At that time, the solution fit our needs perfectly. Over the last couple of years, as technology evolved and developed, we found that we needed to make a change.
The Institute of Electrical and Electronics Engineers (IEEE) in January 2014 released the 802.11ac standards; it was perfect timing, considering our company was planning on changing out this technology soon. Many laptop and mobile device manufacturers had already began incorporating the 802.11ac functionality in their devices since as early as 2012 to be prepared for the release of these standards.
Our challenges included:
- • Bandwidth issues as a result of multiple mobile devices per user
- • Technology advancements with our mobile devices (in particular, supporting video applications) was exceeding the features and functionality that our older access points could support
- •Control and access for our guests and applications required during their visits
Armed with our customized wireless testing apparatus that Bob Romano created, we proceeded to complete our wireless survey to determine the best locations for access points.
We chose to install Aruba IAP-225 access points to provide 802.11ac (also known as 5G WiFi) coverage throughout our building. These access points provided immediate and noticeable benefits including blanket coverage throughout our facility as well as outside areas that required coverage while also doubling our channel bandwidth.
802.11ac standards include improvements such as increases in bandwidth speeds and beamforming technology. Skipping all the technical jargon, bottom line, speeds of 3x's faster of the previous 802.11n wireless infrastructure should be expected and the new beamforming technology allows the ability to focus signal strength toward active user locations. If you would like to read the Aruba tech version of 802.11ac features and functionality, click here.
Ben started out in our voice division supporting our telephone customers and Mitel Direct customers located primarily in the Greenville, Spartanburg and Anderson, SC areas.
Ben originally hails from Miami, but has lived in many different states including Michigan, Kentucky, and North Carolina; much of this due to being raised in a military family. A few years ago, he finally decided to settle down in South Carolina.
Since he began working at TSAChoice, Ben has succeeded in becoming our most certified engineer acquiring certifications from Mitel, Cisco, Microsoft and CompTIA. He has recently been promoted to the Technical Services Manager for our Greenville, South Carolina office. Ben is a relentless worker, making for the perfect problem-and-solution guy. He finds overcoming tough challenges with which he is presented exhilarating.
This need to face challenges head-on falls right in line with his adventurous, big game hunter side. A look at his bucket list reveals items such as Kodiak bear hunting in Alaska, hunting the big 5 in Africa, Caribbean spear fishing while living on a sailboat, and a walkabout in Australia ending with a little spear fishing on the Great Barrier Reef.
He is an avid outdoorsman who enjoys scuba diving, kayaking, swimming and hunting. He and his wife are very active in the community in which they live; Ben assists his wife Amanda with Bruce Unlimited Designs doing face painting for parties (part of the proceeds go to support Miracle Hill Ministries). Bruce and Amanda are also in the process of launching an outreach to the homeless in the Greenville area.
Relying on an automated process and forgetting about it is tempting, but if a system crashes and you try to restore from a non-existent file that was supposed to be there, you will wish you had taken the time to verify those backup procedures.
A dangerous mistake is backing data up in only one location. Over the years I've had many a work laptop crash that contained system backup information, and so have developed the habit of backing up my backups to a shared network drive, which is then backed up to the cloud. In other words, backup your files in as many places possible to ensure that you are able to get a hold of them when you need them; from my experience, some files become corrupt or damaged and require hours (or even days) of programming to fix. Just back back back it up!
As a rule, every time you make a change to any system, including your phone system, you need to get a current backup. That backup file needs to be copied offsite, either to a network storage device of some sort, or to the cloud. This simple precaution can save hours of downtime, headaches, and hundreds to thousands of dollars in labor and lost business associated with re-building a system.
So how does one backup a phone system? I'm glad you asked! The following is a brief description of how to backup the Mitel MiVoice Office, Mitel 5000, Mitel MiVoice Business, Mitel Communications Directory (MCD) and the Mitel 3300 systems.
Directions to backup the MiVoice Office and 5000
- 1. Launch the System Administrator & Diagnostics Tool.
2. Click the telephone button, or select the drop down and choose Launch DB Programming.
3. From the Operations Menu (located at the top of the screen), select Backup Operations and then Save Backup.
4. You will want to select Save Database to a PC, choose your save to location, assign a file name (example 0115.m5k) and click the start button.
5. Once your file is saved to your PC (remember the discussion we had above about multiple backups) copy that file off to a remote location (the cloud, NAS, etc.).
6. You're done!
Directions to backup MiVoice Business, MCD and Mitel 3300
- 1. Open Internet Explorer or Mozilla Firefox and browse to the address of your phone system.
2. Log into the Embedded System Management (ESM) interface, and select System Administration Tool.
3. Select the drop down menu on the left side and choose Maintenance and Diagnostics, then Backup/Restore, then choose Backup.
For this save you can choose whether or not to backup your call history and voicemail messages, I recommend not backing these up (as they add time to the process), and by the time a restore is required, the data will most likely be irrelevant.
- 4. A ".tar" file will be auto generated.
5. After the backup is complete the file can be saved to a specific directory.
Again, once your file is saved to your PC (remember the discussion we had above about multiple backups) copy that file off to a remote location (the cloud, NAS, etc.).
That's it, nothing to it! This is just some simple maintenance that could save you time and money in the long run. If you need assistance with either of the processes listed above, feel free to reach out to our Customer Care department and we will be happy to assist.
Benjamin Bruce, Technical Services Manager, South Carolina Region
Jennifer is the contract administrator for TSAChoice. Her position consist of maintaining all of the technology service and support contracts including Complete IT (CIT) contracts, Comprehensive Service Agreements (CSA) for Mitel phone systems, Technology Assurance Program (TAP) contracts and Block Amount Agreements. She also sets up new customers and contact information, makes the dreaded collection calls and doesn't even mind cleaning out the ice maker in the refrigerator when it freezes over.
Jennifer is a very organized person, expecting nothing less than perfection with whichever jobs she is charged. If a task is in Jennifer's capable hands, her co-workers know they can let it go and move on to their next assignment.
Jennifer grew up in the Williamson area of South Carolina, graduating from Palmetto High and moving on to get her degree in Radio and TV Broadcasting from Tri-County Technical College in Pendleton, SC. She moved straight into the radio business working nights for WSSL in Greenville, with her personality tagline, "Let Jennifer put you to bed."
Orange seems to be her preferred color of choice, with some purple mixed in and a tiger strip here and there. Her work area definitely defines where her allegiance lies: it's complete with a Clemson keyboard, a Clemson gnome, orange sticky notes and even an orange paper corrector. If you want to get on her bad side, just let a derogative comment slip about the Clemson Tigers football team.
In her time off, she cares for her mother, spends time with daughters and grandchildren and lives with a couple of finicky cats. She has been known to break out in song at the closest Karaoke bar, she enjoys grabbing a bite at the Whistle Stop at the American Cafe in Travelers Rest and she can't resist a good biscuit with gravy from Biscuit Head in West Asheville.
To understand the importance of having an RCDD involved in infrastructure projects, you must first understand what the Building Industry Consulting Service International (BICSI) organization is about. BICSI is a professional association that supports the Information Transport System (ITS) industry. BICSI works with companies like TSAChoice to certify installers and designers specializing in complex cabling projects.
RCDD is a designation that is awarded to individuals that have a minimum of 2-4 years experience working with infrastructure solutions and 2) has proven their knowledge by completing an extensive exam based around topics such as:
- • Principles of transmission
- • Backbone and horizontal distribution systems
- • Firestop systems
- • Bonding and grounding
- • Field testing of structured cable and optical fiber
- • Outside plant cable
- • Data and wireless networks
- • Data centers
- • Audio visual systems
Due to the constantly evolving tech industry, this designation is renewed every 3 years with 45 hours of continuing education and attendance at a minimum of one BICSI conference.
An RCDD is an integral part of the designer phase of a project, working from the beginning with architects, engineers and general contractors to provide a proper design and a plan that can be functional, flexible and scalable.
Working with any type of cable or optical fiber, there are codes and standards that BICSI has outlined that should be followed to avoid future issues and complications. If the standards are not met and appropriate testing not followed, the cable infrastructure could experience electrical interference, inadequate data transmission performance, there could be life safety issues, issues with meeting code and even aesthetic challenges. These problems could lead to additional costs including lost time on projects, trouble shooting, and unplanned maintenance costs.
The RCDD credential is meant to provide companies like TSAChoice a professional designation of excellence, a status recognized and mandated by many private and state organizations, a mark of design knowledge and an indication of experience, training and knowledge known throughout the information and communication technology industry.
TSAChoice has consistently kept one or more RCDDs on staff, as well as multiple BICSI certified installers and technicians to ensure the organizations we work with are receiving the best options for cabling projects to provide long lasting performance.
This operations center will be the new hub to manage, monitor and respond even more quickly to our managed network service customers.
The NOC will initially consist of four workstations for three full time IT engineers and one voice engineer to monitor and maintain our Complete IT (CIT) customers. Two 60" monitors will provide instant views of managed networks, dispatch boards and current locations of TSAChoice engineers.
This operations center was created primarily with our CIT customers in mind, these customers are high touch, need additional resources and quick response times from our team. This group will also assist in dispatching and monitoring service ticket queues for our non-CIT customers, therefore increasing the efficiency of our entire service department.
As we continue to refine and grow our CIT offerings, these customers should expect to see continued improvements in our ability to provide them with outstanding technical support.
The operations center will go live on Monday, May 18th. If you would like to schedule a visit to our office to see what support and resources we can offer please call 828-254-4464 or complete this form.
Mr. Fix It is our nickname for Bob around the office; not only does he take care of our customers needs, but when anything goes wrong internally, or even with his co-workers, he is the first person to call. He has repaired everything from our laptops to TV's to broken glass on our smart phones.
As an in-house bench tech, he works on everything from basic monitors and printers to large video walls and plotters. He is one of only a few people in Asheville that has the expertise to repair this specific type of equipment. When working in the field, he works primarily with our audio visual division on
Bob is the kind of guy who welcomes a challenge. The most unusual item he has repaired in his career was a laser drill used to burn holes through diamonds, although recently he completed repairs on a coin operated football video game and an art project, a video "sky" for Degrees of Paradise, that was created out of the old tube style televisions. He also custom designed an apparatus that TSAChoice uses to complete wireless surveys for larger applications or for buildings with high ceilings such as manufacturing facilities.
Bob has a beautiful wife of 35 years, a daughter Katie and son John (both in their 20's). In his spare time, he enjoys renovating his 150 year old house, and taking trips in his Corvette along the beautiful North Carolina countryside.
Twenty-five years ago, few businesses had a CTO, an in-house IT department, or even a server room next to the break room (or, as we’ve seen, a server stack IN the break room.) Now technology is a major player in every office environment, and it’s unheard of to have a break room that doesn’t have a recycling bin it.
Initially, technology was imperative for increasing the speed and efficiency of business transactions. Thanks to a continuing new stream of products and initiatives from the tech sector, technology also has a growing role to play in lowering your company’s carbon footprint. By making informed choices, your business can enjoy the benefits of going green well beyond your waste-recycling program.
Two Shining Examples
“We are so proud that the finished product is not only the most eco-friendly GM dealership in Western North Carolina but also the most customer-friendly. We could not be more pleased that Sunshine Chevrolet is the first in America to be recognized as a GM Green Dealer!” states Don Elliott, President and Owner of Sunshine Chevrolet.
In March, TSAChoice customer Sunshine Chevrolet (Arden, NC) was recognized as the first recipient of General Motors’ Green Dealer Recognition program for its proven track record in areas such as energy reduction, renewable energy use, water conservation efforts, recycling and community outreach. Energy efficient LED lighting with state-of-the-art programmable capabilities, advanced building techniques, and high efficiency cooling and heating are just a few of the specific ways Sunshine implemented environmental features on its site.
You can view a short video that shows how Sunshine Chevrolet worked with TSAChoice to use smart technology throughout its facility here.
TSAChoice customer Kanuga Conferences, Inc. was also recently recognized for seeking ways to reduce its carbon footprint. The Energy Solutions Center awarded Kanuga Conferences and PSNC Energy with its Partnership Award for Innovative Energy Solutions for working together on a large-scale conversion from propane to natural gas in 2014, resulting in more energy efficient heating and hot water supply for Kanuaga’s lodging, program buildings, kitchens and staff housing.
Talk (Clean) To Me
TSAChoice is able to help its customers in Asheville and Greenville reduce energy use and costs simply by choosing the right phone system. Mitel, for which TSAChoice is an Exclusive Partner, is a world leader both in product recyclability and e-waste decommissioning.
Recyclability is included in the design of all Mitel products: MiVoice IP Phones are at least 66 percent recyclable by weight and Mitel has a comprehensive recycling program that diverts up to 65 percent of Mitel’s waste from day-to-day operations. In the US, Mitel has partnered with Global Investment Recovery Inc. (GIR), a signatory to the Electronics Recycler’s Pledge of True Stewardship.
Other Mitel recycling activities include:
• All telephony equipment designated as e-waste is decommissioned at local area facilities.
• Equipment decommissioning and destruction practices are respectful to the environment.
• Scrap metal and precious metal components are recovered and recycled for reuse.
Continuing the Green Revolution via Office Technology
For its own facilities and operations, TSAChoice either recycles or safely disposes of electronic waste and utilizes the services of Resolution Recycling. TSAChoice staff utilize online forms, use smart devices for scheduling and service calls, and recycle day-to-day items all to reduce energy consumption and office waste. TSAChoice is also in the process of converting to e-billing so look for more information about that switch soon.
As we continue to drive these improvements, we love to hear stories about our partners doing the same. Share your green best practices with us.
There are many layers involved in protecting yourself and your company from viruses/malware and ransomware. Normally we think of these layers in the form of firewalls and antivirus software. For small to medium businesses we think of this protection in a four pronged approach.
However, there is a fifth element that should be taken into consideration.
One of the most effective ways to protect your PC or network is human awareness and making sure that privacy and security settings inherent to different applications are setup appropriately. There are so many simple things we can do (with little effort!) to provide these additional layers of protection.
One of the biggest points of weakness we tend to have as humans is curiosity.
When you receive an unexpected email with an attachment or link, a little further investigation doesn't hurt prior to clicking on the surprise that awaits.
- If you know the person from which the email was received, shoot them back a quick email or make a phone call to ask if they have sent something before proceeding with what could be the click of death for your digital information.
- Check the link using the Trend Safety Center. (TIP: good shortcut to add to your web browser)
- Use your search engine to see if you can find any information on the email address, subject used, topic or the document link name.
- If you are concerned that it isn't safe and it doesn't look important, just delete it and move on.
Passwords are a huge part of protecting information and should not be taken lightly. This is the easiest security that you will ever put into place and the most frequently used.
The key is to not make your passwords something obvious, something personal, or something directly related to anything around you. Here are a few rules to keep in mind when setting them up:
- Combinations of upper, lower caps, letters and symbols is a must.
- The longer the better.
- Reset your passwords on a scheduled basis.
- Use different passwords for each account.
- Password protect important documents.
Make sure password recovery method questions are not easily answered. For example, your mothers maiden name is probably pretty easy to find, while the name of your first pet, may not be as readily available. Adding an extra unexpected word to the response is also an easy method to strengthen this process.
To keep track of these passwords use a tool such as Last Pass to not only track passwords, but to help in generating them.
Birthdays, initials, family members, cars, your address, your social security number, your pets name, your best friends name, boyfriends name, address, year of birth, your name, your husbands name nothing related personally to you.
We use so many applications today that have additional security settings that allow protection of our information beyond the initial password protection. The secret, they only work if they are adjusted in privacy and security settings of these apps.
Two step verification is a process by which when logging into your account, a code is generated and in most cases sent to your mobile phone or device and is then required to be entered prior to a successful login. Examples of applications using this process currently include Google, Facebook, Last Pass, Dropbox, LinkedIn and others. For a list of other applications using this feature you can access the Two Factor Authorization website.
Trend released a report "Dissecting Data Breaches and Dunking the Myths" this report states that 41% of breaches are due to device loss.
Setup encryption on your mobile devices; this function basically turns all of your information into unreadable data, unless the correct authorization is used to access the device. Encryption can be easily setup on both Android and iOS devices.
Encryption can effect performance for Android devices and cannot be reversed. Read complete information for encrypting your Android device prior to starting the process.
Read information for encrypting your iOS device.
This is a case where offense is definitely your best defense. We place software and firewalls on our systems to protect ourselves and our companies, sometimes forgetting that without common sense it is all for naught. Take a few minutes review and share this information with friends, family, coworkers and employees to make sure we are all doing our best to protect our data.
There are four primary steps to planning your server migration. Steps 1 and 2 are where you determine what is necessary, what can be removed from your plate, and provides a platform for planning a schedule.
If you don't already have a list of all your software types within your server, then this is where you will start. Use this spreadsheet to get started.
First, list all Microsoft Server roles, Microsoft applications, third party applications and any custom applications associated with the Server.
Once you have a complete list of the software on the Server, for each type, determine criticality, complexity and risk associated. Criticality will determine what is necessary to migrate, while the complexity and risk factors will assist in determining schedules for migrating software.
Criticality will also assist in step 3, determining the location for the software, whether it is a physical server, virtual server or if the software in question will be moved to the cloud.
Based on Microsoft recommendations, criticality is determined based on the following:
- Mission Critical-
- requires more resources,
- is required for compliance,
- planning is critical,
- or planning needs to start immediately
- provides a competitive advantage,
- could doing something different provide more value
- consider usage,
- what is the business value,
- retire or move to a different solution
- serves no benefit
Complexity, just as it sounds, entails the challenges you may face when making this software conversion. These complexities include the ability to move due to time challenges, the time required, and other integrations that may be affected. For example, a software program that is being used by only a handful of people and a few hours a day will be easier to move than software that is accessed 24/7 and pulls information from other software sources.
Risk, or the chance of losing data, can be a concern, especially if you don't have proper backups or a disaster recovery plan in place.
Complexity and Risk will both be rated on a low/medium/high scale or possibly a 1-10 scale if you wish to be more granular.
Once the risk is assessed, this program provides an at-a-glance table to assist with what can be retired, items that will be simple to transfer to another platform, and others that will require more diligence.