{"id":374,"date":"2015-09-25T17:06:54","date_gmt":"2015-09-25T17:06:54","guid":{"rendered":"http:\/\/50.87.249.54\/~activey5\/?page_id=374"},"modified":"2015-09-25T17:31:06","modified_gmt":"2015-09-25T17:31:06","slug":"case-studies","status":"publish","type":"page","link":"http:\/\/activeitsupport.com\/?page_id=374","title":{"rendered":"Our Work"},"content":{"rendered":"<div id=\"pl-374\"  class=\"panel-layout\" ><div id=\"pg-374-0\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-374-0\" style=\"border-bottom: 1px solid #e0e0e0;padding: 100px 0; \" data-stretch-type=\"full-stretched\" data-overlay=\"true\" ><div id=\"pgc-374-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-374-0-0-0\" class=\"so-panel widget widget_sydney_services_type_a sydney_services_widget panel-first-child panel-last-child\" data-index=\"0\" >\t\t\t<h3 class=\"widget-title\">Our Work<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"service col-md-6\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"roll-icon-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"icon\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fa fa-cube\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t<h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCase Study: Allowing remote workers to get access to central systems\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t<p><strong>The Challenge<\/strong><\/p>\n<p>The customer was establishing a number of new offices, and needed the staff at these offices to be able to access all the facilities currently available at the main office.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Our Solution<\/strong><br \/>\nWe designed a system using thin client terminals which could be installed at the remote sites and linked into the main system using VPN over the internet, to provide the required functionality.<\/p>\n<p>However, it was also important that the remote sites could be quickly established without the need for IT staff to travel to each site to set it up.<\/p>\n<p>To achieve this, we devised a scripted install procedure and an equipment pack including thin client terminals, printers, VPN client hardware, switches and cabling which could be sent to the site.<\/p>\n<p>A local IT engineer could easily set up the site using the scripted install procedure.<\/p>\n<p>We also provided a user guide for the staff, and guides for the applications so that they could start using the system immediately.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!--.info-->\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"service col-md-6\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"roll-icon-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"icon\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fa fa-cube\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t<h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCase Study: Preventing virus infection\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t<p><strong>The Challenge<\/strong><\/p>\n<p>The customer needed to extend Internet access and email to all staff, whilst ensuring that they were protected against viruses which could arrive by email, or by direct exposure of workstations to the Internet.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Our Solution<\/strong><\/p>\n<p>We installed an Internet firewall\/router to enable internet access, and configured workstations to use this.\u00a0 We updated and expanded the email system to cover all staff, and installed an anti-spam filter.<\/p>\n<p>We installed a server-based Antivirus console, which took control of the anti-virus settings on each computer, ensuring that each computer was kept up to date, with no operator or user involvement required on a day-to-day basis.<\/p>\n<p>We monitor the anti-virus console remotely, and are able to see the current status of the anti-virus software on each computer, and take action if we see a problem arising.\u00a0 The console also advised us of any intercepted viruses.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!--.info-->\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"service col-md-6\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"roll-icon-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"icon\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fa fa-cube\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t<h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCase Study: Overcoming barriers to system expansion\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t<p><strong>The Challenge<\/strong><\/p>\n<p>This customer was having problems with running out of disk space on the main file server.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Our Solution<\/strong><\/p>\n<p>We installed quota control software on the file server.\u00a0 This was then configured to provide users with a limited quota, which can be set on a user-by-user basis.\u00a0 Users are given automatic warnings if they go over their allowed quota.\u00a0 If they continue to remain over their allowed quota they are prevented from creating new documents until they have reduced their overall storage use.<\/p>\n<p>This leaves users free to choose their priorities for data storage, whilst preventing the server from running out of storage space.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!--.info-->\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"service col-md-6\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"roll-icon-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"icon\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fa fa-cube\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t<h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCase Study: Email Management\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t<p><strong>The Challenge<\/strong><\/p>\n<p>The customer was experiencing problems with spam email.\u00a0 Staff time was being wasted in identifying and deleting these emails.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Our Solution<\/strong><\/p>\n<p>We installed dedicated anti-spam device their network which checks the source of each incoming email against lists of known spammers, and from intelligence gathered from spam interceptions around the world.<\/p>\n<p>The software also checks the content of emails to estimate the likelihood of an email being spam.<\/p>\n<p>Users have the ability to check the mail flagged as spam being held on their account and are able to release any incorrectly labelled email without the involvement of IT staff.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!--.info-->\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"service col-md-6\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"roll-icon-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"icon\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fa fa-cube\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t<h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCase Study: Managing Printers on Large Sites\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t<p><strong>The Challenge<\/strong><\/p>\n<p>This customer had a large number of printers, each of which was directly connected to the network, and workstations had been configured to print to the directly.\u00a0 However, printer management was problematic, as users could select the wrong printer and cause the printer to become unavailable for other users by sending inappropriate jobs to it.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Our Solution<\/strong><\/p>\n<p>We installed a printer server, based upon the Windows server operating system, to drive all the printers from a single point, and provide a central monitoring point.\u00a0 We then assigned printing rights for each printer by user group, so that users would be guided to the correct printer, and prevented from using the wrong printers.<\/p>\n<p>We also migrated these printer settings into the customer&#8217;s terminal servers, so that all users on these servers would benefit from the print server as well.<\/p>\n<p>The result is a simpler, more manageable and more robust printing environment<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!--.info-->\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"service col-md-6\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"roll-icon-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"icon\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fa fa-cube\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t<h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCase Study: Keeping data secure through effective backups\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t<p><strong>The Challenge<\/strong><\/p>\n<p>The customer had a backup system, but this system needed to be monitored on a daily basis to ensure correct operation, which was eating into the time available to IT staff to work on projects to develop new capabilities in the business.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Our Solution<\/strong><\/p>\n<p>We installed a new backup system for this customer, who have also engaged us to monitor the system on a daily basis, and to maintain it&#8217;s operation, thereby freeing the customer&#8217;s IT staff to work on other tasks.<\/p>\n<p>The backup system provides backup services to over 20 client servers, running the organisation&#8217;s mission-critical applications.\u00a0 Backups run on a daily basis, with reports sent automatically to us for examination.<\/p>\n<p>Backup failures are quickly identified and action taken directly by us to rectify any problems.\u00a0 We are able to directly control the backup system at our customer&#8217;s site from our offices.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!--.info-->\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"service col-md-6\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"roll-icon-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"icon\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fa fa-cube\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t<h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCase Study: Controlling web access\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t<p><strong>The Challenge<\/strong><\/p>\n<p>The customer had an old hardware-based proxy server, but this did not integrate with Active Directory, so there was duplicated work in setting up new users for both Internet access and Active Directory.\u00a0 Also, each user would have to enter a username and password to obtain internet access, but this only worked with a limited range of applications, consequently other applications which needed internet access would not work.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Our Solution<\/strong><\/p>\n<p>We installed a new server for control of web access, and then integrated the security for Internet access with Active Directory.\u00a0 Users are then added to an appropriate AD group, and these groups are given access to the Internet.\u00a0 Some groups are given full access with all applications available (eg web browser, messenger, FTP), whilst others are limited to web browser only with a limited range of web sites on a &#8220;whitelist&#8221;.<\/p>\n<p>The system keeps records of all internet access, and third party tools are available to view these records, thereby ensuring that staff are complying with the company policy on internet usage.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!--.info-->\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"service col-md-6\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"roll-icon-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"icon\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fa fa-cube\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t<h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCase Study: Providing extra resources for an inhouse team\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t<p><strong>The Challenge<\/strong><\/p>\n<p>The customer&#8217;s IT staff were becoming overworked due to growth in demand and limited resources, and a wide range of systems which needed support.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Our Solution<\/strong><\/p>\n<p>We put in place arrangements to act as an extension of the inhouse IT department for this company.\u00a0 We carry out a wide range of tasks, including server builds, user management, PC and notebook builds, data transfer and recovery, problem solving, backup and anti-virus monitoring.<\/p>\n<p>Work is carried out onsite or remotely as required.\u00a0 With VPN connectivity and remote monitoring tools we are able to take remote control of servers and workstations on the customer&#8217;s site to carry out the work in many cases.<\/p>\n<p>Our experience, high level of training, and familiarity with the customer&#8217;s systems means that we are able to work effectively with minimal supervision.\u00a0 We use a helpdesk management tool to provide feedback on each assigned job.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!--.info-->\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"service col-md-6\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"roll-icon-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"icon\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fa fa-cube\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t<h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCase Study: Understanding and managing IT\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t<p><strong>The Challenge<\/strong><\/p>\n<p>This client is a small business, and like many small businesses, is dependent upon IT, but without the resource of a permanent IT staffer.\u00a0 The systems used are a combination of industry-specific software tools, and generic office tools.\u00a0 They have an ongoing need for support and service.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Our Solution<\/strong><\/p>\n<p>We provide an ongoing support and maintenance service, keeping their systems up-to-date and installing new facilities where a need has been identified.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!--.info-->\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"service col-md-6\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"roll-icon-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"icon\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fa fa-cube\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t<h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCase Study: Solving reliability issues\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t<p><strong>The Challenge<\/strong><\/p>\n<p>This company had an old server based upon an obsolete operating system with no clear migration path.\u00a0 The backup device had failed, and the server was not maintainable.\u00a0 They had a critical database business application which they needed to continue using.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Our Solution<\/strong><\/p>\n<p>Active IT Support ported the application to a new server, allowing them to continue to use the application, and with improved performance and simpler operation.<\/p>\n<p>We also modified the applications that connected to the database system to enable them continue to use it.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!--.info-->\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"service col-md-6\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"roll-icon-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"icon\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fa fa-cube\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"content\">\r\n\t\t\t\t\t\t\t\t\t<h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tCase Study: Removing system bottlenecks\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t<p><strong>The Challenge<\/strong><\/p>\n<p>The customer had a backup system which had grown out-of-date, no longer capable of handling the number of files which were to be backed up.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Our Solution<\/strong><\/p>\n<p>We diagnosed a bottleneck in the hard drive subsystem on the server.\u00a0 We fitted a new tape library, and migrated the backup system to a different server.\u00a0 Although this was not a new server, by re-organising the drive configuration and installing the latest backup software we were able to dramatically improve the performance of the system, so that backups which were taking 3 days were able to complete in 6 hours, and were able to backup all servers on the site.<\/p>\n<p>We provide a daily monitoring service for this server, with automatic email notification so that we can identify problems quickly, and fix them in time for the next scheduled backup<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div><!--.info-->\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Our Work Case Study: Allowing remote workers to get access to central systems The Challenge The customer was establishing a number of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"page-templates\/page_front-page.php","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P6Me5a-62","_links":{"self":[{"href":"http:\/\/activeitsupport.com\/index.php?rest_route=\/wp\/v2\/pages\/374"}],"collection":[{"href":"http:\/\/activeitsupport.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/activeitsupport.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/activeitsupport.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/activeitsupport.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=374"}],"version-history":[{"count":4,"href":"http:\/\/activeitsupport.com\/index.php?rest_route=\/wp\/v2\/pages\/374\/revisions"}],"predecessor-version":[{"id":537,"href":"http:\/\/activeitsupport.com\/index.php?rest_route=\/wp\/v2\/pages\/374\/revisions\/537"}],"wp:attachment":[{"href":"http:\/\/activeitsupport.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}