Intersoft Systems, Inc.
  • Products
    • INTERAC for Construction
    • INTERAC for General Business
    • INTERAC for Franchises
    • INTERAC for Public Accounting
    • INTERAC Payroll Solutions
  • Services & Support
    • Support Request Form
    • Implementation
  • News & Articles
    • Case Studies
    • Slide Share Articles
  • Contact Us
  • RequestFollowUp

Intersoft Systems
​News & Articles

Security in the Cloud: Strategies for Coping and Conquering

10/11/2016

0 Comments

 
Picture
Guest post by Adam Stern, CEO of Infinitely Virtual

It’s now part of the conventional wisdom that cloud computing has altered the IT delivery model. The steady embrace of the cloud among businesses large and small does not, however, mean that organizations can or should let their guard down on matters of security and data protection. While cloud server hosting provides compelling benefits, security is an essential part of any discussion of cloud adoption. Mitigating security risks is imperative to creating a comfort level among CIOs and CISOs, to transition applications and data to the cloud.
 
Applications, systems and data all have different security thresholds.  Even in highly regulated industries such as healthcare or financial services, there are cases in which virtual servers make sense. For example, web, mobile and social can be moved to a virtual server without the same degree of security concern as there is for regulated information or mission critical applications.
 
When deciding whether an application, product or service belongs in a cloud server, CIOs and CISOs must consider:
  • Type of data or application;
  • Service-level agreement; and
  • Security environment.
 The decision to move to the cloud, especially the public cloud, should depend on the sensitivity of the data and the level of security offered by the cloud provider. The final question should be whether the business value offsets the risk.
 
Cloud service providers (CSPs) are beginning to put a greater emphasis on security protections, with technologies such as clustered firewalls and intrusion detection and prevention systems (IDPS). In the cloud’s infancy, CSPs touted scalability, initial cost savings and speed. But the prospect of enhanced security in the cloud – indeed, that the better cloud deployments now mean that data is safer in the cloud than on a typical unsecured desktop – has altered the conversation. Organizations assessing cloud service providers can now seek out CSPs whose security controls mitigate the risks of moving to the cloud.
 
When considering a move to virtual server hosting, CIOs and CISOs need to check for audits of a CSP’s security controls.  Look for providers who have passed the SSAE (Standards for Attestation Engagements) No. 16 Type II audit, one of the most rigorous auditing standards for hosting companies.  The audit confirms the highest level of service and reliability attainable for a virtual server hosting company.  To be SSAE compliant, a hosting provider should offer SSL capability, enterprise-level, application level protection, hardware firewall, IP-restricted FTP, managed backups with 14-day retention, advanced monitoring and multi-level intrusion prevention.
​
In addition, an increasing number of CSPs are using the American Insti­tute of Certified Public Accountants’ Service Organization Control process (SOC), the organization’s certification of controls with verification for cloud environments. Some of the larger cloud service providers now publish SOC reports on their security controls. Mandates from CIOs and CISOs may be required before SOC reports are published by all cloud providers.
 
Now more than ever, cloud service providers are realizing that managing security is fundamental to facilitating cloud adoption. Those cloud providers concerned about safeguarding their clients’ data and applications are taking steps to mitigate those risks with tight security controls and transparency regarding those controls. 
0 Comments

Windows Server 2012: Small (Business) is Beautiful

9/6/2016

0 Comments

 
Picture
Guest post by Adam Stern, CEO of Infinitely Virtual

​Windows Server powers many of the world’s largest data centers, but it also delivers value to small- to midsize business (SMBs).  Windows Server 2012 redefines the server category, delivering hundreds of new features and enhancements that span virtualization, networking, storage, user experience, cloud computing, automation, and more.  For SMBs, virtualizing Windows Server 2012 through a cloud service provider can help transform IT operations, reducing costs and delivering an entirely new level of business value.

But why Windows Server 2012?
 
Windows Server 2012 provides a scalable, highly available platform for mission-critical applications and offers enhanced support for open standards, open source applications and various development languages.  Windows Server 2012 also makes it easier to deploy a virtual desktop infrastructure, and can lower storage costs. Virtual Desktop Infrastructure in Windows Server 2012 enables businesses to access IT from virtually anywhere, providing a rich Windows experience while ensuring enhanced data security and compliance.

For SMBs considering Windows cloud server hosting Windows Server 2012 offers optimum flexibility. Quality cloud service providers (CSPs) provide a number of Windows 2012 hosting plans, along with support for Windows 8 as well. These kinds of plans harness cloud solutions to advance the growth of SMBs.  Windows cloud servers offered through quality CSPs are 100 percent protected, 100 percent secure, 100 percent scalable and deliver 100 percent uptime. 

Windows virtual server hosting using Windows 2012 delivers a host of benefits, from the ability to select a graphical user interface to dramatically simplified licensing.  Its Server Manager offers multi-server capabilities, making it extremely easy to deploy roles and features remotely to physical and virtual servers. Windows 2012 incorporates integrated security features such as Dynamic Access Control (DAC) and adds Storage Spaces, a new feature that enables users to create a storage pool using inexpensive hard drives. Its Hyper-V Replica replication mechanism provides true disaster recovery capabilities to SMBs that might otherwise find that kind of solution unattainable due to cost constraints.

To ensure comprehensive data protection, SMBs considering a move to Windows virtual server hosting should expect free onsite and offsite backup using Application-Consistent Snapshot technology.  With Application-Consistent Snapshots, entire servers or individual files can be restored in minutes in a consistent state. Database and disk transactions are complete and free of data corruption.

Business should also require that their cloud service provider offer Perimeter Intrusion Detection Prevention and Perimeter Anti-Virus/Anti-Malware with Windows virtual server hosting. This ensures that every network transaction is inspected by unique perimeter devices, blocking known attacks and CVEs. Viruses and malware transmitted over unencrypted connections are blocked before they reach the client’s server.  

Windows cloud servers enable SMBs to stay lean and scale instantly when required. They permit organizations to do business anywhere, empowering them to be faster and bolder than competitors who have yet to make the move.
0 Comments

Virtual Server Hosting: Mitigating Security Risks

8/9/2016

0 Comments

 
Picture
Guest post by Adam Stern, CEO of Infinitely Virtual.

It’s now part of the conventional wisdom that cloud computing has altered the IT delivery model. The steady embrace of the cloud among businesses large and small does not, however, mean that organizations can or should let their guard down on matters of security and data protection. While cloud server hosting provides compelling benefits, security is an essential part of any discussion of cloud adoption. Mitigating security risks is imperative to creating a comfort level among CIOs and CISOs, to transition applications and data to the cloud.
 
Applications, systems and data all have different security thresholds.  Even in highly regulated industries such as healthcare or financial services, there are cases in which virtual servers make sense. For example, web, mobile and social can be moved to a virtual server without the same degree of security concern as there is for regulated information or mission critical applications. 
 
When deciding whether an application, product or service belongs in a cloud server, CIOs and CISOs must consider: 
  • Type of data or application;
  • Service-level agreement; and
  • Security environment.

The decision to move to the cloud, especially the public cloud, should depend on the sensitivity of the data and the level of security offered by the cloud provider. The final question should be whether the business value offsets the risk.
 
Cloud service providers (CSPs) are beginning to put a greater emphasis on security protections, with technologies such as clustered firewalls and intrusion detection and prevention systems (IDPS). In the cloud’s infancy, CSPs touted scalability, initial cost savings and speed. But the prospect of enhanced security in the cloud – indeed, that the better cloud deployments now mean that data is safer in the cloud than on a typical unsecured desktop – has altered the conversation. Organizations assessing cloud service providers can now seek out CSPs whose security controls mitigate the risks of moving to the cloud.

When considering a move to virtual server hosting, CIOs and CISOs need to check for audits of a CSP’s security controls.  Look for providers who have passed the SSAE (Standards for Attestation Engagements) No. 16 Type II audit, one of the most rigorous auditing standards for hosting companies.  The audit confirms the highest level of service and reliability attainable for a virtual server hosting company.  To be SSAE compliant, a hosting provider should offer SSL capability, enterprise-level, application level protection, hardware firewall, IP-restricted FTP, managed backups with 14-day retention, advanced monitoring and multi-level intrusion prevention.

In addition, an increasing number of CSPs are using the American Institute of Certified Public Accountants’ Service Organization Control process (SOC), the organization’s certification of controls with verification for cloud environments. Some of the larger cloud service providers now publish SOC reports on their security controls. Mandates from CIOs and CISOs may be required before SOC reports are published by all cloud providers.
 
Now more than ever, cloud service providers are realizing that managing security is fundamental to facilitating cloud adoption. Those cloud providers concerned about safeguarding their clients’ data and applications are taking steps to mitigate those risks with tight security controls and transparency regarding those controls. 
0 Comments

Maximize Efficiency with a Terminal Server

5/10/2016

0 Comments

 
Picture
​When implementing the INTERAC Accounting System, particularly in a multi-user setting, the advantages of a Terminal Server (Remote Desktop Services) will become readily apparent. Whether you choose a traditional server, a virtualized server, or a cloud hosted server, the same remote desktop functionality is available. Following are just a few of the key considerations.

Ease of Access
Remote Desktop connections provides the same Windows desktop interface you are used to using, but because the applications run on the server, it can be accessed using a variety of network devices. Make the system available to users on the device they prefer whether it is a PC, tablet, or thin-client. Not only can your office staff benefit, field personnel and remote staff can easily log in and run their business applications on demand. Create an icon on your desktop for easy access to log into the Terminal Server. When logged in, each user gets their own customizable remote desktop on the server, with their applications and user configuration settings. They can even use their own local printers and scanners.

Remote Desktop is an easy way to provide access to the INTERAC suite of applications to workgroups in multiple office locations. All that is required is a reliable internet connection, or you may choose to utilize a more secure virtual private network connection. Either way, all the data and processing is done on the server. Only the keystrokes and display information are being transmitted between the server and end user. 

Mobile field users can also utilize Remote Desktop connections to access the system, providing on-demand access the critical reporting information they need. INTERAC security controls what applications and information each user is allowed to access.

Data Security
Allowing individual silos of data on each PC creates all kinds of data management issues. Knowing that hard drives are one of the most frequent failures on a PC, it is much better to have your files on a server with more robust storage and backup options. 
​
Because servers typically have higher grade disk drives and utilize RAID drive configurations to further protect data from drive failures, they are a much more reliable and secure environment for critical data storage. Consolidating the data to a Terminal Server brings the data storage under the control of the server, which allows for much better data security and makes it much easier to assure that important data is properly backed up. This is particularly important with sensitive accounting data. Utilizing proper security protocols, prevents unauthorized access. In addition to Windows server security options, INTERAC security controls which portions of the INTERAC suite each user may access. Centralizing these settings to the server, it is very easy to maintain and update security settings when necessary. 

System Performance
While it is certainly feasible to utilize a file server for data storage, it consumes significant network resources when opening and saving files. This is likely to create performance issues that can easily be avoided by utilizing a Terminal Server. A file server configuration may be acceptable for small work groups, but we recommend a Terminal Server for workgroups of five or more users. 

System Maintenance and Software Updates
One of the biggest advantages of a Terminal Server is realized in the time saved in doing system updates. Because there is only one master INTERAC installation on the server, only one installation needs to be updated, making ongoing updates much easier to manage. Running the update on the server takes care of all the users at one time. That is much easier than trying to manage separate installations for an entire workgroup.
Instead of routinely upgrading a whole group of personal computers, you can focus the resources on a single server solution which will better utilize the processing power. With the important business applications hosted on the server, the requirements for the user PC or thin-client are minimal, allowing you to extend the useful life of existing computers. 

Remote Desktop (Terminal Server) Technology is built in
The Microsoft Windows Server 2008 & 2012 operating systems include these Remote Desktop capabilities. It is simply a matter of enabling these features and providing the user licenses. Likewise, the desktop operating systems are also capable of running the Remote Desktop client software to connect to the server. 

When the time comes to consider your next INTERAC server upgrade, Intersoft Systems would encourage you to take advantage of a Terminal Server with Remote Desktop connections. Take advantage of all these time saving features on a traditional server, a virtualized server, or on a hosted cloud server. We would be happy to help you select the appropriate option, or even supply the hardware or hosting services. Let us know how we can help.

0 Comments

Security in the Cloud

11/20/2015

0 Comments

 
Picture
By Adam Stern, founder and CEO of Infinitely Virtual
Originally posted to the Cloud Strategy Magazine blog on July 10, 2015

It’s now part of the conventional wisdom that cloud computing has altered the IT delivery model. The steady embrace of the cloud among businesses large and small does not, however, mean that organizations can or should let their guard down on matters of security and data protection. While cloud server hosting provides compelling benefits, security is an essential part of any discussion of cloud adoption. Mitigating security risks is imperative to creating a comfort level among CIOs and CISOs, to transition applications and data to the cloud.

Applications, systems, and data all have different security thresholds.  Even in highly regulated industries such as health care or financial services, there are cases in which virtual servers make sense. For example, web, mobile, and social can be moved to a virtual server without the same degree of security concern as there is for regulated information or mission critical applications.

When deciding whether an application, product, or service belongs in a cloud server, CIOs, and CISOs must consider:
  • Type of data or application
  • Service-level agreement
  • Security environment
The decision to move to the cloud, especially the public cloud, should depend on the sensitivity of the data and the level of security offered by the cloud provider. The final question should be whether the business value offsets the risk.

Cloud service providers (CSPs) are beginning to put a greater emphasis on security protections, with technologies such as clustered firewalls and intrusion detection and prevention systems (IDPS). In the cloud’s infancy, CSPs touted scalability, initial cost savings, and speed. But the prospect of enhanced security in the cloud — indeed, that the better cloud deployments now mean that data is safer in the cloud than on a typical unsecured desktop — has altered the conversation. Organizations assessing cloud service providers can now seek out CSPs whose security controls mitigate the risks of moving to the cloud.

When considering a move to virtual server hosting, CIOs and CISOs need to check for audits of a CSP’s security controls. Look for providers who have passed the SSAE (Standards for Attestation Engagements) No. 16 Type II audit, one of the most rigorous auditing standards for hosting companies. The audit confirms the highest level of service and reliability attainable for a virtual server hosting company. To be SSAE compliant, a hosting provider should offer SSL capability, enterprise-level, application level protection, hardware firewall, IP-restricted FTP, managed backups with 14-day retention, advanced monitoring, and multi-level intrusion prevention.

In addition, an increasing number of CSPs are using the American Insti­tute of Certified Public Accountants’ Service Organization Control process (SOC), the organization’s certification of controls with verification for cloud environments. Some of the larger cloud service providers now publish SOC reports on their security controls. Mandates from CIOs and CISOs may be required before SOC reports are published by all cloud providers.

Now more than ever, cloud service providers are realizing that managing security is fundamental to facilitating cloud adoption. Those cloud providers concerned about safeguarding their clients’ data and applications are taking steps to mitigate those risks with tight security controls and transparency regarding those controls.

0 Comments

Should there be a cloud in your forecast?

5/19/2015

0 Comments

 
Picture
With the proliferation of cloud computing options, should you be considering adding cloud computing to your IT portfolio?

There certainly seems to be considerable momentum driving the ongoing development of cloud computing platforms. With the big names like IBM, HP, Dell, Microsoft, Amazon, and Google very much in the mix, there must be something to it. If you are like most of us, you are already using cloud computing, if only to host your personal email accounts. Does it make sense to consider some of the other cloud alternatives for your business computing as well?


With all the competition, prices are becoming very competitive, making it a good time to explore your options. There are all sorts of cloud based software solutions that may be a good fit for your needs. Many of these offer some basic entry level version for free, allowing you to test it out before you subscribe. You could start with Microsoft Office 365, or Google Apps for your word processing, spreadsheet, and presentation software.

For basic file backup, sharing and collaboration with teammates or customers, you could take advantage of Microsoft’s One Drive, Google Drive, Box or Dropbox. These options may also integrate with the word processing and email solutions to further simplify file handling.

One of the most common cloud based software conversions is Customer Relationship Management. There are a significant number of companies hosting their CRM systems with cloud based providers already. Making this information available to the entire team, anytime, anywhere, on any device offers obvious advantages, in addition to offloading the IT costs related to maintaining the system.

To take advantage of the same benefits, you may also want to consider hosting some of your other software applications like your accounting system. Creating a private cloud for your more sensitive computing needs can provide the flexibility and convenience of the cloud, while keeping your data safe and secure.

Following are some additional resources:
Is there a cloud in your forecast?
The cheap, convenient cloud (The Economist)
IT's cloud security concerns do not correlate to actual failures (InfoWorld)

0 Comments

Public, Private and Hybrid Clouds – Which Is Right for You?

4/3/2015

0 Comments

 
Picture
While most of us have at least heard of “the cloud”, there are several variations on the theme. Which, if any, of these options are right for your organization?

Public Cloud
As the name indicates, this option shares the hardware and software services with the general public. Think of Google for example: Gmail, Google Docs, Google Drive are all examples of a public cloud solution. Microsoft offers public cloud solutions with their Office 365 suite, allowing users to access their own subscription to the Office applications.  

Private Cloud
For those who have the expertise and desire to have more control over their data and applications, the choice to build and support their own private cloud may be an option. Because of the technical expertise required and the costs related to owning all the necessary hardware and software, private clouds are generally left to the large enterprise.

Hybrid Cloud
For many small to mid-sized businesses, a hybrid of the public and private cloud may be the right solution. You can partner with a cloud hosting provider to supply the computing infrastructure required, but your applications and data may be hosted on a private server which is not shared with other organizations. This provides much better control over the system, and security for your data.

When it comes to your accounting system and the sensitive information it contains, the security of either owning the system, or at least having it on a private server is an important consideration. Intersoft Systems recommends hosted Terminal Server solutions for the INTERAC accounting suite. Utilizing a hosted Terminal Server allows you to shift the burden of server maintenance to your hosting partner. It should also allow you to quickly and easily scale up or down to meet any new system requirements, an option that isn’t so simple when you own all the hardware.



Additional Resources
  • Virtual Terminal Server – Infinitely Virtual
  • Advantages of a Terminal Server
  • “The pros and cons of public, private and hybrid clouds” – by Stephanie Walden

0 Comments

Collaboration in the Cloud

8/28/2014

0 Comments

 
Collaboration & Document Sharing (Part 2)  
Collaboration
Commenting & Project Management
In addition to simple file sharing and online backup, some of these applications also provide a means of commenting and version control for the files they contain. It goes beyond simply emailing links to files instead of sending actual copies of the files back and forth. Taking advantage of the automatic synchronization makes it possible for a group of people to have the latest updates to a file within seconds of the changes being saved. Some of these applications will even keep track of the revisions, keeping a backup as each new version is updated.

Collaboration 101
Suppose you are working with a team to develop a presentation for your customers. You are responsible for writing and formatting the presentation, but you need to gather content from other team members, and then everyone needs to participate in the review process.
  • Create a project folder in your chosen file sharing application.
  • Invite the appropriate team members to share that folder, allowing all of you to have access to the folder’s contents.
  • Add your shared files to this folder. 
    - You may want to solicit input using a questionnaire that each person can complete and save in the folder. 
    - Saving your presentation drafts to the shared folder will also allow team members to review and comment on it as the review process gets underway.
    - It may be helpful to keep a separate schedule and project journal in this folder as well.

If you don’t go any farther than this with collaboration, it can still be much faster and easier than trying to email files around to the team and then try to sort out the various versions as each of them submits their updates. Just keeping track of all the updates and versions in email history is nearly impossible.

This can be even more important when the team is scattered in different locations, or when you aren’t all with the same organization. Think about the advantages when you need to share information with someone who doesn’t or shouldn’t have access to your local computer or network. 

Collaboration 201
Wouldn’t it be nice to use this same collaboration idea to share comments, assign and monitor tasks. While this is beyond the capabilities of some of the entry level file sharing applications, other solutions like Box are more comprehensive. Even the basic (free) Box account provides the option to add notes and assign tasks, allowing the team to keep all their interaction in one place where the entire team can see it.
  • Adding comments to files makes it easy to get feedback from the entire team. It works just like social media, so there is a complete history of all the posted comments attached to the file.
  • Assigning tasks with due dates can help to keep a project on track. Instead of simply making a note for an action item on a file, you can assign it to team members as a task, generating an email alert to the assignees.

Having used these tools to manage team projects where we needed to share comments and review documents, it is really nice to have everything in one place for the whole team. All the notes and comments are right there with the shared files. Everyone can see all the history and share their input.

If you haven’t already, I would encourage you to pick one of the basic options and give it a test drive. Everything described so far is available at no cost, so there is no reason not to see what it can do for you and your team.


Learn More:
Box
Dropbox
Google Drive
Microsoft OneDrive


0 Comments

To Share or Not To Share

8/21/2014

0 Comments

 
Collaboration & Document Sharing (Part 1)  
Sharing
Collaboration has become a common buzzword, but what does it mean? There are lots of new software applications claiming to be collaboration and file sharing tools, but in the real world, what do they do for us?
  • Store all kinds of files. (documents, pictures, presentations, videos, etc.)
  • Provide automated online backup.
  • Enable sharing using links to the files instead of emailing copies of the files.
  • Enable reviewing, commenting and task assignment.
There are a variety of choices like Google Drive, Microsoft’s One Drive, Dropbox, and Box to name just a few that I use. When it comes to archiving and sharing information, these new tools can be very helpful. All of these that I named offer a free starter account, with optional upgrades to paid versions with more features and storage capacity.

What are they and how do they work?
Web-based file storage and retrieval
All of these options provide a web-based portal where you can store the files you upload. Simply create an account to use their web-based portal and tools.

PC based synchronization utility to automate the upload/download process
They also provide a downloadable synchronization utility which will automatically upload any files that you save in the synchronized folder on your local PC. To make it more powerful, download their utility and create a local folder on your PC which will automatically synchronize with your online portal account. This is an easy way to make your files readily accessible when you are away from your PC.

Tablet and smart phone apps
In addition to working with your PC, they also provide apps for tablets and smart phones, enabling them to also access and share the files synchronized to the online portal. Not only can you access your files from a tablet or smart phone, when you share files with others, they can also use any device to preview and download the files you have shared.

Sharing files
Instead of emailing copies of files, which consumes extra drive space for each copy you send, you can share link to the uploaded document. The recipient has the option to view it online, or download it to their local PC, tablet or smart phone. In addition to sending individual file links, these sharing options also enable you to share entire folders of files, so you can easily share a whole collection of resources that would otherwise be too large to email. Let your imagination run wild for a bit and think of all the ways you could use this type of resource, both internally and with those outside your company.

Examples:
INTERAC Software Updates – As a software provider, Intersoft Systems routinely provides updates to our applications. In the past this was done by producing and shipping CD’s (or in earlier years, floppy disks) to each user. Now we are able to offer these updates with a simple Dropbox download. Each user receives an email with a link to the downloadable update files. It eliminates the time and expense associated with producing and shipping CD’s and with an automated email blast, the distribution takes minutes instead of hours. Delivery to our users is almost immediate, and the download only takes a couple of minutes.

Sales & Marketing Files – I keep all of my customer correspondence, quotes, contracts, and pricing information in OneDrive. I save these files to the OneDrive folder on my PC as they are created, and they are automatically synchronized to my OneDrive portal. This makes all that information readily available when I am out of the office. I can access it from any web-connected PC, my table, or my iPhone. It also provides an automatic backup of all my files, should something happen to my PC. Now I can share links to these documents instead of attaching them to emails, making the email smaller and avoiding any issues with blocked attachments.

In upcoming segments, I will explore some of the reviewing, commenting, and version control options.

Other Resources:
Box
Dropbox
Google Drive
Microsoft OneDrive


0 Comments

Security in a Cloud World

5/30/2014

0 Comments

 
multi-factor authentication
Multi-factor Authentication
As Microsoft and other software developers continue to develop and promote their product lines for cloud environments, those of us who depend on their applications for our businesses will be forced to deal with the “as a Service” model. Keeping our data secure is one of the critical concerns. The following article provides food for thought on multifactor authentication.    read the full article

0 Comments

Is There a Cloud in Your Forecast?

3/5/2014

0 Comments

 
Is there a could in your forecast
Considering Hosted Server and SaaS options

As the concept of cloud computing becomes more popular and accepted, is it right for your organization? As with most things, there are pros and cons. Here are some things to consider:

What does it cost?
While the traditional model has been to purchase the hardware you need to support the applications and users required to manage your business, the advent of hosted computers has opened up new alternatives. When comparing the overall costs of maintaining owned servers with hosted servers, there are a variety of factors to consider:


  • Server Hardware – What does it cost to purchase the hardware vs the cost of providing that same computing power in a hosted server? If you amortize the cost of the server hardware you need to support your requirements over the average 5 year life of a server, how does that compare with the cost of a hosted server over the same time? 
  • Server Support & Maintenance - What does it cost to maintain the hardware? Whether you have an IT department on staff, or these services are outsourced, there is a cost associated with maintaining these systems. Typically, the hosting provider takes responsibility for routine operating system updates and any hardware failures as part of their ongoing support. You need to account for the maintenance costs along with the hardware costs.
  • Application Software – Software providers are also offering the option of “renting” the software. Instead of purchasing the software outright, you may consider the Software as a Service (SaaS) model. This option allows the up-front cost of the software to be deferred to a monthly or annual installment plan. While the up-front costs are typically lower, you are likely to find that, over time, it would be less costly to purchase the software and only pay for the renewals and upgrades.

Will it enhance employee productivity?
There are several potential time saving advantages to utilizing a hosted application server or SaaS solution.


  • The primary advantage of a hosted application server is in the maintenance of the hardware and all the routine operating system updates. To keep a system current and functioning efficiently requires routine maintenance. This service is typically provided by the hosting provider as part of their hosting service. This eliminates the hours spent by your staff on these updates, allowing them to focus on other priorities. 
  • Hosting service providers also take responsibility for the necessary hardware upgrades, so you won’t need to worry about purchasing new hardware or managing the hardware upgrades as new technology emerges. For those who don’t have an in-house IT department, this  can be significant. Most hosting vendors offer 24x7x365 support, so you can always reach someone when you need help.
  • Keeping your key software applications updated can also be streamlined by having it on a dedicated server platform. By hosting your applications on a shared server, instead of loading and then maintaining software on a variety of individual PCs, only one installation needs to be maintained. This can be a real time saver and it avoids the disruptions required to maintain the individual PCs. 
  • Taking it a step further, the advantage of a SaaS option would shift most of the responsibility for these routine updates to the software vendor, further simplifying the whole system.
  • Remote Access is another important benefit. Not only will staff be able to access their applications from the office, but field workers or remote staff can also utilize the system anywhere they have a suitable internet connection. With the appropriate security credentials, users are able to log into the hosted server and run their applications, wherever they are. This option can be a significant step to enabling a more flexible workflow for your entire team.

What potential problems should you guard against?
While there are lots of advantages to “cloud computing”, it is not the right fit for every situation. There are some things to watch out for as you consider your options.


  • It is dependent on a reliable internet connection, so if you happen to be in an area where internet service is not available or reliable, a hosted solution is not a good idea. For most applications, the internet speed is not a major factor, but users must be able to connect and stay connected while they are accessing the hosted system.
  • Data security is always a concern. Be sure that your hosting provider utilizes the appropriate security measures to protect you from hackers. Any reputable hosting supplier will be able to demonstrate their security protocols.
  • Data backup is also a critical consideration. Again, reputable hosting providers will also offer disaster recovery backup services as part of their hosting plans. This may be sufficient for some users, but you should also consider keeping a local copy of your critical data. There are lots of ways this can be done, but, depending on the volume of data, there may be additional charges associated with the data transfer.

While this is by no means a comprehensive guide, it should serve to get you thinking about some of the key considerations. Cloud computing isn’t right for every situation, but for most, it is certainly worthy of a close look. There has to be something to it when so many the most successful businesses are promoting and using this technology, but is it right for your organization?

Following are some additional resources:

     Cloud Computing Defined (Wikipedia)
     What is Cloud Computing? (Google Developers)
     10 reasons why Windows Terminal Services is becoming more popular (Tech Republic)

0 Comments

Advantages of a Terminal Server 

1/13/2014

0 Comments

 
When implementing the INTERAC Accounting System, particularly in a multi-user setting, the advantages of a Terminal Server (Remote Desktop Services) will become readily apparent.

Ease of Access
It is the same Windows desktop interface you are used to using, but because the applications run on the server, it can be accessed using a variety of network devices including a traditional PC, tablet, or thin-client. Not only can your office staff benefit, field personnel and remote staff can easily log in and run their business applications on demand. It is easy to create an icon on your desktop to access or log into the Terminal Server. When logged in, each user gets their own customizable server desktop with their applications and user configuration settings. It is even possible to utilize their own local printers and scanners.

For organizations with multiple locations, this is an easy way to provide access to the INTERAC suite of applications. It can be done with a simple internet connection, or through more secure virtual private network connections. Either way, the data never leaves the server. Only the keystrokes and display information are being transmitted between the server and end user.

It is equally easy for mobile/field users to log into the server and run their applications. The only requirement is an internet connection.

Data Security
Having individual silos of data on each PC can create all kinds of issues with keeping data secure, backed up, and in sync. Because hard drives are one of the most frequent failures on a PC, it is much better to have your files on a server with more robust storage and backup options.

Simply moving data to a file server is better than on the PC because servers typically have higher grade disk drives. Servers also utilize RAID drive configurations to further protect data from drive failures. It is also much easier to run automated backup software on a server, assuring that there are consistent backups done for disaster recovery.

With the Terminal Server you bring the data storage under the control of the server. This allows for much better data security and makes it much easier to assure that important data is properly backed up. This is particularly important with sensitive accounting data. Utilizing proper security protocols, you are able to prevent unauthorized access to your data. In addition to the Windows server security options, INTERAC security controls what portions of the INTERAC suite each user has access to. Because these security settings are centralized to the server, it is very easy to maintain and update security settings when necessary.

System Performance
While it is certainly feasible to utilize a file server for data storage, it can consume significant network resources when opening and saving files. This is likely to create performance issues that can easily be avoided by utilizing a Terminal Server. A file server configuration may be acceptable for small work groups, but we recommend a Terminal Server for workgroups of five or more users.

System Maintenance and Software Updates
Instead of installing the software on each individual PC, there is one master installation on the server, which is shared by all the users. You only have to install and configure the software one time, on one machine. This also means that when updates come, only one installation needs to be updated, making ongoing updates much easier to manage. Running the update on the server takes care of all the users at one time. That is much easier than trying to manage separate installations for an entire workgroup.

Instead of routinely upgrading a whole group of personal computers, you can focus the resources on a single server solution which will better utilize the processing power. With the important business applications hosted on the server, the requirements for the user PC or thin-client are minimal, allowing you to extend the useful life of existing computers. Having the key applications hosted on the server also give you the option of using low cost thin client terminals instead of personal computers.

Remote Desktop (Terminal Server) Technology is built in
The Microsoft Windows Server 2003/2008/2012 operating systems include these capabilities. It is simply a matter of enabling these features and providing the user licenses. Likewise, the desktop operating systems are also capable of running the Remote Desktop client software to connect to the server.

Here are some other resources that might be of interest:

10 reasons why Windows Terminal Services is becoming more popular 
Wikipedia - Remote Desktop Services  
Microsoft TechNet - How Terminal Services Works
Microsoft TechNet – Remote Desktop Services Overview


0 Comments

    Categories

    All
    Accounts Payable
    Check Writing
    Cloud Computing
    Construction
    Data Storage & Backup
    Document Management
    EPayCard
    Equipment Cost
    General
    Hardware Solutions
    Job Cost
    Payroll
    Positive Pay
    Reporting
    Scanner
    Tax Forms & Filing

    Archives

    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014
    March 2014
    February 2014
    January 2014

    View my profile on LinkedIn

    RSS Feed

Intersoft Systems, Inc. 
PO Box 1050, Beaverton, OR 97075
(800) 547-6429  |  sales@intersoftsystems.com
Sitemap
  • Products
    • INTERAC for Construction
    • INTERAC for General Business
    • INTERAC for Franchises
    • INTERAC for Public Accounting
    • INTERAC Payroll Solutions
  • Services & Support
    • Support Request Form
    • Implementation
  • News & Articles
    • Case Studies
    • Slide Share Articles
  • Contact Us
  • RequestFollowUp