;br /&gt;
Obviously the rapid changes and growth is that
 no single&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;small business owner, manager or any employee, for that 
matter — can be an expert in everything. &lt;br /&gt;
Qualified consultants are 
potentially able to address some of the biggest challenges small 
businesses face today. Bringing a consultant on-board helps managers add
 the expertise and skills they need to address specific issues at 
particular times, and can provide the best possible outcomes.&lt;br /&gt;
Where consultants can help:&lt;br /&gt;
&lt;h3&gt;
&lt;b&gt;How to predict the sector/market trends?&lt;/b&gt;&lt;/h3&gt;
You need a subject matter expert in your sector and someone 
experienced in developing Business Strategy. Again go back to 
data-information-knowledge-wisdom model to be able to predict customer 
trends, market trends, globalisation or localisation. All of that is 
crucial to a changing economic climate, but not every small business 
manager has Oracle’s predictive powers. Bringing in a consultant trained
 in reading and predicting those all-important trends could be the 
difference between a success and a failure.&lt;br /&gt;
&lt;h3&gt;
&lt;b&gt;Manage your finances wisely&lt;/b&gt;&lt;/h3&gt;
Expectedly managers have to be great at the big picture and 
disruptive thinking. However small business managers are usually 
business owners and they have significant expertise in their technical 
domain. Unless the domain is not within the finance/accountancy, they 
are less good with things like cash flow, profit margins, reducing 
costs, financing, etc. Small and medium businesses may not require a 
full-time CFO, but would do better to employ a part-time financial 
consultant who can step into the role as needed.&lt;br /&gt;
&lt;h3&gt;
&lt;b&gt;Monitor – Control – Manage your business&lt;/b&gt;&lt;/h3&gt;
The world around us is full of events. We do not pay attention to 
almost all of them. We take care only to meaningful ones. In order to 
measure performance we have to define what we have to measure, how to 
measure it, what instruments and tools we have to have. Using a 
meaningful set of rounded performance indicators that provide the 
business with insights about how well it is performing is key. Most 
people know barely how to develop KPIs, how to avoid the key pitfalls 
and how to best communicate metrics so that they inform decision-making.
 In most cases small businesses rely on overly simple or even assumption
 of indicators that just clog up the reporting channels.&lt;br /&gt;
&lt;h3&gt;
&lt;b&gt;Information Technologies&lt;/b&gt;&lt;/h3&gt;
As technologies change practically at the speed of light, it’s vital 
for companies to innovate or be left behind — but many managers started 
their careers and businesses before many of these technologies even 
existed! IT consultants can be vital for converting Business Strategy to
 a IT Strategy, (re)design of IT Services road-map, unlock competitive 
advantages by integrating new technologies, in particular mobile, app 
development, and cloud computing.&lt;br /&gt;
&lt;h3&gt;
&lt;b&gt;Big data&lt;/b&gt;&lt;/h3&gt;
Your grandma’s generation certainly didn’t have to deal with 
petabytes of data or worry about what to do with it. 90% of the world’s 
data was created in the past two years and managing, keeping safe and 
extracting insights from the ever-increasing amounts of data your 
business produces needs to be in the hands of a qualified professional 
who can help you get the most return from that data. You have to be able
 not just to collect, but to apply data mining, business intelligence, 
performance management, predictive analysis and risk management. This 
will increase the revenue/profit from existing customers by up-selling 
and cross-selling, plus will uncover new market places and 
opportunities.&lt;br /&gt;
&lt;h3&gt;
&lt;b&gt;Talent factor&lt;/b&gt;&lt;/h3&gt;
Again, a small or medium-sized business might not need full-time 
human resources or recruiting staff, but during peak growth periods, 
finding the right people and developing the right skills and 
competencies is the key to a sustainable future. Look much more for a 
passion and starve to learn rather than experience, skills and 
knowledge. Everything is possible with ambition and passion. Bringing in
 a consultant with the expertise to find exactly the workers you need 
would be a wise investment.&lt;br /&gt;
&lt;h3&gt;
&lt;b&gt;Regulation and compliance&lt;/b&gt;&lt;/h3&gt;
As markets and technologies shift, so do rules and regulations. 
Depending on your sector, it can make much more sense to bring in a 
consultant to help with these areas rather than trying to understand the
 complexities yourself — and risk fines or worse for non-compliance.&lt;br /&gt;
&lt;h3&gt;
&lt;b&gt;Why customer is a king?&lt;/b&gt;&lt;/h3&gt;
In a world of instant gratification, customers expect instant 
customer service — and can take to the web to share their displeasure at
 less than satisfactory service just as quickly. You have to be quick in
 responses and here consultants and technologies can help&lt;br /&gt;
&lt;h3&gt;
&lt;b&gt;Maintaining reputation&lt;/b&gt;&lt;/h3&gt;
Once built your business credibility is like a live creature. You 
have to take care not just to show testimonials and certificates from 
third party organisations, but to allow positive word of mouth to flow 
amongst you prospective customers. Experienced reputation consultant can
 help you to manage this for you.&lt;br /&gt;
&lt;h3&gt;
&lt;b&gt;Ride the wave of changes&lt;/b&gt;&lt;/h3&gt;
Early adopter or late to the game? What is the right time to embrace 
change and when to stay the course? Rarely everything new is better, yet
 eschewing every change runs the risk of becoming obsolete and I have 
bad experience with that. Definitely this should not be stopper. A 
professional outside opinion can facilitate the informed decision and 
will make all the difference.&lt;br /&gt;
I have started the post with our life in interesting times. They are 
quick and stormy due to a constant change for the foreseeable future: 
change is the new normal. Preparing for the changes and extracting the 
real value can be achieved by investing in the right kind of advice is 
the best way to meet these challenges head on.&lt;br /&gt;
Do you have your very trusted advisor?&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/6975712972672502328/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2016/05/small-businesses-challenges-consultants.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/6975712972672502328'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/6975712972672502328'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2016/05/small-businesses-challenges-consultants.html' title='Small businesses’ challenges consultants can help to overcome'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheUiKYHmNmKp08k4X04gHd4YdJJE3w5Xq8TfzErTvw6Nb67HmV8oaRKvbAIAiW6fO53PnhfzbNEwsU9YFgFSCrREFEVtjbUAxG-CJwgXvkD0brG_UFeo55SIV9wWcnarzltHD7PnvWhA0/s72-c/confident-endeavors-business-consulting.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>London, UK</georss:featurename><georss:point>51.5073509 -0.12775829999998223</georss:point><georss:box>51.1912379 -0.77320529999998222 51.8234639 0.51768870000001777</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-6631812011409899662</id><published>2016-05-17T13:38:00.000+01:00</published><updated>2016-05-17T13:38:13.768+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="digital"/><category scheme="http://www.blogger.com/atom/ns#" term="strategy"/><category scheme="http://www.blogger.com/atom/ns#" term="transformation"/><title type='text'>Small Business Survival Guide</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;article-body&quot; dir=&quot;ltr&quot; itemprop=&quot;articleBody&quot;&gt;
Only 10% of small businesses survive first five years, and again 10% 
of them will survive between next five years period. This data 
underscores that small business ownership is no cakewalk.&lt;br /&gt;
Beyond the classic entrepreneurial challenge of making and sustaining
 a profit, small business owners now struggle to find time and resources
 to adapt to new technology, say experts.&lt;br /&gt;
The pace of technological development is as staggering as the 
ever-changing ways that consumers engage and utilize it. To stay 
competitive to consumers and to employees, &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;small businesses need to 
adopt and incorporate online technology into their everyday business 
operations.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUiPV2aSou9wRksq5rnZymqGfP4hWLVZViWMbTytsWzObx0pAQKwWFchF5zB6CwaWH83F4cPEv59TsnIB1ppTO3C5RABrfFOrhcradfoS5vtRc0c-_Ftu_93_84pPP9r_M4j_qlfUCgmg/s1600/small-business.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUiPV2aSou9wRksq5rnZymqGfP4hWLVZViWMbTytsWzObx0pAQKwWFchF5zB6CwaWH83F4cPEv59TsnIB1ppTO3C5RABrfFOrhcradfoS5vtRc0c-_Ftu_93_84pPP9r_M4j_qlfUCgmg/s400/small-business.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
To help entrepreneurs navigate new technology and embrace the 
evolving business operations landscape, I recommend six tips for small 
business success: &lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Be visible: Even if your business is farming, the importance of 
having an online presence cannot be overstated. It’s not enough to 
simply have a website, you need to be discovered. Google frequently 
changes the way it determines search results rankings. Invest in search 
engine optimization (SEO) not once, but periodically, to conform to 
Google’s make-or-break formulas. A solid social media strategy and 
mobile capacity for your site will also positively impact your search 
ranking. Put the marketing books away and lean on digital marketing 
experts to audit your current online presence and build a strategy that 
works for your budget and grows your customer base.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Keep in touch: You may be the one pulling the trigger on big 
decisions, but that doesn’t mean you are expected to know it all. Seek 
advice from trusted industry peers or a local mentor through LinkedIn, 
Business Networking and or any social media. Make time for webinars and 
networking events. Most importantly, stay connected to friends and 
family during times of stress. Ask various people about their perception
 of your services/products.&lt;/li&gt;
&lt;li&gt;Protect your data: Small businesses are often targets of identity 
theft.&amp;nbsp;&amp;nbsp; Create sophisticated passwords to protect sensitive 
information. Consider investing in a protection service with 
round-the-clock threat monitoring and recovery support in case of 
fraudulent activity. Think about restore of your data.&lt;/li&gt;
&lt;li&gt;Make your sales efficiently: The sale process happens between human 
beings. You have to know as much as possible information for them. The 
secret is to add context to your collected data and create valuable 
information. Adding experience to information enables knowledge.The 
wisdom as a last stage after knowledge will enable prediction of trends,
 behaviour and creation of new market places. On the other side it 
enables up-sales and cross-sales. Cost of sale is approximately 10 times
 less compared with sale to a new customer.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Get smart about taxes: Set up a legal entity for your business 
online. This will allow you to hold on to more of your income and 
increase your asset and liability protections. Business taxes can be 
more expensive and complicated than personal filing, so find an 
accountant that gets your business. You can greatly benefit from the 
assistance of online accounting experts. They will help you take 
advantage of deductions and tax credits and assist you in filing your 
frequent, varied deadlines on time to avoid penalty.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Speed up workforce: New mobile and tablet apps make tedious tasks 
easier and more efficient. Save your employees’ time and yours also by 
continual improvements in optimisation, automation and collaboration.&lt;/li&gt;
&lt;/ul&gt;
Not sure how to achieve all of the above? Simply give me a shout.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/6631812011409899662/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2016/05/small-business-survival-guide.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/6631812011409899662'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/6631812011409899662'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2016/05/small-business-survival-guide.html' title='Small Business Survival Guide'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUiPV2aSou9wRksq5rnZymqGfP4hWLVZViWMbTytsWzObx0pAQKwWFchF5zB6CwaWH83F4cPEv59TsnIB1ppTO3C5RABrfFOrhcradfoS5vtRc0c-_Ftu_93_84pPP9r_M4j_qlfUCgmg/s72-c/small-business.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>London, UK</georss:featurename><georss:point>51.5073509 -0.12775829999998223</georss:point><georss:box>51.1912379 -0.77320529999998222 51.8234639 0.51768870000001777</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-3664062496540774077</id><published>2016-05-09T05:00:00.000+01:00</published><updated>2016-05-09T05:00:19.651+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="infrastructure"/><category scheme="http://www.blogger.com/atom/ns#" term="management"/><category scheme="http://www.blogger.com/atom/ns#" term="remote"/><category scheme="http://www.blogger.com/atom/ns#" term="road warrior"/><title type='text'>Remote Workplaces and the Cloud Technologies</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;article-body&quot; dir=&quot;ltr&quot; itemprop=&quot;articleBody&quot;&gt;
Remote employees are no longer a future project – they are a reality 
for the last two decades. Despite an abundance of scepticism (and a few 
outright bans like Yahoo), researchers keep finding that remote workers 
are more productive, less likely to quit, and generally better at their 
jobs. While some still find it hard to cut their ties to the office, the
 trend toward more remote work is clear. You can save commuting time and
 costs and spend with a family instead.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Let’s look at remote worker average profile. He or she is 42 years 
old on average, at least college educated, payslip is showing more than 
£45K salary and head count at the company is above 100 employees. There 
are a lot of exclusions of course and it depends more on the sector plus
 business specifics.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoqfLlhhl78n_1hibvlA-lOodocPGKZcHoe7WFEqCDxKo5ZE_VqTeRwTBKB1f5bXIwj9RljCxgLLmL6Ifpa4P5tbAh3sSu09ZSJq759uo5Ny2ZIFC4NEjIF3SwwaAV-gqWC9VabLNceXE/s1600/Remote+Worker.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;223&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoqfLlhhl78n_1hibvlA-lOodocPGKZcHoe7WFEqCDxKo5ZE_VqTeRwTBKB1f5bXIwj9RljCxgLLmL6Ifpa4P5tbAh3sSu09ZSJq759uo5Ny2ZIFC4NEjIF3SwwaAV-gqWC9VabLNceXE/s320/Remote+Worker.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
There is a specific kind of a remote worker and this is Road Warrior.
 We have been all on odd conference call with the guy or gal sprinting 
through an airport terminal or parked on the side of a noisy free-way. 
The road warrior is rarely ever in one place for long but constantly on 
the move visiting prospects and clients, inspecting sites or attending 
seminars in different cities, connecting from whichever device is 
handiest in the moment – laptop, tablet, smartphone or all of the above.&lt;br /&gt;
From a CIO’s perspective, however, the benefits of remote work are 
not quite as obvious. Those remote workers are saving the company quite a
 lot when it comes to the real estate, utilities, and other overhead 
costs associated with a physical office. But CIO who look at the cost 
per employee may actually see a higher bill when workers are outside the
 office. It is true IT expenditures could be a little bit higher.&lt;br /&gt;
Everyone who works from home requires an end user device as computer,
 tablet or mobile, after all. Those devices can’t be quickly and easily 
supported when they’re dispersed. Remote workers can’t just pop into 
their neighbour’s cubicle for some impromptu support, although that may 
be an advantage for beleaguered IT-savvy workers.&lt;br /&gt;
Most issues and support requests can still be dealt with remotely in 
many instances, particularly as more and more applications are being 
moved to the cloud. Remote workplaces also have to cope with loss of 
equipment. The devices of remote workers are more likely to get lost in 
transit or stolen from coffee houses than their in-office counterparts. 
The bring-your-own-device (BYOD) trend is accelerating quickly and 
maintenance cost is reduced for the end user devices as long as they are
 able to access cloud based applications.&lt;br /&gt;
Infrastructure quality can also be an issue. In an office, IT 
operations can assure the same standards, or at least create a solid 
baseline that everyone can count on. But out in the wild, there’s a huge
 difference in what infrastructure employees are plugging into. Remote 
workers may be relying on shared Wi-Fi or are using blazingly fast 
connections of mobile operators. A dispersed IT infrastructure has to 
allow for both possibilities.&lt;br /&gt;
There’s also an increased cost for keeping remote workers connected 
to each other. A dispersed workforce means that more money goes to 
remote meeting technologies – negating at least some of the gain from 
getting rid of those physical conference rooms.&lt;br /&gt;
Do these potential disadvantages add up to the end of the remote 
workplace? Not really, even the answer isn’t very clear in the end. 
However remote workers can do the job around the globe/clock and this 
includes low cost destinations at any time around the clock.&lt;br /&gt;
Calculating the costs and benefits of a remote workplace isn’t 
necessarily about comparing hard numbers. The impact of remote work on 
employee morale, retention, and productivity can be difficult to measure
 against stolen computers and the cost of a videoconferencing system. 
The company expansion and business growth acceleration powered by remote
 workplace may be just as important as overhead introduced by more 
complex technical architecture. You can grow your business as a 
multinational company easily without burden of physical offices and 
without limits of your current physical location simply by relying on 
technologies.&lt;br /&gt;
&amp;nbsp;Want your office(s) to work remotely, but not sure how you can make it work? We can help.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/3664062496540774077/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2016/05/remote-workplaces-and-cloud-technologies.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/3664062496540774077'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/3664062496540774077'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2016/05/remote-workplaces-and-cloud-technologies.html' title='Remote Workplaces and the Cloud Technologies'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoqfLlhhl78n_1hibvlA-lOodocPGKZcHoe7WFEqCDxKo5ZE_VqTeRwTBKB1f5bXIwj9RljCxgLLmL6Ifpa4P5tbAh3sSu09ZSJq759uo5Ny2ZIFC4NEjIF3SwwaAV-gqWC9VabLNceXE/s72-c/Remote+Worker.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>London, UK</georss:featurename><georss:point>51.5073509 -0.12775829999998223</georss:point><georss:box>51.1912379 -0.77320529999998222 51.8234639 0.51768870000001777</georss:box></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-6646260804083918805</id><published>2016-05-02T18:29:00.000+01:00</published><updated>2016-05-02T18:29:46.648+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="management"/><category scheme="http://www.blogger.com/atom/ns#" term="outsource"/><category scheme="http://www.blogger.com/atom/ns#" term="strategy"/><title type='text'>Business value in IT outsourcing</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
In simple language, outsourcing is the contracting out of a business 
function to an external supplier, involving the transfer of people as 
resources and capabilities, processes and assets. This contracting out 
can be undertaken at either an on-shore or off-shore location, and to 
one (single-sourced) or more (multi-sourced) outsourcing partners. 
Outsourcing is most mature in the Information Technology sector although
 it is increasingly developing to include a wide range of business 
processes.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;From the early 80’s last century IT Outsourcing has 
evolved into a sophisticated global market and most companies, no matter
 how traditional their business model is, have outsourced one or more 
layers of their IT function. Outsourcing IT has always been a complex 
programme, in part due to the requirement to bundle IT into ‘services’ 
combining hardware, software, people and processes. These services often
 contain data centre, end-user computing, service desk, application 
development and maintenance, and voice and data network packages. &lt;br /&gt;For
 traditional IT outsourcing there are intricacies in transferring staff,
 novating contracts and assessing the financial impact of selling 
physical assets. These complications have been recently compounded by 
on-demand IT offerings, the evolution of offshore centres, and the 
advent of cloud-based offerings.&lt;br /&gt;Outsourcing success is dependent 
upon how well the process will be managed before and after the 
outsourcing contract is signed. Many companies award the outsourcing 
contract to the lowest bidder without understanding the consequences and
 without performing a complete vendor selection process. Some companies 
blindly go for medium to higher outsourcing contract bidder relying on 
the assumption if it is more expensive it should be good enough. When 
things start to fall apart, like missed delivery targets, quality issues
 occur or inconsistent service, the blame-game starts and everyone runs 
for cover.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Fit for purpose&lt;/strong&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXwbVeEbA5-QgdcPLGgPtz9t06MeEGZ7G8l68u22RZ5AJq945ZkoHRQsKpsSgUZR_v2A6-x0b08UyRa3qV4ao1JHe4JVzUPToNM6wVrJNtyQXXvqC7_lTafNOn_fCCEiPjnewmPV79gGY/s1600/home-office-595476_1280.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXwbVeEbA5-QgdcPLGgPtz9t06MeEGZ7G8l68u22RZ5AJq945ZkoHRQsKpsSgUZR_v2A6-x0b08UyRa3qV4ao1JHe4JVzUPToNM6wVrJNtyQXXvqC7_lTafNOn_fCCEiPjnewmPV79gGY/s320/home-office-595476_1280.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;Outsourcing an IT 
process simply because it is not working well only makes the problem 
worse. Without a doubt, an outsourcing vendor should add value to 
customer business, but should not be relied upon to fix the problems 
inherent in the business itself. The best approach is to re-visit the 
process design by to applying Deming Cycle – Plan, Do, Check (Study), 
Apply or simply to hire external consultant organisation to do the job. 
Once the process is clarified and cleared from unnecessary workflows and
 elements all activities can be re-visited.Still not satisfied by 
the outcome? Look around for an outsourcing solution. Now it is clear 
what is required and you will compare apples with apples.&lt;br /&gt;Unfortunately
 I have been approached many times in my professional career by business
 managers to “compare” their IT department outcome with outsourced IT 
service. The pity part is only numbers are usually compared without real
 understanding of the services, pros and cons of both models and 
pricing/chargeback models.&lt;br /&gt;Why not to outsource the comparison to experienced organisation and enable an informed decision?&lt;br /&gt; &lt;br /&gt;&lt;strong&gt;Thorough Vendor Selection&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;The
 vendor selection process can be a very complicated and emotional 
undertaking if you don&#39;t know how to approach it from the very start. 
First discover what is required. Before start to gather data or perform 
interviews, assemble a team of people who have a vested interest in this
 particular vendor selection process. The outcome of the team work is to
 define, in writing, the product, material or service that are in demand
 and to be transferred to a vendor. Next step should involve defining 
the technical, business and the vendor requirements. Finally, the 
document shall be visible and accessible to the areas relevant to this 
vendor selection process and seek their input.&lt;br /&gt;Did you started with 
mentioned above? If not it is time to do it. Not sure how to follow 
properly the Bid Management process? You can outsource it also.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Make It Measurable&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;Is
 this measurable? If not, do not include it in the SLA(s). How good is 
good internet? Only measurable units should be used in conjunction with 
measurement systems. This will provide information about outsourced 
process or service performance. If you don&#39;t analyse and define quality 
measurements and/or service levels, how will you know if your 
outsourcing vendor is performing to your standards?&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Risk Mitigation&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;The list below is not exhaustive but is good starting point to address some of the risks:&lt;br /&gt;
1.
 Company legacy/politics are jeopardizing the success of the project – 
Establish a dedicated team with strong organisational and board level 
support.&lt;br /&gt;2. Poor Selection of Vendor - Consider a detailed Study 
about vendors including current processes, customer references etc., 
rather than blindly believing the track record.&lt;br /&gt;3. Scope Creep - 
Scope of the project getting wider with new requirements to be 
addressed. Phased approach with milestones and trade-offs at various 
stages.&lt;br /&gt;4. Process and Quality standards incompatible with vendor. - 
Agreed upon standards and processes must be part of the binding 
contract.&lt;br /&gt;5. Security breach including Confidentiality, IP and trade 
secrets. - Require vendors to meet security standards and monitor with 
effective auditing.&lt;br /&gt;6. Infrastructure breakdown, could be a 
software/hardware/network failure that may or may not be directly in 
vendor&#39;s control. - Review and approve Business Continuity and disaster 
recovery plans of the vendor. Audit data from simulated disaster drills.&lt;br /&gt;7.
 Poorly designed disaster recovery systems/processes. - Review and 
approve Business Continuity and disaster recovery plans of the vendor. 
Audit data from simulated disaster drills.&lt;br /&gt;8. Reduced Employee 
motivation as outsourcing is perceived as loss of job. - Establish 
Employee retention strategies such as retention bonus, performance map 
etc.&lt;br /&gt;9. Political/Cultural unrest. - Be sensitive to cultural issues.&lt;br /&gt;10.
 Process non-alignment and differing governance model. - Establish 
compatible and agreeable processes and include them as part of the 
contract.&lt;br /&gt;11. Increased labour rate as the project progresses. Vendor
 might try to justify the increase with reasons such as Inflation, 
currency conversion fluctuations. - Binding document should contain 
appropriate forecasts and waivers wherever applicable.&lt;br /&gt;12. Legal and 
Regulatory risks. - Increase awareness about region specific laws and 
regulations to better plan for incompatibilities and allowable 
trade-offs.&lt;br /&gt;13. Non-alignment of Management and Reporting Structure with vendor. - Expect Governance model to be included in RFPs.&lt;br /&gt;14.
 Lack of control or insight into vendor progress. - Well planned 
milestones, immediate deliverables along with appropriate documentation 
plan.&lt;br /&gt;15. Country specific issues such as differing laws, educational systems. - Increase awareness of all stakeholders.&lt;br /&gt;16. Higher Project Transition cost. - Factor in a detailed transition cost to overall project cost.&lt;br /&gt;17.
 Response time not within the acceptable/required limits as the vendor 
is spread across time-zone. - Flexible shits to respect time-zones and 
increased frequency of meetings.&lt;br /&gt;18. Project members of vendor lack project knowledge or technology know-how. - Review vendor team selection process.&lt;br /&gt;19.
 Knowledge transfer issues such as inability to capture tacit knowledge.
 - Recorded videos, tutorials, web casts to transfer knowledge.&lt;br /&gt;20. 
Dependence on a single vendor for all outsourcing needs. - Core 
processes, deliverables designed to be loosely coupled with vendor&#39;s 
technologies, processes.&lt;br /&gt;21. Cultural differences. - Increased cultural awareness through specialized trainings.&lt;br /&gt;
Always
 is good idea to find an experienced advisor or consultant if your 
outsourcing project’s complexity exceeds your organisation resources and
 capabilities.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Control It&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
After the newness
 of the outsourcing relationship wears off, it is human nature to sit 
back and enjoy the ride for a while. Unfortunately, this leads to 
complacency and attention to performance can be forgotten. In order to 
avoid these symptoms, set a timetable to review your outsourcing 
vendor&#39;s performance. A manager should held the responsibility to follow
 up. If needed, send your staff to be trained in vendor management 
skills and techniques. This strategy will also yield the ability to deal
 with unforeseen circumstances on a timelier basis and mitigate the risk
 associated with outsourcing.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/6646260804083918805/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2016/05/business-value-in-it-outsourcing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/6646260804083918805'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/6646260804083918805'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2016/05/business-value-in-it-outsourcing.html' title='Business value in IT outsourcing'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXwbVeEbA5-QgdcPLGgPtz9t06MeEGZ7G8l68u22RZ5AJq945ZkoHRQsKpsSgUZR_v2A6-x0b08UyRa3qV4ao1JHe4JVzUPToNM6wVrJNtyQXXvqC7_lTafNOn_fCCEiPjnewmPV79gGY/s72-c/home-office-595476_1280.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-8341641701597783970</id><published>2016-04-24T20:34:00.000+01:00</published><updated>2016-04-24T20:46:37.763+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="managed"/><category scheme="http://www.blogger.com/atom/ns#" term="services"/><title type='text'>Outsourcing of IT Managed Services</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 class=&quot;article-title&quot; itemprop=&quot;headline&quot;&gt;
&lt;/h1&gt;
&lt;h3 class=&quot;center&quot;&gt;
&lt;b&gt;Challenges and Solutions&lt;/b&gt;&lt;/h3&gt;
&lt;h3 class=&quot;center&quot;&gt;
&lt;b&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;b&gt;Threat to Security and Confidentiality&lt;/b&gt;&lt;br /&gt;
The vital 
asset of any business is the information that keeps it running. Whatever
 you have as information assets, intellectual property or any other 
confidential information that would be exposed to the outsourcing 
organisation, there is a risk that the confidentiality may be 
compromised. If the outsourced function involves sharing proprietary 
company data or knowledge, this must be taken into account. Evaluate the
 outsourcing organisation carefully and prepare NDA to make sure your 
data is protected and the agreement has a penalty clause if an incident 
occurs.&lt;br /&gt;
Do you have action plan and implemented process prior of the incident? Communication plan?&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Service Level Agreement&lt;/b&gt;&lt;br /&gt;
The outsourcing 
organisation will be motivated by profit. Since the agreement will fix 
the price, the only way for them to increase profit will be to decrease 
expenses or ask &lt;a href=&quot;https://www.linkedin.com/company/prima-net-consult&quot; target=&quot;_blank&quot;&gt;Prima Net Consult&lt;/a&gt;
 why strategic approach introduce best value. As long as they meet the 
conditions of the agreement, you will pay. Conditions must to be 
described into SLA document for each particular service. In addition, 
you will lose the ability to rapidly respond to changes in the business 
environment as cheap service and quick response to a changes are 
self-excluding. The agreement usually will be very specific and you will
 pay extra for changes.&lt;br /&gt;
Do your SLAs use measurable services? Are you use strategic approach in IT Managed Services?&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEips9sBOeHamfXYKJ0lCJSKReH6ZN0te49Liqmj6JuZd1pjOphiMBmRnflUrh4apQArQVUmaIMUTOtKdPfPyX4bCPo-qSd2kX7E-bFm4AwvptOAGmEnAX87zwWMtVFB_4nBpwMyvm_qamY/s1600/outsource.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEips9sBOeHamfXYKJ0lCJSKReH6ZN0te49Liqmj6JuZd1pjOphiMBmRnflUrh4apQArQVUmaIMUTOtKdPfPyX4bCPo-qSd2kX7E-bFm4AwvptOAGmEnAX87zwWMtVFB_4nBpwMyvm_qamY/s320/outsource.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;Covered Costs by the agreement&lt;/b&gt;&lt;br /&gt;
Signing an 
agreement with the outsourcing organisation that will cover the details 
of the service that they will be providing. Anything not covered in the 
papers will be the basis for you to pay additional charges. Obviously, 
this is the outsourcing organisation&#39;s business. They have done this 
before and they are the ones that write the template of the agreement. 
Expectedly, you will be at a disadvantage when negotiations start.&lt;br /&gt;
Do
 you have clearly defined services and service levels? Do you have an 
option to “burst” in demand for the service or quickly add/remove new 
services?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Transfer of Managerial Control&lt;/b&gt;&lt;br /&gt;
Whether you sign 
an agreement to have another organisation perform the function of an 
entire IT department or single task, you are turning the management and 
control of that function over to them. True, you will have an agreement,
 but the managerial control will belong to external organisation. Your 
outsourcing organisation will not be driven by the same standards and 
mission that drives your company. They will be driven to make a profit 
from the services that they are providing to you and other businesses 
like yours.&lt;br /&gt;
Do you have a governance framework prepared?&lt;br /&gt;
&lt;br /&gt;
With all these pros and cons of outsourcing to be considered before 
actually approaching a service provider, it is always advisable to 
specifically determine the importance of the tasks which are to be 
outsourced. It is always beneficial for an organization to consider the 
advantages and disadvantages of offshoring before actually outsourcing 
it.&lt;br /&gt;
As the list above is not exhaustive, what do you think is the most dangerous disadvantage of IT Managed Services outsourcing?&lt;br /&gt;
&lt;h3 class=&quot;center&quot;&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/h3&gt;
&lt;h1 class=&quot;article-title&quot; itemprop=&quot;headline&quot;&gt;
&amp;nbsp;&lt;/h1&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/8341641701597783970/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2016/04/outsourcing-of-it-managed-services.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/8341641701597783970'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/8341641701597783970'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2016/04/outsourcing-of-it-managed-services.html' title='Outsourcing of IT Managed Services'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEips9sBOeHamfXYKJ0lCJSKReH6ZN0te49Liqmj6JuZd1pjOphiMBmRnflUrh4apQArQVUmaIMUTOtKdPfPyX4bCPo-qSd2kX7E-bFm4AwvptOAGmEnAX87zwWMtVFB_4nBpwMyvm_qamY/s72-c/outsource.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-4291646419099040901</id><published>2013-08-14T09:09:00.001+01:00</published><updated>2015-05-02T13:58:03.897+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="HOW-TO"/><category scheme="http://www.blogger.com/atom/ns#" term="MailStore Home"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>MailStore Home - Tips and Tricks - Part 4 - Manual repair corrupted MailStoreFileGroup.fdb files and .fdb backup</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: #e69138; font-family: Verdana, sans-serif; font-weight: bold; line-height: 1.15; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: #e69138; font-family: Verdana, sans-serif; font-weight: bold; line-height: 1.15; white-space: pre-wrap;&quot;&gt;Problem: &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;line-height: 16px;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;i&gt;&quot;The problem occurred when moving my back-up to a new location. Somehow the MailStoreFileGroup.fdb file got corrupted. To cut to the chase is there a way to manually repair the file for my latest database back-up is to old for my comfort. I would rather repair the database and have excess to all my archived mails including the including the possibility of it going wrong. Then on forehand back up from an older back-up and missing those essential mails.&quot;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;&lt;span style=&quot;font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #e69138; font-family: Verdana, sans-serif;&quot;&gt;Resolution:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 15px;&quot;&gt;Thanks to MailStore&amp;nbsp;Community powered support:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 15px;&quot;&gt;&lt;i&gt;&quot;First of all, close MailStore Home. Then open the cmd.exe by using the Start -&amp;amp;gt; Run.. function in Windows. Now go on with the following instructions. We assume you are already in the directory containing the MailStoreFileGroup.fdb file.&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 15px;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;i&gt;1. Define the following two variables, it makes life easier, in that you do not have to type in the user name and password every time you issue a command.&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;i&gt;SET ISC_USER=SYSDBA&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;i&gt;SET ISC_PASSWORD=masterkey&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;i&gt;2. Always make sure you work on a copy of the database, not the production database. Use the operating system to make a copy of the database. You must have exclusive access to the database to do this.&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;i&gt;copy MailStoreFileGroup.fdb MailStoreFileGroup.fdb.bak&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;i&gt;3. Now check for database corruption. You must have exclusive access to do this, but since you&#39;re working on a copy of the original database, this is not a problem...&quot;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://getsatisfaction.com/email_archiving_software/topics/manual_repairing_of_a_corrupted_mailstorefilegroup_fdb_file&quot; style=&quot;font-family: Verdana, sans-serif; line-height: 15px;&quot; target=&quot;_blank&quot;&gt;S&lt;/a&gt;&lt;a href=&quot;https://getsatisfaction.com/email_archiving_software/topics/manual_repairing_of_a_corrupted_mailstorefilegroup_fdb_file&quot; style=&quot;font-family: Verdana, sans-serif; line-height: 15px;&quot; target=&quot;_blank&quot;&gt;ee full post here&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Useful links:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;- &lt;a href=&quot;http://www.firebirdsql.org/manual/gfix-commands.html&quot; target=&quot;_blank&quot;&gt;Firebird Gfix&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;- &lt;a href=&quot;http://www.firebirdsql.org/manual/gbak-cmdline.html#gbak-cmdline-common&quot; target=&quot;_blank&quot;&gt;Firebird Gbak&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot;&gt;

&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/4291646419099040901/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2013/08/mailstore-home-tips-and-tricks-part-4.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/4291646419099040901'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/4291646419099040901'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2013/08/mailstore-home-tips-and-tricks-part-4.html' title='MailStore Home - Tips and Tricks - Part 4 - Manual repair corrupted MailStoreFileGroup.fdb files and .fdb backup'/><author><name>vMilen</name><uri>http://www.blogger.com/profile/05318089702427368203</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-6882652719211987080</id><published>2013-08-12T20:50:00.001+01:00</published><updated>2013-08-14T19:13:25.795+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="HOW-TO"/><category scheme="http://www.blogger.com/atom/ns#" term="MailStore Home"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>MailStore Home - Tips and Tricks Part 3 … in the Cloud</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: #e69138; font-family: Verdana, sans-serif; font-weight: bold; line-height: 1.15; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #e69138; font-family: Verdana, sans-serif; font-weight: bold; line-height: 1.15; white-space: pre-wrap;&quot;&gt;Problem: &lt;/span&gt;&lt;br /&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Actually there is no problem just considering the possibility and ways to move/sync my portable MailStore Home folder to the Cloud Drive&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;&lt;span style=&quot;font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #e69138; font-family: Verdana, sans-serif;&quot;&gt;Resolution:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;The idea is again related to symbolic links. That’s why if you missed previous article -&lt;a href=&quot;http://itanalyses.blogspot.ro/2013/08/mailstore-home-tips-and-tricks-part-2.html&quot; target=&quot;_blank&quot;&gt; MailStore Home - Tips and Tricks - Part 2&lt;/a&gt; should be helpful to read it because there is nothing different only symlink path and target directory must be changed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;&lt;span style=&quot;font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #e69138; font-family: Verdana, sans-serif;&quot;&gt;Sync MailStoreHome folder to SkyDrive and Dropbox&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 1.15; white-space: pre-wrap;&quot;&gt;So I have &lt;/span&gt;&lt;span style=&quot;line-height: 20px; white-space: pre-wrap;&quot;&gt;SkyDrive&lt;/span&gt;&lt;span style=&quot;line-height: 1.15; white-space: pre-wrap;&quot;&gt; folder located at D:\SkyDrive and I want to sync my mailstorehome folder located at F:\my_mailstore_portable to my SkyDrive account folder without moving it. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;
&lt;/span&gt;
&lt;div style=&quot;margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;C&lt;span style=&quot;line-height: 1.15; white-space: pre-wrap;&quot;&gt;reate symlink by elevated cmd prompt:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span id=&quot;docs-internal-guid-5b550fc1-3522-fb9a-95ca-4708f347802c&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;&lt;i&gt;C:\Windows\system32&amp;gt; mklink /j D:\SkyDrive\&lt;/i&gt;&lt;/span&gt;&lt;i style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;my_mailstore_portable &lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;&lt;i&gt;f:\my_mailstore_portable&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;i&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;i&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;symbolic link created for D:\SkyDrive\my_mailstore_portable &amp;lt;&amp;lt;===&amp;gt;&amp;gt; f:\my_mailstore_portable&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;line-height: 1.1590909090909092; margin-bottom: 13pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;After link creation, you’ll see the&lt;i&gt; \my_mailstore_portable&lt;/i&gt; folder inside of SkyDrive folder with a shortcut icon.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.1590909090909092; margin-bottom: 13pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Thus you can use the application from either location and both will have the same contents since it’s actually one folder.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.1590909090909092; margin-bottom: 13pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.1590909090909092; white-space: pre-wrap;&quot;&gt;In this way, you can use your cloud MailStore Home from different locations where you have installed SkyDrive application.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.1590909090909092; white-space: pre-wrap;&quot;&gt;Symbolic link creation for Dropbox is the same.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #e69138; font-family: Verdana, sans-serif;&quot;&gt;Sync MailStoreHome folder to Google Drive&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 1.15; white-space: pre-wrap;&quot;&gt;There is a little difference because it &lt;/span&gt;&lt;span style=&quot;line-height: 20px; white-space: pre-wrap;&quot;&gt;doesn&#39;t&lt;/span&gt;&lt;span style=&quot;line-height: 1.15; white-space: pre-wrap;&quot;&gt; support syncing of symbolic link folders. How to do symlinks?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;In order to do this, we first have to move the &lt;i&gt;\my_mailstore_portable&lt;/i&gt; folder to the Google Drive folder. Then we create symlink to where we want (for example I want to create symlink/shortcut to F:\) that points to the &amp;nbsp;\my_mailstore_portable folder in the Google Drive&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.15; white-space: pre-wrap;&quot;&gt;Create symlink by elevated cmd prompt:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.15; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;line-height: 0.9545454545454546; margin-bottom: 4pt; margin-left: 8pt; margin-top: -4pt; text-align: left;&quot;&gt;
&lt;span style=&quot;font-style: italic; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;C:\Windows\system32&amp;gt; mklink /d F:\&lt;/span&gt;&lt;i style=&quot;font-family: Verdana, sans-serif; line-height: 18px;&quot;&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;my_mailstore_portable&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt; &quot;C:\Users\milen\Google Drive\my_mailstore_portable&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 0.9545454545454546; margin-bottom: 4pt; margin-left: 8pt; margin-top: -4pt; text-align: left;&quot;&gt;
&lt;span style=&quot;font-style: italic; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;font-style: italic; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;line-height: 0.9545454545454546; margin-bottom: 4pt; margin-left: 8pt; margin-top: -4pt; text-align: left;&quot;&gt;
&lt;span style=&quot;font-style: italic; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;symbolic link created for &lt;/span&gt;&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;F:\&lt;/span&gt;&lt;i style=&quot;font-family: Verdana, sans-serif; line-height: 18px;&quot;&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;my_mailstore_portable &lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;&amp;lt;&amp;lt;===&amp;gt;&amp;gt;&quot;C:\Users\milen\Google Drive\my_mailstore_portable&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 1.15; white-space: pre-wrap;&quot;&gt;That’s it! Use it with &lt;/span&gt;&lt;span style=&quot;line-height: 18px; white-space: pre-wrap;&quot;&gt;caution because some guys notice for problems with DropBox syncing and possibility of data lost. I use Google drive without any problems.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 18px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Please do not use MailStore Home for commercial purposes. This is illegal and violates the license agreement. If you need a solid email archiving solution suitable for all size businesses - MailStore Server offer much more valuable features, flexibility and ease of use for users and IT staff!&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Calibri; font-size: 13px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Arial; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span class=&quot;fullpost&quot;&gt;

&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/6882652719211987080/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2013/08/mailstore-home-tips-and-tricks-part-3.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/6882652719211987080'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/6882652719211987080'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2013/08/mailstore-home-tips-and-tricks-part-3.html' title='MailStore Home - Tips and Tricks Part 3 … in the Cloud'/><author><name>vMilen</name><uri>http://www.blogger.com/profile/05318089702427368203</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-6674934924082945695</id><published>2013-08-05T14:38:00.001+01:00</published><updated>2013-08-05T14:42:34.556+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="HOW-TO"/><category scheme="http://www.blogger.com/atom/ns#" term="MailStore Home"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>MailStore Home - Tips and Tricks Part 2 - Multiple Home users</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #e69138;&quot;&gt;Problem:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Аll of my family use email services and mail archiving by MailStore Home. My desire is they to have personal mailstore archive located in their private folders on our home NAS. If you try to install or run portable MailStore Home from network share you will get the error:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzhJHbAo2RJJ7YIUvyT7mWF1-lasudEjn6eDjL4cUvyTfKaoqm3sEe_JaCZvwQRS5m3tTzRSNBXIlkn8_XuWzvaZvo2e38WE-lL5xlre4qg3UIelQMJZBYdLijG5swG7b0_zROTRIYht4t/s1600/mailstore-network.JPG&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;146&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzhJHbAo2RJJ7YIUvyT7mWF1-lasudEjn6eDjL4cUvyTfKaoqm3sEe_JaCZvwQRS5m3tTzRSNBXIlkn8_XuWzvaZvo2e38WE-lL5xlre4qg3UIelQMJZBYdLijG5swG7b0_zROTRIYht4t/s400/mailstore-network.JPG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #e69138;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #e69138;&quot;&gt;Resolution:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Have you ever tried to install a software on a network drive or use a network drive as application directory. In such cases the installer checks for the drive type and refuses the installation on network drives. A workaround&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;which will help you to read the riddle is a &lt;a href=&quot;http://en.wikipedia.org/wiki/Symbolic_link&quot; target=&quot;_blank&quot;&gt;symbolic link&lt;/a&gt; in Windows.&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Symbolic links (symlinks) are actually advanced shortcuts. You can create symbolic links to individual files or folders and then these will appear like they are stored in the folder with the symbolic link even though the symbolic link only points to their real location.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;There are two types of symbolic links - soft and hard. Soft symbolic links work essentially the same as a standard shortcuts.  When you open a soft link, you will be redirected to the folder where the files are stored.  However, a hard link makes it appear as though the file or folder actually exists at the location of the symbolic link, and your applications won’t know any different. Thus, hard links are of the most interest in this article.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;For example, the application wants to put its data in the local disk drive but you want the data to be stored on the mapped network drive &lt;i&gt;X:\NAS-Share\application&lt;/i&gt;, you can use the &lt;a href=&quot;http://technet.microsoft.com/en-us/library/cc753194(v=ws.10).aspx&quot;&gt;mklink&lt;/a&gt; command in Windows 7 command prompt to symlink the directory.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;The general syntax is:&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br style=&quot;font-family: Verdana, sans-serif;&quot; /&gt;
&lt;i style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;mklink /d symlinkpath targetdirectory&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Run Windows Command Prompt -&amp;gt; cmd.exe&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;C:\Users\user1&amp;gt; mklink /D e:\ms-user1 \\nas\personal_folders\ms-user1&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-style: italic;&quot;&gt;You do not have sufficient privilege to perform this operation.&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Oops! We need to use elevated command prompt - cmd.exe (Run as Administrator) ... do it a&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;gain ...&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;C:\Windows\system32&amp;gt; mklink /d e:\ms-user1 \\nas\personal_folders\ms-user1&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;i style=&quot;font-family: Verdana, sans-serif;&quot;&gt;symbolic link created for e:\ms-user1 &amp;lt;&amp;lt;===&amp;gt;&amp;gt; \\nas\personal_folders\ms-user1&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;As you can see I don&#39;t need to create the &lt;i&gt;ms-user1&lt;/i&gt; folder manually, the mklink will do that for you.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Now the application detects E:\ms-user as valid local path and uses the symlinked path to store its data on the network share \\nas\personal_folders\ms-user1&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;For privacy reasons is better to create a symlink in&amp;nbsp;corresponding user folder&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Repeat symlink setup for additional home user folders:&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Мy wife’s laptop:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;C:\Windows\system32&amp;gt; mklink /d d:\mailstorehome&amp;nbsp;&lt;/i&gt;&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;\\nas\personal_folders\my_wife_folder/mailstorehome&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;symbolic link created for d:\mailstorehome &amp;lt;&amp;lt;===&amp;gt;&amp;gt; \\nas\personal_folders\my_wife_folder/mailstorehome&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Мy son’s workstation:&lt;/span&gt;&lt;br /&gt;
&lt;i style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;C:\Windows\system32&amp;gt; mklink /d f:\mailstorehome&amp;nbsp;&lt;/i&gt;&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;\\nas\personal_folders\my_son_folder/mailstorehome&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;symbolic link created for f:\mailstorehome &amp;lt;&amp;lt;===&amp;gt;&amp;gt; \\nas\personal_folders\my_son_folder/mailstorehome&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;etc.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;For Windows 2000/XP, you would use a NTFS &lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/NTFS_junction_point&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;junction point&lt;/a&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt; or Windows Resource Kit,  or &lt;/span&gt;&lt;a href=&quot;http://schinagl.priv.at/nt/ln/ln.html&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Ln - Command Line Hardlinks&lt;/a&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt; tool&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;If you do not like command line and prefer graphic interface then try  &lt;a href=&quot;http://schinagl.priv.at/nt/hardlinkshellext/hardlinkshellext.html&quot;&gt;Link Shell Extension&lt;/a&gt; (really very useful and&amp;nbsp;convenient&amp;nbsp;tool)&lt;br /&gt;&lt;br /&gt;Once you have done symlinks the next is MailStore Home installation,&amp;nbsp;configuration&amp;nbsp;an so on.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #e69138; font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #e69138; font-family: Verdana, sans-serif;&quot;&gt;Coming soon: MailStore Home - Tips and Tricks Part 3 - ... in the Cloud&lt;/span&gt;&lt;br /&gt;
&lt;b style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Please do not use MailStore Home for commercial purposes. This is illegal and violates the license agreement. If you need a solid email archiving solution suitable for all size businesses - MailStore Server offer much more valuable features, flexibility and ease of use for users and IT staff!&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/6674934924082945695/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2013/08/mailstore-home-tips-and-tricks-part-2.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/6674934924082945695'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/6674934924082945695'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2013/08/mailstore-home-tips-and-tricks-part-2.html' title='MailStore Home - Tips and Tricks Part 2 - Multiple Home users'/><author><name>vMilen</name><uri>http://www.blogger.com/profile/05318089702427368203</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzhJHbAo2RJJ7YIUvyT7mWF1-lasudEjn6eDjL4cUvyTfKaoqm3sEe_JaCZvwQRS5m3tTzRSNBXIlkn8_XuWzvaZvo2e38WE-lL5xlre4qg3UIelQMJZBYdLijG5swG7b0_zROTRIYht4t/s72-c/mailstore-network.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-4397062123918326807</id><published>2013-08-01T21:49:00.000+01:00</published><updated>2013-08-05T14:38:27.727+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="HOW-TO"/><category scheme="http://www.blogger.com/atom/ns#" term="MailStore Home"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>MailStore Home - Tips and Tricks Part 1 - Scheduled Tasks</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;fullpost&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;span style=&quot;color: black; font-family: Verdana, sans-serif; line-height: 1.575; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;a href=&quot;http://www.mailstore.com/en/mailstore-home.aspx&quot; style=&quot;text-decoration: none;&quot;&gt;MailStore&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.575; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; is awesome mail archiver. The Home edition is free for personal use. It’s a small, portable and easy to use software designed to make backup, restore and email migration. MailStore supports many different types of mailboxes such as Outlook, Outlook Express, Thunderbird, Exchange Server, Office 365, .EML files and more. It also supports a variety of internet based mail services such as Gmail, Hotmail and Yahoo mail. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;span id=&quot;docs-internal-guid-736bd18b-312e-d652-5979-0b5a99268587&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.575; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;span id=&quot;docs-internal-guid-736bd18b-312e-d652-5979-0b5a99268587&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;MailStore is well known and proven software and my goals are not to make advertisements or yet another product review because such materials you can find enough in the Internet. I’ll show you how to make your life easier despite some restrictions and lacks in Home edition.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;span id=&quot;docs-internal-guid-736bd18b-312e-d652-5979-0b5a99268587&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;b style=&quot;line-height: 1.5; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #e69138;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;b style=&quot;line-height: 1.5; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #e69138;&quot;&gt;Problem: &lt;/span&gt;&lt;/b&gt;
&lt;/span&gt;&lt;span id=&quot;docs-internal-guid-736bd18b-312e-d652-5979-0b5a99268587&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span id=&quot;docs-internal-guid-736bd18b-312e-d652-5979-0b5a99268587&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;&lt;span style=&quot;line-height: 1.5; white-space: pre-wrap;&quot;&gt;Automated backup feature is missing in Home edition so I &lt;/span&gt;&lt;span style=&quot;line-height: 24px; white-space: pre-wrap;&quot;&gt;wouldn&#39;t &lt;/span&gt;&lt;span style=&quot;line-height: 1.5; white-space: pre-wrap;&quot;&gt;have to manually run it every day or week.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b style=&quot;font-family: Verdana, sans-serif; line-height: 1.5; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #e69138;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;b style=&quot;font-family: Verdana, sans-serif; line-height: 1.5; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #e69138;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-family: Verdana, sans-serif; line-height: 1.5; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #e69138;&quot;&gt;Resolution:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.5; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- Let&#39;s assume that you have already configured archive profile.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.5; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- Create a Desktop Shortcut to run the archive task - right click the newly created profile -&amp;gt; Create Shortcut on Desktop...&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.5; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.5; margin-bottom: 0pt; margin-top: 0pt; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;.&lt;/span&gt;&lt;img height=&quot;352px;&quot; src=&quot;https://lh6.googleusercontent.com/bus_ZcgPA8CUsjYXW-a26CPvGuyyLa0tvzSv6yT4qXDYXez3Omo29yZ9DAIKLrN178kRj6Oo-W6SPV8AbZ_5xiv5Bt7w7KZN6GsG3jVf8xWF-esAu6yuptYdlQ&quot; width=&quot;360px;&quot; /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.35; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.35; white-space: pre-wrap;&quot;&gt;- Open Task Scheduler, from the Control Panel -&amp;gt; Administration and create new task.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.35; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.35; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.35; white-space: pre-wrap;&quot;&gt;- Give it a name and description&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.35; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.35; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.35; white-space: pre-wrap;&quot;&gt;- Under Actions tab - click New&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.15; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.15; white-space: pre-wrap;&quot;&gt;- Select Action: Start a Program&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.15; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.15; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- Program/script:&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.15; white-space: pre-wrap;&quot;&gt;copy &amp;nbsp;path to application ending with MailStoreHome.exe&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;line-height: 1.15; white-space: pre-wrap;&quot;&gt;from shortcut above - right click the shortcut -&amp;gt; Properties -&amp;gt; Target&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.15; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.15; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- &lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.15; white-space: pre-wrap;&quot;&gt;Add arguments: &lt;span style=&quot;color: #6aa84f;&quot;&gt;/c archive –id=”1″&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.15; text-align: center; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.15; text-align: center; white-space: pre-wrap;&quot;&gt;- Start in: E:\ms-user1\Application&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-left: 36pt; margin-top: 0pt; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.15; margin-bottom: 0pt; margin-left: 36pt; margin-top: 0pt; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;img height=&quot;337px;&quot; src=&quot;https://lh3.googleusercontent.com/0uqW-IJbhiWeT4RJdSJPz4N95ONG3zWsNfG0niDutACbAaMc1w_d19xwnW8UXY2mKHcIb9dwh8hDry0PymabPbNw6shboXc0oAcx8y8ivxDdzfQ4YvOPVgLrcw&quot; width=&quot;466px;&quot; /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.35; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;line-height: 1.35; white-space: pre-wrap;&quot;&gt;- Select Trigger Tab and schedule the task at your choice (everyday, few times weekly or &lt;/span&gt;&lt;span style=&quot;line-height: 21px; white-space: pre-wrap;&quot;&gt;monthly&lt;/span&gt;&lt;span style=&quot;line-height: 1.35; white-space: pre-wrap;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.35; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.35; margin-bottom: 0pt; margin-top: 0pt; text-align: center;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;img height=&quot;285px;&quot; src=&quot;https://lh5.googleusercontent.com/R4YtunUQvJFqO4xbtRjsGU4xWr8FyoHzaxeEOPDJWoTJjgol4FBHGF8xIsKIsh62kCDq4uE7HkgBN368t-ZnXtpj9c8RyK30vy3srZVQZ0hg905hgMa1grOT&quot; style=&quot;line-height: normal; white-space: normal;&quot; width=&quot;459px;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.35; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.35; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- SAVE and test the event - right click the archive profile -&amp;gt; Run&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt;- If you have&amp;nbsp;&lt;/span&gt;additional profiles - r&lt;span style=&quot;line-height: 1.35;&quot;&gt;epeat configurations.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;line-height: 1.35; white-space: pre-wrap;&quot;&gt;- After finish you should see the message in Progress View window:&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.35; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://lh5.googleusercontent.com/qlGHF9QNya208_UDhSESv0djLBX7dp3M6-pH8EplargO9BciTdGREIunqh15m6zgxZmoqwIoohdsedUIZzeO3U_6VMjmH0TellZ7KyXTr8KHbP7URSGjyIQ2gw&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;140px;&quot; src=&quot;https://lh5.googleusercontent.com/qlGHF9QNya208_UDhSESv0djLBX7dp3M6-pH8EplargO9BciTdGREIunqh15m6zgxZmoqwIoohdsedUIZzeO3U_6VMjmH0TellZ7KyXTr8KHbP7URSGjyIQ2gw&quot; style=&quot;line-height: 1.35;&quot; width=&quot;263px;&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.35; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.35; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;line-height: 1.35; white-space: pre-wrap;&quot;&gt;Every time when task is completed you need to close the window manually - thus force you to ensure that archiving process is successful. If you want to close MailStore windows automatically - there is a lot of solutions, but the easiest way I think is just hidden within Settings Tab in your scheduled task.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.35; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;line-height: 1.35; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCj1zVMt23VkB2C0tBcoHJ7UG1sVMZQewz1F3xdHkcQhXUXHVc4Utcjda9W_zjSqSw5Cx3vCSEWmIHoNgTwmlI_F0Nq4TMq5oklzjd3oSMrGMcDmm8dwH6JQrnzN8g4EqJnedxgZOxG-yi/s1600/settings-tab.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;297&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCj1zVMt23VkB2C0tBcoHJ7UG1sVMZQewz1F3xdHkcQhXUXHVc4Utcjda9W_zjSqSw5Cx3vCSEWmIHoNgTwmlI_F0Nq4TMq5oklzjd3oSMrGMcDmm8dwH6JQrnzN8g4EqJnedxgZOxG-yi/s400/settings-tab.JPG&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.35; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;line-height: 1.35; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;div style=&quot;line-height: 1.35;&quot;&gt;
&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- Check option “Stop the task if it runs longer than: “ and set the required time. How to determine? &amp;nbsp;Get the time required for archiving all profiles and round it to above. Be aware that the first archive task will take longer but not for the next run because the process is differential. If the values ​​from the drop down menu does not satisfy you and want to set the time in minutes - write by hand &quot;minutes&quot;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35;&quot;&gt;
&lt;span style=&quot;line-height: 1.35; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35;&quot;&gt;
&lt;span style=&quot;line-height: 1.35; white-space: pre-wrap;&quot;&gt;That&#39;s it!&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;line-height: 1.35;&quot;&gt;
&lt;span style=&quot;line-height: 1.35; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35;&quot;&gt;
&lt;span style=&quot;line-height: 1.35; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35;&quot;&gt;
&lt;span style=&quot;color: #e69138; line-height: 1.35; white-space: pre-wrap;&quot;&gt;Coming soon: &lt;/span&gt;&lt;span style=&quot;color: #e69138; line-height: 1.35; white-space: pre-wrap;&quot;&gt;MailStore Home - Tips and Tricks Part 2 - Multiple users&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;line-height: 1.35;&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;line-height: 1.35; margin-bottom: 14pt; margin-top: 0pt; text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 1.35; white-space: pre-wrap;&quot;&gt;&lt;b&gt;Please do not use MailStore Home for commercial purposes. This is illegal and violates the license agreement. If you need a solid email archiving solution suitable for all size businesses - MailStore Server offer much more valuable features, flexibility and ease of use for users and IT staff!&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Calibri; font-size: 15px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot;&gt;

&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/4397062123918326807/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2013/08/mailstore-home-tips-and-tricks-part-1.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/4397062123918326807'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/4397062123918326807'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2013/08/mailstore-home-tips-and-tricks-part-1.html' title='MailStore Home - Tips and Tricks Part 1 - Scheduled Tasks'/><author><name>vMilen</name><uri>http://www.blogger.com/profile/05318089702427368203</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh6.googleusercontent.com/bus_ZcgPA8CUsjYXW-a26CPvGuyyLa0tvzSv6yT4qXDYXez3Omo29yZ9DAIKLrN178kRj6Oo-W6SPV8AbZ_5xiv5Bt7w7KZN6GsG3jVf8xWF-esAu6yuptYdlQ=s72-c" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-6870219761376508490</id><published>2013-07-30T08:20:00.000+01:00</published><updated>2013-08-01T22:51:22.208+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="HOW-TO"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><category scheme="http://www.blogger.com/atom/ns#" term="vSphere ESXi 5.x"/><title type='text'> Error in the RPC receive loop: RpcIn: Unable to send</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b style=&quot;color: #e69138;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Problem:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAMt8sLpwsFoFxhnTR-LeUBLGb8NHxx3LynwTJG5swiZhGy4jPkepe4OyqevriFRuqeeSNg_XHX5GIfrG-pV2TILNbDQZz5po8e6POufl-GBTLWg3NuXD5tLIDNaYB0E4GBEbtLI9CDjfL/s1600/errorinRPC.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;276&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAMt8sLpwsFoFxhnTR-LeUBLGb8NHxx3LynwTJG5swiZhGy4jPkepe4OyqevriFRuqeeSNg_XHX5GIfrG-pV2TILNbDQZz5po8e6POufl-GBTLWg3NuXD5tLIDNaYB0E4GBEbtLI9CDjfL/s400/errorinRPC.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Error message above is flooded in Event&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Viewer&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&amp;nbsp;on a MS Windows VM guest when vmtools upgrade is performed to 5.1 but I encountered the same error recently after fresh&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;installation of&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&amp;nbsp;VMWare tools on new VM guest.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Error message for Linux guest is the same.&amp;nbsp;According to&amp;nbsp;&lt;a href=&quot;http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&amp;amp;cmd=displayKC&amp;amp;externalId=2036350&quot; target=&quot;_blank&quot;&gt;KB2036350&lt;/a&gt;&amp;nbsp;- this should be fix the problem, however the tools.conf sometimes is not created.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: #e69138; font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;Resolution:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;The RPC errors mentioned above is caused because of missing&amp;nbsp;vmtools configuration file&amp;nbsp;(tools.conf) within VMware Tools directory. Once you put the configuration file in place and restart the VMTools service, everything seems to be OK.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;This procedure is&amp;nbsp;preferred&amp;nbsp;in production environment because guest reboot is not required. You may resolve the problem by simply&amp;nbsp;uninstall/install vmtools but you must schedule VM guest restart at your convenience.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Create tools.conf in the location for:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;- MS Windows 2K/XP2K3&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #e69138;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;C:\Documents and Settings\All Users\Application Data\VMware\VMware Tools\tools.conf&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;- Windows Vista/7/2K8, and 2012:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #e69138;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;C:\ProgramData\VMware\VMware Tools\tools.conf&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;- Linux:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #e69138;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;/etc/vmware-tools/tools.conf&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Put the following into the file:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;[logging]&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;log = true&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;# Enable tools service logging to vmware.log&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;vmsvc.level = debug&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;vmsvc.handler = vmx&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;# Enable new “vmusr” service logging to vmware.log&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;vmusr.level = error&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;vmusr.handler = vmx&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;# Enable “Volume Shadow Copy” service logging to vmware.log&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;vmvss.level = debug&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;vmvss.handler = vmx&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Then restart VM Tools&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;- Windows command prompt:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;c:\Users\user1&amp;gt; net stop VMtools &amp;amp;&amp;amp; net start VMtools&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;- Linux:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f; font-family: Verdana, sans-serif;&quot;&gt;$sudo /etc/init.d/vmware-tools restart&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;I&#39;ve used this simple VBscript below to copy tools.conf to the&amp;nbsp;appropriate&amp;nbsp;location and restart vmtools service. Use it&amp;nbsp;standalone, for mass deployments - by MS Group Policy,&amp;nbsp;&lt;a href=&quot;http://labs.vmware.com/flings/vgc&quot; target=&quot;_blank&quot;&gt;VMware Guest Console&lt;/a&gt;&amp;nbsp;or whatever you decide.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;&#39;Copy file: source - destination &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;Dim FSO&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;Set FSO = CreateObject(&quot;Scripting.FileSystemObject&quot;)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;FSO.CopyFile &quot;\\NAS\PATH_TO \tools.conf&quot;, &quot;C:\Documents and Settings\All Users\Application Data\VMware\VMware Tools\&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;&#39; Stop &amp;amp; Start Service&#39;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;Dim objWMIService, objItem, objService&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;Dim colListOfServices, strComputer, strService, intSleep&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;strComputer = &quot;.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;intSleep = 10000&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;&#39; Caution -&amp;gt; strService is case sensitive!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;strService = &quot; &#39;VMtools&#39; &quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;Set objWMIService = GetObject(&quot;winmgmts:&quot; _&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;&amp;amp; &quot;{impersonationLevel=impersonate}!\\&quot; _&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;&amp;amp; strComputer &amp;amp; &quot;\root\cimv2&quot;)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;Set colListOfServices = objWMIService.ExecQuery _&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;(&quot;Select * from Win32_Service Where Name =&quot;_&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;&amp;amp; strService &amp;amp; &quot; &quot;)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;For Each objService in colListOfServices&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;objService.StopService()&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;WSCript.Sleep intSleep&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;objService.StartService()&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;Next&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #93c47d; font-family: Verdana, sans-serif;&quot;&gt;WScript.Quit&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot;&gt;

&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/6870219761376508490/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2013/07/error-in-rpc-receive-loop-rpcin-unable.html#comment-form' title='7 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/6870219761376508490'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/6870219761376508490'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2013/07/error-in-rpc-receive-loop-rpcin-unable.html' title=' Error in the RPC receive loop: RpcIn: Unable to send'/><author><name>vMilen</name><uri>http://www.blogger.com/profile/05318089702427368203</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAMt8sLpwsFoFxhnTR-LeUBLGb8NHxx3LynwTJG5swiZhGy4jPkepe4OyqevriFRuqeeSNg_XHX5GIfrG-pV2TILNbDQZz5po8e6POufl-GBTLWg3NuXD5tLIDNaYB0E4GBEbtLI9CDjfL/s72-c/errorinRPC.jpg" height="72" width="72"/><thr:total>7</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-7192766880521668585</id><published>2013-07-27T23:50:00.000+01:00</published><updated>2013-08-01T22:51:41.034+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><category scheme="http://www.blogger.com/atom/ns#" term="vSphere Client"/><title type='text'> The Performance Overview tab fails to display into vSphere Client and VCSA 5.1</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;color: #e69138;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Problem:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;I cannot view the Performance Overview tab when connecting to vCenter Server Appliance using the vSphere Client 5.1 on MS Windows XP / 2003.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;Variations of the error message in the Performance Overview tab:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;- This program cannot display the webpage - more often seen&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;- Navigation to the webpage was cancelled - rarely viewed &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color: #e69138;&quot;&gt;&lt;b&gt;Resolution:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Usually the problem is ciphers attribute in the VCSA Tomcat config file - server.xml&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;1. Log in to console of VCSA as the root user&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;2. Locate file under /usr/lib/vmware-vpx/tomcat/conf/&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;3. Make file backup (for your peace of mind)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;4. Edit file - Find and replace &quot;ciphers&quot; attribute in the server.xml with following value:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #e69138;&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;ciphers=&quot;SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;4. Restart the vmware-vpxd service:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;via console&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;vcsa-lab:~# service vmware-vpxd restart&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;or via web management: &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;https:/&quot;VCSA-IP address/:5480&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwbgWlbjFW-Q-WIsn_o8IM0vl1AC4sN-NQ9njkoisUsyacDj74NfgCQZmPfRapmYI7jPM4QDQSY5DTj1h0mPO3kS4DunlfMYjiR2tM4oWKE9rChTpNRvlAtt1Os0a5gW1XtadRXEN_8kfD/s1600/vcsa.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;188&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwbgWlbjFW-Q-WIsn_o8IM0vl1AC4sN-NQ9njkoisUsyacDj74NfgCQZmPfRapmYI7jPM4QDQSY5DTj1h0mPO3kS4DunlfMYjiR2tM4oWKE9rChTpNRvlAtt1Os0a5gW1XtadRXEN_8kfD/s320/vcsa.JPG&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span class=&quot;fullpost&quot;&gt;

&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/7192766880521668585/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2013/07/the-performance-overview-tab-fails-to_27.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/7192766880521668585'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/7192766880521668585'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2013/07/the-performance-overview-tab-fails-to_27.html' title=' The Performance Overview tab fails to display into vSphere Client and VCSA 5.1'/><author><name>vMilen</name><uri>http://www.blogger.com/profile/05318089702427368203</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwbgWlbjFW-Q-WIsn_o8IM0vl1AC4sN-NQ9njkoisUsyacDj74NfgCQZmPfRapmYI7jPM4QDQSY5DTj1h0mPO3kS4DunlfMYjiR2tM4oWKE9rChTpNRvlAtt1Os0a5gW1XtadRXEN_8kfD/s72-c/vcsa.JPG" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-3568817333585641297</id><published>2013-02-24T20:33:00.000+00:00</published><updated>2013-07-25T13:07:15.856+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="FreeNAS"/><category scheme="http://www.blogger.com/atom/ns#" term="HOW-TO"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><category scheme="http://www.blogger.com/atom/ns#" term="vSAN"/><title type='text'>Jumbo frames in virtual FreeNAS 8.3.1 on ESXi 5.X</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h4&gt;
&lt;span id=&quot;internal-source-marker_0.13459575246088207&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: orange; font-family: inherit;&quot;&gt;... and how to setup vmxnet3 vNIC and Jumbo frames&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;Problem:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;When I set jumbo frames (MTU=9000) on em0 vNIC in virtual FreeNAS I can&#39;t get frames bigger than 1500 between the peers, even configuring mtu=9000 in all network elements between end points. Do not be fooled if you see this:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;color: #6aa84f; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;[root@freenas] ~# ifconfig em0 mtu 9000&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;[root@freenas] ~# ifconfig em0 em0: flags=8843 metric 0 &lt;/span&gt;&lt;span style=&quot;color: #f1c232;&quot;&gt;mtu 9000&lt;/span&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt; options=9b&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #6aa84f; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;ether 00:50:56:87:xx:xx options=9b ether 00:50:56:87:xx:xx&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;.....&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;I did some unsuccessful tests with em0 (in my case vnic is recognized as intel 82545EM) and MTU=9K. Eventually I could not get real jumbo frames between FreeNAS and other vm even inside vSphere host. Probably exception is being in the E1000 driver used by FreeNAS virtual machine though this also depends of physical NICs. &lt;/span&gt;&lt;a href=&quot;http://www.freebsd.org/cgi/man.cgi?query=em&amp;amp;sektion=4&quot;&gt;&lt;span style=&quot;color: #1155cc; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;em(4)&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt; supports variations of the hardware - some do jumbo frames, some don&#39;t. It could easily get a lot quirks in a VM, depending on how the VM emulates the card and the mode of networking used. This should show which of the Intel cards is being emulated.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;# pciconf -lv | grep -A3 em0&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;Resolution:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
FreeNAS 8.3.1 comes with preinstalled 3rd-party/independent vmtools. Unfortunately VMXNET3 isn’t included. If you want to make the most of your virtual network adapter, there is a way to set up vmxnet3 in your freenas.&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;- mount the vmware tools CD image to the vm freenas&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;img height=&quot;107&quot; src=&quot;https://lh3.googleusercontent.com/Xzu9eVZd3xjTIHIPs6kOP9LSpubzyaYjU0LP_NQzLKwl1ejcfzY4Rb407L_XMXFBO9Lcmpu6LTUKtjFobhlIEmAkCEOE3ZmuqK-8Aypqhb7dc2158Gxb5JJNLg&quot; width=&quot;400&quot; /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Go to shell and:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- Create mount point for CD&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;# mkdir /mnt/cd&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;# mount -t cd9660 /dev/cd0 /mnt/cd&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;# ls /mnt/cd&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;./ manifest.txt ../ vmware-freebsd-tools.tar.gz&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- Mount root rw (read/write)&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;# mount -urw /&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- Copy file vmware-freebsd-tools.tar.gz to /tmp , change file permission and gunzip&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;# cd /mnt/cd&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;#cp vmware-freebsd-tools.tar.gz /tmp&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;#chmod 777 /tmp/&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;vmware-freebsd-tools.tar.gz&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;# gunzip vmware-freebsd-tools.tar.gz/tmp&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;# tar -xf vmware-freebsd-tools.tar&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Look for vmxnet3.ko file in FreeBSD8.1 subdirectory (path below) and copy to /boot/modules&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;# ls /tmp/vmware-tools-distrib/lib/modules/binary/FreeBSD8.1-amd64&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-weight: normal;&quot;&gt;./ ../ vmblock.ko vmmemctl.ko vmxnet.ko&lt;/span&gt;&lt;span style=&quot;color: orange;&quot;&gt; vmxnet3.ko&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- Add vmxnet3 driver in loader.conf&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;For loading additional  kernel modules (such as drivers) - GUI Tunable is preferred method because your changes will persist across upgrades&lt;/span&gt;&lt;span style=&quot;font-family: sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19.046875px;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;GUI - System - Tunables - Add tunable&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilyRSttvXMPZieSE4nYu-3NYnayI57V8s_tAZUsiXEWkd-c9hFTfWAhNFMIaLSzJvq0yQ6La09Xh4gzwavcGnv54URFVVCgq-RGRuVhqzeL8Gwh5KRm7e5x49T_QWdFA0onQqYT_0Ad6AT/s1600/tunables.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilyRSttvXMPZieSE4nYu-3NYnayI57V8s_tAZUsiXEWkd-c9hFTfWAhNFMIaLSzJvq0yQ6La09Xh4gzwavcGnv54URFVVCgq-RGRuVhqzeL8Gwh5KRm7e5x49T_QWdFA0onQqYT_0Ad6AT/s1600/tunables.JPG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;... or by manually edit /boot/loader.conf (but you risk losing your config if you upgrade)&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;# nano /boot/loader.conf&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;
GNU nano 2.2.6 File: /boot/loader.conf&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;#&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;# Boot loader file for FreeNAS. This relies on a hacked beastie.4th.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;#&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;autoboot_delay=&quot;2&quot;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;loader_logo=&quot;freenas&quot;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;#Fix booting from USB device bug&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;kern.cam.boot_delay=&quot;30000&quot;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;#VMXNET3 driver&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;color: orange;&quot;&gt;vmxnet3_load=&quot;YES&quot;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Save the corrections by Ctrl+O&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Exit nano - Ctrl+X&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;font-family: inherit; font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-family: inherit; font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-family: inherit; font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Shutdown FreeNAS and goto vSphere Client - Edit settings - and add VMXNET3 adapter (I’ve added&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b id=&quot;internal-source-marker_0.13459575246088207&quot; style=&quot;font-family: inherit; font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;2 more&lt;/span&gt;&lt;/b&gt;&lt;b style=&quot;font-family: inherit; font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;)&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img height=&quot;243px;&quot; src=&quot;https://lh3.googleusercontent.com/oiHb49dKC-HWz3JlVya10qmWt_v3eupm4qjeYuxhPIhOmof7sew6GHuxSE-gfnmbnsut_MjmLKHZpsSBAIuqCf3agg4wR6q85QUfgoS51534hJ3hC8H2WwdYsg&quot; width=&quot;517px;&quot; /&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Start FreeNAS and login - Network Interfaces - Add Interface&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img height=&quot;152px;&quot; src=&quot;https://lh3.googleusercontent.com/Ysjc4HsRGy6H8MM7EegaQPKQiv3bHSnzFjLQcDHOjDxsqa1MPIWlycsEAiYHWHUVl3v4z2uHl5urck41D6CVejiAUqJsWZiNdPJNI8aBbLv9q68VGTmfNsxbXA&quot; width=&quot;288px;&quot; /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Now you can utilize VMXNET3 adapters from drop down menu and well functioning 9K jumbo frames!&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/3568817333585641297/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2013/02/jumbo-frames-in-virtual-freenas-831-on.html#comment-form' title='17 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/3568817333585641297'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/3568817333585641297'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2013/02/jumbo-frames-in-virtual-freenas-831-on.html' title='Jumbo frames in virtual FreeNAS 8.3.1 on ESXi 5.X'/><author><name>vMilen</name><uri>http://www.blogger.com/profile/05318089702427368203</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh3.googleusercontent.com/Xzu9eVZd3xjTIHIPs6kOP9LSpubzyaYjU0LP_NQzLKwl1ejcfzY4Rb407L_XMXFBO9Lcmpu6LTUKtjFobhlIEmAkCEOE3ZmuqK-8Aypqhb7dc2158Gxb5JJNLg=s72-c" height="72" width="72"/><thr:total>17</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-4108415408760208322</id><published>2013-02-24T17:23:00.001+00:00</published><updated>2015-05-01T17:38:39.874+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="OpenTool"/><category scheme="http://www.blogger.com/atom/ns#" term="PowerShell"/><category scheme="http://www.blogger.com/atom/ns#" term="Script"/><category scheme="http://www.blogger.com/atom/ns#" term="UCS"/><title type='text'>Automated backup for Cisco UCS instances</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;&lt;b&gt;Prerequisites&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;1.&amp;nbsp;&amp;nbsp; &amp;nbsp;For each UCS cluster instance logon and create dedicated user with admin rights for backup purposes.&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhy82bQqCyYRMAopJ4n_oaysswJJOPV0n4JYIpgB1_AUE8NlGmGMVoiLvDGjCiQSvqCk7IiHsbMWYnEhzFFImLxX0fPbDisES6USQ-mBLSS7wX2hFnJPohfpXyY639HOABKxhRafA1jsd8/s1600/UCS_backup1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;289&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhy82bQqCyYRMAopJ4n_oaysswJJOPV0n4JYIpgB1_AUE8NlGmGMVoiLvDGjCiQSvqCk7IiHsbMWYnEhzFFImLxX0fPbDisES6USQ-mBLSS7wX2hFnJPohfpXyY639HOABKxhRafA1jsd8/s640/UCS_backup1.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;2.&amp;nbsp;&amp;nbsp; &amp;nbsp;Enable HTTPS port on UCS cluster instance&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4BsKFVNrt0tXbI2mbPhWAnZoznWbL5Yy1Xt_QFWtYzX1ckpRaT6yToXK4Lea4eHxN40xoWf6eGfkzu09rbW6uHTqwZMfsWmjDBCfTC_Eg1QVlKdeA7Bn9zYAjINJqt8PVNWahL_xmUok/s1600/UCS_backup2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4BsKFVNrt0tXbI2mbPhWAnZoznWbL5Yy1Xt_QFWtYzX1ckpRaT6yToXK4Lea4eHxN40xoWf6eGfkzu09rbW6uHTqwZMfsWmjDBCfTC_Eg1QVlKdeA7Bn9zYAjINJqt8PVNWahL_xmUok/s640/UCS_backup2.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&amp;nbsp;3.&amp;nbsp;&amp;nbsp; &amp;nbsp;Password for user “backup” out of Cisco UCS should be kept in secure string. It is already created and saved at file D:\UCS_SCRIPT\CISCO_UCS_BCKP_PWD.txt as secure string.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;Note: &amp;nbsp;&amp;nbsp; &amp;nbsp;If there is a need for new password for new Cisco UCS instance different from currently used you have to create new text file for storing new secure string, otherwise you will overwrite &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;D:\UCS_SCRIPT\CISCO_UCS_BCKP_PWD.txt&lt;/span&gt;&lt;/span&gt; and logon will fail for all previously setup instances.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;4.&amp;nbsp;&amp;nbsp; &amp;nbsp;Create new secure string from plain password.&lt;br /&gt;&amp;nbsp;&amp;nbsp; i.&amp;nbsp;&amp;nbsp; &amp;nbsp;Logon with local admin user to Win&lt;span style=&quot;font-size: small;&quot;&gt;dows box&lt;/span&gt;. Keep in mind this user should start scheduled job later&lt;span style=&quot;font-size: small;&quot;&gt; so you have to setup it&lt;span style=&quot;font-size: small;&quot;&gt; with same &lt;span style=&quot;font-size: small;&quot;&gt;Windows credentials.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp; ii.&amp;nbsp;&amp;nbsp; &amp;nbsp;Open Cisco UCS PowerTool or MS PowerShell.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&amp;nbsp; iii.&amp;nbsp;&amp;nbsp; &amp;nbsp;Copy following command&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Read-Host -AsSecureString | ConvertFrom-SecureString | Out-File D:\UCS_SCRIPT\CISCO_UCS_BCKP_PWD.txt&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt; paste at OpenTool command line, change name of text file CISCO_UCS_BCKP_PWD_NN.txt, where NN is next available number and click Enter.&lt;br /&gt;&amp;nbsp; iv.&amp;nbsp;&amp;nbsp; &amp;nbsp;Command will wait for input of plain password for backup user. Click Enter when finished.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;5.&amp;nbsp;&amp;nbsp; &amp;nbsp;Prepare folders for backup files.&lt;br /&gt;&amp;nbsp; i.&amp;nbsp;&amp;nbsp; &amp;nbsp;Go to L:\UCS_BACKUPS (change to your backup destination) and navigate to appropriate datacentre or create new one if it does not exist.&lt;br /&gt;&amp;nbsp; ii.&amp;nbsp;&amp;nbsp; &amp;nbsp;Go to appropriate UCS instance within chosen datacenter or create new one if it does not exist.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;6.&amp;nbsp;&amp;nbsp; &amp;nbsp;Copy existing script to new one&lt;br /&gt;&amp;nbsp; i.&amp;nbsp;&amp;nbsp; &lt;span style=&quot;font-size: small;&quot;&gt;Example:&lt;/span&gt; Cisco_UCS_[datacenter]_[UCSinstance]_Backup_Script.ps1”, where [datacenter] is your site and [UCSinstance] is &lt;span style=&quot;font-size: small;&quot;&gt;name of&lt;/span&gt; UCS instance.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #3d85c6;&quot;&gt;&lt;b&gt;UCS instance backup script&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;1.&amp;nbsp;&amp;nbsp; &amp;nbsp;Backup script should have independence from others and batch file ran from scheduler. This involves each particular script to Load Module: Cisco UCS PowerTool on top of MS PowerShell.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;2.&amp;nbsp;&amp;nbsp; &amp;nbsp;Static parameters&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;color: #bf9000;&quot;&gt;&lt;i&gt;Set-Variable -Name ScriptDir&amp;nbsp;&amp;nbsp; -Value &quot;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;color: #bf9000;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;D:\UCS_SCRIPT&lt;/span&gt;&lt;/span&gt;&quot; -Scope Local&lt;br /&gt;Set-Variable -Name BackupPath&amp;nbsp; -Value &quot;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;L:\UCS_BACKUPS&lt;/span&gt;\[datacenter]\[UCSinstance]&quot; -Scope Local&lt;br /&gt;Set-Variable -Name BackupTypes -Value (&#39;config-system&#39;,&#39;config-logical&#39;,&#39;config-all&#39;,&#39;full-state&#39;)&lt;br /&gt;Write-Host &quot;`nStatic parameters`n-----------------`nScriptDir = $($ScriptDir)`nBackupPath = $($BackupPath)`nBackupTypes = $($BackupTypes)`n&quot;&lt;br /&gt;$UCS = &quot;[FQDN of your UCS instance]&quot;&lt;br /&gt;$errmailTo = &quot;you@yourcompany.com&quot;&lt;br /&gt;$errmailFrom = &quot;UCS_[name of currnet UCS instance]_backup@&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;yourcompany.com&lt;/i&gt;&lt;/span&gt;&quot;&lt;br /&gt;$errmailSMTP = &quot;smtp.&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;color: #bf9000;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;yourcompany.com&lt;/i&gt;&lt;/span&gt;&quot;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp; i.&amp;nbsp;&amp;nbsp; &amp;nbsp;BackupPath should correspond to your newly created backup folders – previous chapter, article 5.&lt;br /&gt;&amp;nbsp; ii.&amp;nbsp;&amp;nbsp; &amp;nbsp;BackupTypes describe all possible backups for UCS.&lt;br /&gt;&amp;nbsp; iii.&amp;nbsp;&amp;nbsp; &amp;nbsp;$UCS should correspond to name of your new UCS instance.&lt;br /&gt;&amp;nbsp; iv.&amp;nbsp;&amp;nbsp; &amp;nbsp;$errmailTo should correspond to your addressee of error messages.&lt;br /&gt;&amp;nbsp;&amp;nbsp; v.&amp;nbsp;&amp;nbsp; &amp;nbsp;$errmailFrom should be descriptive which UCS instance sent messages and why.&lt;br /&gt;&lt;br /&gt;3.&amp;nbsp;&amp;nbsp; &amp;nbsp;Start PowerShell transcript and point output to $BackupPath\backuplog.txt. This file is unique for each Cisco UCS instance and keeps logs for last backup job until is overwritten from next start of backup script. Its purpose is only for troubleshooting.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;4.&amp;nbsp;&amp;nbsp; &amp;nbsp;Read credentials, logon to Cisco UCS instance and define error on connecting&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;color: #bf9000;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;# Get the credentials setup&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;color: #bf9000;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;$password = Get-Content &lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;color: #bf9000;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;D:\UCS_SCRIPT&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;\CISCO_UCS_BCKP_PWD.txt | ConvertTo-SecureString&lt;br /&gt;$cred = New-Object System.Management.Automation.PSCredential “backup”,$password&lt;br /&gt;# Login&lt;br /&gt;$login = Connect-Ucs [IP aaa.bbb.ccc.ddd or $UCS] -Credential $cred -ErrorVariable errConnectingUcs | select Ucs,UserName,Version&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp; i.&amp;nbsp;&amp;nbsp; &amp;nbsp;Pay attention you get secure string from correct text file.&lt;br /&gt;&amp;nbsp; ii.&amp;nbsp;&amp;nbsp; &amp;nbsp;Modify IP address aaa.bbb.ccc.ddd to correspond to your new UCS instance.&lt;br /&gt;&amp;nbsp; iii.&amp;nbsp;&amp;nbsp; &amp;nbsp;If connection fails an error message will be send to predefined addressee.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;5.&amp;nbsp;&amp;nbsp; &amp;nbsp;Get one of each type of UCS backup and send an e-mail if backup job is failed.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;6.&amp;nbsp;&amp;nbsp; &amp;nbsp;Disconnect Cisco UCS&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;7.&amp;nbsp;&amp;nbsp; &amp;nbsp;Retention policy for backup files - delete all files within backup folder older than 30 days from now, but keep at least last 3 sets with all types of backups (3 daily backups) even they are older than 30 days. This will ensure you will have all type of backups for last 30 days in normal operation, but in case of backup failure you could rely on latest 3 backups.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;P.S. If there is a need to take exclusive backup for UCS instance start appropriate script at &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;D:\UCS_SCRIPT&lt;/span&gt;&lt;/span&gt;\ with extension .ps1 within MS PowerShell or Cisco OpenTool console and keep in mind to evacuate backup files from backup folder if you have intention to keep them more than 30 days. Otherwise create one .bat file &lt;span style=&quot;font-size: small;&quot;&gt;containing as many rows you &lt;span style=&quot;font-size: small;&quot;&gt;need as following one:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;span style=&quot;color: red;&quot;&gt;&lt;i&gt;%WINDIR%\System32\windowspowershell\v1.0\powershell.exe &quot;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;D:\UCS_SCRIPT&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;\&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Cisco_UCS_[datacenter]_[UCSinstance]_Backup_Script.ps1”, where [datacenter] is your site and [UCSinstance] is &lt;span style=&quot;font-size: small;&quot;&gt;name of&lt;/span&gt; UCS instance.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #3d85c6;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;And backup script: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;fullpost&quot; style=&quot;font-size: small;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;pre class=&quot;brush: js&quot;&gt;#------------------#
# Preparation work #
#------------------#

#--- Import Cisco PowerTool Modules ---#
if ((Get-Module |where {$_.Name -ilike &quot;CiscoUcsPS&quot;}).Name -ine &quot;CiscoUcsPS&quot;)
    {
    Write-Host &quot;Loading Module: Cisco UCS PowerTool Module&quot; -ForegroundColor &quot;Green&quot;
    Import-Module CiscoUcsPs
    }

#--- Static parameters ---#
Set-Variable -Name ScriptDir   -Value &quot;D:\UCS_SCRIPT&quot; -Scope Local
Set-Variable -Name BackupPath  -Value &quot;L:\UCS_BACKUPS\[datacenter]\[UCSinstance]&quot; -Scope Local
Set-Variable -Name BackupTypes -Value (&#39;config-system&#39;,&#39;config-logical&#39;,&#39;config-all&#39;,&#39;full-state&#39;)
Write-Host &quot;`nStatic parameters`n-----------------`nScriptDir = $($ScriptDir)`nBackupPath = $($BackupPath)`nBackupTypes = $($BackupTypes)`n&quot;
$Ucs = &quot;[FQDN of your UCS instance]&quot;
$errmailTo = &quot;you@yourcompany.com&quot;
$errmailFrom = &quot;UCS_[name of currnet UCS instance]_backup@yourcompany.com&quot;
$errmailSMTP = &quot;smtp.yourcompany.com&quot;

#----------------------------------#
# Start doing the real backup work #
#----------------------------------#

#--- Start collecting logs for last backup job ---#
start-transcript $BackupPath\backuplog.txt

#--- Get the credentials setup ---#
$password = Get-Content D:\UCS_SCRIPT\CISCO_UCS_BCKP_PWD.txt | ConvertTo-SecureString
$cred = New-Object System.Management.Automation.PSCredential “backup”,$password

#--- Login ---#
$login = Connect-Ucs [IP aaa.bbb.ccc.ddd or $UCS] -Credential $cred -ErrorVariable errConnectingUcs | select Ucs,UserName,Version

#--- Send an e-mail if error occured while connecting to UCS ---#
if ($errConnectingUcs -ne $null) {
        $errmailBody = @()
    $errmailBody += &quot;$(Get-Date) - Error connecting to UCS`n`n&quot;
    $errmailBody += $errConnectingUcs
    Send-MailMessage  -From $errmailFrom -To $errmailTo -Subject &quot;Backup-mUcs Error-- Failed connecting to $($Ucs)&quot; -Body ($errmailBody | Out-String) -SmtpServer $errmailSMTP
        break
}

#--- Get one of each type of UCS backup and send an e-mail if backup job is failed ---#
ForEach ($type in $backuptypes) {
        Backup-Ucs -Type $type  -PreservePooledValues -PathPattern ($BackupPath + &#39;\${ucs}-${yyyy}${MM}${dd}-${HH}${mm}-&#39; + $type + &#39;.xml&#39;) -ErrorVariable errBackupUcs
        if ($errBackupUcs -ne $null) {
                $errmailBody = @()
                $errmailBody += &quot;$(Get-Date) - Error running backup of type $($type)`n`n&quot;
                $errmailBody += $error[0]
                Send-MailMessage  -From $errmailFrom -To $errmailTo -Subject &quot;Backup-mUcs Error-- On $($Ucs) backup of type $($type) failed&quot; -Body ($errmailBody | Out-String) -

SmtpServer $errmailSMTP
        }
    else
    {
    Write-Host &quot;`nCisco UCS instance $Ucs created successfully $type type of backup and saved it at $BackupPath `n&quot; -ForegroundColor &quot;Green&quot;
    }
}

#--- Don`t leave a stale session on the UCS ---#
Disconnect-Ucs

# ----------------------------------------------#
# Define parameters for Backup Retention policy #
# ----------------------------------------------#

#--- Define today ---#
$Now = Get-Date

#--- Define retention amount of days ---#
$Days = &quot;30&quot;

#--- Last 3 backups (4 per day) should be kept even they are older than $Days + backuplog.txt file ---#
#--- Example: Keep last 3 backups i.e. 12 files / 4 files per day = 3 days ---#
$OldBackupsFilestobeKept = &quot;13&quot;
$OldBackupsDays = ($OldBackupsFilestobeKept - 1)/4

#--- Define extension of backup files to be deleted ---#
$Extension = &quot;*.xml&quot;

#--- Define LastWriteTime parameter based on $Days ---#
$LastWrite = $Now.AddDays(-$Days)

#--- Get files based on lastwrite filter and specified folder ---#
$Files = Get-Childitem $BackupPath $Extension | Where {$_.LastWriteTime -le &quot;$LastWrite&quot;}

#--- Determine how many files are currently in folder ---# 
#--- Please keep in mind UCS has 4 separate xml backup files per day ---#
$NumberOfFiles = Get-ChildItem $BackupPath $Extension

Write-Host &quot;`nExecuting retention policy for backup files - delete all files older than $Days days, but keep last 3 daily backups `n&quot; -BackgroundColor &quot;Gray&quot; -ForegroundColor 

&quot;Black&quot;

if ($NumberOfFiles.Count -le $OldBackupsFilestobeKept)
    {
    write-host &quot;`nCan not delete last $OldBackupsDays backups even they are older than $Days days, as they are only 3 last full sets of backups`n&quot; -ForegroundColor &quot;DarkRed&quot;
    }
    else
        {
        foreach ($File in $Files)
            {
            if ($File -ne $Null)
                {
                write-host &quot;&#39;nDeleting File $File &#39;n&quot; -ForegroundColor &quot;DarkRed&quot;
                Remove-Item $File.FullName | out-null
                }
            else
                {
                Write-Host &quot;`nNo more files to delete! `n&quot; -foregroundcolor &quot;Green&quot;
                }
            }
        }

stop-transcript
&lt;/pre&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/4108415408760208322/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2013/02/automated-backup-for-cisco-ucs.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/4108415408760208322'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/4108415408760208322'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2013/02/automated-backup-for-cisco-ucs.html' title='Automated backup for Cisco UCS instances'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhy82bQqCyYRMAopJ4n_oaysswJJOPV0n4JYIpgB1_AUE8NlGmGMVoiLvDGjCiQSvqCk7IiHsbMWYnEhzFFImLxX0fPbDisES6USQ-mBLSS7wX2hFnJPohfpXyY639HOABKxhRafA1jsd8/s72-c/UCS_backup1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-3568635791312863446</id><published>2013-02-24T09:13:00.001+00:00</published><updated>2013-02-25T12:05:04.985+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business"/><category scheme="http://www.blogger.com/atom/ns#" term="IT"/><category scheme="http://www.blogger.com/atom/ns#" term="management"/><category scheme="http://www.blogger.com/atom/ns#" term="market"/><title type='text'>Small scale markets</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&amp;nbsp; Every business needs up to date information technology. Bulgarian companies also. They are pressured by increasing competition in business environment, but opening of Bulgaria to international markets, direct relation with the country’s entry into the European Union.&lt;br /&gt;&amp;nbsp; Dealing successfully with challenges, they increasingly depend on the collaboration tools. Access to shared resources is the key. It may be common accessed information, applications and devices. They should rely on the reliability and accessibility at any time. This is the birth of naturally need a computer, which can store and process the most important information about the company – especially developed by the manufacturer system, called server.&lt;br /&gt;&amp;nbsp; With the rapid and headlong development of industry – all high class servers with 4 and 8 processors technology are available for the lower class machines, designed for small and medium businesses. With attractive prices of course. However, companies limited by their own IT budgets are often hesitate – server or PC?&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&amp;nbsp; Servers are offered more widely, and most consumers begin think that it will be useful for managing files and printers, for hosting e-mail services, better network securing or even making more things than it could be made with desktop PC.&lt;br /&gt;Its ok, but realizing the need for a server and actually revealing the exact model they need are two different tasks. It is obligatory to understand what a server is, which of its capabilities are useful for them, and decide whether they need a server and how to find right model.&lt;br /&gt;&amp;nbsp; Most of Bulgarian companies are micro, assuming international understanding of company size. So, companies here start with one server, but with all of required form business services up and running. It seems well from financial point of view, but not from maintenance and support perspective. Microsoft for example, presumes dedicated server for each service as a best practice. This is not applicable for small scale markets. One option was Microsoft Small Business Edition. Main reason was customer gets most of frequently used services in a box solution. Even using a virtualization this model is the same. For most dedicated services on separate servers customers must purchase separate licenses for operating systems. So for most of Bulgarian companies best practices are consolidating services, not so much consolidating servers.&lt;br /&gt;Situation is that most of Bulgarian mangers are owners of their business. They started little company and because of their professional experience at specific field, the beginning has been successful. Later they meet “problem of growth”. Micro company must become mini. It means more employees, collaboration tools and team work. There is no problem to hire more specialists. It’s quite easy to learn most of them how to work in team.&lt;br /&gt;
&lt;br /&gt;Main question is how to work together in better way?&lt;br /&gt;
&lt;br /&gt;&amp;nbsp; Yes, with new technologies, but very often business managers do not know anything about them. They must determine future of the company, but there is no company’s management know how.&lt;br /&gt;Regular micro companies owns between 0 and 3 servers. For first group without server is important to realize the benefits from e-collaboration. Companies which have 2 and more servers may be useful to consolidate servers utilizing virtualization.&lt;br /&gt;
&lt;br /&gt;How to do this without company’s internal knowledge?&lt;br /&gt;
&lt;br /&gt;&amp;nbsp; Obviously, you will say: External consultants, of course. Most of Bulgarian IT companies can best do box moving. They work with micro clients and doing only sales of hardware or software licenses. So this type of IT companies does not have expertise for implementing solutions. Main reason is lack of place and time to earn experience. It’s magic circle. Fortunately there are big players already developed well their portfolio of professional services.&lt;br /&gt;
&lt;br /&gt;How market can adopt new technologies?&lt;br /&gt;
&lt;br /&gt;&amp;nbsp; This could be facilitated hiring well-rounded with hands-on experience specialists. They must provide technology knowledge to customers. This might be starting point of strategic planning for IT development. Most important is providing knowledge for solving a business problem, technical problem and then – how to take advantage over competitors. &lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/3568635791312863446/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2013/02/small-scale-markets.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/3568635791312863446'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/3568635791312863446'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2013/02/small-scale-markets.html' title='Small scale markets'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-7327365764766196945</id><published>2013-02-23T21:18:00.000+00:00</published><updated>2013-02-24T11:43:25.849+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><category scheme="http://www.blogger.com/atom/ns#" term="vSphere ESXi 5.x"/><title type='text'>VMware VM - changing the MAC address </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b id=&quot;internal-source-marker_0.522915257839486&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The conversion of physical to virtual machine is related to change of the MAC address of the network interface. In some cases &lt;/span&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;this can be a problem when software is installed where the licensing is bound up to the MAC address.&lt;/span&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; To avoid the automatic change of MAC address, you should not move the machine (configuration file of VM) to another host or different datastores on the same host.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;If the VM is a member in a DRS cluster and automatically or manually movement between different hosts is needed, then we must set up MAC to static and we can achieve this in few ways.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 12px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;Method #1.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; vSphere Client&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 12px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 12px; white-space: pre-wrap;&quot;&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt; &lt;/span&gt;&lt;img height=&quot;267px;&quot; src=&quot;https://lh6.googleusercontent.com/HX-QDn_nN4oYRwC4B6pEcxL__uReLLjtzP_tWbyKODhnEuXrQFR_oIQAp6Uv40LZKeaZa094locP-3vk6GYdgCxmG-cFeu541DpLvJHgL_GvyteufXO0afBq4w&quot; width=&quot;460px;&quot; /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 12px; white-space: pre-wrap;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;If your attempt failed with the error below - go to method 3&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style=&quot;color: #cc0000;&quot;&gt;“The MAC address entered is not in the valid range. Valid values are between xx:xx:xx:xx:xx” &lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 12px; font-weight: normal; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 12px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;Method #2.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; MAC address change from within the network adapter settings in Windows.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;First of all ensure that vSwitch (virtual port group) security settings &lt;/span&gt;MAC Address Changes&lt;span style=&quot;font-weight: normal;&quot;&gt; and &lt;/span&gt;Forged Transmits&lt;span style=&quot;font-weight: normal;&quot;&gt; are set to &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Accept&lt;span style=&quot;font-weight: normal;&quot;&gt;. Go to your network adapter properties (see the picture below)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 12px; font-weight: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;img height=&quot;299px;&quot; src=&quot;https://lh5.googleusercontent.com/knuXvM3dbz6fomFgxWmBuH8roMaIahSCzwFwLqv7DYzZBBfEgKSCZfJV5kcx7sy7GqRRoDwQWifJ4Cp6-FSquVQHTV-RQ19gI_FGyPvDwwM7_njc1TOFoo14jQ&quot; width=&quot;270px;&quot; /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;
&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Select Locally Administered Address -&amp;gt; Value and enter the MAC address without the colon (:).&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Restart the virtual machine to ensure that the change takes effect over the network.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;If not succeed run command &lt;/span&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;getmac&lt;/span&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; from Windows command prompt&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;If the option &lt;span style=&quot;color: #cc0000;&quot;&gt;Locally Administered Address (for Intel Pro/1000MT) is unavailable&lt;/span&gt; and can not change the MAC address - go to method 3&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;Method #3.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; Edit the VM&#39;s config file .vmx manually using plain text editor. Download the .vmx configuration file for the virtual machine to your desktop using the Datastore Browser. Open with text editor and delete the following from the vmx file&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;ethernetN.generatedAddress&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;ethernetN.addressType&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;ethernetN.generatedAddressOffset&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;To change the MAC address to a non-vmware address (in my case MAC address of h/w NIC) add these lines to the .vmx:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;ethernetN.checkMACAddress = “false”&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;ethernetN.addressType = “static”&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;ethernetN.address = “address here”&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Save the configuration file and upload with &amp;nbsp;Datastore Browser&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: orange;&quot;&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Need to know notes for manual editing process :&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- Never edit vmx file while virtual machine is running (power off vm)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- Always make backup copy before editing – you need a plan B if something goes wrong.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;- ESXi with vCenter Server - manual changes are overwritten by the entries stored in the vCenter Server database, therefore remove virtual machine from inventory before editing.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit; font-size: 12px; vertical-align: baseline; white-space: pre-wrap;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;vertical-align: baseline;&quot;&gt; &lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class=&quot;fullpost&quot;&gt;

&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/7327365764766196945/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2013/02/vmware-vm-changing-mac-address.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/7327365764766196945'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/7327365764766196945'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2013/02/vmware-vm-changing-mac-address.html' title='VMware VM - changing the MAC address '/><author><name>vMilen</name><uri>http://www.blogger.com/profile/05318089702427368203</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh6.googleusercontent.com/HX-QDn_nN4oYRwC4B6pEcxL__uReLLjtzP_tWbyKODhnEuXrQFR_oIQAp6Uv40LZKeaZa094locP-3vk6GYdgCxmG-cFeu541DpLvJHgL_GvyteufXO0afBq4w=s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-2020532480823784157</id><published>2013-02-21T12:39:00.000+00:00</published><updated>2013-02-24T20:41:36.143+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="FreeNAS"/><category scheme="http://www.blogger.com/atom/ns#" term="NUT snmp-ups"/><category scheme="http://www.blogger.com/atom/ns#" term="UPS"/><title type='text'>FreeNAS -8.3.0 UPS control via SNMP</title><content type='html'>&lt;span style=&quot;color: orange; font-family: inherit;&quot;&gt;&lt;b&gt;UPS Service configurations to MGE Galaxy 5000 with WEB/SNMP Network Management Card Transverse 66074 - firmware version GG&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;This card acts as an SNMP agent and as a HTTP/Web server. It enables UPS supervision from the Network Monitoring System using SNMP and traps or simply from a web browser. &lt;br /&gt;FreeNAS communicate with this card by &lt;a href=&quot;http://www.networkupstools.org/&quot;&gt;NUT - Network UPS Tool&lt;/a&gt;. It would be helpful to read man page for NUT &lt;a href=&quot;http://www.networkupstools.org/docs/man/snmp-ups.html&quot;&gt;snmp-ups&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;img height=&quot;400&quot; src=&quot;https://lh4.googleusercontent.com/NmV2T0nnQJpH4p19CylaLS_3pIvE3BVGjR6aoUq304HoVqDsNC0zVF4K3tWHdordfO4tkSa9YxkMGYUzVmAQanXmzUfqHFW0Ac0ISZjy_620j8mjhKftLgVsaA&quot; style=&quot;font-family: inherit;&quot; width=&quot;336&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;- Identifier - &lt;/b&gt;name of your UPS&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;- Driver&lt;/b&gt; - From the drop down menu choose the appropriate driver for snmp-ups:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: orange; font-family: inherit;&quot;&gt;&lt;a href=&quot;http://soft.apc.com/emb/htm/66074e.htm&quot;&gt;MGE UPS SYSTEMS ups 5 Pulsar / Comet / Galaxy (SNMP) SNMP/Web Transverse card (ref 66074) (snmp-ups)&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
Many of the choices listed are in fact the same driver as you can see below &lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;(ups.conf -&amp;gt; driver=snmp-ups). Don’t worry  if you select one, save it, and when you come back later to UPS Services menu to discover that a different option is selected - FreeNAS change your choice with the first device driver in drop-down menu with common snmp-ups driver.&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;- Port&lt;/b&gt; is the second most important setting in this configuration - in that case port is IP address of UPS Network Management Card.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;- Auxialiary parameters&lt;/b&gt; - &amp;nbsp;All other settings are optional and can be omitted, but beware for correct snmp setting if you use different community and snmp_version. &lt;b&gt;pollfreq&lt;/b&gt; is polling frequency in seconds with default value = 30. I made several tests with lower values, but this unnecessarily increase network flow in management VLAN and causes gaps in ups.log data logging. &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;[root@fnas] ~# cat&amp;nbsp;/etc/local/nut/ups.conf&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #6aa84f; font-family: inherit;&quot;&gt;&lt;br /&gt;   driver = snmp-ups&lt;br /&gt;   port = 192.168.96.41&lt;br /&gt;   desc = &quot;UPS1 - MGE Galaxy 5000 60kVA&quot;&lt;br /&gt;   community = public&lt;br /&gt;   snmp_version = v1&lt;br /&gt;   mibs = mge&lt;br /&gt;   pollfreq = 30&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Freenas message log:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;Feb 18 11:10:36 fnas notifier: Detected GALAXY on host 192.168.96.41 (mib: mge 0.5)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;Feb 18 11:10:36 fnas notifier: Network UPS Tools - UPS driver controller 2.6.5&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;Feb 18 11:10:36 fnas notifier: Starting nut.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;Feb 18 11:10:36 fnas notifier: fopen /var/db/nut/upsd.pid: No such file or directory&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;Feb 18 11:10:36 fnas notifier: listening on 127.0.0.1 port 3493&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;Feb 18 11:10:36 fnas notifier: Connected to UPS [ups]: snmp-ups-ups&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;Feb 18 11:10:36 fnas notifier: nut_upsmon not running? (check /var/db/nut/upsmon.pid).&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;Feb 18 11:10:36 fnas notifier: Starting nut_upsmon.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;Feb 18 11:10:36 fnas notifier: kill: No such process&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;Feb 18 11:10:36 fnas notifier: UPS: ups (master) (power value 1)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;Feb 18 11:10:36 fnas notifier: nut_upslog not running? (check /var/db/nut/upslog.pid).&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;Feb 18 11:10:36 fnas notifier: Starting nut_upslog.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Pool the status of UPS&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[root@fnas] ~# upsc ups@localhost&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ambient.humidity: 0.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ambient.temperature: 0.0&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;battery.charge: 100.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;battery.charge.low: 30&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;battery.runtime: 4860.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;battery.runtime.low: 180.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;battery.voltage: 494.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;device.mfr: Eaton&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;device.model: GALAXY&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;device.serial: 1P2J1XXX&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;device.type: ups&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;driver.name: snmp-ups&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;driver.parameter.mibs: mge&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;driver.parameter.pollfreq: 30&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;driver.parameter.pollinterval: 2&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;driver.parameter.port: 192.168.96.41&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;driver.parameter.snmp_version: v1&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;driver.version: 2.6.5&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;driver.version.data: mge MIB 0.5&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;driver.version.internal: 0.68&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L1-N.voltage: 400.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L1-N.voltage.maximum: 400.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L1-N.voltage.minimum: 398.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L1.current: 12.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L1.frequency: 50.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L2-N.voltage: 400.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L2-N.voltage.maximum: 400.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L2-N.voltage.minimum: 398.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L2.current: 12.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L2.frequency: 50.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L3-N.voltage: 400.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L3-N.voltage.maximum: 400.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L3-N.voltage.minimum: 398.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L3.current: 12.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.L3.frequency: 50.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.phases: 3.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;input.transfer.reason:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;outlet.desc: Main Outlet&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;outlet.id: 0&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;output.L1-N.voltage: 401.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;output.L1.current: 15.60&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;output.L1.frequency: 50.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;output.L2-N.voltage: 401.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;output.L2.current: 12.70&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;output.L2.frequency: 50.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;output.L3-N.voltage: 399.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;output.L3.current: 9.50&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;output.L3.frequency: 50.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;output.phases: 3.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.beeper.status: enabled&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.delay.shutdown: 20&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.delay.start: 30&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.firmware: V1.GDENA7S300IC303&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.firmware.aux: GG (SN 49EH5XXXX)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.L1.load: 13.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.L2.load: 13.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.L3.load: 13.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.mfr: Eaton&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.model: GALAXY&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.serial: 1P2J1XXXX&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.start.auto: no&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.status: OL&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.test.result: no test initiated&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.timer.reboot: -1.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.timer.shutdown: -1.00&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;ups.timer.start: -1.00&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Check ups.log&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;root@fnas:~cat /var/log/ups.log&lt;/span&gt;&lt;br /&gt; &lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;20130218 111656 100.00 NA NA [OL] NA NA&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;20130218 112157 100.00 NA NA [OL] NA NA&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;20130218 112657 100.00 NA NA [OL] NA NA&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;20130218 113157 100.00 NA NA [OL] NA NA&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Default format of ups.log - &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;[DATE] [TIME] [battery.charge] [input.voltage] [ups.load] [ups.status] [ups.temperature] [input.frequency]&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;,i.e. I’ve got info for battery charge (100%) and operational status - OL - (OnLine)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;List available commands can be invoked in MGE Galaxy 5000 UPS hardware&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[root@fnas] /# upscmd -l ups&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Instant commands supported on UPS [ups]:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;beeper.disable - Disable the UPS beeper&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;beeper.enable - Enable the UPS beeper&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;beeper.mute - Temporarily mute the UPS beeper&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;load.off - Turn off the load immediately&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;load.off.delay - Turn off the load with a delay (seconds)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;load.on - Turn on the load immediately&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;load.on.delay - Turn on the load with a delay (seconds)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;shutdown.return - Turn off the load and return when power is back&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;shutdown.stayoff - Turn off the load and remain off&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;test.battery.start - Start a battery test&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;View the read/write variables inside mine UPS&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[root@fnas] /# upsrw ups&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[battery.charge.low]&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Remaining battery level when UPS switches to LB (percent)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Type: STRING&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Value: 30&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[outlet.desc]&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Outlet description&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Type: STRING&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Value: Main Outlet&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[ups.delay.shutdown]&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Interval to wait after shutdown with delay command (seconds)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Type: STRING&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Value: 20&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[ups.delay.start]&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Interval to wait before (re)starting the load (seconds)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Type: STRING&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Value: 30&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[ups.start.auto]&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;UPS starts when mains is (re)applied&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Type: UNKNOWN (unrecognized)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Notified applications setup in NMC transverse card via WEB:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyYzuYvYwnvFd0gaWmVje5C9hgkJ3X8h5SkNUH7Tlqb0QkrkeWmhOXXYovLVTP4iLX2algsbG8W8B2Jrfz0pKyCAnuBsrxNXG92B3PvwBifxKqHc6eNy1LO9wTGvsx2vNk9oanuOqrMIKI/s1600/net_app_shut.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyYzuYvYwnvFd0gaWmVje5C9hgkJ3X8h5SkNUH7Tlqb0QkrkeWmhOXXYovLVTP4iLX2algsbG8W8B2Jrfz0pKyCAnuBsrxNXG92B3PvwBifxKqHc6eNy1LO9wTGvsx2vNk9oanuOqrMIKI/s1600/net_app_shut.JPG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Unfortunately my attempts for shutdown test from Notified Applications in WEB interface (picture above) were unsuccessful. General test is when I brake input circuit of the ups:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;[root@fnas] /#&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #6aa84f;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Network UPS Tools upsmon 2.6.5&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;…..&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Broadcast Message from root@fnas.hbc&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;        (no tty) at 18:59 EET...&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Executing automatic power-fail shutdown&lt;/span&gt;&lt;br /&gt;                                             &lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;*** FINAL System shutdown message from root@fnas.local ***&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;System going down IMMEDIATELY&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
Final e-mail status report:&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHVNpNVjpiNn6kMczwQYLU9jghajXKvi8ahCeqDD2UEQqx_MhLdZWq-Wu8cMK4AOY6RWopYkNXsJnIEr4UfUhgnGIH6gFFQBMYa5iFKNLvlpMgv9yw1Hxu63tAX0UD4QiJQ-aU8GPZx3du/s1600/ups_mail_report.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHVNpNVjpiNn6kMczwQYLU9jghajXKvi8ahCeqDD2UEQqx_MhLdZWq-Wu8cMK4AOY6RWopYkNXsJnIEr4UfUhgnGIH6gFFQBMYa5iFKNLvlpMgv9yw1Hxu63tAX0UD4QiJQ-aU8GPZx3du/s1600/ups_mail_report.JPG&quot; height=&quot;175&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/2020532480823784157/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2013/02/freenas-830-ups-control-via-snmp.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/2020532480823784157'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/2020532480823784157'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2013/02/freenas-830-ups-control-via-snmp.html' title='FreeNAS -8.3.0 UPS control via SNMP'/><author><name>vMilen</name><uri>http://www.blogger.com/profile/05318089702427368203</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh4.googleusercontent.com/NmV2T0nnQJpH4p19CylaLS_3pIvE3BVGjR6aoUq304HoVqDsNC0zVF4K3tWHdordfO4tkSa9YxkMGYUzVmAQanXmzUfqHFW0Ac0ISZjy_620j8mjhKftLgVsaA=s72-c" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-6917450973602895609</id><published>2010-03-12T06:51:00.061+00:00</published><updated>2013-02-24T10:11:47.239+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="мобилен"/><category scheme="http://www.blogger.com/atom/ns#" term="софтуер"/><category scheme="http://www.blogger.com/atom/ns#" term="услуги"/><category scheme="http://www.blogger.com/atom/ns#" term="хардуер"/><title type='text'>M-tel VMC Prima комплект - как да ползваме модема K3565-Z със SIM карти от други оператори</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
.&lt;br /&gt;
Преди време купих&amp;nbsp;&lt;a href=&quot;http://mtel.bg/vmc_prima/index.php&quot;&gt;M-tel VMC Prima&lt;/a&gt; комплект за &quot;спешни случаи&quot;. В рамките на страната съм го използвал рядко, като няколко пъти наистина ме е спасявал, а варианта без обвързване с договор е много подходящ за такива цели - плащаш, само когато е нужно. Цената на пакета и услугата, както и относително по-доброто покритие спрямо останалите оператори беше причина да не търся други оферти и решения за използване на &quot;чужди&quot; SIM карти. Излизането ми извън страната и нуждата от мобилен интернет обаче промени това.&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt; Като цяло в чужбина най-лесно достъпната алтернатива за временно ползване на интернет е през GSM оператор (изключвам работното място, интернет кафета и всякакъв подобен род обекти с безплатен WiFi, както и по-скъпите WiMax пакети, които обикновено са с обвързващи договори).&lt;br /&gt; В началото стартирах с използване на телефон като 3G модем, но bluetooth връзките с лаптопа, смяната на SIM картите (voice/data) и ускореното изтощаване на батерията започна да ме уморява и реших да намеря начин за употреба на &quot;резервния ми интернет&quot; - VMC 3G модем K3565-Z, забутан някъде из джобовете в раницата на лаптопа.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit8YjSDjCNFqsXPKuTBaXlIfENTCxuBpXR9AMg-XuESvFf7qJoGLZ1N-LH_vyVgLl4T5PVD6jW_TBLDfpbWULVR8MwW4AFZSBE1JrMN0jXZlWAMSETWMpxSppzY6-XJZC6ZDnZZD1f8Fq3/s1600-h/prima-1500MB-BG.png&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5450740829790846562&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit8YjSDjCNFqsXPKuTBaXlIfENTCxuBpXR9AMg-XuESvFf7qJoGLZ1N-LH_vyVgLl4T5PVD6jW_TBLDfpbWULVR8MwW4AFZSBE1JrMN0jXZlWAMSETWMpxSppzY6-XJZC6ZDnZZD1f8Fq3/s320/prima-1500MB-BG.png&quot; style=&quot;cursor: pointer; display: block; height: 157px; margin: 0px auto 10px; text-align: center; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt; С този пакет на цена от 99 лв. получих модема &lt;a href=&quot;http://www.business.vodafone.com/site/bus/public/enuk/support/10_productsupport/usb_stick/01_vodafone/vodafone_k3565z/05_summary/p_summary.jsp&quot;&gt;К3565-Z&lt;/a&gt; (буквата Z е важна и показва, че производителя е &lt;a href=&quot;http://wwwen.zte.com.cn/en/&quot;&gt;ZTE&lt;/a&gt;. Huawei има модел със същото обозначение, но &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;забележете K3565-H. Двата модема нямат нищо общо като хардуер и firmware, защото K3565-H всъщност е Huawei E160X.&lt;br /&gt;&lt;br /&gt;Най-важния факт, който трябва да отбележа, че VMC K3565-Z, НЕ Е SIM/NETWORK LOCKED!!!&lt;br /&gt;&lt;br /&gt;Това означава, че модема може да се ползва с карти на други оператори, ако се използват следните методи:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Вариант 1.&lt;/span&gt; Промяна на конфигурационните настройки в софтуера Vodafone Mobile Connect&lt;br /&gt;&lt;br /&gt;Vodafone конфигурира предварително настройките на всички оператори, с които работи в своя софтуер за улеснение на потребителя. Тези настройки са във вид на xml файлове и &quot;живеят&quot; в директорийната структура на приложението по оператори и държави. Тъй като инсталирания VMC не ми даваше възможност за запис на новосъздадени от мен връзки с други оператори, то се наложи да преработя съществуващата конфигурация на Мтел, като изнамерих съответния xml. Процедурата не е &quot;висш пилотаж&quot;, но определено не е user friendly, защото освен популярните параметри като AP, user name, password, phone number, се променят няколко други като Operator ID например, който не може да бъде видян през телефонните настройки (поне не през моя Sony-Ericsson) и ми отне излишно много време за ровене в интернет през алтернативната и скъпа GPRS/3G връзка на voice картата ми.&lt;br /&gt;Тази проба направих единствено от спортна тръпка, защото нито съм влюбен в GUI-то на VMC, нито мислех да го използвам при условие, че има доста по-лесен и бърз начин, подходящ за масовия потребител.&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;Вариант 2&lt;/span&gt;. Windows Dial-up&lt;br /&gt;&lt;br /&gt;Разполагаме с инсталиран VMC, но не го стартираме (ако деинсталираме - губим драйверите). Създаваме dial-up връзка през Windows, асоциирана с нашия модем на съответния COM порт. Необходимо е предварително от Device Manager - Modem - ZTE Proprietary HS-USB Modem - Advanced / Extra command - да се въведе следната АТ команда за избор на APN:&lt;br /&gt;&lt;br /&gt;AT+CGDCONT=1,&quot;IP&quot;,&quot;internet.vivacell.am&quot;&lt;br /&gt;&lt;br /&gt;,(някои оператори не изискват изрично указване на APN, т.е. AP се открива автоматично като при dhcp. За арменския Vivacell например - APN се оставя празно, а за BeeLine - AT+CGDCONT=1,&quot;IP&quot;,&quot;APN&quot;)&lt;br /&gt; За dial-up връзката въвеждаме username/password (ако е нужно и зависи от оператора, в моя случаи - празно) с номер *99#&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyM9B9njwg0AdvNeIXfqoTXFjVCuFYkuYdRqmKITjLn-ZQ6myJOFTrl6IkI82H_5MmDtKjVtS3XoV7ZfAYpsC-QfO4rNqEzj5H-xQU7nFOlY2pMeCN_oT9bcWFeDxljD6pODjvOfkCtvqW/s1600-h/dialup.JPG&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5450857022398063394&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyM9B9njwg0AdvNeIXfqoTXFjVCuFYkuYdRqmKITjLn-ZQ6myJOFTrl6IkI82H_5MmDtKjVtS3XoV7ZfAYpsC-QfO4rNqEzj5H-xQU7nFOlY2pMeCN_oT9bcWFeDxljD6pODjvOfkCtvqW/s320/dialup.JPG&quot; style=&quot;cursor: pointer; display: block; height: 199px; margin: 0px auto 10px; text-align: center; width: 271px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt; Единственото неудобство на Windows Dial-up връзката е липсата на статистика и невъзможността да се следи трафика, което никак не е фатално, но зависи от нуждите на конкретния случай.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Вариант 3.&lt;/span&gt; Инсталираме друг мениджър на връзките&lt;br /&gt;&lt;br /&gt;Приемаме, че вече имаме инсталиран VMC и следва да го махнем. Инсталираме &lt;a href=&quot;http://www.zshare.net/download/635202358b6f5dc7/&quot;&gt;ZTE Join Air&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguuriuylPKTZ3_Ozml6wk92HdViFjMAeHS9Sshi6LTPpXgVrZJ0Xoh5Xh4BAMMP321mc4B6dA12ojbvdxS1zOPeGtG3BCZs_gXGJ-T2ivq2rtAT8RKVg93ajyDFHj50o9_OZUFv9n9GTse/s1600-h/zte.JPG&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5450743974686112562&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguuriuylPKTZ3_Ozml6wk92HdViFjMAeHS9Sshi6LTPpXgVrZJ0Xoh5Xh4BAMMP321mc4B6dA12ojbvdxS1zOPeGtG3BCZs_gXGJ-T2ivq2rtAT8RKVg93ajyDFHj50o9_OZUFv9n9GTse/s320/zte.JPG&quot; style=&quot;cursor: pointer; display: block; height: 201px; margin: 0px auto 10px; text-align: center; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;В Интернет открих множество други универсални мениджъри - безплатни и платени, но ZTE Connection Manager, освен free, ми хареса с това, че е максимално опростен и лек.&lt;br /&gt;&lt;br /&gt;* При деинсталация ще загубим драйверите, затова ползваме тези(32 и 64-bit - изтегляме &lt;a href=&quot;http://sharebee.com/3e3da7f8&quot;&gt;K3565-Z drivers&lt;/a&gt;)&lt;br /&gt;  &lt;br /&gt;Ако решим да се заиграем с модема е възможно да &quot;убием&quot; autorun-a на VMC при първоначално свързване с компютър, както и да &quot;мушнем&quot; ZTE dashboard  на мястото на VMC - било във външна microSD или във вградената памет. Ето как може да се случи това:&lt;br /&gt;&lt;br /&gt;- За конзолна връзка с модема използвам &lt;a href=&quot;http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html&quot;&gt;Putty&lt;/a&gt; (може Hyperterminal или аналогична), като предварително трябва да разберем на кой COM (serial) порт се е закачил модема от Device Manager - Modem - ZTE Proprietary HS-USB Modem  - Port&lt;br /&gt;Конфигурация за серийната връзка е следната: &lt;br /&gt;- bit per second - от 9600 до 115200 (без значение)&lt;br /&gt;- Data bit 9&lt;br /&gt;- Parity None&lt;br /&gt;- Stop bit 1&lt;br /&gt;- Flow Control None&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin03oeoqDOcdU215N9s6dHkBc432xQgY0rj8vImqHf2JPH-wu-3eRI8FcLg93fnWV_CU9rlMD-tNC7wCN4b8UpCpgC_tHbWhBqapatflAGSxKtFOSXRbpr-usTN6Qz4m9o1vAhzcFuTKXR/s1600-h/putty1.JPG&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5450873924664526514&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin03oeoqDOcdU215N9s6dHkBc432xQgY0rj8vImqHf2JPH-wu-3eRI8FcLg93fnWV_CU9rlMD-tNC7wCN4b8UpCpgC_tHbWhBqapatflAGSxKtFOSXRbpr-usTN6Qz4m9o1vAhzcFuTKXR/s320/putty1.JPG&quot; style=&quot;cursor: pointer; display: block; height: 306px; margin: 0px auto 10px; text-align: center; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;- Забрана на вътрешния flashdrive, съотв. autorun-a&lt;br /&gt;AT+ZCDRUN=9&lt;br /&gt;(разрешаване на flashdrive - AT+ZCDRUN=8)&lt;br /&gt;&lt;br /&gt;Други интересни AT команди:&lt;br /&gt;&lt;br /&gt;- Stay online&lt;br /&gt;AT+ZOPRT=5&lt;br /&gt;&lt;br /&gt;- check network/SIM lock&lt;br /&gt;AT+ZSEC?&lt;br /&gt;answer: &lt;sec_statue&gt;,&lt;sec_items&gt;&lt;br /&gt;&lt;br /&gt;&amp;lt; SEC_STATUE &amp;gt;:&lt;br /&gt;0 Initializing the encryption (Insignificant SEC_ITEMS)&lt;br /&gt;1 Network Lock error. (Insignificant SEC_ITEMS)&lt;br /&gt;2 Network Locked&lt;br /&gt;3 Unlocked or correct MCC/MNC&lt;br /&gt;&lt;br /&gt;&lt;sec_items&gt;:&lt;br /&gt;0 No action&lt;br /&gt;1 Network lock&lt;br /&gt;2 (U)SIM card lock&lt;br /&gt;3 Network Lock and (U)SIM card Lock&lt;br /&gt;&lt;br /&gt;- Unlock - Тази команда се използва в случаите, когато разполагате с unlock-code и отключвате lock-нат модем. Процедурата е валидна и за GSM апарати, освен ако няма друга препоръчителна процедура за конкретния модел. Unlock-code съм купувал/генерирал за два други модема на Huawei срещу 10$ на парче от &lt;a href=&quot;http://www.xorox-team.com/&quot;&gt;www.xorox-team.com&lt;/a&gt;, който ми беше препоръчан и смятам за читав, защото кодовете бяха ОК.&lt;br /&gt;&lt;br /&gt;AT+ZNCK=&quot;unlock-code&quot;&lt;br /&gt;AT+ZNCK?&lt;br /&gt;Unlock residual time 0-5&lt;br /&gt;&lt;br /&gt;Безболезнен начин за премахване на VMC, без да правим каквито и да било промени по вградения flash на модема е като използваме външна microSD.&lt;br /&gt;&lt;br /&gt;1. Забраняваме вградения флаш по указания по-горе начин чрез АТ команда: AT+ZCDRUN=9. Ако получите съобщение за грешка в конзолата, тогава предварително трябва да се &quot;разкачи&quot; флаш паметта (unmount) чрез &quot;safely remove hardware&quot; и спирате &quot;USB Mass Storage Device&quot;  &lt;br /&gt;2. Слагате microSD картата, предварително форматирана на FAT32&lt;br /&gt;3. Изтегляте &lt;a href=&quot;http://www.zshare.net/download/635202358b6f5dc7/&quot;&gt;това &lt;/a&gt;и екстрактвате съдържанието му на флаша. (съдържа ZTE dashboard, драйвери и autorun)&lt;br /&gt;&lt;br /&gt;По така направения начин при свързване на модема към компютър ще се стартира autorun на ZTE (само в случай, че ауторъна на removable device не е забранен на ниво Windows) &lt;br /&gt;&lt;br /&gt;Нека да поровим в internal flash memory&lt;br /&gt;&lt;br /&gt;Рисковия начин за премахване на VMC е чрез физическо изтриване от internal flash memory и замяната му с ZTE Join Air. Процедурата не е сложна, но ако не сте сигурни, какво точно правите - сега е подходящия момент да умъртвите модема си.&lt;br /&gt;Използваме &lt;a href=&quot;http://www.x-drivers.com/catalog/flash/mobile_phones/companies/qualcomm/models/qpst/12051.html&quot;&gt;QPST &lt;/a&gt;- Qualcomm Product Support Tool - много сериозен инструмент за мобилни телефони, който предлага file explorer, factory test tools, low level communication settings, RF calibration tools, roaming list editor, service programming tool и др.&lt;br /&gt;&lt;br /&gt;1. За начало ни трябват всички необходими драйвери и инсталираме VMC, ако не сме го направили до момента&lt;br /&gt;&lt;br /&gt;2. Изтегляме QPST и инсталираме.&lt;br /&gt;&lt;br /&gt;3. От пакета QPST стартираме &quot;QPST&quot; Configuration&quot; избираме &quot;Ports&quot; tab&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQP15kDzm6up7nR3QJRW8880cHbkb-cGbvuiQTZb76GqUTX9IIiJs11mzn_Q_tJf-g7EQxzLqGCySBwn_pjGVIQq3uO2jwrmGqIRiF7IwzMiRUcDsIfoO_XdTKoVyhri4LYcFI4D_rfItg/s1600-h/1.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5451193027968655810&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQP15kDzm6up7nR3QJRW8880cHbkb-cGbvuiQTZb76GqUTX9IIiJs11mzn_Q_tJf-g7EQxzLqGCySBwn_pjGVIQq3uO2jwrmGqIRiF7IwzMiRUcDsIfoO_XdTKoVyhri4LYcFI4D_rfItg/s320/1.jpg&quot; style=&quot;cursor: pointer; display: block; height: 210px; margin: 0px auto 10px; text-align: center; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;4. Добавяме порт от &quot;Add New Port&quot;&lt;br /&gt;&lt;br /&gt;5. Избираме порт обозначен като &quot;USB/QC Diagnostic&quot; и после &quot;OK&quot;.&lt;br /&gt;&lt;br /&gt;6. &quot;Start Clients&quot; от менюто и избере &quot;EFS EXPLORER&quot;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvuCUe-RS_eJmAq0N6-4mZcuHP1iNmsMdIsmAZf6V9RvMLkXJvMo3yVlyRfEbhpxQ5WnlPlJljNoKGPt3cJnNuBsax13pK2H_cBZx9Nirz7BMRQtzlGGxs13f89uYV7nyxjwEGiAhaJIR3/s1600-h/4.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5451195010138705042&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvuCUe-RS_eJmAq0N6-4mZcuHP1iNmsMdIsmAZf6V9RvMLkXJvMo3yVlyRfEbhpxQ5WnlPlJljNoKGPt3cJnNuBsax13pK2H_cBZx9Nirz7BMRQtzlGGxs13f89uYV7nyxjwEGiAhaJIR3/s320/4.jpg&quot; style=&quot;cursor: pointer; display: block; height: 205px; margin: 0px auto 10px; text-align: center; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;7. От появилия се прозорец виждаме &quot;Unknown&quot; phone, маркираме и потвърждаваме с ОК.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlJ6DMLV2uJeIfTcGeObt0pBiYzDssN26VXa44LQPh2-179DUn6kheSEbalMIbqRuLsn_5PlTDsEOpOklUfxG77s6QqJQy1M1ZtYqTBAXC3qqKp5ExHzm-jDlhc1zcEHcli0xekCX6lQLk/s1600-h/5.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5451198284186158066&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlJ6DMLV2uJeIfTcGeObt0pBiYzDssN26VXa44LQPh2-179DUn6kheSEbalMIbqRuLsn_5PlTDsEOpOklUfxG77s6QqJQy1M1ZtYqTBAXC3qqKp5ExHzm-jDlhc1zcEHcli0xekCX6lQLk/s320/5.jpg&quot; style=&quot;cursor: pointer; display: block; height: 151px; margin: 0px auto 10px; text-align: center; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Сега QPST прочита EFS файловата система на модема&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2EJhoMe9lXttmYOoxyiHh8xIA_y2odBkZIqlYgwrK2bSfoUuxHVgc8_RHtcrvr4oKm63rtJgcU4wA1shozxf2RXh4a03viKn-CNjnIURVwYLpPesu89PHavpItKFdhkJaBD5ffqv_9LxZ/s1600-h/6.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5451200651665818786&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2EJhoMe9lXttmYOoxyiHh8xIA_y2odBkZIqlYgwrK2bSfoUuxHVgc8_RHtcrvr4oKm63rtJgcU4wA1shozxf2RXh4a03viKn-CNjnIURVwYLpPesu89PHavpItKFdhkJaBD5ffqv_9LxZ/s320/6.jpg&quot; style=&quot;cursor: pointer; display: block; height: 153px; margin: 0px auto 10px; text-align: center; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;8. Виждаме файловата структура на internal flashdrive. Добре е да направим резервно копие на ZTEMODEM.ISO. Става с десен бутон върху файла и &quot;Copy File from Phone&quot;... и избираме дестинацията.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdzFWn1Jx3xB_opahMKgqXrre4y6_zgq3Mpn_Yf1Y_fWgtuy4m4gAIpNjTEhSELbUuMlnyLTcB21QS0WeTK2sO6AhAVq4E1GLl_G8h2sSWfWNWU0YTx6SMmSZG4ltobCcP_WZBrR1i0Z32/s1600-h/7.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5451202171972738338&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdzFWn1Jx3xB_opahMKgqXrre4y6_zgq3Mpn_Yf1Y_fWgtuy4m4gAIpNjTEhSELbUuMlnyLTcB21QS0WeTK2sO6AhAVq4E1GLl_G8h2sSWfWNWU0YTx6SMmSZG4ltobCcP_WZBrR1i0Z32/s320/7.jpg&quot; style=&quot;cursor: pointer; display: block; height: 200px; margin: 0px auto 10px; text-align: center; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Отиваме да пием кафе за 25-30 минути и точно след толкова приключва на процедурата. Вече може да затриете файла.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglbXHuJabOZKX0g6OBhLJD99k8R111f-vHvpayiSf8HUCjWtlNGoKhzZxQUn29pH-1qVcxn-Ri3BODCx_Yi4LpltX1UIjvkf61SYabB8w9Uwo6uMhtAy-vQR7FQRWs7E_oZexVFxk0Lst-/s1600-h/9.jpg&quot; onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; id=&quot;BLOGGER_PHOTO_ID_5451205971677270754&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglbXHuJabOZKX0g6OBhLJD99k8R111f-vHvpayiSf8HUCjWtlNGoKhzZxQUn29pH-1qVcxn-Ri3BODCx_Yi4LpltX1UIjvkf61SYabB8w9Uwo6uMhtAy-vQR7FQRWs7E_oZexVFxk0Lst-/s320/9.jpg&quot; style=&quot;cursor: pointer; display: block; height: 200px; margin: 0px auto 10px; text-align: center; width: 320px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;9. Изтегляме &lt;a href=&quot;http://sharebee.com/0ead8539&quot;&gt;това&lt;/a&gt;, разархивираме и копираме новия ZTEMODEM.ISO в модема.&lt;br /&gt;&lt;br /&gt;10. След приключване на процедурата по копиране излизаме от QPST configuration. Следва запитване за ресет на устройството и потвърждаваме с ОК. &lt;br /&gt;&lt;br /&gt;Вече вашия модем е с ZTE Join Air и ползваме SIМ карти от всякакви оператори!&lt;/sec_items&gt;&lt;/sec_items&gt;&lt;/sec_statue&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/6917450973602895609/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2010/03/m-tel-vmc-prima-k3565-z-sim.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/6917450973602895609'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/6917450973602895609'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2010/03/m-tel-vmc-prima-k3565-z-sim.html' title='M-tel VMC Prima комплект - как да ползваме модема K3565-Z със SIM карти от други оператори'/><author><name>vMilen</name><uri>http://www.blogger.com/profile/05318089702427368203</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit8YjSDjCNFqsXPKuTBaXlIfENTCxuBpXR9AMg-XuESvFf7qJoGLZ1N-LH_vyVgLl4T5PVD6jW_TBLDfpbWULVR8MwW4AFZSBE1JrMN0jXZlWAMSETWMpxSppzY6-XJZC6ZDnZZD1f8Fq3/s72-c/prima-1500MB-BG.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4646058686247885856.post-5056567207025255899</id><published>2010-02-18T14:11:00.001+00:00</published><updated>2013-02-24T10:13:12.929+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="виртуален"/><category scheme="http://www.blogger.com/atom/ns#" term="виртуализация"/><category scheme="http://www.blogger.com/atom/ns#" term="зелени технологии"/><category scheme="http://www.blogger.com/atom/ns#" term="поддръжка"/><title type='text'>Старите сървъри и десктопи</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div align=&quot;justify&quot;&gt;
В България се натрупаха доста остарели компютри и сървъри. Голяма част от тях вече не са натоварени. Често съдържат стари счетоводни или складови ( и не само) системи, които се ползват само за справки за минали периоди. Техния хардуер е в достатъчно напреднала възраст и вероятността за отказ не е никак малка. Ремонта и подмяната на дефектирали компоненти е скъпа за старите устройства, а често и невъзможна. &lt;/div&gt;
&lt;div align=&quot;justify&quot;&gt;
&lt;br /&gt;
Има ли решение този проблем?&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;br /&gt;Отговора се крие във &lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;fullpost&quot;&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;виртуализирането на тези машини върху един единствен нов хардуер. Поради независимостта на виртуалните машини една от друга, те могат да си съжителстват безпроблемно, няколко на брой върху една единствена физическа машина.&lt;br /&gt;Ползата за крайния потребител е, че разделя операционната система и приложния софтуер от хардуера, а добрата новина е, че за това може да се ползва безплатен продукт за виртуализация. Единствения разход ще бъде покупката на нова машина с необходимите параметри за да може да държи в себе си нужните виртуални машини. Впредвид, че повечето от тези виртуални машини ще съдържат в себе си софтуер, който ще се ползва само за справки, а не за оперативна, текуща работа, то параметрите на новозакупената машина не е задължително да бъдат високи.&lt;br /&gt;Следващата стъпка е мигрирането на данните от физическата към виртуалната машина. Процеса не е деструктивен за физическата машина и едва след, като се убедим, че виртуалната машина е създадена и функционира успешно, можем да „пенсионираме” физическия й първообраз.&lt;br /&gt;Обикновените (физически) сървъри и настолни компютри работят с много на брой отделни файлове. Те могат да бъдат както от операционната система, така също драйвери, приложен софтуер или просто потребителски данни. Виртуализацията разделя софтуера от хардуера, вмъквайки един допълнителен слой между тях и поставя данните за всяка виртуална машина (VM) в един единствен файл на физическия диск (или масив). VMware използва VMDK файлов формат. Такъв файл представлява пълна и независима виртуална машина под VMware продукти или други платформи, които поддържат VMDK файлове като XVM, QEMU или VirtualBox.&lt;br /&gt;&lt;br /&gt;Основните предимства са простота и удобство. Един файл (*.VMDK), например, е лесно да се премести между физически сървъри, чрез студена или жива миграцията в платформа за виртуализация. Лесно е да се постигне защита на информацията чрез снимки на състоянието (snapshots). Преди въвеждането на специализираните софтуерни инструменти, беше невъзможно да се възстанови само част от VM, като например обикновен потребителски документ. Налагаше се да се възстанови цялата VM, обикновено на резервен сървър, вместо на оперативния сървър, като едва тогава архива на повредения файл можеше да бъде извлечен. Днес, възстановяването на отделен файл от виртуалната машина не е проблем. Това не изключва задължението на администраторите да разработят планове за възстановяване след авария.&lt;br /&gt;&lt;br /&gt;Файлoвият формат VMDK се конкурира с Microsoft Virtual Hard Drive (VHD) дисков формат, използван в Hyper-V платформата. Дисковите формати не са директно съвместими и от това следва, че съществуващите виртуални машини не могат да функционират върху различен Hypervisor. В много случаи, виртуални машини трябва първо да бъдат мигрирани върху физически сървър (V2P) за ефективното премахване на предходната виртуализация. Новият Hypervisor тогава ще създаде нови виртуални машини, като се използва нов формат на диск. Съществуват и инструменти на други разработчици за преход от един формат в друг.&lt;br /&gt;Процеса на виртуализация на стари физически машини носи спестявания от опертивни разходи и повишава сигурността на данните при минимална инвестиция.&lt;br /&gt;Примери за виртуализиращ сървър ще намерите в следващия пост.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itanalyses.blogspot.com/feeds/5056567207025255899/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itanalyses.blogspot.com/2010/02/blog-post.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/5056567207025255899'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4646058686247885856/posts/default/5056567207025255899'/><link rel='alternate' type='text/html' href='http://itanalyses.blogspot.com/2010/02/blog-post.html' title='Старите сървъри и десктопи'/><author><name>Nanyo Nanev</name><uri>http://www.blogger.com/profile/08429777706919694715</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4DyAVlkWDJrhCV4-jluFhgZjpoh_gKUBsMVHfvLFuprvB-bPGYV7XXcPCmDsU_nPcuJZ57jCammvm-mWbhP3iPMOTKVdGFnjvwoa1V6nLjptJztR7aHVYbtKgEOOOpbg/s220/NanyoNanev_117x155.jpg'/></author><thr:total>0</thr:total></entry></feed>