{"global":{"lastError":{},"locale":"de","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"},{"id":"ru","name":"Русский"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"implementations":{"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"more":{"ru":"Узнать больше","_type":"localeString","en":"Learn more"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"en":"From Z to A","ru":"от Я до А","_type":"localeString"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"_type":"localeString","en":"Rating descending","ru":"По убыванию рейтинга"},"sort-discount-asc":{"_type":"localeString","en":"Rebate ascending","ru":"По возрастанию скидки"},"sort-discount-desc":{"_type":"localeString","en":"Rebate descending","ru":"По убыванию скидки"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"supplier":{"en":"Supplier","ru":"Поставщик","_type":"localeString"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"product":{"ru":"Продукт","_type":"localeString","en":"Product"},"no-results":{"ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString","en":"No results found. We didn't find any results with the filter you selected."},"with-reference":{"ru":"С референсом","_type":"localeString","en":"With reference"},"items-found":{"ru":"Внедрений найдено","_type":"localeString","en":"Deployments found"},"canceled":{"_type":"localeString","en":"Canceled","ru":"Отменено"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"en":"Deal in progress","ru":"Сделка в процессе","_type":"localeString"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"_type":"localeString","en":"In Process","ru":"Ведется"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"_type":"localeString","en":"Proof of concept","ru":"Пилотный проект"},"stopped":{"en":"Stopped","ru":"Остановлено","_type":"localeString"},"date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"roi":{"_type":"localeString","en":"ROI","ru":"ROI"},"implementations-fetching-error":{"en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"_type":"localeString","en":"Requests","de":"References","ru":"Мои запросы"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"catalogs":{"_type":"localeString","en":"Catalogs","ru":"Каталоги"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"en":"My profile","ru":"Мои данные","_type":"localeString"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"en":"Roi4Webinar","_type":"localeString"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"_type":"localeString","en":"4 vendors","ru":"поставщикам"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"_type":"localeString","en":"Leave comment","ru":"Оставить комментарий"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"_type":"localeString","en":"Company name","ru":"Компания"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"_type":"localeString","en":"Received ROI","ru":"Полученный ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}},"filters":{"from":{"ru":"от","_type":"localeString","en":"from"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"_type":"localeString","en":"Filter by price","ru":"Фильтр по цене"},"view-type-label":{"_type":"localeString","en":"View","ru":"Вид"},"sort-type-label":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"category":{"_type":"localeString","en":"Category","ru":"Категория"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"_type":"localeString","en":"Add Product","ru":"Добавить продукт"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"filter-toggle":{"en":"Filter","ru":"Фильтр","_type":"localeString"},"clear-button":{"ru":"Очистить","_type":"localeString","en":"Сlear"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"en":"Providers","ru":"Поставщик, производитель","_type":"localeString"},"business-tasks-field":{"_type":"localeString","en":"Business tasks","ru":"Бизнес задачи"},"problems-field":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"with-discounts-checkbox":{"_type":"localeString","en":"With discounts","ru":"Со скидками"},"expert-price-checkbox":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"roi-calculator-checkbox":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"apply-filter-button":{"en":"Apply filter","ru":"Применить фильтр","_type":"localeString"},"sorting-toggle":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"ru":"С внедрениями","_type":"localeString","en":"With deployments"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"en":"Product Categories","ru":"Категории продуктов","_type":"localeString"},"countries":{"ru":"Страны","_type":"localeString","en":"Countries"},"seller":{"ru":"Продавец","_type":"localeString","en":"Seller"},"vendors":{"_type":"localeString","en":"User products vendors","ru":"Производители продуктов пользователя"},"suppliers":{"ru":"Поставщики пользователя","_type":"localeString","en":"User suppliers"},"business-process":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"business-objectives":{"_type":"localeString","en":"Business tasks","ru":"Бизнес задачи"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"ru":"Пользователи","_type":"localeString","en":"Users"},"status":{"en":"Status","ru":"Статус","_type":"localeString"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"ru":"С референсами","_type":"localeString","en":"With reference"},"show-deal-checkbox":{"en":"Show deal with noname","ru":"Показывать сделки с noname","_type":"localeString"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"_type":"localeString","en":"Date","ru":"Дата"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"_type":"localeString","en":"Company size","ru":"Размер компании"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"_type":"localeString","en":"Add deployment","ru":"Добавить внедрение"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"sort-title-desc":{"en":"From Z to A","ru":"От Я до А","_type":"localeString"},"sellers-field":{"ru":"Поставщики, Производители","_type":"localeString","en":"Sellers"},"supply-types":{"_type":"localeString","en":"Supply type","ru":"Тип поставки"},"with-comments-checkbox":{"_type":"localeString","en":"With comments","ru":"С комментариями"},"supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"vendor":{"en":"Vendor","ru":"Производитель","_type":"localeString"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"_type":"localeString","en":"Company type","ru":"Тип компании"},"partners-field":{"en":"Partners","ru":" Партнеры","_type":"localeString"},"customers":{"ru":"Покупатели","_type":"localeString","en":"Customers"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"_type":"localeString","en":"Deal is planned","ru":"Сделка планируется"},"finished":{"_type":"localeString","en":"Finished","ru":"Завершено"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"_type":"localeString","en":"Planned","ru":"Планируется"},"proof-of-concept":{"_type":"localeString","en":"Proof of concept","ru":"Пилотный проект"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"competencies":{"_type":"localeString","en":"Competencies","ru":"Компетенции"}}},"translationsStatus":{"implementations":"success","filters":"success"},"sections":{"implementations-text-block":{"label":"catalog-implementations-text-block","body":{"en":[{"_key":"0e40f9075bd0","markDefs":[],"children":[{"marks":[],"text":"The ROI4CIO Deployment Catalog is a database of software, hardware, and IT service implementations. Find implementations by vendor, supplier, user, business tasks, problems, status, filter by the presence of ROI and reference.","_key":"0e40f9075bd00","_type":"span"}],"_type":"block","style":"normal"}],"ru":[{"_type":"block","style":"normal","_key":"1435aa042111","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Каталог внедрений ROI4CIO - это база данных о внедрениях программного обеспечения, оборудования и ИТ-услуг. Находите внедрения по вендору, поставщику, пользователю, бизнес-задачам, проблемам, статусу, фильтруйте по наличию ROI и референса.","_key":"1435aa0421110"}]}],"_type":"localeBlock"}}},"sectionsStatus":{"implementations-text-block":"success"},"pageMetaData":{"implementations":{"title":{"ru":"ROI4CIO: Внедрения","_type":"localeString","en":"ROI4CIO: Implementations"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"}},{"name":"og:description","translations":{"en":"Implementations","ru":"Каталог внедрений различных видов программного обеспечения, ИТ проектов. Результаты внедрений ИТ, результаты, референсы, ROI","_type":"localeString"}},{"name":"title","translations":{"en":"Implementations","ru":"Внедрения","_type":"localeString"}},{"name":"description","translations":{"ru":"Описание внедрений","_type":"localeString","en":"Implementations description"}},{"translations":{"ru":"Внедрения ключевые слова","_type":"localeString","en":"Implementations keywords"},"name":"keywords"}]}},"pageMetaDataStatus":{"implementations":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{"acs-access-control-and-management-system-for-the-kharkiv-regional-state-administration":{"id":1006,"title":"ACS (access control and management system) for the Kharkiv Regional State Administration","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"acs-access-control-and-management-system-for-the-kharkiv-regional-state-administration","roi":0,"seo":{"title":"ACS (access control and management system) for the Kharkiv Regional State Administration","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"ACS (access control and management system) for the Kharkiv Regional State Administration","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":7570,"title":"KHARKIV REGIONAL STATE ADMINISTRATION","logoURL":"https://roi4cio.com/uploads/roi/company/KHOGA.png","alias":"kharkovskaja-oblastnaja-gosudarstvennaja-administracija","address":"","roles":[],"description":" Kharkiv Regional State Administration, HOGA (Ukrainian: Kharkov Oblast State Administration, HODA) is an executive authority in the Kharkov region of Ukraine.\r\nThe head of the regional state administration is appointed by the President of Ukraine.<br />\r\nLocal government in the field of existence of the Kharkiv Regional Council.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":3,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://kharkivoda.gov.ua/ru","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KHARKIV REGIONAL STATE ADMINISTRATION","keywords":"","description":" Kharkiv Regional State Administration, HOGA (Ukrainian: Kharkov Oblast State Administration, HODA) is an executive authority in the Kharkov region of Ukraine.\r\nThe head of the regional state administration is appointed by the President of Ukraine.<br />\r\nLoca","og:title":"KHARKIV REGIONAL STATE ADMINISTRATION","og:description":" Kharkiv Regional State Administration, HOGA (Ukrainian: Kharkov Oblast State Administration, HODA) is an executive authority in the Kharkov region of Ukraine.\r\nThe head of the regional state administration is appointed by the President of Ukraine.<br />\r\nLoca","og:image":"https://roi4cio.com/uploads/roi/company/KHOGA.png"},"eventUrl":""},"supplier":{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""},"vendors":[{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""}],"products":[{"id":5070,"logo":false,"scheme":false,"title":"СКУД (система контроля и управления доступом) by SOLTI","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"alias":"skud-sistema-kontrolja-i-upravlenija-dostupom-by-solti","companyTypes":[],"description":" СКУД (англ. PACS) — система контроля и управления доступом. Является незаменимым элементом комплексной системы безопасности компании и взаимодействует с видеонаблюдением и охранной сигнализацией. Представляет собой набор механизмов и программного-аппаратных средств безопасности, предназначенных для ограничения и мониторинга перемещений в пределах конкретного здания и прилегающей к нему территории.<br /><br />НАДЕЖНЫЕ PACS ДЛЯ ВАШЕГО БИЗНЕСА ПОД КЛЮЧ\r\nКомпания SOLTI предоставляет полный спектр услуг по проектированию, монтажу, настройке, сервисному обслуживанию, ремонту и модернизации систем контроля и управления доступом. Вы владеете гостиницей, рестораном, большим загородным домом или управляете банком, IT-компанией, производственным предприятием? В наше время эта технология может быть полезна в любой сфере.<br />\r\nSOLTI охотно сотрудничает не только с коммерческими организациями (устанавливая, к примеру, систему контроля доступа на предприятии), но и с государственными заказчиками. В 2017 году SOLTI успешно разработала и реализовала проект создания интегрированной системы видеонаблюдения и СКУД в Харьковской ОГА.<br /><br />КАКИЕ ЗАДАЧИ РЕШАЕТ СКУД<br />\r\nОсновные функции подобных комплексов:<br />\r\n\r\n<ul><li>Управление доступом. Оператор системы ограничения доступа устанавливает для кого, когда и в какие конкретно помещения разрешен вход.</li></ul>\r\n<ul><li>Идентификация посетителей. PACS определит личность пришедшего и зафиксирует его передвижения внутри контролируемой зоны.</li></ul>\r\n<ul><li>Учет рабочего времени. Возможно знать, кто из сотрудников предприятия опоздал утром на работу или устроил себе слишком длинный перерыв. Такая система учёта рабочего времени позволяет усилить дисциплину.</li></ul>\r\n<ul><li>Расчет заработной платы. Если размер ежемесячной оплаты труда для персонала вычисляется на основе почасовой ставки, бухгалтер сможет быстро получать точные данные по этому вопросу.</li></ul>\r\n<ul><li>Сбор статистики, касающейся перемещений клиентов и работников компании.</li></ul>\r\n<ul><li>Интеграция с системами безопасности. Работа СКУД координируется с комплексами средств видеонаблюдения, а также с охранными сигнализациями и системой пожаротушения.</li></ul>\r\nНа некоторых объектах, для обеспечения дополнительной безопасности, система контроля и управления доступом (в т.ч. система управления доступом к данным) организуется изолированно от остальных информационных сетей.","shortDescription":"Построение и сервисное обслуживание эффективной СКУД на ваших объектах специалистами SOLTI","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"СКУД (система контроля и управления доступом) by SOLTI","keywords":"","description":" СКУД (англ. PACS) — система контроля и управления доступом. Является незаменимым элементом комплексной системы безопасности компании и взаимодействует с видеонаблюдением и охранной сигнализацией. Представляет собой набор механизмов и программного-аппаратных с","og:title":"СКУД (система контроля и управления доступом) by SOLTI","og:description":" СКУД (англ. PACS) — система контроля и управления доступом. Является незаменимым элементом комплексной системы безопасности компании и взаимодействует с видеонаблюдением и охранной сигнализацией. Представляет собой набор механизмов и программного-аппаратных с"},"eventUrl":"","translationId":7091,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":47,"title":"Access Control Systems","alias":"access-control-systems","description":"Access control is a security technique that regulates who or what can view or use resources in a computing environment. It is a fundamental concept in security that minimizes risk to the business or organization.\r\nThere are two types of access control: physical and logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access control limits connections to computer networks, system files and data.\r\nTo secure a facility, organizations use electronic access control systems that rely on user credentials, access card readers, auditing and reports to track employee access to restricted business locations and proprietary areas, such as data centers. Some of these systems incorporate access control panels to restrict entry to rooms and buildings as well as alarms and lockdown capabilities to prevent unauthorized access or operations.\r\nAccess control systems perform identification authentication and authorization of users and entities by evaluating required login credentials that can include passwords, personal identification numbers (PINs), biometric scans, security tokens or other authentication factors. Multifactor authentication, which requires two or more authentication factors, is often an important part of layered defense to protect access control systems.\r\nThese security controls work by identifying an individual or entity, verifying that the person or application is who or what it claims to be, and authorizing the access level and set of actions associated with the username or IP address. Directory services and protocols, including the Local Directory Access Protocol (LDAP) and the Security Assertion Markup Language (SAML), provide access controls for authenticating and authorizing users and entities and enabling them to connect to computer resources, such as distributed applications and web servers.\r\nOrganizations use different access control models depending on their compliance requirements and the security levels of information technology they are trying to protect.\r\nThe goal of access control is to minimize the risk of unauthorized access to physical and logical systems. Access control is a fundamental component of security compliance programs that ensures security technology and access control policies are in place to protect confidential information, such as customer data. Most organizations have infrastructure and procedures that limit access to networks, computer systems, applications, files and sensitive data, such as personally identifiable information and intellectual property.\r\nAccess control systems are complex and can be challenging to manage in dynamic IT environments that involve on-premises systems and cloud services. After some high-profile breaches, technology vendors have shifted away from single sign-on systems to unified access management, which offers access controls for on-premises and cloud environments.\r\nAccess control is a process that is integrated into an organization's IT environment. It can involve identity and access management systems. These systems provide access control software, a user database, and management tools for access control policies, auditing and enforcement.\r\nWhen a user is added to an access management system, system administrators use an automated provisioning system to set up permissions based on access control frameworks, job responsibilities and workflows.\r\nThe best practice of "least privilege" restricts access to only resources that an employee requires to perform their immediate job functions.\r\nA common security issue is failure to revoke credentials and access to systems and data when an individual moves into a different job internally or leaves the company.","materialsDescription":"<span style=\"font-weight: bold;\">What is an ACS?</span>\r\nInterpretation of the abbreviation "ACS" - access control system. Includes hardware and software.\r\n<span style=\"font-weight: bold;\">How does ACS work?</span>\r\nThe system allows only people and cars that it “recognizes” into the territory to be able to identify.\r\nFor access we use contact and contactless keys, cards, fingerprints, secret code. Doorphones unlock the locks manually - when you click the "Open" button.\r\nThe intellectual access control system generates daily reports for each employee. Upon arrival at work, the staff opens the door with personal cards or puts the cards to the reader at the reception. We fix the time of breaks and the end of the working day.\r\n<span style=\"font-weight: bold;\">What are the types of access control?</span>\r\nAccess control systems are divided into autonomous and networked:\r\n<span style=\"font-style: italic;\">Autonomous access control systems</span> are not connected to the computer. Suitable for small offices, cafes, shops, hotels. Autonomous systems are used on sites with 1–2 inputs.\r\n<span style=\"font-style: italic;\">Network access control systems</span> are connected to a computer. Such systems serve complex objects: business centers, manufacturing, research institutes, hospitals, etc.\r\n<span style=\"font-weight: bold;\">What is the access control system?</span>\r\nMain components:\r\n1. Blocking devices. Electromagnetic and electromechanical locks, barriers, gates, etc.\r\n2. Identifiers:\r\n<ul><li>Touch Memory contact keys - standard intercom keys;</li><li>Touch Memory Access Keys;</li><li>RFID contactless keys;</li><li>Biometric sensor - fingerprint access;</li><li>Keyboard for entering code.</li></ul>\r\n3. Readers. Card readers, scanners, etc.\r\n4. Controllers. Unlock the blocking device automatically or manually. Manual input is used in intercoms.\r\n<span style=\"font-weight: bold;\">Is it possible to combine an access control system with a security alarm?</span>\r\nThe unified access control system + security alarm system responds to an attempt to illegally pass through the access control point: open the door, unlock the turnstile. The alarm signal instantly arrives on the control panel of the security company, mobile phone manager or another responsible person.\r\n<span style=\"font-weight: bold;\">Why combine access control with video surveillance?</span>\r\nWhen integrating with video surveillance, you get video recordings of all passes through access control points. Information from the cameras is transmitted to the monitors of the security in real time - the situation at the facility is easy to control.\r\n<span style=\"font-weight: bold;\">Why do you need ACS maintenance?</span>\r\nMaintenance prolongs the life of the system. The equipment is inspected once a month, if necessary, fix minor problems and replace components. You save on capital repairs at the expense of preventive.<br /> ","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Access_Control_Systems.png"},{"id":729,"title":"IT Project Deployment Services","alias":"it-project-deployment-services","description":" Companies invest in projects for the implementation of IT systems that are consistent with the organization's values, with the goal of realizing a business vision, stable support for operational activities, and gaining competitive advantages. In this regard, technological projects are becoming increasingly large-scale, affecting more departments of the organization, and pose a risk to the company if the operation of information systems is disrupted.\r\nThe introduction of new IT requires the project team to carry out at least two principal stages:\r\n<ul><li>pre-project analysis of the enterprise, when, with the help of specialists in the proposed IP and specialists of the enterprise, compliance and discrepancies between the system and its future use is revealed. As a result of the survey, ways to eliminate inconsistencies are determined based on the initial assessment of the required resources and time. The survey is conducted using questions and answers, to some extent formalized, and special software tools that allow you to describe the processes of the system and the enterprise and compare them visually. No changes take place at the enterprise unless individual employees are distracted from their direct duties, which is both a virtue and a disadvantage of this approach;</li><li>trial implementation carried out on the most characteristic site of work. Based on this test work, a general assessment of future implementation is determined and a fundamental decision is made on the use of IP.</li></ul>\r\nThere is a lot of confusion and substitution of the concept of “project team” with the idea of it as a “group”, “pack”, “family”, etc. There are several understandings that there is a modern “project team/group” and “integrated project team”, however, the fundamental characteristic of the team is that it does not exist outside the project. A team with all its human strengths and weaknesses is a necessary and inseparable element of any project. It is a developing element of the technology of the project and affects the project itself.\r\nThe project itself is not “done” - it is made by people, and where people are affected by the influence of biology, instincts, gender parameters, “conscious” and “unconscious”, etc. If people are in the organizational “system” (family, flock, group, team, etc.), systemic effects arise that should be foreseen in the formation of a set of people due to the competent selection, placement and development of the team in the right direction. This is not just an ordinary organizational question, but a question of the depth of understanding of the essence of the project, its management and the skill of the leader.","materialsDescription":" <span style=\"font-weight: bold;\">What is an IT project?</span>\r\nAn IT project is a project that includes work related to information technology.\r\n<span style=\"font-weight: bold;\">What is information technology?</span>\r\nInformation technology is a technology aimed at the creation, development and support of information systems.\r\n<span style=\"font-weight: bold;\">What are the main ideas underlying the project team model of an IT project?</span>\r\n<ul><li>interdependent and interrelated roles in a small group;</li><li>determination of the role, special mission and area of responsibility for each member of the project team;</li><li>distributed project management and responsibility;</li><li>each is focused on the success of the project and is set to work throughout the project cycle;</li><li>communication between project team members is a key success factor;</li><li>users and training staff are included in the project team;</li><li>parallel engineering - parallel work of all team members on a project.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Deployment_Services.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":10,"title":"Ensure Compliance"},{"id":254,"title":"Centralize management"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":282,"title":"Unauthorized access to corporate IT systems and data"},{"id":350,"title":"No monitoring of corporate IT processes"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":387,"title":"Non-compliant with IT security requirements"},{"id":395,"title":"Decentralization of management"}]}},"categories":[{"id":47,"title":"Access Control Systems","alias":"access-control-systems","description":"Access control is a security technique that regulates who or what can view or use resources in a computing environment. It is a fundamental concept in security that minimizes risk to the business or organization.\r\nThere are two types of access control: physical and logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access control limits connections to computer networks, system files and data.\r\nTo secure a facility, organizations use electronic access control systems that rely on user credentials, access card readers, auditing and reports to track employee access to restricted business locations and proprietary areas, such as data centers. Some of these systems incorporate access control panels to restrict entry to rooms and buildings as well as alarms and lockdown capabilities to prevent unauthorized access or operations.\r\nAccess control systems perform identification authentication and authorization of users and entities by evaluating required login credentials that can include passwords, personal identification numbers (PINs), biometric scans, security tokens or other authentication factors. Multifactor authentication, which requires two or more authentication factors, is often an important part of layered defense to protect access control systems.\r\nThese security controls work by identifying an individual or entity, verifying that the person or application is who or what it claims to be, and authorizing the access level and set of actions associated with the username or IP address. Directory services and protocols, including the Local Directory Access Protocol (LDAP) and the Security Assertion Markup Language (SAML), provide access controls for authenticating and authorizing users and entities and enabling them to connect to computer resources, such as distributed applications and web servers.\r\nOrganizations use different access control models depending on their compliance requirements and the security levels of information technology they are trying to protect.\r\nThe goal of access control is to minimize the risk of unauthorized access to physical and logical systems. Access control is a fundamental component of security compliance programs that ensures security technology and access control policies are in place to protect confidential information, such as customer data. Most organizations have infrastructure and procedures that limit access to networks, computer systems, applications, files and sensitive data, such as personally identifiable information and intellectual property.\r\nAccess control systems are complex and can be challenging to manage in dynamic IT environments that involve on-premises systems and cloud services. After some high-profile breaches, technology vendors have shifted away from single sign-on systems to unified access management, which offers access controls for on-premises and cloud environments.\r\nAccess control is a process that is integrated into an organization's IT environment. It can involve identity and access management systems. These systems provide access control software, a user database, and management tools for access control policies, auditing and enforcement.\r\nWhen a user is added to an access management system, system administrators use an automated provisioning system to set up permissions based on access control frameworks, job responsibilities and workflows.\r\nThe best practice of "least privilege" restricts access to only resources that an employee requires to perform their immediate job functions.\r\nA common security issue is failure to revoke credentials and access to systems and data when an individual moves into a different job internally or leaves the company.","materialsDescription":"<span style=\"font-weight: bold;\">What is an ACS?</span>\r\nInterpretation of the abbreviation "ACS" - access control system. Includes hardware and software.\r\n<span style=\"font-weight: bold;\">How does ACS work?</span>\r\nThe system allows only people and cars that it “recognizes” into the territory to be able to identify.\r\nFor access we use contact and contactless keys, cards, fingerprints, secret code. Doorphones unlock the locks manually - when you click the "Open" button.\r\nThe intellectual access control system generates daily reports for each employee. Upon arrival at work, the staff opens the door with personal cards or puts the cards to the reader at the reception. We fix the time of breaks and the end of the working day.\r\n<span style=\"font-weight: bold;\">What are the types of access control?</span>\r\nAccess control systems are divided into autonomous and networked:\r\n<span style=\"font-style: italic;\">Autonomous access control systems</span> are not connected to the computer. Suitable for small offices, cafes, shops, hotels. Autonomous systems are used on sites with 1–2 inputs.\r\n<span style=\"font-style: italic;\">Network access control systems</span> are connected to a computer. Such systems serve complex objects: business centers, manufacturing, research institutes, hospitals, etc.\r\n<span style=\"font-weight: bold;\">What is the access control system?</span>\r\nMain components:\r\n1. Blocking devices. Electromagnetic and electromechanical locks, barriers, gates, etc.\r\n2. Identifiers:\r\n<ul><li>Touch Memory contact keys - standard intercom keys;</li><li>Touch Memory Access Keys;</li><li>RFID contactless keys;</li><li>Biometric sensor - fingerprint access;</li><li>Keyboard for entering code.</li></ul>\r\n3. Readers. Card readers, scanners, etc.\r\n4. Controllers. Unlock the blocking device automatically or manually. Manual input is used in intercoms.\r\n<span style=\"font-weight: bold;\">Is it possible to combine an access control system with a security alarm?</span>\r\nThe unified access control system + security alarm system responds to an attempt to illegally pass through the access control point: open the door, unlock the turnstile. The alarm signal instantly arrives on the control panel of the security company, mobile phone manager or another responsible person.\r\n<span style=\"font-weight: bold;\">Why combine access control with video surveillance?</span>\r\nWhen integrating with video surveillance, you get video recordings of all passes through access control points. Information from the cameras is transmitted to the monitors of the security in real time - the situation at the facility is easy to control.\r\n<span style=\"font-weight: bold;\">Why do you need ACS maintenance?</span>\r\nMaintenance prolongs the life of the system. The equipment is inspected once a month, if necessary, fix minor problems and replace components. You save on capital repairs at the expense of preventive.<br /> ","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Access_Control_Systems.png"},{"id":729,"title":"IT Project Deployment Services","alias":"it-project-deployment-services","description":" Companies invest in projects for the implementation of IT systems that are consistent with the organization's values, with the goal of realizing a business vision, stable support for operational activities, and gaining competitive advantages. In this regard, technological projects are becoming increasingly large-scale, affecting more departments of the organization, and pose a risk to the company if the operation of information systems is disrupted.\r\nThe introduction of new IT requires the project team to carry out at least two principal stages:\r\n<ul><li>pre-project analysis of the enterprise, when, with the help of specialists in the proposed IP and specialists of the enterprise, compliance and discrepancies between the system and its future use is revealed. As a result of the survey, ways to eliminate inconsistencies are determined based on the initial assessment of the required resources and time. The survey is conducted using questions and answers, to some extent formalized, and special software tools that allow you to describe the processes of the system and the enterprise and compare them visually. No changes take place at the enterprise unless individual employees are distracted from their direct duties, which is both a virtue and a disadvantage of this approach;</li><li>trial implementation carried out on the most characteristic site of work. Based on this test work, a general assessment of future implementation is determined and a fundamental decision is made on the use of IP.</li></ul>\r\nThere is a lot of confusion and substitution of the concept of “project team” with the idea of it as a “group”, “pack”, “family”, etc. There are several understandings that there is a modern “project team/group” and “integrated project team”, however, the fundamental characteristic of the team is that it does not exist outside the project. A team with all its human strengths and weaknesses is a necessary and inseparable element of any project. It is a developing element of the technology of the project and affects the project itself.\r\nThe project itself is not “done” - it is made by people, and where people are affected by the influence of biology, instincts, gender parameters, “conscious” and “unconscious”, etc. If people are in the organizational “system” (family, flock, group, team, etc.), systemic effects arise that should be foreseen in the formation of a set of people due to the competent selection, placement and development of the team in the right direction. This is not just an ordinary organizational question, but a question of the depth of understanding of the essence of the project, its management and the skill of the leader.","materialsDescription":" <span style=\"font-weight: bold;\">What is an IT project?</span>\r\nAn IT project is a project that includes work related to information technology.\r\n<span style=\"font-weight: bold;\">What is information technology?</span>\r\nInformation technology is a technology aimed at the creation, development and support of information systems.\r\n<span style=\"font-weight: bold;\">What are the main ideas underlying the project team model of an IT project?</span>\r\n<ul><li>interdependent and interrelated roles in a small group;</li><li>determination of the role, special mission and area of responsibility for each member of the project team;</li><li>distributed project management and responsibility;</li><li>each is focused on the success of the project and is set to work throughout the project cycle;</li><li>communication between project team members is a key success factor;</li><li>users and training staff are included in the project team;</li><li>parallel engineering - parallel work of all team members on a project.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Deployment_Services.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.solti.ua/sozdaniye-integrirovannoy-sistemy-videonablyudeniya-i-skud-v-kharkovskoy-oblastnoy-gosadministratsii/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"ip-telephony-for-ukrainian-coal-mining-company":{"id":1004,"title":"IP telephony for Ukrainian coal mining company","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"ip-telephony-for-ukrainian-coal-mining-company","roi":0,"seo":{"title":"IP telephony for Ukrainian coal mining company","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"IP telephony for Ukrainian coal mining company","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":7574,"title":"Zasyadko Mine","logoURL":"https://roi4cio.com/uploads/roi/company/SHakhta-im-Zasjadko-239x178.png","alias":"shakhta-imeni-a-f-zasjadko","address":"Donetsk","roles":[],"description":" Zasyadko Mine (Ukrainian: Шахта ім. Засядька, Russian: Шахта им. А. Ф. Засядько) is a coal mining company in Ukraine's eastern city of Donetsk. Following the start of the War in Donbass in 2014 the mine became situated in rebel controlled territory.\r\nThe manager and alleged owner of the company is Yukhym Zvyahilsky, influential businessman and politician within the Party of Regions. Along with its economic, technological and political importance, the company, namely its coal mine, is infamous for being the site of repeated mining accidents with numerous fatalities. The deadliest disaster, the worst in Ukraine’s history, happened on November 18, 2007, killing 101 miners.<br />\r\nSource: https://en.wikipedia.org/wiki/Zasyadko_coal_mine","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Zasyadko Mine","keywords":"","description":" Zasyadko Mine (Ukrainian: Шахта ім. Засядька, Russian: Шахта им. А. Ф. Засядько) is a coal mining company in Ukraine's eastern city of Donetsk. Following the start of the War in Donbass in 2014 the mine became situated in rebel controlled territory.\r\nThe mana","og:title":"Zasyadko Mine","og:description":" Zasyadko Mine (Ukrainian: Шахта ім. Засядька, Russian: Шахта им. А. Ф. Засядько) is a coal mining company in Ukraine's eastern city of Donetsk. Following the start of the War in Donbass in 2014 the mine became situated in rebel controlled territory.\r\nThe mana","og:image":"https://roi4cio.com/uploads/roi/company/SHakhta-im-Zasjadko-239x178.png"},"eventUrl":""},"supplier":{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""},"vendors":[{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""}],"products":[{"id":5068,"logo":false,"scheme":false,"title":"IP-Телефония by SOLTI","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"alias":"ip-telefonija-by-solti","companyTypes":[],"description":" IP-телефония – современное комплексное решение, позволяющее организовать передачу речевых сигналов с помощью сети интернет.\r\nСпециалисты SOLTI выполняют проектирование, внедрение и поддержку решений на базе:\r\n<ul><li>OpenScape — флагманская линейки от компания Unify (Siemens)</li></ul>\r\n<ul><li>3CX VOIP — программная мини АТС , заменяющая традиционную аппаратную АТС</li></ul>\r\n<ul><li>Asterisk — свободное решение с открытым исходным кодом</li></ul>\r\n<br />ПРЕИМУЩЕСТВА IP-ТЕЛЕФОНИИ<br />\r\n\r\n<ul><li>телефонная проводка больше не нужна: используется существующая компьютерная сеть или Wi-Fi сеть организации</li></ul>\r\n<ul><li>снижение затрат на телефонные переговоры: экономия на междугородной и, особенно, международной связи</li></ul>\r\n<ul><li>использование внутренних телефонных номеров независимо от физического места подключения</li></ul>\r\n<ul><li>возможность звонков с компьютера или ноутбука</li></ul>\r\n<ul><li>использование IP-телефонов без привязки к производителю оборудования</li></ul>\r\n<ul><li>цифровые и аналоговые аппараты</li></ul>\r\n<ul><li>повышение мобильности для сотрудников: возможность удаленной работы</li></ul>\r\n<ul><li>упрощение администрирования: веб-интерфейс настройки и возможность управления через интернет</li></ul>\r\n<ul><li>возможно использование любого SIP-телефона (программный или аппаратный)</li></ul>\r\n<br />РЕАЛИЗУЕМЫЕ ФУНКЦИИ\r\n<ul><li>маршрутизация звонков по SIP протоколу</li></ul>\r\n<ul><li>парковка и перехват вызова</li></ul>\r\n<ul><li>создание телефонной конференции</li></ul>\r\n<ul><li>централизованный телефонный справочник</li></ul>\r\n<ul><li>автосекретарь</li></ul>\r\n<ul><li>информация о статусе абонента</li></ul>\r\n<ul><li>подключение в единую телефонную сеть домашних и мобильных рабочих мест</li></ul>\r\n<ul><li>переадресация звонков на мобильные телефоны</li></ul>\r\n<ul><li>запись разговоров</li></ul>\r\n<ul><li>интеграция с Microsoft Outlook, Microsoft CRM</li></ul>\r\n<ul><li>прием факсов через Fax-server</li></ul>\r\n<ul><li>защита от вторжений и механизмы шифрования передаваемых данных</li></ul>","shortDescription":"Предлагаемые решения IP-телефонии от SOLTI надежны, отличаются безопасностью и хорошей защитой от прослушивания.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IP-Телефония by SOLTI","keywords":"","description":" IP-телефония – современное комплексное решение, позволяющее организовать передачу речевых сигналов с помощью сети интернет.\r\nСпециалисты SOLTI выполняют проектирование, внедрение и поддержку решений на базе:\r\n<ul><li>OpenScape — флагманская линейки от компани","og:title":"IP-Телефония by SOLTI","og:description":" IP-телефония – современное комплексное решение, позволяющее организовать передачу речевых сигналов с помощью сети интернет.\r\nСпециалисты SOLTI выполняют проектирование, внедрение и поддержку решений на базе:\r\n<ul><li>OpenScape — флагманская линейки от компани"},"eventUrl":"","translationId":7089,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"},{"id":729,"title":"IT Project Deployment Services","alias":"it-project-deployment-services","description":" Companies invest in projects for the implementation of IT systems that are consistent with the organization's values, with the goal of realizing a business vision, stable support for operational activities, and gaining competitive advantages. In this regard, technological projects are becoming increasingly large-scale, affecting more departments of the organization, and pose a risk to the company if the operation of information systems is disrupted.\r\nThe introduction of new IT requires the project team to carry out at least two principal stages:\r\n<ul><li>pre-project analysis of the enterprise, when, with the help of specialists in the proposed IP and specialists of the enterprise, compliance and discrepancies between the system and its future use is revealed. As a result of the survey, ways to eliminate inconsistencies are determined based on the initial assessment of the required resources and time. The survey is conducted using questions and answers, to some extent formalized, and special software tools that allow you to describe the processes of the system and the enterprise and compare them visually. No changes take place at the enterprise unless individual employees are distracted from their direct duties, which is both a virtue and a disadvantage of this approach;</li><li>trial implementation carried out on the most characteristic site of work. Based on this test work, a general assessment of future implementation is determined and a fundamental decision is made on the use of IP.</li></ul>\r\nThere is a lot of confusion and substitution of the concept of “project team” with the idea of it as a “group”, “pack”, “family”, etc. There are several understandings that there is a modern “project team/group” and “integrated project team”, however, the fundamental characteristic of the team is that it does not exist outside the project. A team with all its human strengths and weaknesses is a necessary and inseparable element of any project. It is a developing element of the technology of the project and affects the project itself.\r\nThe project itself is not “done” - it is made by people, and where people are affected by the influence of biology, instincts, gender parameters, “conscious” and “unconscious”, etc. If people are in the organizational “system” (family, flock, group, team, etc.), systemic effects arise that should be foreseen in the formation of a set of people due to the competent selection, placement and development of the team in the right direction. This is not just an ordinary organizational question, but a question of the depth of understanding of the essence of the project, its management and the skill of the leader.","materialsDescription":" <span style=\"font-weight: bold;\">What is an IT project?</span>\r\nAn IT project is a project that includes work related to information technology.\r\n<span style=\"font-weight: bold;\">What is information technology?</span>\r\nInformation technology is a technology aimed at the creation, development and support of information systems.\r\n<span style=\"font-weight: bold;\">What are the main ideas underlying the project team model of an IT project?</span>\r\n<ul><li>interdependent and interrelated roles in a small group;</li><li>determination of the role, special mission and area of responsibility for each member of the project team;</li><li>distributed project management and responsibility;</li><li>each is focused on the success of the project and is set to work throughout the project cycle;</li><li>communication between project team members is a key success factor;</li><li>users and training staff are included in the project team;</li><li>parallel engineering - parallel work of all team members on a project.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Deployment_Services.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":370,"title":"No automated business processes"},{"id":377,"title":"Separate communications channels"},{"id":378,"title":"Low employee productivity"},{"id":398,"title":"Poor communication and coordination among staff"}]}},"categories":[{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"},{"id":729,"title":"IT Project Deployment Services","alias":"it-project-deployment-services","description":" Companies invest in projects for the implementation of IT systems that are consistent with the organization's values, with the goal of realizing a business vision, stable support for operational activities, and gaining competitive advantages. In this regard, technological projects are becoming increasingly large-scale, affecting more departments of the organization, and pose a risk to the company if the operation of information systems is disrupted.\r\nThe introduction of new IT requires the project team to carry out at least two principal stages:\r\n<ul><li>pre-project analysis of the enterprise, when, with the help of specialists in the proposed IP and specialists of the enterprise, compliance and discrepancies between the system and its future use is revealed. As a result of the survey, ways to eliminate inconsistencies are determined based on the initial assessment of the required resources and time. The survey is conducted using questions and answers, to some extent formalized, and special software tools that allow you to describe the processes of the system and the enterprise and compare them visually. No changes take place at the enterprise unless individual employees are distracted from their direct duties, which is both a virtue and a disadvantage of this approach;</li><li>trial implementation carried out on the most characteristic site of work. Based on this test work, a general assessment of future implementation is determined and a fundamental decision is made on the use of IP.</li></ul>\r\nThere is a lot of confusion and substitution of the concept of “project team” with the idea of it as a “group”, “pack”, “family”, etc. There are several understandings that there is a modern “project team/group” and “integrated project team”, however, the fundamental characteristic of the team is that it does not exist outside the project. A team with all its human strengths and weaknesses is a necessary and inseparable element of any project. It is a developing element of the technology of the project and affects the project itself.\r\nThe project itself is not “done” - it is made by people, and where people are affected by the influence of biology, instincts, gender parameters, “conscious” and “unconscious”, etc. If people are in the organizational “system” (family, flock, group, team, etc.), systemic effects arise that should be foreseen in the formation of a set of people due to the competent selection, placement and development of the team in the right direction. This is not just an ordinary organizational question, but a question of the depth of understanding of the essence of the project, its management and the skill of the leader.","materialsDescription":" <span style=\"font-weight: bold;\">What is an IT project?</span>\r\nAn IT project is a project that includes work related to information technology.\r\n<span style=\"font-weight: bold;\">What is information technology?</span>\r\nInformation technology is a technology aimed at the creation, development and support of information systems.\r\n<span style=\"font-weight: bold;\">What are the main ideas underlying the project team model of an IT project?</span>\r\n<ul><li>interdependent and interrelated roles in a small group;</li><li>determination of the role, special mission and area of responsibility for each member of the project team;</li><li>distributed project management and responsibility;</li><li>each is focused on the success of the project and is set to work throughout the project cycle;</li><li>communication between project team members is a key success factor;</li><li>users and training staff are included in the project team;</li><li>parallel engineering - parallel work of all team members on a project.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Deployment_Services.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.solti.ua/postroeniya-sistemy-ip-telefonii-na-shaxte-im-zasyadko/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"microsoft-hyper-v-for-kharkiv-city-council":{"id":1001,"title":"Microsoft Hyper-V for Kharkiv City Council","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"microsoft-hyper-v-for-kharkiv-city-council","roi":0,"seo":{"title":"Microsoft Hyper-V for Kharkiv City Council","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Microsoft Hyper-V for Kharkiv City Council","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":7570,"title":"KHARKIV REGIONAL STATE ADMINISTRATION","logoURL":"https://roi4cio.com/uploads/roi/company/KHOGA.png","alias":"kharkovskaja-oblastnaja-gosudarstvennaja-administracija","address":"","roles":[],"description":" Kharkiv Regional State Administration, HOGA (Ukrainian: Kharkov Oblast State Administration, HODA) is an executive authority in the Kharkov region of Ukraine.\r\nThe head of the regional state administration is appointed by the President of Ukraine.<br />\r\nLocal government in the field of existence of the Kharkiv Regional Council.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":3,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://kharkivoda.gov.ua/ru","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KHARKIV REGIONAL STATE ADMINISTRATION","keywords":"","description":" Kharkiv Regional State Administration, HOGA (Ukrainian: Kharkov Oblast State Administration, HODA) is an executive authority in the Kharkov region of Ukraine.\r\nThe head of the regional state administration is appointed by the President of Ukraine.<br />\r\nLoca","og:title":"KHARKIV REGIONAL STATE ADMINISTRATION","og:description":" Kharkiv Regional State Administration, HOGA (Ukrainian: Kharkov Oblast State Administration, HODA) is an executive authority in the Kharkov region of Ukraine.\r\nThe head of the regional state administration is appointed by the President of Ukraine.<br />\r\nLoca","og:image":"https://roi4cio.com/uploads/roi/company/KHOGA.png"},"eventUrl":""},"supplier":{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""},"vendors":[{"id":163,"title":"Microsoft","logoURL":"https://roi4cio.com/uploads/roi/company/ms_dshchpshch.png","alias":"microsoft","address":"Microsoft","roles":[],"description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface tablet lineup. As of 2011, it was the world's largest software maker by revenue, and one of the world's most valuable companies.","companyTypes":[],"products":{},"vendoredProductsCount":40,"suppliedProductsCount":40,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":66,"vendorPartnersCount":0,"supplierPartnersCount":272,"b4r":0,"categories":{},"companyUrl":"www.microsoft.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Microsoft","keywords":"Microsoft, software, world, products, hardware, Xbox, video, game","description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:title":"Microsoft","og:description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:image":"https://roi4cio.com/uploads/roi/company/ms_dshchpshch.png"},"eventUrl":""}],"products":[{"id":5,"logo":false,"scheme":false,"title":"Microsoft Hyper-V","vendorVerified":0,"rating":"2.40","implementationsCount":12,"suppliersCount":0,"alias":"microsoft-hyper-v","companyTypes":[],"description":"The management tools for the Hyper-V role consist of:\r\nGUI-based management tools: Hyper-V Manager, a Microsoft Management Console (MMC) snap-in, and Virtual Machine Connection, which provides access to the video output of a virtual machine so you can interact with the virtual machine.\r\nHyper-V-specific cmdlets for Windows PowerShell. Windows Server 2012 includes a Hyper-V module, which provides command-line access to all the functionality available in the GUI, as well functionality not available through the GUI. For more information about the Hyper-V module, see Hyper-V Module for Windows PowerShell.\r\nIf you use Server Manager to install the Hyper-V role, the management tools are included unless you specifically exclude them. If you use Windows PowerShell to install the Hyper-V role, the management tools are not included by default. To install the tools, use the parameter –IncludeManagementTools. For instructions about installing the Hyper-V role, see Install Hyper-V and create a virtual machine.\r\n\r\nOverview of Hyper-V\r\nApplies To: Windows Server 2008 R2\r\nHyper-V provides software infrastructure and basic management tools that you can use to create and manage a virtualized server computing environment. This virtualized environment can be used to address a variety of business goals aimed at improving efficiency and reducing costs. For example, a virtualized server environment can help you:\r\nReduce the costs of operating and maintaining physical servers by increasing your hardware utilization. You can reduce the amount of hardware needed to run your server workloads.\r\nIncrease development and test efficiency by reducing the amount of time it takes to set up hardware and software and reproduce test environments.\r\nImprove server availability without using as many physical computers as you would need in a failover configuration that uses only physical computers.\r\nSome ways Hyper-V can help you\r\nHyper-V can help you:\r\nEstablish or expand a private cloud environment. Provide more flexible, on-demand IT services by moving to or expanding your use of shared resources and adjust utilization as demand changes.\r\nUse your hardware more effectively. Consolidate servers and workloads onto fewer, more powerful physical computers to use less power and physical space.\r\nImprove business continuity. Minimize the impact of both scheduled and unscheduled downtime of your workloads.\r\nEstablish or expand a virtual desktop infrastructure (VDI). Use a centralized desktop strategy with VDI can help you increase business agility and data security, as well as simplify regulatory compliance and manage desktop operating systems and applications. Deploy Hyper-V and Remote Desktop Virtualization Host (RD Virtualization Host) on the same server to make personal virtual desktops or virtual desktop pools available to your users.\r\nMake development and test more efficient. Reproduce different computing environments without having to buy or maintain all the hardware you'd need if you only used physical systems.\r\nHyper-V and other virtualization products\r\nHyper-V in Windows and Windows Server replaces older hardware virtualization products, such as Microsoft Virtual PC, Microsoft Virtual Server, and Windows Virtual PC. Hyper-V offers networking, performance, storage and security features not available in these older products.\r\nHyper-V and most third-party virtualization applications that require the same processor features aren't compatible. That's because the processor features, known as hardware virtualization extensions, are designed to not be shared. For details, see Virtualization applications do not work together with Hyper-V, Device Guard, and Credential Guard.","shortDescription":"The Hyper-V role enables you to create and manage a virtualized computing environment by using virtualization technology that is built in to Windows Server. Installing the Hyper-V role installs the required components and optionally installs management tools. The required components include Windows hypervisor, Hyper-V Virtual Machine Management Service, the virtualization WMI provider, and other virtualization components such as the virtual machine bus (VMbus), virtualization service provider (VSP) and virtual infrastructure driver (VID).","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Hyper-V","keywords":"Hyper-V, Windows, hardware, virtual, physical, your, tools, server","description":"The management tools for the Hyper-V role consist of:\r\nGUI-based management tools: Hyper-V Manager, a Microsoft Management Console (MMC) snap-in, and Virtual Machine Connection, which provides access to the video output of a virtual machine so you can interact","og:title":"Microsoft Hyper-V","og:description":"The management tools for the Hyper-V role consist of:\r\nGUI-based management tools: Hyper-V Manager, a Microsoft Management Console (MMC) snap-in, and Virtual Machine Connection, which provides access to the video output of a virtual machine so you can interact"},"eventUrl":"","translationId":617,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"},{"id":1,"title":"Desktop virtualization","alias":"desktop-virtualization","description":" Desktop virtualization is a virtualization technology that separates an individual's PC applications from his or her desktop. Virtualized desktops are generally hosted on a remote central server, rather than the hard drive of the personal computer. Because the client-server computing model is used in virtualizing desktops, desktop virtualization is also known as client virtualization.\r\nDesktop virtualization provides a way for users to maintain their individual desktops on a single, central server. The users may be connected to the central server through a LAN, WAN or over the Internet.\r\nDesktop virtualization has many benefits, including a lower total cost of ownership (TCO), increased security, reduced energy costs, reduced downtime and centralized management.\r\nLimitations of desktop virtualization include difficulty in maintenance and set up of printer drivers; increased downtime in case of network failures; complexity and costs involved in VDI deployment and security risks in the event of improper network management.<br /><br />","materialsDescription":" <span style=\"font-weight: bold; \">What are types of desktop virtualization technologies?</span>\r\nHost-based forms of desktop virtualization require that users view and interact with their virtual desktops over a network by using a remote display protocol. Because processing takes place in a data center, client devices can be traditional PCs, but also thin clients, zero clients, smartphones and tablets. Examples of host-based desktop virtualization technology include:\r\n<span style=\"font-weight: bold; \">Host-based virtual machines:</span> Each user connects to an individual VM that is hosted in a data center. The user may connect to the same VM every time, allowing for personalization (known as a persistent desktop), or be given a fresh VM at each login (a nonpersistent desktop).\r\n<span style=\"font-weight: bold; \">Shared hosted:</span> Users connect to a shared desktop that runs on a server. Microsoft Remote Desktop Services, formerly Terminal Services, takes this client-server approach. Users may also connect to individual applications running on a server; this technology is an example of application virtualization.\r\n<span style=\"font-weight: bold; \">Host-based physical machines:</span> The operating system runs directly on another device's physical hardware.\r\nClient virtualization requires processing to occur on local hardware; the use of thin clients, zero clients and mobile devices is not possible. These types of desktop virtualization include:\r\n<span style=\"font-weight: bold; \">OS image streaming:</span> The operating system runs on local hardware, but it boots to a remote disk image across the network. This is useful for groups of desktops that use the same disk image. OS image streaming, also known as remote desktop virtualization, requires a constant network connection in order to function.\r\n<span style=\"font-weight: bold; \">Client-based virtual machines:</span> A VM runs on a fully functional PC, with a hypervisor in place. Client-based virtual machines can be managed by regularly syncing the disk image with a server, but a constant network connection is not necessary in order for them to function.\r\n<span style=\"font-weight: bold;\">Desktop virtualization vs. virtual desktop infrastructure</span>\r\nThe terms <span style=\"font-style: italic;\">desktop virtualization</span> and virtual desktop infrastructure (VDI) are often used interchangeably, but they are not the same. While VDI is a type of desktop virtualization, not all desktop virtualization uses VDI.\r\nVDI refers to the use of host-based VMs to deliver virtual desktops, which emerged in 2006 as an alternative to Terminal Services and Citrix's client-server approach to desktop virtualization technology. Other types of desktop virtualization -- including the shared hosted model, host-based physical machines and all methods of client virtualization -- are not examples of VDI.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Desktop_virtualization.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":254,"title":"Centralize management"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"},{"id":177,"title":"Decentralized IT systems"},{"id":370,"title":"No automated business processes"},{"id":393,"title":"Complex and non-transparent business processes"}]}},"categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"},{"id":1,"title":"Desktop virtualization","alias":"desktop-virtualization","description":" Desktop virtualization is a virtualization technology that separates an individual's PC applications from his or her desktop. Virtualized desktops are generally hosted on a remote central server, rather than the hard drive of the personal computer. Because the client-server computing model is used in virtualizing desktops, desktop virtualization is also known as client virtualization.\r\nDesktop virtualization provides a way for users to maintain their individual desktops on a single, central server. The users may be connected to the central server through a LAN, WAN or over the Internet.\r\nDesktop virtualization has many benefits, including a lower total cost of ownership (TCO), increased security, reduced energy costs, reduced downtime and centralized management.\r\nLimitations of desktop virtualization include difficulty in maintenance and set up of printer drivers; increased downtime in case of network failures; complexity and costs involved in VDI deployment and security risks in the event of improper network management.<br /><br />","materialsDescription":" <span style=\"font-weight: bold; \">What are types of desktop virtualization technologies?</span>\r\nHost-based forms of desktop virtualization require that users view and interact with their virtual desktops over a network by using a remote display protocol. Because processing takes place in a data center, client devices can be traditional PCs, but also thin clients, zero clients, smartphones and tablets. Examples of host-based desktop virtualization technology include:\r\n<span style=\"font-weight: bold; \">Host-based virtual machines:</span> Each user connects to an individual VM that is hosted in a data center. The user may connect to the same VM every time, allowing for personalization (known as a persistent desktop), or be given a fresh VM at each login (a nonpersistent desktop).\r\n<span style=\"font-weight: bold; \">Shared hosted:</span> Users connect to a shared desktop that runs on a server. Microsoft Remote Desktop Services, formerly Terminal Services, takes this client-server approach. Users may also connect to individual applications running on a server; this technology is an example of application virtualization.\r\n<span style=\"font-weight: bold; \">Host-based physical machines:</span> The operating system runs directly on another device's physical hardware.\r\nClient virtualization requires processing to occur on local hardware; the use of thin clients, zero clients and mobile devices is not possible. These types of desktop virtualization include:\r\n<span style=\"font-weight: bold; \">OS image streaming:</span> The operating system runs on local hardware, but it boots to a remote disk image across the network. This is useful for groups of desktops that use the same disk image. OS image streaming, also known as remote desktop virtualization, requires a constant network connection in order to function.\r\n<span style=\"font-weight: bold; \">Client-based virtual machines:</span> A VM runs on a fully functional PC, with a hypervisor in place. Client-based virtual machines can be managed by regularly syncing the disk image with a server, but a constant network connection is not necessary in order for them to function.\r\n<span style=\"font-weight: bold;\">Desktop virtualization vs. virtual desktop infrastructure</span>\r\nThe terms <span style=\"font-style: italic;\">desktop virtualization</span> and virtual desktop infrastructure (VDI) are often used interchangeably, but they are not the same. While VDI is a type of desktop virtualization, not all desktop virtualization uses VDI.\r\nVDI refers to the use of host-based VMs to deliver virtual desktops, which emerged in 2006 as an alternative to Terminal Services and Citrix's client-server approach to desktop virtualization technology. Other types of desktop virtualization -- including the shared hosted model, host-based physical machines and all methods of client virtualization -- are not examples of VDI.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Desktop_virtualization.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.solti.ua/proyekt-postroyeniya-otkazoustoychivogo-klastera-virtualnykh-mashin/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"microsoft-project-server-2013-with-microsoft-sharepoint-integration-for-large-engineering-company":{"id":997,"title":"Microsoft Project Server 2013 with Microsoft SharePoint integration for large engineering company","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"microsoft-project-server-2013-with-microsoft-sharepoint-integration-for-large-engineering-company","roi":0,"seo":{"title":"Microsoft Project Server 2013 with Microsoft SharePoint integration for large engineering company","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Microsoft Project Server 2013 with Microsoft SharePoint integration for large engineering company","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""},"vendors":[{"id":163,"title":"Microsoft","logoURL":"https://roi4cio.com/uploads/roi/company/ms_dshchpshch.png","alias":"microsoft","address":"Microsoft","roles":[],"description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface tablet lineup. As of 2011, it was the world's largest software maker by revenue, and one of the world's most valuable companies.","companyTypes":[],"products":{},"vendoredProductsCount":40,"suppliedProductsCount":40,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":66,"vendorPartnersCount":0,"supplierPartnersCount":272,"b4r":0,"categories":{},"companyUrl":"www.microsoft.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Microsoft","keywords":"Microsoft, software, world, products, hardware, Xbox, video, game","description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:title":"Microsoft","og:description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:image":"https://roi4cio.com/uploads/roi/company/ms_dshchpshch.png"},"eventUrl":""}],"products":[{"id":366,"logo":false,"scheme":false,"title":"Microsoft Sharepoint Server","vendorVerified":0,"rating":"2.70","implementationsCount":7,"suppliersCount":0,"alias":"microsoft-sharepoint-server","companyTypes":[],"description":"SharePoint Server is provided to organizations that seek greater control over SharePoint's behavior or design. This product is installed on the customer's IT infrastructure. It receives less frequent updates, but has access to a wider set of features and customization capabilities. There are three versions of SharePoint Server: Foundation (free), Standard, and Enterprise, although the free version may have been discontinued in 2016. These servers may be provisioned as normal virtual/cloud servers, or as hosted services.","shortDescription":"SharePoint is a web based application that integrates with Microsoft Office. Launched in 2001, SharePoint is primarily sold as a document management and storage system, but the product is highly configurable and usage varies substantially between organizations.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Sharepoint Server","keywords":"SharePoint, Server, free, servers, Standard, although, Enterprise, versions","description":"SharePoint Server is provided to organizations that seek greater control over SharePoint's behavior or design. This product is installed on the customer's IT infrastructure. It receives less frequent updates, but has access to a wider set of features and custo","og:title":"Microsoft Sharepoint Server","og:description":"SharePoint Server is provided to organizations that seek greater control over SharePoint's behavior or design. This product is installed on the customer's IT infrastructure. It receives less frequent updates, but has access to a wider set of features and custo"},"eventUrl":"","translationId":367,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":148,"title":"Enterprise Portal","alias":"enterprise-portal","description":"An enterprise portal, also known as an enterprise information portal (EIP), is a framework for integrating information, people and processes across organizational boundaries in a manner similar to the more general web portals. Enterprise portals provide a secure unified access point, often in the form of a web-based user interface, and are designed to aggregate and personalize information through application-specific portlets.\r\nOne hallmark of enterprise portals is the de-centralized content contribution and content management, which keeps the information always updated. Another distinguishing characteristic is that they cater for customers, vendors and others beyond an organization's boundaries. This contrasts with a corporate portal which is structured for roles within an organization.\r\nAn enterprise portal has two main functions; integration and presentation. It must be able to access information from multiple and varied sources and manipulate that information through the portal.\r\nOther common features include;\r\n<ul><li><span style=\"font-style: italic;\">Single sign-on</span> — enterprise portals can provide single sign-on capabilities between their users and various other systems. This requires a user to authenticate only once.</li><li><span style=\"font-style: italic;\">Integration</span> — the connection of functions and data from multiple systems into new components/portlets/web parts with an integrated navigation between these components.</li><li><span style=\"font-style: italic;\">Federation</span> — the integration of content provided by other portals, typically through the use of WSRP or similar technologies.</li><li><span style=\"font-style: italic;\">Customization</span> — Users can customize the look and feel of their environment. Customers who are using EIPs can edit and design their own web sites which are full of their own personality and own style; they can also choose the specific content and services they prefer. Also refers to the ability to prioritize most appropriate content based on attributes of the user and metadata of the available content.</li><li><span style=\"font-style: italic;\">Personalization</span> — Personalization is more about matching content with the user. Based on a user profile, personalization uses rules to match the "services", or content, to the specific user. To some degree, you can think of the two like this: customization is in hands of the end user, personalization is not. Of course actual personalization is often based on your role or job function within the portal context.</li><li><span style=\"font-style: italic;\">Access control</span> — the ability for portal to limit specific types of content and services users have access to. For example, a company's proprietary information can be entitled for only company employee access. This access rights may be provided by a portal administrator or by a provisioning process. Access control lists manage the mapping between portal content and services over the portal user base.</li><li><span style=\"font-style: italic;\">Enterprise search</span> — search enterprise content using enterprise search.</li><li><span style=\"font-style: italic;\">Omni channel enablement</span> — present the pages optimally on all channels and devices.</li><li><span style=\"font-style: italic;\">Analytics</span> — track and monitor user behaviour on portal pages (such as navigation, clicks, downloads, page exits and such) and generate reports.</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">What is an Enterprise Portal?</span>\r\nAbbreviated as EPS, Enterprise Portal Software is a prepackaged software kit used by the enterprise to integrate its information and processes. Organizations use portals primarily to aggregate information from a number of different sources, including disparate systems, and provide this information to authorized users in a neatly managed single screen or system.\r\n<span style=\"font-weight: bold;\">Typical Enterprise Portal's Interface</span>\r\nEPS usually offers a Web-based interface to provide a secure unified access point through which information is aggregated to application-specific portlets. Enterprise Portal Software lets authorized users access Web services, and portals can be combined to form portal networks that can cover an organization's entire enterprise system.","iconURL":"https://roi4cio.com/fileadmin/user_upload/Enterprise_Portal.png"},{"id":273,"title":"Team Collaborative Applications","alias":"team-collaborative-applications","description":" Collaborative software or groupware is application software designed to help people working on a common task to attain their goals. One of the earliest definitions of groupware is "intentional group processes plus software to support them".\r\nThe worldwide team collaborative applications market continues to accelerate as collaboration becomes a key component of the future of work in a digital enterprise. The market is growing in revenue, leveraging IT integrations to both bridge functions and the enterprise. The market continues to move to the cloud and emphasizes usage across devices.\r\nThe total worldwide team collaborative applications market grew at 24.7% year over year, up from 21.5% growth the previous year. Growth was powered by the adoption of solutions that made working together more agile and seamless and favored solutions with integrations that centralize work, assets, and communications, including messaging and chat. In short, applications that made it easier to get work done by bringing content, context, and communications in a single place.\r\nFeeling the pinch to produce more with less, organizations have turned to collaborative applications to streamline workflow and engage employees, partners and, increasingly, customers. They are discovering new paths to productivity, a better digital user experience (UX), and loyalty. Companies are developing a new way to work together and across their workforce and the sales continuum. A more technology-savvy and digitally connected workforce is empowering and accelerating this trend. Artificial intelligence (AI) is more common across collaborative solutions and almost expected by employees to automate repetitive tasks. Increasingly, machine learning (ML) and AI will generate new forms of value from conversations, meetings, and other content assets.\r\nMake no mistake, the majority of the lead vendors in this space are heavily invested in the future of work and want to be either your future workspace — where work actually is done — or an application that integrates to facilitate better and more productive results with a better-engaged workforce.","materialsDescription":"<span style=\"font-weight: bold; \">What is groupware?</span>\r\nCollaborative software was originally designated as groupware and this term can be traced as far back as the late 1980s, when Richman and Slovak (1987) wrote: "Like an electronic sinew that binds teams together, the new groupware aims to place the computer squarely in the middle of communications among managers, technicians, and anyone else who interacts in groups, revolutionizing the way they work."\r\nEven further back, in 1978 Peter and Trudy Johnson-Lenz coined the term groupware; their initial 1978 definition of groupware was, "intentional group processes plus software to support them." Later in their article they went on to explain groupware as "computer-mediated culture... an embodiment of social organization in hyperspace." Groupware integrates co-evolving human and tool systems, yet is simply a single system.\r\nIn the early 1990s the first commercial groupware products were delivered, and big companies such as Boeing and IBM started using electronic meeting systems for key internal projects. Lotus Notes appeared as a major example of that product category, allowing remote group collaboration when the internet was still in its infancy. Kirkpatrick and Losee (1992) wrote then: "If GROUPWARE really makes a difference in productivity long term, the very definition of an office may change. You will be able to work efficiently as a member of a group wherever you have your computer. As computers become smaller and more powerful, that will mean anywhere." In 1999, Achacoso created and introduced the first wireless groupware.\r\n<span style=\"font-weight: bold;\">What are the levels of groupware?</span>\r\nGroupware can be divided into three categories depending on the level of collaboration:\r\n<ul><li>Communication can be thought of as unstructured interchange of information. A phone call or an IM Chat discussion are examples of this.</li><li>Conferencing (or collaboration level, as it is called in the academic papers that discuss these levels) refers to interactive work toward a shared goal. Brainstorming or voting are examples of this.</li><li>Co-ordination refers to complex interdependent work toward a shared goal. A good metaphor for understanding this is to think about a sports team; everyone has to contribute the right play at the right time as well as adjust their play to the unfolding situation - but everyone is doing something different - in order for the team to win. That is complex interdependent work toward a shared goal: collaborative management.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/Team_Collaborative_Applications.png"},{"id":307,"title":"Archiving Software","alias":"archiving-software","description":" Enterprise <span style=\"font-weight: bold;\">archiving software </span>is designed to assist in storing a company’s structured and unstructured data. By incorporating unstructured data (e.g., email messages and media files), enterprise information archiving software provides more complete archives of business data across the board. Data can be stored on premise with local data servers or on cloud servers, or using a hybrid of the two. These solutions are used throughout a business by any employee, since all teams should be archiving their data for, at minimum, auditing purposes. Data archiving software are typically implemented and maintained by a company’s data team, and they can be used by companies of any size.\r\nWhile similar to a backup software solution, archiving solution handles the original data as opposed to a copy of that data. To qualify for the data archiving solutions category, a product must: \r\n<ul><li>Store both structured and unstructured data</li><li>Provide data management options for archived data</li><li>Protect access to archived data</li></ul>","materialsDescription":"<h1 class=\"align-center\"> What is Archiving Software?</h1>\r\nArchiving Software supports enterprises in retaining and rapidly retrieving structured and unstructured data over time while complying with security standards and the like. File archiving may include images, messages (e.g. IMs, social media posts, etc.), emails, and content from web pages and social sites. Compliant data retention may require retaining data in its native form and context so that it can be understood.\r\nAlso called Enterprise Information Archiving (EIA), archiving software is designed to meet discovery requirements. That means that the archive must be searchable so that all stored data can be retrieved with context intact.\r\nArchiving software is most commonly a requirement for banking institutions and governments. More stringent privacy laws means that EIA has become a concern for private corporations as well. Archiving software will contain features overlapping Enterprise Search, Data Governance and eDiscovery, and some features in common with ECM.\r\n<h1 class=\"align-center\">What’s the Difference: Backup vs Archive</h1>\r\nBackups and archives serve different functions, yet it’s common to hear the terms used interchangeably in cloud storage. \r\nA <span style=\"font-weight: bold;\">backup </span>is a copy of your data that is made to protect against loss of that data. Typically, backups are made on a regular basis according to a time schedule or when the original data changes. The original data is not deleted, but older backups are often deleted in favor of newer backups.<br /><span style=\"font-weight: bold;\">The goal of a backup</span> is to make a copy of anything in current use that can’t afford to be lost. A backup of a desktop or mobile device might include just the user data so that a previous version of a file can be recovered if necessary.\r\nOn these types of devices an assumption is often made that the OS and applications can easily be restored from original sources if necessary (and/or that restoring an OS to a new device could lead to significant corruption issues). In a virtual server environment, a backup could include.\r\nAn <span style=\"font-weight: bold;\">archive </span>is a copy of data made for long-term storage and reference. The original data may or may not be deleted from the source system after the archive copy is made and stored, though it is common for the archive to be the only copy of the data. \r\nIn contrast to a backup whose purpose is to be able to return a computer or file system to a state it existed in previously, <span style=\"font-weight: bold;\">data archiving can have multiple purposes</span>. An archiving system can provide an individual or organization with a permanent record of important papers, legal documents, correspondence, and other matters.\r\nOften, archive program is used to meet information retention requirements for corporations and businesses. If a dispute or inquiry arises about a business practice, contract, financial transaction, or employee, the records pertaining to that subject can be obtained from the archive.\r\nAn archive is frequently used to ease the burden on faster and more frequently accessed data storage systems. Older data that is unlikely to be needed often is put on systems that don’t need to have the speed and accessibility of systems that contain data still in use. Archival storage systems are usually less expensive, as well, so a strong motivation is to save money on data storage.\r\nArchives are often created based on the age of the data or whether the project the data belongs to is still active. Data archiving solutions might send data to an archive if it hasn’t been accessed in a specified amount of time, when it has reached a certain age, if a person is no longer with the organization, or the files have been marked for storage because the project has been completed or closed.<br /><br /><br />","iconURL":"https://roi4cio.com/fileadmin/user_upload/Archiving_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3090,"logo":false,"scheme":false,"title":"Microsoft Project","vendorVerified":0,"rating":"2.00","implementationsCount":2,"suppliersCount":0,"alias":"microsoft-project","companyTypes":[],"description":"<p>Microsoft Project is a project management system and a way to optimize portfolio management, which allows you to plan and control project activities of organizations.</p>\r\n<p>Compared with other similar programs, the MS Project is considered the most common and “easy” to refer to the initial level of project management software with a classic standard office interface. In the single-user and small solutions market, the software product takes about 80% (about 20 million people use it).</p>\r\n<p>It is believed that as an integrated set of methods, processes and tools for planning and monitoring projects, MS Project is more often used in the implementation of relatively small project ideas. However, the existence of several paid options - basic, professional and advanced - when choosing the most complete functionality allows you to significantly expand the capabilities of the program compared to the basic version.</p>\r\n<p>Another focus of the \"detuning\" is the specialization of the product. Among such software, Primavera is popular, which is widespread in the field of engineering and construction projects as a means of calendar-network planning, which allows to take into account financial, material and labor resources in medium and large projects. Basecamp software cloud tool is considered the main competitor in the segment of ultra-light management decisions. At the same time, Microsoft has also been offering a cloud version of its product since 2013.</p>\r\n<p>In addition to the cloud application, several products are available under the Project brand:</p>\r\n<ol>\r\n<li>Project Standard allows for individual planning for small projects.</li>\r\n<li>Corporate management is carried out with the help of a special platform, including:</li>\r\n</ol>\r\n<ul>\r\n<li>Project Server,</li>\r\n<li>the corporate version of Project Professional, where collaborative tools (Project Server and SharePoint Foundation / Server) are added to the capabilities of the Standard version,</li>\r\n<li>the technology of the web interface of the reporting of executives on the progress of tasks, for viewing project portfolios and other collaboration (Project Web Access).</li>\r\n</ul>\r\n<p>Source: <a href=\"https://finswin.com/projects/instrumenty/microsoft-project.html\" target=\"_blank\" rel=\"noopener\">finswin.com/projects/instrumenty/microsoft-project.html</a></p>","shortDescription":"Microsoft Project is a project management system and a way to optimize portfolio management, which allows you to plan and control project activities of organizations.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Project","keywords":"","description":"<p>Microsoft Project is a project management system and a way to optimize portfolio management, which allows you to plan and control project activities of organizations.</p>\r\n<p>Compared with other similar programs, the MS Project is considered the most common","og:title":"Microsoft Project","og:description":"<p>Microsoft Project is a project management system and a way to optimize portfolio management, which allows you to plan and control project activities of organizations.</p>\r\n<p>Compared with other similar programs, the MS Project is considered the most common"},"eventUrl":"","translationId":3091,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":363,"title":"Project and Portfolio Management","alias":"project-and-portfolio-management","description":"<span style=\"font-weight: bold;\">Project Portfolio Management (PPM)</span> is the centralized management of the processes, methods, and technologies used by project managers and project management offices (PMOs) to analyze and collectively manage current or proposed projects based on numerous key characteristics. The objectives of PPM are to determine the optimal resource mix for delivery and to schedule activities to best achieve an organization’s operational and financial goals, while honouring constraints imposed by customers, strategic objectives, or external real-world factors. The International standard defines the framework of the Project Portfolio Management.\r\nPPM provides program and project managers in large, program/project-driven organizations with the capabilities needed to manage the time, resources, skills, and budgets necessary to accomplish all interrelated tasks. It provides a framework for issue resolution and risk mitigation, as well as the centralized visibility to help planning and scheduling teams to identify the fastest, cheapest, or most suitable approach to deliver projects and programs. Portfolio Managers define Key Performance Indicators and the strategy for their portfolio.\r\n<span style=\"font-style: italic;\">Pipeline Management.</span> Pipeline management involves steps to ensure that an adequate number of project proposals are not generated and not evaluated to determine whether (and how) a set of projects in the portfolio can be executed with finite development resources in a specified time. There are three major sub-components to pipeline management: ideation, work intake processes, and Phase-Gate reviews. Fundamental to pipeline management is the ability to align the decision-making process for estimating and selecting new capital investment projects with the strategic plan.\r\n<span style=\"font-style: italic;\">Resource Manager.</span> The focus on the efficient and effective deployment of an organization’s resources where and when they are needed. These can include financial resources, inventory, human resources, technical skills, production, and design. In addition to project-level resource allocation, users can also model ‘what-if’ resource scenarios, and extend this view across the portfolio.\r\n<span style=\"font-style: italic;\">Change Control.</span> The capture and prioritization of change requests that can include new requirements, features, functions, operational constraints, regulatory demands, and technical enhancements. PPM provides a central repository for these change requests and the ability to match available resources to evolving demand within the financial and operational constraints of individual projects.\r\n<span style=\"font-style: italic;\">Financial Management.</span> With PPM, the Office of Finance can improve their accuracy for estimating and managing the financial resources of a project or group of projects. In addition, the value of projects can be demonstrated in relation to the strategic objectives and priorities of the organization through financial controls and to assess progress through earned value and other project financial techniques.\r\n<span style=\"font-style: italic;\">Risk Management.</span> An analysis of the risk sensitivities residing within each project, as the basis for determining confidence levels across the portfolio. The integration of cost and schedule risk management with techniques for determining contingency and risk response plans, enable organizations to gain an objective view of project uncertainties.","materialsDescription":" <span style=\"font-weight: bold;\">What’s the difference between Project Management and Project Portfolio Management?</span>\r\nProject management is focused on an individual project, making sure it achieves its objectives and adheres to cost schedule baselines and performance standards. Project portfolio management, on the other hand, takes into consideration all the projects within a portfolio. The primary objective here is to select and maintain the appropriate mix of projects and to assess the costs, risks, and returns of running these projects in relation to how they match with organizational goals. Simply put, project management is about doing the project right, project portfolio management is about doing the right projects.\r\n<span style=\"font-weight: bold;\">What Problems Can Project Portfolio Management Address?</span>\r\nProject Portfolio Management helps companies avoid project overload and work on projects that are not aligned with the ultimate vision. In other words, project portfolio management helps companies to work towards their goals without getting sidetracked by too many shiny pennies (ie. projects that appear to be enticing but actually drain their resources for little return).\r\n<span style=\"font-weight: bold;\">How does Project Portfolio Management help with new product development?</span>\r\nProject Portfolio Management supports companies in assessing, evaluating and ranking new product ideas before they become projects, so that time, money and human resources can be spent working on projects that support strategic objectives. This becomes increasingly important and relevant for companies that receive dozens if not hundreds of project proposals.\r\n<span style=\"font-weight: bold;\">What are the key elements of successful portfolio management?</span>\r\nGoals, objectives, governance, approval processes and monitoring portfolio performance.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Project_and_Portfolio_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":254,"title":"Centralize management"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":378,"title":"Low employee productivity"},{"id":381,"title":"HR management"},{"id":395,"title":"Decentralization of management"},{"id":398,"title":"Poor communication and coordination among staff"}]}},"categories":[{"id":148,"title":"Enterprise Portal","alias":"enterprise-portal","description":"An enterprise portal, also known as an enterprise information portal (EIP), is a framework for integrating information, people and processes across organizational boundaries in a manner similar to the more general web portals. Enterprise portals provide a secure unified access point, often in the form of a web-based user interface, and are designed to aggregate and personalize information through application-specific portlets.\r\nOne hallmark of enterprise portals is the de-centralized content contribution and content management, which keeps the information always updated. Another distinguishing characteristic is that they cater for customers, vendors and others beyond an organization's boundaries. This contrasts with a corporate portal which is structured for roles within an organization.\r\nAn enterprise portal has two main functions; integration and presentation. It must be able to access information from multiple and varied sources and manipulate that information through the portal.\r\nOther common features include;\r\n<ul><li><span style=\"font-style: italic;\">Single sign-on</span> — enterprise portals can provide single sign-on capabilities between their users and various other systems. This requires a user to authenticate only once.</li><li><span style=\"font-style: italic;\">Integration</span> — the connection of functions and data from multiple systems into new components/portlets/web parts with an integrated navigation between these components.</li><li><span style=\"font-style: italic;\">Federation</span> — the integration of content provided by other portals, typically through the use of WSRP or similar technologies.</li><li><span style=\"font-style: italic;\">Customization</span> — Users can customize the look and feel of their environment. Customers who are using EIPs can edit and design their own web sites which are full of their own personality and own style; they can also choose the specific content and services they prefer. Also refers to the ability to prioritize most appropriate content based on attributes of the user and metadata of the available content.</li><li><span style=\"font-style: italic;\">Personalization</span> — Personalization is more about matching content with the user. Based on a user profile, personalization uses rules to match the "services", or content, to the specific user. To some degree, you can think of the two like this: customization is in hands of the end user, personalization is not. Of course actual personalization is often based on your role or job function within the portal context.</li><li><span style=\"font-style: italic;\">Access control</span> — the ability for portal to limit specific types of content and services users have access to. For example, a company's proprietary information can be entitled for only company employee access. This access rights may be provided by a portal administrator or by a provisioning process. Access control lists manage the mapping between portal content and services over the portal user base.</li><li><span style=\"font-style: italic;\">Enterprise search</span> — search enterprise content using enterprise search.</li><li><span style=\"font-style: italic;\">Omni channel enablement</span> — present the pages optimally on all channels and devices.</li><li><span style=\"font-style: italic;\">Analytics</span> — track and monitor user behaviour on portal pages (such as navigation, clicks, downloads, page exits and such) and generate reports.</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">What is an Enterprise Portal?</span>\r\nAbbreviated as EPS, Enterprise Portal Software is a prepackaged software kit used by the enterprise to integrate its information and processes. Organizations use portals primarily to aggregate information from a number of different sources, including disparate systems, and provide this information to authorized users in a neatly managed single screen or system.\r\n<span style=\"font-weight: bold;\">Typical Enterprise Portal's Interface</span>\r\nEPS usually offers a Web-based interface to provide a secure unified access point through which information is aggregated to application-specific portlets. Enterprise Portal Software lets authorized users access Web services, and portals can be combined to form portal networks that can cover an organization's entire enterprise system.","iconURL":"https://roi4cio.com/fileadmin/user_upload/Enterprise_Portal.png"},{"id":273,"title":"Team Collaborative Applications","alias":"team-collaborative-applications","description":" Collaborative software or groupware is application software designed to help people working on a common task to attain their goals. One of the earliest definitions of groupware is "intentional group processes plus software to support them".\r\nThe worldwide team collaborative applications market continues to accelerate as collaboration becomes a key component of the future of work in a digital enterprise. The market is growing in revenue, leveraging IT integrations to both bridge functions and the enterprise. The market continues to move to the cloud and emphasizes usage across devices.\r\nThe total worldwide team collaborative applications market grew at 24.7% year over year, up from 21.5% growth the previous year. Growth was powered by the adoption of solutions that made working together more agile and seamless and favored solutions with integrations that centralize work, assets, and communications, including messaging and chat. In short, applications that made it easier to get work done by bringing content, context, and communications in a single place.\r\nFeeling the pinch to produce more with less, organizations have turned to collaborative applications to streamline workflow and engage employees, partners and, increasingly, customers. They are discovering new paths to productivity, a better digital user experience (UX), and loyalty. Companies are developing a new way to work together and across their workforce and the sales continuum. A more technology-savvy and digitally connected workforce is empowering and accelerating this trend. Artificial intelligence (AI) is more common across collaborative solutions and almost expected by employees to automate repetitive tasks. Increasingly, machine learning (ML) and AI will generate new forms of value from conversations, meetings, and other content assets.\r\nMake no mistake, the majority of the lead vendors in this space are heavily invested in the future of work and want to be either your future workspace — where work actually is done — or an application that integrates to facilitate better and more productive results with a better-engaged workforce.","materialsDescription":"<span style=\"font-weight: bold; \">What is groupware?</span>\r\nCollaborative software was originally designated as groupware and this term can be traced as far back as the late 1980s, when Richman and Slovak (1987) wrote: "Like an electronic sinew that binds teams together, the new groupware aims to place the computer squarely in the middle of communications among managers, technicians, and anyone else who interacts in groups, revolutionizing the way they work."\r\nEven further back, in 1978 Peter and Trudy Johnson-Lenz coined the term groupware; their initial 1978 definition of groupware was, "intentional group processes plus software to support them." Later in their article they went on to explain groupware as "computer-mediated culture... an embodiment of social organization in hyperspace." Groupware integrates co-evolving human and tool systems, yet is simply a single system.\r\nIn the early 1990s the first commercial groupware products were delivered, and big companies such as Boeing and IBM started using electronic meeting systems for key internal projects. Lotus Notes appeared as a major example of that product category, allowing remote group collaboration when the internet was still in its infancy. Kirkpatrick and Losee (1992) wrote then: "If GROUPWARE really makes a difference in productivity long term, the very definition of an office may change. You will be able to work efficiently as a member of a group wherever you have your computer. As computers become smaller and more powerful, that will mean anywhere." In 1999, Achacoso created and introduced the first wireless groupware.\r\n<span style=\"font-weight: bold;\">What are the levels of groupware?</span>\r\nGroupware can be divided into three categories depending on the level of collaboration:\r\n<ul><li>Communication can be thought of as unstructured interchange of information. A phone call or an IM Chat discussion are examples of this.</li><li>Conferencing (or collaboration level, as it is called in the academic papers that discuss these levels) refers to interactive work toward a shared goal. Brainstorming or voting are examples of this.</li><li>Co-ordination refers to complex interdependent work toward a shared goal. A good metaphor for understanding this is to think about a sports team; everyone has to contribute the right play at the right time as well as adjust their play to the unfolding situation - but everyone is doing something different - in order for the team to win. That is complex interdependent work toward a shared goal: collaborative management.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/Team_Collaborative_Applications.png"},{"id":307,"title":"Archiving Software","alias":"archiving-software","description":" Enterprise <span style=\"font-weight: bold;\">archiving software </span>is designed to assist in storing a company’s structured and unstructured data. By incorporating unstructured data (e.g., email messages and media files), enterprise information archiving software provides more complete archives of business data across the board. Data can be stored on premise with local data servers or on cloud servers, or using a hybrid of the two. These solutions are used throughout a business by any employee, since all teams should be archiving their data for, at minimum, auditing purposes. Data archiving software are typically implemented and maintained by a company’s data team, and they can be used by companies of any size.\r\nWhile similar to a backup software solution, archiving solution handles the original data as opposed to a copy of that data. To qualify for the data archiving solutions category, a product must: \r\n<ul><li>Store both structured and unstructured data</li><li>Provide data management options for archived data</li><li>Protect access to archived data</li></ul>","materialsDescription":"<h1 class=\"align-center\"> What is Archiving Software?</h1>\r\nArchiving Software supports enterprises in retaining and rapidly retrieving structured and unstructured data over time while complying with security standards and the like. File archiving may include images, messages (e.g. IMs, social media posts, etc.), emails, and content from web pages and social sites. Compliant data retention may require retaining data in its native form and context so that it can be understood.\r\nAlso called Enterprise Information Archiving (EIA), archiving software is designed to meet discovery requirements. That means that the archive must be searchable so that all stored data can be retrieved with context intact.\r\nArchiving software is most commonly a requirement for banking institutions and governments. More stringent privacy laws means that EIA has become a concern for private corporations as well. Archiving software will contain features overlapping Enterprise Search, Data Governance and eDiscovery, and some features in common with ECM.\r\n<h1 class=\"align-center\">What’s the Difference: Backup vs Archive</h1>\r\nBackups and archives serve different functions, yet it’s common to hear the terms used interchangeably in cloud storage. \r\nA <span style=\"font-weight: bold;\">backup </span>is a copy of your data that is made to protect against loss of that data. Typically, backups are made on a regular basis according to a time schedule or when the original data changes. The original data is not deleted, but older backups are often deleted in favor of newer backups.<br /><span style=\"font-weight: bold;\">The goal of a backup</span> is to make a copy of anything in current use that can’t afford to be lost. A backup of a desktop or mobile device might include just the user data so that a previous version of a file can be recovered if necessary.\r\nOn these types of devices an assumption is often made that the OS and applications can easily be restored from original sources if necessary (and/or that restoring an OS to a new device could lead to significant corruption issues). In a virtual server environment, a backup could include.\r\nAn <span style=\"font-weight: bold;\">archive </span>is a copy of data made for long-term storage and reference. The original data may or may not be deleted from the source system after the archive copy is made and stored, though it is common for the archive to be the only copy of the data. \r\nIn contrast to a backup whose purpose is to be able to return a computer or file system to a state it existed in previously, <span style=\"font-weight: bold;\">data archiving can have multiple purposes</span>. An archiving system can provide an individual or organization with a permanent record of important papers, legal documents, correspondence, and other matters.\r\nOften, archive program is used to meet information retention requirements for corporations and businesses. If a dispute or inquiry arises about a business practice, contract, financial transaction, or employee, the records pertaining to that subject can be obtained from the archive.\r\nAn archive is frequently used to ease the burden on faster and more frequently accessed data storage systems. Older data that is unlikely to be needed often is put on systems that don’t need to have the speed and accessibility of systems that contain data still in use. Archival storage systems are usually less expensive, as well, so a strong motivation is to save money on data storage.\r\nArchives are often created based on the age of the data or whether the project the data belongs to is still active. Data archiving solutions might send data to an archive if it hasn’t been accessed in a specified amount of time, when it has reached a certain age, if a person is no longer with the organization, or the files have been marked for storage because the project has been completed or closed.<br /><br /><br />","iconURL":"https://roi4cio.com/fileadmin/user_upload/Archiving_Software.png"},{"id":363,"title":"Project and Portfolio Management","alias":"project-and-portfolio-management","description":"<span style=\"font-weight: bold;\">Project Portfolio Management (PPM)</span> is the centralized management of the processes, methods, and technologies used by project managers and project management offices (PMOs) to analyze and collectively manage current or proposed projects based on numerous key characteristics. The objectives of PPM are to determine the optimal resource mix for delivery and to schedule activities to best achieve an organization’s operational and financial goals, while honouring constraints imposed by customers, strategic objectives, or external real-world factors. The International standard defines the framework of the Project Portfolio Management.\r\nPPM provides program and project managers in large, program/project-driven organizations with the capabilities needed to manage the time, resources, skills, and budgets necessary to accomplish all interrelated tasks. It provides a framework for issue resolution and risk mitigation, as well as the centralized visibility to help planning and scheduling teams to identify the fastest, cheapest, or most suitable approach to deliver projects and programs. Portfolio Managers define Key Performance Indicators and the strategy for their portfolio.\r\n<span style=\"font-style: italic;\">Pipeline Management.</span> Pipeline management involves steps to ensure that an adequate number of project proposals are not generated and not evaluated to determine whether (and how) a set of projects in the portfolio can be executed with finite development resources in a specified time. There are three major sub-components to pipeline management: ideation, work intake processes, and Phase-Gate reviews. Fundamental to pipeline management is the ability to align the decision-making process for estimating and selecting new capital investment projects with the strategic plan.\r\n<span style=\"font-style: italic;\">Resource Manager.</span> The focus on the efficient and effective deployment of an organization’s resources where and when they are needed. These can include financial resources, inventory, human resources, technical skills, production, and design. In addition to project-level resource allocation, users can also model ‘what-if’ resource scenarios, and extend this view across the portfolio.\r\n<span style=\"font-style: italic;\">Change Control.</span> The capture and prioritization of change requests that can include new requirements, features, functions, operational constraints, regulatory demands, and technical enhancements. PPM provides a central repository for these change requests and the ability to match available resources to evolving demand within the financial and operational constraints of individual projects.\r\n<span style=\"font-style: italic;\">Financial Management.</span> With PPM, the Office of Finance can improve their accuracy for estimating and managing the financial resources of a project or group of projects. In addition, the value of projects can be demonstrated in relation to the strategic objectives and priorities of the organization through financial controls and to assess progress through earned value and other project financial techniques.\r\n<span style=\"font-style: italic;\">Risk Management.</span> An analysis of the risk sensitivities residing within each project, as the basis for determining confidence levels across the portfolio. The integration of cost and schedule risk management with techniques for determining contingency and risk response plans, enable organizations to gain an objective view of project uncertainties.","materialsDescription":" <span style=\"font-weight: bold;\">What’s the difference between Project Management and Project Portfolio Management?</span>\r\nProject management is focused on an individual project, making sure it achieves its objectives and adheres to cost schedule baselines and performance standards. Project portfolio management, on the other hand, takes into consideration all the projects within a portfolio. The primary objective here is to select and maintain the appropriate mix of projects and to assess the costs, risks, and returns of running these projects in relation to how they match with organizational goals. Simply put, project management is about doing the project right, project portfolio management is about doing the right projects.\r\n<span style=\"font-weight: bold;\">What Problems Can Project Portfolio Management Address?</span>\r\nProject Portfolio Management helps companies avoid project overload and work on projects that are not aligned with the ultimate vision. In other words, project portfolio management helps companies to work towards their goals without getting sidetracked by too many shiny pennies (ie. projects that appear to be enticing but actually drain their resources for little return).\r\n<span style=\"font-weight: bold;\">How does Project Portfolio Management help with new product development?</span>\r\nProject Portfolio Management supports companies in assessing, evaluating and ranking new product ideas before they become projects, so that time, money and human resources can be spent working on projects that support strategic objectives. This becomes increasingly important and relevant for companies that receive dozens if not hundreds of project proposals.\r\n<span style=\"font-weight: bold;\">What are the key elements of successful portfolio management?</span>\r\nGoals, objectives, governance, approval processes and monitoring portfolio performance.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Project_and_Portfolio_Management.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.solti.ua/vnedrenie-nastrojka-programmnogo-kompleksa-microsoft-project-server-2013-s-integraciej-microsoft-sharepoint/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"microsoft-sql-server-2016-for-utility-company-kharkivvodokanal":{"id":1000,"title":"Microsoft SQL Server 2016 for utility company Kharkivvodokanal","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"microsoft-sql-server-2016-for-utility-company-kharkivvodokanal","roi":0,"seo":{"title":"Microsoft SQL Server 2016 for utility company Kharkivvodokanal","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Microsoft SQL Server 2016 for utility company Kharkivvodokanal","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":7572,"title":"Kharkivvodokanal","logoURL":"https://roi4cio.com/uploads/roi/company/kharkivvodokanal-logo.png","alias":"kharkovvodokanal","address":"","roles":[],"description":" Municipal enterprise "Kharkivvodokanal" is the largest technological complex of water supply and sewer networks and structures in Ukraine, which provides drinking water and a reliable sewage system for residents of Kharkov and the Kharkov region.<br />The company was established on October 1, 2011 as a result of the merger of two utilities - KP "Kharkovkommunochistvod" and KP "PTP" Water ". Until that time, Kharkov was the only city in Ukraine in which the engineering structures of the water supply and sewage systems were serviced by two different enterprises.<br />The purpose of the enterprise is the implementation of production, research and commercial activities for the full and high-quality satisfaction of the needs of the population, economic entities for public utilities, providing group, individual water supply, sanitation in Kharkov and settlements of the Kharkiv region, and taking measures to improve the environmental situation in Ukraine , increasing the income level of employees of the enterprise, increasing interest and responsibility for the horse nye results of operations in order to obtain an appropriate profit.\r\nSource: https://vodokanal.kharkov.ua/content/about","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://vodokanal.kharkov.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Kharkivvodokanal","keywords":"","description":" Municipal enterprise "Kharkivvodokanal" is the largest technological complex of water supply and sewer networks and structures in Ukraine, which provides drinking water and a reliable sewage system for residents of Kharkov and the Kharkov region.<br","og:title":"Kharkivvodokanal","og:description":" Municipal enterprise "Kharkivvodokanal" is the largest technological complex of water supply and sewer networks and structures in Ukraine, which provides drinking water and a reliable sewage system for residents of Kharkov and the Kharkov region.<br","og:image":"https://roi4cio.com/uploads/roi/company/kharkivvodokanal-logo.png"},"eventUrl":""},"supplier":{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""},"vendors":[{"id":163,"title":"Microsoft","logoURL":"https://roi4cio.com/uploads/roi/company/ms_dshchpshch.png","alias":"microsoft","address":"Microsoft","roles":[],"description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface tablet lineup. As of 2011, it was the world's largest software maker by revenue, and one of the world's most valuable companies.","companyTypes":[],"products":{},"vendoredProductsCount":40,"suppliedProductsCount":40,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":66,"vendorPartnersCount":0,"supplierPartnersCount":272,"b4r":0,"categories":{},"companyUrl":"www.microsoft.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Microsoft","keywords":"Microsoft, software, world, products, hardware, Xbox, video, game","description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:title":"Microsoft","og:description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:image":"https://roi4cio.com/uploads/roi/company/ms_dshchpshch.png"},"eventUrl":""}],"products":[{"id":634,"logo":false,"scheme":false,"title":"Microsoft SQL Server","vendorVerified":0,"rating":"2.00","implementationsCount":4,"suppliersCount":0,"alias":"microsoft-sql-server","companyTypes":[],"description":"As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications—which may run either on the same computer or on another computer across a network (including the Internet).\r\nMicrosoft markets at least a dozen different editions of Microsoft SQL Server, aimed at different audiences and for workloads ranging from small single-machine applications to large Internet-facing applications with many concurrent users.","shortDescription":"Microsoft SQL Server is a relational database management system developed by Microsoft.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft SQL Server","keywords":"Microsoft, computer, applications, different, with, Server, software, editions","description":"As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications—which may run either on the same computer or on another computer across a network (including the Internet).\r\nMic","og:title":"Microsoft SQL Server","og:description":"As a database server, it is a software product with the primary function of storing and retrieving data as requested by other software applications—which may run either on the same computer or on another computer across a network (including the Internet).\r\nMic"},"eventUrl":"","translationId":635,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":239,"title":"Relational Database Management Systems","alias":"relational-database-management-systems","description":" Relational Database Management System (RDBMS) is a DBMS designed specifically for relational databases. Therefore, RDBMSes are a subset of DBMSes.\r\nA relational database refers to a database that stores data in a structured format, using rows and columns. This makes it easy to locate and access specific values within the database. It is "relational" because the values within each table are related to each other. Tables may also be related to other tables. The relational structure makes it possible to run queries across multiple tables at once.\r\nWhile a relational database describes the type of database an RDMBS manages, the RDBMS refers to the database program itself. It is the software that executes queries on the data, including adding, updating, and searching for values.\r\nAn RDBMS may also provide a visual representation of the data. For example, it may display data in a tables like a spreadsheet, allowing you to view and even edit individual values in the table. Some relational database softwareallow you to create forms that can streamline entering, editing, and deleting data.\r\nMost well known DBMS applications fall into the RDBMS category. Examples include Oracle Database, MySQL, Microsoft SQL Server, and IBM DB2. Some of these programs support non-relational databases, but they are primarily used for relational database management.\r\nExamples of non-relational databases include Apache HBase, IBM Domino, and Oracle NoSQL Database. These type of databases are managed by other DMBS programs that support NoSQL, which do not fall into the RDBMS category.\r\nElements of the relational DBMS that overarch the basic relational database are so intrinsic to operations that it is hard to dissociate the two in practice.\r\nThe most basic features of RDBMS are related to create, read, update and delete operations, collectively known as CRUD. They form the foundation of a well-organized system that promotes consistent treatment of data.\r\nThe RDBMS typically provides data dictionaries and metadata collections useful in data handling. These programmatically support well-defined data structures and relationships. Data storage management is a common capability of the RDBMS, and this has come to be defined by data objects that range from binary large object (blob) strings to stored procedures. Data objects like this extend the scope of basic relational database operations and can be handled in a variety of ways in different RDBMSes.\r\nThe most common means of data access for the RDBMS is via SQL. Its main language components comprise data manipulation language (DML) and data definition language (DDL) statements. Extensions are available for development efforts that pair SQL use with common programming languages, such as COBOL (Common Business-Oriented Language), Java and .NET.\r\nRDBMSes use complex algorithms that support multiple concurrent user access to the database, while maintaining data integrity. Security management, which enforces policy-based access, is yet another overlay service that the RDBMS provides for the basic database as it is used in enterprise settings.\r\nRDBMSes support the work of database administrators (DBAs) who must manage and monitor database activity. Utilities help automate data loading and database backup. RDBMS systems manage log files that track system performance based on selected operational parameters. This enables measurement of database usage, capacity and performance, particularly query performance. RDBMSes provide graphical interfaces that help DBAs visualize database activity.\r\nRelational database management systems are central to key applications, such as banking ledgers, travel reservation systems and online retailing. As RDBMSes have matured, they have achieved increasingly higher levels of query optimization, and they have become key parts of reporting, analytics and data warehousing applications for businesses as well. \r\nRDBMSes are intrinsic to operations of a variety of enterprise applications and are at the center of most master data management (MDM) systems.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What are the advantages of a Relational Database Management System?</span></h1>\r\nA Relational Database Management System (RDBMS) is a software system that provides access to a relational database. The software system is a collection of software applications that can be used to create, maintain, manage and use the database. A "relational database" is a database structured on the "relational" model. Data are stored and presented in a tabular format, organized in rows and columns with one record per row.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Data Structure.</span> The table format is simple and easy for database users to understand and use. Relational database management software provide data access using a natural structure and organization of the data. Database queries can search any column for matching entries.</li></ul>\r\n<dl></dl>\r\n<ul><li><span style=\"font-weight: bold;\">Multi-User Access.</span> RDBMS database program allow multiple database users to access a database simultaneously. Built-in locking and transactions management functionality allow users to access data as it is being changed, prevents collisions between two users updating the data, and keeps users from accessing partially updated records.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Privileges. </span>Authorization and privilege control features in an RDBMS allow the database administrator to restrict access to authorized users, and grant privileges to individual users based on the types of database tasks they need to perform. Authorization can be defined based on the remote client IP address in combination with user authorization, restricting access to specific external computer systems.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Network Access.</span> RDBMSs provide access to the database through a server daemon, a specialized software program that listens for requests on a network, and allows database clients to connect to and use the database. Users do not need to be able to log in to the physical computer system to use the database, providing convenience for the users and a layer of security for the database. Network access allows developers to build desktop tools and Web applications to interact with databases.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Speed.</span> The relational database model is not the fastest data structure. RDBMS software advantages, such as simplicity, make the slower speed a fair trade-off. Optimizations built into an RDBMS, and the design of the databases, enhance performance, allowing RDBMSs to perform more than fast enough for most applications and data sets. Improvements in technology, increasing processor speeds and decreasing memory and storage costs allow systems administrators to build incredibly fast systems that can overcome any database performance shortcomings.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Maintenance. </span>RDBMSs feature maintenance utilities that provide database administrators with tools to easily maintain, test, repair and back up the databases housed in the system. Many of the functions can be automated using built-in automation in the RDBMS, or automation tools available on the operating system.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Language.</span> RDBMSs support a generic language called "Structured Query Language" (SQL). The SQL syntax is simple, and the language uses standard English language keywords and phrasing, making it fairly intuitive and easy to learn. Many RDBMSs add non-SQL, database-specific keywords, functions and features to the SQL language.</li></ul>\r\n\r\n","iconURL":"https://roi4cio.com/fileadmin/user_upload/Relational_Database_Management_Systems.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":8,"title":"Reduce Production Timelines"},{"id":254,"title":"Centralize management"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":178,"title":"No control over data access"},{"id":350,"title":"No monitoring of corporate IT processes"},{"id":370,"title":"No automated business processes"},{"id":378,"title":"Low employee productivity"}]}},"categories":[{"id":239,"title":"Relational Database Management Systems","alias":"relational-database-management-systems","description":" Relational Database Management System (RDBMS) is a DBMS designed specifically for relational databases. Therefore, RDBMSes are a subset of DBMSes.\r\nA relational database refers to a database that stores data in a structured format, using rows and columns. This makes it easy to locate and access specific values within the database. It is "relational" because the values within each table are related to each other. Tables may also be related to other tables. The relational structure makes it possible to run queries across multiple tables at once.\r\nWhile a relational database describes the type of database an RDMBS manages, the RDBMS refers to the database program itself. It is the software that executes queries on the data, including adding, updating, and searching for values.\r\nAn RDBMS may also provide a visual representation of the data. For example, it may display data in a tables like a spreadsheet, allowing you to view and even edit individual values in the table. Some relational database softwareallow you to create forms that can streamline entering, editing, and deleting data.\r\nMost well known DBMS applications fall into the RDBMS category. Examples include Oracle Database, MySQL, Microsoft SQL Server, and IBM DB2. Some of these programs support non-relational databases, but they are primarily used for relational database management.\r\nExamples of non-relational databases include Apache HBase, IBM Domino, and Oracle NoSQL Database. These type of databases are managed by other DMBS programs that support NoSQL, which do not fall into the RDBMS category.\r\nElements of the relational DBMS that overarch the basic relational database are so intrinsic to operations that it is hard to dissociate the two in practice.\r\nThe most basic features of RDBMS are related to create, read, update and delete operations, collectively known as CRUD. They form the foundation of a well-organized system that promotes consistent treatment of data.\r\nThe RDBMS typically provides data dictionaries and metadata collections useful in data handling. These programmatically support well-defined data structures and relationships. Data storage management is a common capability of the RDBMS, and this has come to be defined by data objects that range from binary large object (blob) strings to stored procedures. Data objects like this extend the scope of basic relational database operations and can be handled in a variety of ways in different RDBMSes.\r\nThe most common means of data access for the RDBMS is via SQL. Its main language components comprise data manipulation language (DML) and data definition language (DDL) statements. Extensions are available for development efforts that pair SQL use with common programming languages, such as COBOL (Common Business-Oriented Language), Java and .NET.\r\nRDBMSes use complex algorithms that support multiple concurrent user access to the database, while maintaining data integrity. Security management, which enforces policy-based access, is yet another overlay service that the RDBMS provides for the basic database as it is used in enterprise settings.\r\nRDBMSes support the work of database administrators (DBAs) who must manage and monitor database activity. Utilities help automate data loading and database backup. RDBMS systems manage log files that track system performance based on selected operational parameters. This enables measurement of database usage, capacity and performance, particularly query performance. RDBMSes provide graphical interfaces that help DBAs visualize database activity.\r\nRelational database management systems are central to key applications, such as banking ledgers, travel reservation systems and online retailing. As RDBMSes have matured, they have achieved increasingly higher levels of query optimization, and they have become key parts of reporting, analytics and data warehousing applications for businesses as well. \r\nRDBMSes are intrinsic to operations of a variety of enterprise applications and are at the center of most master data management (MDM) systems.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What are the advantages of a Relational Database Management System?</span></h1>\r\nA Relational Database Management System (RDBMS) is a software system that provides access to a relational database. The software system is a collection of software applications that can be used to create, maintain, manage and use the database. A "relational database" is a database structured on the "relational" model. Data are stored and presented in a tabular format, organized in rows and columns with one record per row.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Data Structure.</span> The table format is simple and easy for database users to understand and use. Relational database management software provide data access using a natural structure and organization of the data. Database queries can search any column for matching entries.</li></ul>\r\n<dl></dl>\r\n<ul><li><span style=\"font-weight: bold;\">Multi-User Access.</span> RDBMS database program allow multiple database users to access a database simultaneously. Built-in locking and transactions management functionality allow users to access data as it is being changed, prevents collisions between two users updating the data, and keeps users from accessing partially updated records.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Privileges. </span>Authorization and privilege control features in an RDBMS allow the database administrator to restrict access to authorized users, and grant privileges to individual users based on the types of database tasks they need to perform. Authorization can be defined based on the remote client IP address in combination with user authorization, restricting access to specific external computer systems.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Network Access.</span> RDBMSs provide access to the database through a server daemon, a specialized software program that listens for requests on a network, and allows database clients to connect to and use the database. Users do not need to be able to log in to the physical computer system to use the database, providing convenience for the users and a layer of security for the database. Network access allows developers to build desktop tools and Web applications to interact with databases.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Speed.</span> The relational database model is not the fastest data structure. RDBMS software advantages, such as simplicity, make the slower speed a fair trade-off. Optimizations built into an RDBMS, and the design of the databases, enhance performance, allowing RDBMSs to perform more than fast enough for most applications and data sets. Improvements in technology, increasing processor speeds and decreasing memory and storage costs allow systems administrators to build incredibly fast systems that can overcome any database performance shortcomings.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Maintenance. </span>RDBMSs feature maintenance utilities that provide database administrators with tools to easily maintain, test, repair and back up the databases housed in the system. Many of the functions can be automated using built-in automation in the RDBMS, or automation tools available on the operating system.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Language.</span> RDBMSs support a generic language called "Structured Query Language" (SQL). The SQL syntax is simple, and the language uses standard English language keywords and phrasing, making it fairly intuitive and easy to learn. Many RDBMSs add non-SQL, database-specific keywords, functions and features to the SQL language.</li></ul>\r\n\r\n","iconURL":"https://roi4cio.com/fileadmin/user_upload/Relational_Database_Management_Systems.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.solti.ua/sozdaniye-servernogo-klastera-vysokoy-dostupnosti-dlya-kp-kharkovvodokanal/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"modernization-of-the-power-supply-system-for-utility-company":{"id":1002,"title":"Modernization of the power supply system for utility company","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"modernization-of-the-power-supply-system-for-utility-company","roi":0,"seo":{"title":"Modernization of the power supply system for utility company","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Modernization of the power supply system for utility company","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":7573,"title":"City Informational Center","logoURL":"https://roi4cio.com/uploads/roi/company/GIC.jpg","alias":"gorodskoi-informacionnyi-centr-kp","address":"","roles":[],"description":" Municipal enterprise "City Information Center" - is engaged in the development and implementation of projects in the field of vital services of Kharkov and its infrastructure, aimed at improving and optimizing the activities of territorial communities, as well as ensuring their smooth functioning.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.infocity.kharkov.ua/ru/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"City Informational Center","keywords":"","description":" Municipal enterprise "City Information Center" - is engaged in the development and implementation of projects in the field of vital services of Kharkov and its infrastructure, aimed at improving and optimizing the activities of territorial communiti","og:title":"City Informational Center","og:description":" Municipal enterprise "City Information Center" - is engaged in the development and implementation of projects in the field of vital services of Kharkov and its infrastructure, aimed at improving and optimizing the activities of territorial communiti","og:image":"https://roi4cio.com/uploads/roi/company/GIC.jpg"},"eventUrl":""},"supplier":{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""},"vendors":[{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""}],"products":[{"id":5064,"logo":false,"scheme":false,"title":"Системы электроснабжения by SOLTI","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"alias":"sistemy-ehlektrosnabzhenija-by-solti","companyTypes":[],"description":" Современное оборудование (серверы, СХД, компьютеры, активное сетевое оборудование, телекоммуникационная аппаратура и пр.) весьма требовательно к качеству электроэнергии. Правильность и надежность его подключения к существующей системе электропитания связано с повышенным риском нарушения рабочего режима техники.\r\nSOLTI оказывает услуги по полному комплексу проектных, монтажных и пуско-наладочных работ по созданию системы электроснабжения промышленных предприятий:\r\n<ul><li>сети номинального напряжения 220/380 В — розеточные сети и освещение, оборудование с малым потреблением электроэнергии;</li></ul>\r\n<ul><li>системы аварийного электроснабжения — действуют в качестве резервных при авариях на основных, в их состав входят генераторы и бесперебойные источники питания.</li></ul>\r\nДля выбора оптимального оборудования, обеспечения эффективности созданной системы электроснабжения предприятия и гарантирования правильной работы ее элементов специалисты SOLTI проводят анализ и планирование будущих нагрузок, которые будут воздействовать на систему.<br />\r\nМонтаж и настройка оборудования, сдача энергообъектов в эксплуатацию производятся в жестком соответствии с действующими нормами и стандартами, рекомендованными производителями оборудования и требованиями Украинского законодательства.<br />\r\nРаботы выполняются высокопрофессиональными специалистами, имеющими большой опыт работы и соответствующие допуски по электробезопасности, что гарантирует правильную и надежную работу установленного оборудования. На все виды монтажных и пуско-наладочных работ SOLTI дает гарантию.<br /><br /><span style=\"font-weight: bold;\">СИСТЕМЫ АВАРИЙНОГО ЭЛЕКТРОСНАБЖЕНИЯ</span><br />\r\nБЕСПЕРЕБОЙНОЕ ЭЛЕКТРОСНАБЖЕНИЕ<br />Резервный источник электропитания — источник бесперебойного электропитания (ИБП)<br />\r\nГАРАНТИРОВАННОЕ ЭЛЕКТРОСНАБЖЕНИЕ<br />Резервный источник электропитания — дизель-генераторная установка (ДГУ)<br />\r\nСХЕМА ПОВЫШЕННОЙ НАДЕЖНОСТИ<br />Комбинированное использование источника бесперебойного электропитания и дизель-генераторной установки<br /><br /><span style=\"font-weight: bold;\">ВОЗМОЖНОСТИ</span><br />\r\nБЕСПЕРЕБОЙНОЕ ЭЛЕКТРОСНАБЖЕНИЕ\r\n<ul><li>бесперебойное электропитание потребителей, подключенных через ИБП;</li></ul>\r\n<ul><li>регулируемое выходное напряжение чистой синусоидальной формы;</li></ul>\r\n<ul><li>совместимость с дизель-генераторами ;</li></ul>\r\n<ul><li>максимальная защита против всплесков, скачков, перепадов и отключений напряжения;</li></ul>\r\n<ul><li>возможность бесперебойного переключения нагрузки на питание от внешней электросети через встроенный и внешний байпас;</li></ul>\r\n<ul><li>дистанционный мониторинг и управление параметрами ИБП.</li></ul>\r\n<br /><span style=\"font-weight: bold;\">ГАРАНТИРОВАННОЕ ЭЛЕКТРОСНАБЖЕНИЕ</span><br />\r\n\r\n<ul><li>гарантированное электропитание подключенных потребителей;</li></ul>\r\n<ul><li>автоматический запуск дизель-генератора при отклонении параметров основной внешней сети электропитания или полном ее отключении;</li></ul>\r\n<ul><li>автоматическое переключение нагрузки с основной внешней сети электропитания на дизель-генератор и обратно;</li></ul>\r\n<ul><li>выдача сигнала тревоги на пост диспетчера в случае аварийного события с оборудованием ДГУ.</li></ul>","shortDescription":"SOLTI оказывает услуги по полному комплексу проектных, монтажных и пуско-наладочных работ по созданию системы электроснабжения промышленных предприятий.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Системы электроснабжения by SOLTI","keywords":"","description":" Современное оборудование (серверы, СХД, компьютеры, активное сетевое оборудование, телекоммуникационная аппаратура и пр.) весьма требовательно к качеству электроэнергии. Правильность и надежность его подключения к существующей системе электропитания связано с","og:title":"Системы электроснабжения by SOLTI","og:description":" Современное оборудование (серверы, СХД, компьютеры, активное сетевое оборудование, телекоммуникационная аппаратура и пр.) весьма требовательно к качеству электроэнергии. Правильность и надежность его подключения к существующей системе электропитания связано с"},"eventUrl":"","translationId":7088,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":729,"title":"IT Project Deployment Services","alias":"it-project-deployment-services","description":" Companies invest in projects for the implementation of IT systems that are consistent with the organization's values, with the goal of realizing a business vision, stable support for operational activities, and gaining competitive advantages. In this regard, technological projects are becoming increasingly large-scale, affecting more departments of the organization, and pose a risk to the company if the operation of information systems is disrupted.\r\nThe introduction of new IT requires the project team to carry out at least two principal stages:\r\n<ul><li>pre-project analysis of the enterprise, when, with the help of specialists in the proposed IP and specialists of the enterprise, compliance and discrepancies between the system and its future use is revealed. As a result of the survey, ways to eliminate inconsistencies are determined based on the initial assessment of the required resources and time. The survey is conducted using questions and answers, to some extent formalized, and special software tools that allow you to describe the processes of the system and the enterprise and compare them visually. No changes take place at the enterprise unless individual employees are distracted from their direct duties, which is both a virtue and a disadvantage of this approach;</li><li>trial implementation carried out on the most characteristic site of work. Based on this test work, a general assessment of future implementation is determined and a fundamental decision is made on the use of IP.</li></ul>\r\nThere is a lot of confusion and substitution of the concept of “project team” with the idea of it as a “group”, “pack”, “family”, etc. There are several understandings that there is a modern “project team/group” and “integrated project team”, however, the fundamental characteristic of the team is that it does not exist outside the project. A team with all its human strengths and weaknesses is a necessary and inseparable element of any project. It is a developing element of the technology of the project and affects the project itself.\r\nThe project itself is not “done” - it is made by people, and where people are affected by the influence of biology, instincts, gender parameters, “conscious” and “unconscious”, etc. If people are in the organizational “system” (family, flock, group, team, etc.), systemic effects arise that should be foreseen in the formation of a set of people due to the competent selection, placement and development of the team in the right direction. This is not just an ordinary organizational question, but a question of the depth of understanding of the essence of the project, its management and the skill of the leader.","materialsDescription":" <span style=\"font-weight: bold;\">What is an IT project?</span>\r\nAn IT project is a project that includes work related to information technology.\r\n<span style=\"font-weight: bold;\">What is information technology?</span>\r\nInformation technology is a technology aimed at the creation, development and support of information systems.\r\n<span style=\"font-weight: bold;\">What are the main ideas underlying the project team model of an IT project?</span>\r\n<ul><li>interdependent and interrelated roles in a small group;</li><li>determination of the role, special mission and area of responsibility for each member of the project team;</li><li>distributed project management and responsibility;</li><li>each is focused on the success of the project and is set to work throughout the project cycle;</li><li>communication between project team members is a key success factor;</li><li>users and training staff are included in the project team;</li><li>parallel engineering - parallel work of all team members on a project.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Deployment_Services.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"},{"id":366,"title":"IT infrastructure consumes a lot of power"},{"id":397,"title":"Insufficient risk management"},{"id":400,"title":"High costs"}]}},"categories":[{"id":729,"title":"IT Project Deployment Services","alias":"it-project-deployment-services","description":" Companies invest in projects for the implementation of IT systems that are consistent with the organization's values, with the goal of realizing a business vision, stable support for operational activities, and gaining competitive advantages. In this regard, technological projects are becoming increasingly large-scale, affecting more departments of the organization, and pose a risk to the company if the operation of information systems is disrupted.\r\nThe introduction of new IT requires the project team to carry out at least two principal stages:\r\n<ul><li>pre-project analysis of the enterprise, when, with the help of specialists in the proposed IP and specialists of the enterprise, compliance and discrepancies between the system and its future use is revealed. As a result of the survey, ways to eliminate inconsistencies are determined based on the initial assessment of the required resources and time. The survey is conducted using questions and answers, to some extent formalized, and special software tools that allow you to describe the processes of the system and the enterprise and compare them visually. No changes take place at the enterprise unless individual employees are distracted from their direct duties, which is both a virtue and a disadvantage of this approach;</li><li>trial implementation carried out on the most characteristic site of work. Based on this test work, a general assessment of future implementation is determined and a fundamental decision is made on the use of IP.</li></ul>\r\nThere is a lot of confusion and substitution of the concept of “project team” with the idea of it as a “group”, “pack”, “family”, etc. There are several understandings that there is a modern “project team/group” and “integrated project team”, however, the fundamental characteristic of the team is that it does not exist outside the project. A team with all its human strengths and weaknesses is a necessary and inseparable element of any project. It is a developing element of the technology of the project and affects the project itself.\r\nThe project itself is not “done” - it is made by people, and where people are affected by the influence of biology, instincts, gender parameters, “conscious” and “unconscious”, etc. If people are in the organizational “system” (family, flock, group, team, etc.), systemic effects arise that should be foreseen in the formation of a set of people due to the competent selection, placement and development of the team in the right direction. This is not just an ordinary organizational question, but a question of the depth of understanding of the essence of the project, its management and the skill of the leader.","materialsDescription":" <span style=\"font-weight: bold;\">What is an IT project?</span>\r\nAn IT project is a project that includes work related to information technology.\r\n<span style=\"font-weight: bold;\">What is information technology?</span>\r\nInformation technology is a technology aimed at the creation, development and support of information systems.\r\n<span style=\"font-weight: bold;\">What are the main ideas underlying the project team model of an IT project?</span>\r\n<ul><li>interdependent and interrelated roles in a small group;</li><li>determination of the role, special mission and area of responsibility for each member of the project team;</li><li>distributed project management and responsibility;</li><li>each is focused on the success of the project and is set to work throughout the project cycle;</li><li>communication between project team members is a key success factor;</li><li>users and training staff are included in the project team;</li><li>parallel engineering - parallel work of all team members on a project.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Deployment_Services.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.solti.ua/modernizatsiya-sistemy-bespereboynogo-pitaniya-moshchnostyu-120-kvt-dlya-tsoda-yedinoy-informatsionnoy-sistemy-kharkovskogo-gorodskogo-soveta/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"structured-cabling-system-scs-for-the-kharkiv-regional-state-administration":{"id":998,"title":"Structured Cabling System (SCS) for the Kharkiv Regional State Administration","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"structured-cabling-system-scs-for-the-kharkiv-regional-state-administration","roi":0,"seo":{"title":"Structured Cabling System (SCS) for the Kharkiv Regional State Administration","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Structured Cabling System (SCS) for the Kharkiv Regional State Administration","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":7570,"title":"KHARKIV REGIONAL STATE ADMINISTRATION","logoURL":"https://roi4cio.com/uploads/roi/company/KHOGA.png","alias":"kharkovskaja-oblastnaja-gosudarstvennaja-administracija","address":"","roles":[],"description":" Kharkiv Regional State Administration, HOGA (Ukrainian: Kharkov Oblast State Administration, HODA) is an executive authority in the Kharkov region of Ukraine.\r\nThe head of the regional state administration is appointed by the President of Ukraine.<br />\r\nLocal government in the field of existence of the Kharkiv Regional Council.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":3,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://kharkivoda.gov.ua/ru","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"KHARKIV REGIONAL STATE ADMINISTRATION","keywords":"","description":" Kharkiv Regional State Administration, HOGA (Ukrainian: Kharkov Oblast State Administration, HODA) is an executive authority in the Kharkov region of Ukraine.\r\nThe head of the regional state administration is appointed by the President of Ukraine.<br />\r\nLoca","og:title":"KHARKIV REGIONAL STATE ADMINISTRATION","og:description":" Kharkiv Regional State Administration, HOGA (Ukrainian: Kharkov Oblast State Administration, HODA) is an executive authority in the Kharkov region of Ukraine.\r\nThe head of the regional state administration is appointed by the President of Ukraine.<br />\r\nLoca","og:image":"https://roi4cio.com/uploads/roi/company/KHOGA.png"},"eventUrl":""},"supplier":{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""},"vendors":[{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""}],"products":[{"id":5062,"logo":false,"scheme":false,"title":"Структурированная кабельная система (СКС) by SOLTI","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"alias":"strukturirovannaja-kabelnaja-sistema-sks-by-solti","companyTypes":[],"description":" Структурированная кабельная система (СКС) — связующая основа информационного и коммуникационного пространства предприятия. Состоит из кабельных линий, промежуточного и оконечного компьютерного или иного оборудования, позволяющего коммутировать связи между помещениями, этажами, подразделениями предприятия.\r\nСпециалисты SOLTI выполняют весь комплекс работ по проектированию, монтажу и обслуживанию оптоволоконных и медножильных структурированных кабельных систем.<br /><br />ПРЕИМУЩЕСТВА СТРУКТУРИРОВАННЫХ СИСТЕМ\r\n<ul><li>глубокая интеграция подсистем</li></ul>\r\n<ul><li>минимизация затрат времени и материальных ресурсов на управление предприятием</li></ul>\r\n<ul><li>оперативное получение информации и влияние на процессы с учетом допусков, установленных руководством для каждого сотрудника</li></ul>\r\nВИДЫ ОБЪЕКТОВ\r\n<ul><li>офисные и жилые помещения: административные здания, учебные учреждения, коттеджи</li></ul>\r\n<ul><li>промышленные предприятия — для эксплуатации в неблагоприятных условиях окружающей среды: высокая влажность, перепады температуры, вибрация, пыль</li></ul>\r\n<ul><li>объекты с повышенными требованиями к электромагнитным помехам: лечебные заведения, аэропорты</li></ul>\r\n<br />ЭТАПЫ СОЗДАНИЯ СТРУКТУРИРОВАННОЙ КАБЕЛЬНОЙ СИСТЕМЫ<br />\r\n1. ПРЕДПРОЕКТНОЕ ОБСЛЕДОВАНИЕ<br />\r\nСпециалисты SOLTI проводят визуальный осмотр объекта, уточняют техническое состояние и характеристики помещений здания, влияющие на сложность и стоимость работ: толщину и материал стен, наличие каналов и фальш-перекрытий и пр. Сопоставляют их с поэтажными чертежами.<br />\r\n<span style=\"font-weight: bold; \">Результат этапа — техническое задание (ТЗ)</span><br />\r\nОжидаемо, что функция формирования технического задания (ТЗ) возлагается на Заказчика.<br />\r\nНо, понимая глубину задачи и множество нюансов, возникающих при проектировании, специалисты SOLTI готовы составить грамотное техническое задание с учетом задач, которые будет решать СКС и пожеланий заказчика к конечному результату.<br />\r\n2. ПРЕДПРОЕКТНОЕ ТЕХНИКО–ЭКОНОМИЧЕСКОЕ ОБОСНОВАНИЕ<br />\r\nСпециалистами SOLTI совместно с сотрудниками заказчика на базе ТЗ формируется предварительный проект. Бюджетируется процес создания структурированной кабельной сети (СКС).<br />\r\nЗаказчик определяется с возможными этапами внедрения и с этапами финансирования.<br />\r\nЗаказчик вносит дополнения, поправки и изменения, которые оперативно учитываются и дорабатываются разработчиками-проектантами.<br />\r\n<span style=\"font-weight: bold; \">Результат этапа — технико-экономическое обоснование</span><br />\r\nСодержит:\r\n<ul><li>эскизный проект</li></ul>\r\n<ul><li>предварительное коммерческое предложение для оценки бюджета заказчиком</li></ul>\r\n3. ПРОЕКТИРОВАНИЕ<br />\r\nПроектирование — самый ответственный этап: грамотно спроектированная СКС позволит сократить стоимость системы не только на этапе внедрения, но и в процессе ее эксплуатации и последующей модернизации.<br />\r\nПри проектировании сети СКС закладывается возможность для дальнейшего ее расширения без реструктуризации в будущем.<br />\r\nСоставляется проектная документация, учитывающая пожелания и финансовые возможности заказчика.<br />\r\n<span style=\"font-weight: bold; \">Результат этапа — проектная документация:</span>\r\n<ul><li>описание проекта</li></ul>\r\n<ul><li>спецификация на необходимое активное и пассивное оборудование</li></ul>\r\n<ul><li>план расположения рабочих мест и коммутационных центров</li></ul>\r\n<ul><li>схематический чертеж расположения кабельных каналов и трасс</li></ul>\r\n<ul><li>смета выполнения работ</li></ul>\r\n4. МОНТАЖ<br />\r\nОсуществляется монтаж кабельной инфраструктуры в соответствии с проектной документацией и согласованным с заказчиком графиком работ.<br />\r\nПри монтаже СКС используется сертифицированное пассивное оборудование известных производителей, каждый элемент структурированной сети обязательно маркируется.<br />\r\nРаботы выполняются монтажным подразделением SOLTI, состоящим из специалистов, имеющих не только знания по способам и стандартам прокладки сетей, но и большой практический опыт.<br />\r\n<span style=\"font-weight: bold; \">Результат этапа — СКС, практически готовая к эксплуатации</span> и требующая только завершающей операции — тестирования.<br />Гарантия высокого качества и надежности монтажа в максимально короткие сроки, без отрыва от работы сотрудников заказчика.<br />\r\n5. ТЕСТИРОВАНИЕ<br />\r\nКомплексное тестирование кабельных соединений на целостность, соответствие подключений, соответствие стандартам.<br />\r\nДля тестирования СКС возможно использование кабельного анализатора Fluke DTX-1800, обеспечивающего проведение измерений на уровне отраслевых стандартов.<br />\r\nНаши СКС соответствуют международным (ISO 11801), американским (ANSI/EIA/TIA 568, ANSI/EIA/TIA 569), европейским (EN 50173) стандартам.<br />\r\n<span style=\"font-weight: bold; \">Результат этапа — эксплуатационная (проектно-эксплуатационная) документация:</span>\r\n<ul><li>схема СКС</li></ul>\r\n<ul><li>кабельный журнал</li></ul>\r\n<ul><li>спецификации использованных тестов</li></ul>\r\n<ul><li>отчёт по тестированию соединений</li></ul>\r\n6. СЕРТИФИКАЦИЯ (ГАРАНТИЯ ДО 25 ЛЕТ)<br />\r\nДополнительно, по желанию заказчика, специалисты SOLTI могут провести сертификацию кабельной системы, подтверждающую надежность и высокое качество СКС.<br />\r\nВозможна постановка на гарантийный учет у производителей СКС, что дает право пользования фирменной гарантией производителя.\r\n<span style=\"font-weight: bold;\">Результат — дополнительно (по желанию) предоставляется:</span>\r\n<ul><li>25-летняя Системная Гарантия TE25 Enterprise Networks:</li></ul>\r\n<ul><li>25-летняя Расширенная Компонентная Гарантия TE25 Enterprise Networks</li></ul>\r\n<br />АУТСОРСИНГ: CОПРОВОЖДЕНИЕ /АДМИНИСТРИРОВАНИЕ<br />После окончания работ по монтажу и сертификации структурированной кабельной системы SOLTI оказывает техническую поддержку созданной СКС:\r\n<ul><li>поддержка в исправном состоянии;</li></ul>\r\n<ul><li>решение инцидентов СКС;</li></ul>\r\n<ul><li>организация новых объектов.</li></ul>\r\nВозможно заключение договора на управление структурированной кабельной системой","shortDescription":"Специалисты SOLTI выполняют весь комплекс работ по проектированию, монтажу и обслуживанию оптоволоконных и медножильных структурированных кабельных систем.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Структурированная кабельная система (СКС) by SOLTI","keywords":"","description":" Структурированная кабельная система (СКС) — связующая основа информационного и коммуникационного пространства предприятия. Состоит из кабельных линий, промежуточного и оконечного компьютерного или иного оборудования, позволяющего коммутировать связи между пом","og:title":"Структурированная кабельная система (СКС) by SOLTI","og:description":" Структурированная кабельная система (СКС) — связующая основа информационного и коммуникационного пространства предприятия. Состоит из кабельных линий, промежуточного и оконечного компьютерного или иного оборудования, позволяющего коммутировать связи между пом"},"eventUrl":"","translationId":7086,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":743,"title":"IT System documentation writing","alias":"it-system-documentation-writing","description":" Without the development of technical documentation, it is impossible to create any complex technical solution. High-quality documentation, that is, informative, complete and understandable, is the key to the success of products at all stages of its life cycle. Properly written documentation is the basis of the functionality and effectiveness of information systems. It is with its use that the processes of creating databases, developing software, selecting and configuring network and server software are carried out.\r\nMany organizations at the initial stages of creating and implementing technical solutions do not pay enough attention to this factor, which often prevents the entry of a new product to the market.\r\nWriting documentation requires the contractor to have specific knowledge and skills, certain experience and considerable labor costs.\r\nThe main task of the working documentation is to give a complete picture of how the system is structured, what it consists of and how it functions.\r\nThere is no single standard for the development of this type of documentation. In most cases, its structure is selected for a specific situation. But you can take any algorithm that has already proven its effectiveness as the basis.","materialsDescription":"<span style=\"font-weight: bold; \">What is software documentation?</span>\r\nSoftware documentation - printed user manuals, online (online) documentation and help text describing how to use the software product.\r\n<span style=\"font-weight: bold; \">What is process documentation?</span>\r\nA process document outlines the steps necessary to complete a task or process. It is internal, ongoing documentation of the process while it is occurring—documentation cares more about the “how” of implementation than the “what” of process impact.\r\n<span style=\"font-weight: bold;\">What should be in the working documentation?</span>\r\nFirst of all, technical descriptions of implemented solutions. These are IT infrastructure diagrams, configuration descriptions, etc.\r\n<span style=\"font-weight: bold;\">What does well-written working documentation give?</span>\r\n<ul><li>systematizes data on IT infrastructure;</li><li>helps to understand the system architecture and functioning of connected services;</li><li>facilitates management decisions (for example, shows which service can be removed or replaced and how it will be displayed on the whole system);</li><li>makes it possible to comprehensively evaluate the selected IT structure and, also, timely notice the mistakes made or holes in the architecture.</li></ul>\r\n<span style=\"font-weight: bold;\">What are the key benefits of writing technical documentation?</span>\r\nThe development of documentation will allow you to:\r\n<ul><li>increase user satisfaction</li><li>reduce the load on the system administrator;</li><li>reduce system support costs.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_System_documentation_writing.png"},{"id":741,"title":"Proof of Concept","alias":"proof-of-concept","description":"Proof of concept (PoC) is a realization of a certain method or idea in order to demonstrate its feasibility, or a demonstration in principle with the aim of verifying that some concept or theory has practical potential. A proof of concept is usually small and may or may not be complete.\r\nProof of concept (POC) is used to test the idea of a certain technical feature or the general design of a product and prove that it is possible to apply those ideas.\r\nIt could be used to test something on just one part of the product before it is tried in practice with making a prototype.\r\nYou can think of this as a pre-prototype version of the product, but it is not even that since POC shouldn’t have all the features as the final product, not even as the prototype.\r\nThe main goal of POC is to prove that it is actually possible to develop that idea and include it as part of the final product.","materialsDescription":" <span style=\"font-weight: bold;\">What is a proof of concept?</span>\r\nProof of concept is the testing of the finished product based on the idea. Thus, this stage is the first phase in the design of the application. It explains how the project should work on the basis of a detailed description of requirements and specifications. The proof is the complete satisfaction of those functions that need to be realized. This approach makes it easier to hire developers for a startup in the future.\r\nIn order to confirm the concept in software development, it is necessary to determine the main tasks and perform the following steps:\r\n<ol><li>Identify project goals and methods for their implementation.</li><li>Receive feedback from users and customers.</li><li>Correct the idea and start implementing it.</li></ol>\r\n<span style=\"font-weight: bold;\">Project goals and methods of implementation</span>\r\nBefore you start, you need to understand what goal will perform a project. A web project can be a large marketplace or social network with unique features and a convenient solution. Also, it may be a CRM system and help the business to increase sales or improve the accounting of business resources. One way or another, each platform has a specific purpose.\r\nThe next step is to build methods of achieving the goal. At this stage, it is important not to delve into the details, but to evaluate common elements. How the project will work, what functions will be implemented, how the web application will interact with users, etc. It is very important to consider each item and write it down in the report. In fact, this is a small brainstorm. Typically, it takes from a few days to a couple of weeks. When the implementation plan is completed, you can begin to collect feedback from future users.\r\n<span style=\"font-weight: bold;\">Feedback from users and customers</span>\r\nWhen you have a ready document with a description of the project and the functions, then you need to get feedback from users or customers. Offer them your solution to a particular problem. Familiarize them with the implementation methods. You will receive many suggestions for improvement. At this point, some of your guesswork will be broken. It is important to listen and collect feedback. There is no need to hurry and change the concept or implement everything that future users are asking for. They don't have an expert evaluation and this is only their proposal.\r\n<span style=\"font-weight: bold;\">Idea correction and implementation</span>\r\nIt is at this stage that the final proof of the concept takes place. Having received feedback, you can clearly understand how users will interact with your project. What emotions it will cause. It is necessary to understand that this is a preliminary evaluation of the concept. Some recommendations may not have value, as others can significantly affect the further development. Thus, based on the information received, it is necessary to consider what can be changed to make the project more convenient. If you received a lot of negative feedback, it makes sense to stop the development process. Or at least think about a new improved version. So, if you really decided to start the development, we recommend starting the design with MVP. The minimal version will allow us to develop the project in the shortest possible time and check the idea on real users.\r\nProof of the concept is one of the important stages in the development of complex and expensive projects. It allows with high probability to determine the value of the project even before the begins development. Typically, the process takes from a few days to a couple of weeks. It gives a clear idea of how the project will work and what functions it will perform. If you approach the feedback analysis process with a clean head, this step in the future can save you money and time.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Proof_of_Concept.png"},{"id":739,"title":"Deployment and Integration Services","alias":"deployment-and-integration-services","description":" The number of various solutions implemented by customers today is quite large. Often, the subsystems of the seemingly unified IT landscape are either weakly connected with each other, or the interaction between them is established in the mode of transferring files and data by mail or “from hand to hand”.\r\nWestern IT vendors, following a certain trend, offer the customer complete and unified solutions. Such blocks of subsystems solve a specific task and form separate IT centers, which also require the mutual integration of infrastructures. This, oddly enough, is even more difficult, as a complete solution does not allow to penetrate deeply and get access to the required information or control subsystems.\r\nNevertheless, the integration and interconnection of information flows can significantly simplify business processes and lead to an increase in the efficiency of interaction both inside and outside the company (with customers and partners).\r\nThe integration task itself is important for business, as it provides a qualitatively new level of services. This is especially important for companies where IT is the immediate tool for achieving business goals. But it is equally important to make integration optimal in the light of minimizing not only the cost of purchasing equipment and software but also preserving previous IT investments.","materialsDescription":" <span style=\"font-weight: bold; \">The main types of implementation and integration services offered by companies:</span>\r\n<ul><li>Designing IT architecture for integration solutions in the field of analytics, automation and monitoring of business processes;</li><li>Development and integration of network infrastructure subsystems, including scalable telecommunications equipment, server equipment and workstations;</li><li>Defining a single platform and developing a solution for integrating enterprise applications, data and business processes;</li><li>Implementation and maintenance of integrated integration solutions in the field of enterprise management (ERP-systems);</li><li>Implementation and maintenance of integration solutions in the field of accounting and analysis of sales and customer relations (CRM-system);</li><li>Implementation and maintenance of integration solutions in the field of accounting and financial analysis;</li><li>Impairment, testing and development of solutions for ensuring information security of a business.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Deployment_and_Integration_Services.png"},{"id":737,"title":"IT System Testing","alias":"it-system-testing","description":" System testing is testing conducted on a complete integrated system to evaluate the system's compliance with its specified requirements.\r\nSystem testing takes, as its input, all of the integrated components that have passed integration testing. The purpose of integration testing is to detect any inconsistencies between the units that are integrated together (called assemblages). System testing seeks to detect defects both within the "inter-assemblages" and also within the system as a whole. The actual result is the behavior produced or observed when a component or system is tested.\r\nSystem testing is performed on the entire system in the context of either functional requirement specifications (FRS) or system requirement specification (SRS), or both. System testing tests not only the design but also the behavior and even the believed expectations of the customer. It is also intended to test up to and beyond the bounds defined in the software or hardware requirements specification(s).\r\nSoftware testing is an investigation conducted to provide stakeholders with information about the quality of the software product or service under test. Software testing can also provide an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation. Software testing involves the execution of a software component or system component to evaluate one or more properties of interest. In general, these properties indicate the extent to which the component or system under test meets the requirements that guided its design and development, responds correctly to all kinds of inputs, performs its functions within an acceptable time, is sufficiently usable, can be installed and run in its intended environments, and achieves the general result its stakeholders desire. As the number of possible tests for even simple software components is practically infinite, all software testing uses some strategy to select tests that are feasible for the available time and resources.\r\nMobile-device testing assures the quality of mobile devices, like mobile phones, PDAs, etc. The testing will be conducted on both hardware and software. And from the view of different procedures, the testing comprises R&D testing, factory testing and certification testing. Mobile-device testing involves a set of activities from monitoring and troubleshooting mobile applications, content and services on real handsets. Testing includes verification and validation of hardware devices and software applications.","materialsDescription":" <span style=\"font-weight: bold;\">What is System Testing?</span>\r\nSystem Testing is the testing of a complete and fully integrated software product. Usually, the software is only one element of a larger computer-based system. Ultimately, the software is interfaced with other software/hardware systems. System Testing is actually a series of different tests whose sole purpose is to exercise the full computer-based system.\r\nTwo Category of Software Testing:\r\n<ul><li>Black Box Testing;</li><li>White Box Testing.</li></ul>\r\nSystem test falls under the black box testing category of software testing.\r\nWhite box testing is the testing of the internal workings or code of a software application. In contrast, black box or System Testing is the opposite. The system test involves the external workings of the software from the user's perspective.\r\n<span style=\"font-weight: bold;\">What do you verify in System Testing?</span>\r\nSystem Testing involves testing the software code for following:\r\n<ul><li>Testing the fully integrated applications including external peripherals in order to check how components interact with one another and with the system as a whole. This is also called End to End testing scenario.</li><li>Verify thorough testing of every input in the application to check for desired outputs.</li><li>Testing of the user's experience with the application.</li></ul>\r\nThat is a very basic description of what is involved in system testing. You need to build detailed test cases and test suites that test each aspect of the application as seen from the outside without looking at the actual source code.\r\n<span style=\"font-weight: bold;\">What Types of System Testing Should Testers Use?</span>\r\nThere are over 50 different types of system testing. The specific types used by a tester depend on several variables. Those variables include:\r\n<ul><li><span style=\"font-weight: bold;\">Who the tester works for</span> - This is a major factor in determining the types of system testing a tester will use. Methods used by large companies are different than those used by medium and small companies.</li><li><span style=\"font-weight: bold;\">Time available for testing</span> - Ultimately, all 50 testing types could be used. Time is often what limits us to using only the types that are most relevant for the software project.</li><li><span style=\"font-weight: bold;\">Resources available to the tester</span> - Of course some testers will not have the necessary resources to conduct a testing type. For example, if you are a tester working for a large software development firm, you are likely to have expensive automated testing software not available to others.</li><li><span style=\"font-weight: bold;\">Software Tester's Education</span> - There is a certain learning curve for each type of software testing available. To use some of the software involved, a tester has to learn how to use it.</li><li><span style=\"font-weight: bold;\">Testing Budget</span> - Money becomes a factor not just for smaller companies and individual software developers but large companies as well.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_System_testing.png"},{"id":735,"title":"Installation and configuration","alias":"installation-and-configuration","description":" Installation or setup is the act of making the system or program ready for execution. Because the process varies for each program and each computer, programs (including operating systems) often come with an installer, a specialized program responsible for doing whatever is needed for their installation. The configuration is an arrangement of functional units according to their nature, number, and chief characteristics. Often, configuration pertains to the choice of hardware, software, firmware, settings, and documentation. The configuration affects system function and performance.\r\nSome computer programs can be executed by simply copying them into a folder stored on a computer and executing them. Other programs are supplied in a form unsuitable for immediate execution and therefore need an installation procedure. Once installed, the program can be executed again and again, without the need to reinstall before each execution.\r\nCommon operations performed during software installations include:\r\n<ul><li>Making sure that necessary system requirements are met</li><li>Checking for existing versions of the software</li><li>Creating or updating program files and folders</li><li>Adding configuration data such as configuration files, Windows registry entries or environment variables</li><li>Making the software accessible to the user, for instance by creating links, shortcuts or bookmarks</li><li>Configuring components that run automatically, such as daemons or Windows services</li><li>Performing product activation</li><li>Updating the software versions</li></ul>\r\nThese operations may require some charges or be free of charge. In case of payment, installation costs means the costs connected and relevant to or incurred as a result of installing the drivers or the equipment in the customers' premises. ","materialsDescription":"<span style=\"font-weight: bold;\">What does "Installation" mean?</span>\r\nInstallation is the process of making hardware and/or software ready for use. Obviously, different systems require different types of installations. While certain installations are simple and straightforward and can be performed by non-professionals, others are more complex and time-consuming and may require the involvement of specialists.\r\n<span style=\"font-weight: bold; \">What does the "Configuration" mean?</span>\r\nThe way a system is set up, or the assortment of components that make up the system. Configuration can refer to either hardware or software, or the combination of both. For instance, a typical configuration for a PC consists of 32MB (megabytes) main memory, a floppy drive, a hard disk, a modem, a CD-ROM drive, a VGA monitor, and the Windows operating system.\r\nMany software products require that the computer have a certain minimum configuration. For example, the software might require a graphics display monitor and a video adapter, a particular microprocessor, and a minimum amount of main memory.\r\nWhen you install a new device or program, you sometimes need to configure it, which means to set various switches and jumpers (for hardware) and to define values of parameters (for software). For example, the device or program may need to know what type of video adapter you have and what type of printer is connected to the computer. Thanks to new technologies, such as plug-and-play, much of this configuration is performed automatically.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Installation_and_configuration.png"},{"id":733,"title":"Technical Support","alias":"technical-support","description":" Technical support (often shortened to tech support) refers to services that entities provide to users of technology products or services. In general, technical support provide help regarding specific problems with a product or service, rather than providing training, provision or customization of product, or other support services. Most companies offer technical support for the services or products they sell, either included in the cost or for an additional fee. Technical support may be delivered over by phone, e-mail, live support software on a website, or other tool where users can log an incident. Larger organizations frequently have internal technical support available to their staff for computer-related problems. The Internet can also be a good source for freely available tech support, where experienced users help users find solutions to their problems. In addition, some fee-based service companies charge for premium technical support services.\r\nTechnical support may be delivered by different technologies depending on the situation. For example, direct questions can be addressed using telephone calls, SMS, Online chat, Support Forums, E-mail or Fax; basic software problems can be addressed over the telephone or, increasingly, by using remote access repair services; while more complicated problems with hardware may need to be dealt with in person.\r\nTechnical support is a range of services providing assistance with technology such as televisions, computers, and software, typically aiming to help the user with a specific problem.","materialsDescription":"<span style=\"font-weight: bold; \">What are the categories of technical support?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Call in</span></span>\r\nThis type of technical support has been very common in the services industry.[citation needed] It is also known as "Time and Materials" (T&M) IT support.[citation needed] The customer pays for the materials (hard drive, memory, computer, digital devices, etc.) and also pays the technician based on the pre-negotiated rate when a problem occurs.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Block hours</span></span>\r\nBlock hours allow the client to purchase a number of hours upfront at an agreed price. While it is commonly used to offer a reduced hourly rate, it can also simply be a standard non-reduced rate, or represent a minimum fee charged to a client before providing service. The premise behind this type of support is that the customer has purchased a fixed number of hours to use either per month or year. This allows them the flexibility to use the hours as they please without doing the paperwork and the hassle of paying multiple bills.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Managed services</span></span>\r\nManaged services means a company will receive a list of well-defined services on an ongoing basis, with well-defined "response and resolution times" for a fixed rate or a flat fee. This can include things like 24/7 monitoring of servers, 24/7 help desk support for daily computer issues, and on-site visits by a technician when issues cannot be resolved remotely.[citation needed] Some companies also offer additional services like project management, backup and disaster recovery, and vendor management in the monthly price. The companies that offer this type of tech support are known as managed services providers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Crowdsourced technical support</span></span>\r\nMany companies and organizations provide discussion boards for users of their products to interact; such forums allow companies to reduce their support costs without losing the benefit of customer feedback.\r\n<span style=\"font-weight: bold;\">What is outsourcing technical support?</span>\r\nWith the increasing use of technology in modern times, there is a growing requirement to provide technical support. Many organizations locate their technical support departments or call centers in countries or regions with lower costs. Dell was amongst the first companies to outsource their technical support and customer service departments to India in 2001. There has also been a growth in companies specializing in providing technical support to other organizations. These are often referred to as MSPs (Managed Service Providers).\r\nFor businesses needing to provide technical support, outsourcing allows them to maintain a high availability of service. Such need may result from peaks in call volumes during the day, periods of high activity due to introduction of new products or maintenance service packs, or the requirement to provide customers with a high level of service at a low cost to the business. For businesses needing technical support assets, outsourcing enables their core employees to focus more on their work in order to maintain productivity. It also enables them to utilize specialized personnel whose technical knowledge base and experience may exceed the scope of the business, thus providing a higher level of technical support to their employees.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Technical_Support.png"},{"id":731,"title":"IT Project Management","alias":"it-project-management","description":" IT project management is the process of planning, organizing and delineating responsibility for the completion of an organizations' specific information technology (IT) goals.\r\nIT project management includes overseeing projects for software development, hardware installations, network upgrades, cloud computing and virtualization rollouts, business analytics and data management projects and implementing IT services.\r\nIn addition to the normal problems that can cause a project to fail, factors that can negatively affect the success of an IT project include advances in technology during the project's execution, infrastructure changes that impact security and data management and unknown dependent relationships among hardware, software, network infrastructure and data. IT projects may also succumb to the first-time, first-use penalty which represents the total risk an organization assumes when implementing new technology for the first time. Because the technology hasn’t been implemented or used before in the organization, there are likely to be complications that will affect the project’s likelihood of success.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Project?</span>\r\nA Project is an initiative launched to create a unique product or service. A Project has a defined start date and a defined end date. The start date represents when the project will be launched. The end date specifies when the project will be completed.\r\nA Project is not a reoccurring activity; but rather is a single effort to produce something new.\r\n<span style=\"font-weight: bold;\">What is Project Management?</span>\r\nProject Management is the collection and application of skills, knowledge, processes, and activities to meet a specific objective that may take the form of a product or service. Project Management is an integrated process of applying 5 major processes and their related activities throughout a project lifecycle: initiating, planning, executing, monitoring and Controlling, Closeout.\r\n<span style=\"font-weight: bold;\">What is a Project Management Methodology?</span>\r\nA Project Management Methodology is the overall approach (system) that will be followed to meet the project objectives.\r\n<span style=\"font-weight: bold;\">What are the characteristics of a project?</span>\r\nA Project has three characteristics:\r\n<ul><li>Temporal nature (Is not ongoing and has a definite start and end date.)</li><li>Unique Deliverable (Produces a new unique product or service that does not exist.)</li><li>Progressive (Actions follow a sequence or pattern and progress over time.)</li></ul>\r\n<span style=\"font-weight: bold;\">Who is responsible for the project?</span>\r\nThe Project Manager is directly responsible for the results of the project. He/She should use the necessary skills, knowledge, and tools to meet the project objectives. During the early phases of the project, the Project Manager, working with the project team, should be able to:\r\n<ul><li>Determine project goals and objectives</li><li>Determine assumptions and constraints</li><li>Define and validate product description</li><li>Determine project requirements</li><li>Define Project deliverables</li><li>Estimate and monitor project resource allocation</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Management.png"},{"id":725,"title":"IT Audit","alias":"it-audit","description":"An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.\r\nIT audits are also known as automated data processing audits (ADP audits) and computer audits. They were formerly called electronic data processing audits (EDP audits).\r\nAn IT audit is different from a financial statement audit. While a financial audit's purpose is to evaluate whether the financial statements present fairly, in all material respects, an entity's financial position, results of operations, and cash flows in conformity to standard accounting practices, the purposes of an IT audit is to evaluate the system's internal control design and effectiveness. This includes, but is not limited to, efficiency and security protocols, development processes, and IT governance or oversight. Installing controls are necessary but not sufficient to provide adequate security. People responsible for security must consider if the controls are installed as intended, if they are effective, or if any breach in security has occurred and if so, what actions can be done to prevent future breaches. These inquiries must be answered by independent and unbiased observers. These observers are performing the task of information systems auditing. In an Information Systems (IS) environment, an audit is an examination of information systems, their inputs, outputs, and processing.\r\nThe primary functions of an IT audit are to evaluate the systems that are in place to guard an organization's information. Specifically, information technology audits are used to evaluate the organization's ability to protect its information assets and to properly dispense information to authorized parties. The IT audit aims to evaluate the following:\r\nWill the organization's computer systems be available for the business at all times when required? (known as availability) Will the information in the systems be disclosed only to authorized users? (known as security and confidentiality) Will the information provided by the system always be accurate, reliable, and timely? (measures the integrity) In this way, the audit hopes to assess the risk to the company's valuable asset (its information) and establish methods of minimizing those risks. ","materialsDescription":" <span style=\"font-weight: bold;\">What Is an IT Audit?</span>\r\nIn the typical software audit, your system administrators will be asked to show that software is not illegally loaded onto machines it shouldn’t be on, that the number of licenses matches up with the number of users or, if you purchased a bulk license, that you don’t exceed the bounds of that license. One thing you definitely don’t want to happen is for an auditor to find that an employee has brought a home version of a software package and installed it on his or her work computer.\r\n<span style=\"font-weight: bold;\">What Do Auditors Want?</span>\r\nIn short, software auditors want to know that companies are following the rules with regard to software licenses. How much slack they’ll give you if they find a minor violation depends on several factors. If you can show your company makes a good-faith effort to stay on top of all software license requirements, it could act in your favor.\r\n<span style=\"font-weight: bold;\">What Should We Do to Prepare for an IT Audit?</span>\r\nIf you have a strong IT asset management program in place, preparation for an audit is far less stressful. When you can easily create reports showing the number of copies installed, the number of licenses, license expiration dates, and hardware where the software is installed, you can create those reports in advance and look for potential problems. If you notice discrepancies, you can take steps to correct them before the auditors arrive.\r\n<span style=\"font-weight: bold;\">How Can We Do a Self-Audit Beforehand?</span>\r\nPerforming periodic self-audits is not just busywork, but could potentially save your company a lot of money and embarrassment. The three main steps in a self-audit are: reading the vendor’s contract, gathering purchase information, and getting an accurate count of how many licenses are deployed:\r\n<ul><li><span style=\"font-weight: bold;\">Read the Contract</span> – Understand license types and models, including maintenance requirements. Learn if there are limitations on where the software can or cannot be used. For example, are you allowed to use it on laptops that travel outside the US?</li><li><span style=\"font-weight: bold;\">Gather Purchase Information</span> – Know where to get your hands on purchase data. If you purchased from a reseller, make sure that the reseller passed on your purchase information to the vendor.</li><li><span style=\"font-weight: bold;\">Get an Accurate License Deployment Count</span> – If your company has a solid IT asset management program, this shouldn’t be a challenge. Otherwise, you’ll need to manually locate receipts and serial numbers and match them up to the machines where the software is deployed.</li></ul>\r\nThe self-audit is much easier to do when you don’t have an actual audit staring you in the face.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Audit.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"}]}},"categories":[{"id":743,"title":"IT System documentation writing","alias":"it-system-documentation-writing","description":" Without the development of technical documentation, it is impossible to create any complex technical solution. High-quality documentation, that is, informative, complete and understandable, is the key to the success of products at all stages of its life cycle. Properly written documentation is the basis of the functionality and effectiveness of information systems. It is with its use that the processes of creating databases, developing software, selecting and configuring network and server software are carried out.\r\nMany organizations at the initial stages of creating and implementing technical solutions do not pay enough attention to this factor, which often prevents the entry of a new product to the market.\r\nWriting documentation requires the contractor to have specific knowledge and skills, certain experience and considerable labor costs.\r\nThe main task of the working documentation is to give a complete picture of how the system is structured, what it consists of and how it functions.\r\nThere is no single standard for the development of this type of documentation. In most cases, its structure is selected for a specific situation. But you can take any algorithm that has already proven its effectiveness as the basis.","materialsDescription":"<span style=\"font-weight: bold; \">What is software documentation?</span>\r\nSoftware documentation - printed user manuals, online (online) documentation and help text describing how to use the software product.\r\n<span style=\"font-weight: bold; \">What is process documentation?</span>\r\nA process document outlines the steps necessary to complete a task or process. It is internal, ongoing documentation of the process while it is occurring—documentation cares more about the “how” of implementation than the “what” of process impact.\r\n<span style=\"font-weight: bold;\">What should be in the working documentation?</span>\r\nFirst of all, technical descriptions of implemented solutions. These are IT infrastructure diagrams, configuration descriptions, etc.\r\n<span style=\"font-weight: bold;\">What does well-written working documentation give?</span>\r\n<ul><li>systematizes data on IT infrastructure;</li><li>helps to understand the system architecture and functioning of connected services;</li><li>facilitates management decisions (for example, shows which service can be removed or replaced and how it will be displayed on the whole system);</li><li>makes it possible to comprehensively evaluate the selected IT structure and, also, timely notice the mistakes made or holes in the architecture.</li></ul>\r\n<span style=\"font-weight: bold;\">What are the key benefits of writing technical documentation?</span>\r\nThe development of documentation will allow you to:\r\n<ul><li>increase user satisfaction</li><li>reduce the load on the system administrator;</li><li>reduce system support costs.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_System_documentation_writing.png"},{"id":741,"title":"Proof of Concept","alias":"proof-of-concept","description":"Proof of concept (PoC) is a realization of a certain method or idea in order to demonstrate its feasibility, or a demonstration in principle with the aim of verifying that some concept or theory has practical potential. A proof of concept is usually small and may or may not be complete.\r\nProof of concept (POC) is used to test the idea of a certain technical feature or the general design of a product and prove that it is possible to apply those ideas.\r\nIt could be used to test something on just one part of the product before it is tried in practice with making a prototype.\r\nYou can think of this as a pre-prototype version of the product, but it is not even that since POC shouldn’t have all the features as the final product, not even as the prototype.\r\nThe main goal of POC is to prove that it is actually possible to develop that idea and include it as part of the final product.","materialsDescription":" <span style=\"font-weight: bold;\">What is a proof of concept?</span>\r\nProof of concept is the testing of the finished product based on the idea. Thus, this stage is the first phase in the design of the application. It explains how the project should work on the basis of a detailed description of requirements and specifications. The proof is the complete satisfaction of those functions that need to be realized. This approach makes it easier to hire developers for a startup in the future.\r\nIn order to confirm the concept in software development, it is necessary to determine the main tasks and perform the following steps:\r\n<ol><li>Identify project goals and methods for their implementation.</li><li>Receive feedback from users and customers.</li><li>Correct the idea and start implementing it.</li></ol>\r\n<span style=\"font-weight: bold;\">Project goals and methods of implementation</span>\r\nBefore you start, you need to understand what goal will perform a project. A web project can be a large marketplace or social network with unique features and a convenient solution. Also, it may be a CRM system and help the business to increase sales or improve the accounting of business resources. One way or another, each platform has a specific purpose.\r\nThe next step is to build methods of achieving the goal. At this stage, it is important not to delve into the details, but to evaluate common elements. How the project will work, what functions will be implemented, how the web application will interact with users, etc. It is very important to consider each item and write it down in the report. In fact, this is a small brainstorm. Typically, it takes from a few days to a couple of weeks. When the implementation plan is completed, you can begin to collect feedback from future users.\r\n<span style=\"font-weight: bold;\">Feedback from users and customers</span>\r\nWhen you have a ready document with a description of the project and the functions, then you need to get feedback from users or customers. Offer them your solution to a particular problem. Familiarize them with the implementation methods. You will receive many suggestions for improvement. At this point, some of your guesswork will be broken. It is important to listen and collect feedback. There is no need to hurry and change the concept or implement everything that future users are asking for. They don't have an expert evaluation and this is only their proposal.\r\n<span style=\"font-weight: bold;\">Idea correction and implementation</span>\r\nIt is at this stage that the final proof of the concept takes place. Having received feedback, you can clearly understand how users will interact with your project. What emotions it will cause. It is necessary to understand that this is a preliminary evaluation of the concept. Some recommendations may not have value, as others can significantly affect the further development. Thus, based on the information received, it is necessary to consider what can be changed to make the project more convenient. If you received a lot of negative feedback, it makes sense to stop the development process. Or at least think about a new improved version. So, if you really decided to start the development, we recommend starting the design with MVP. The minimal version will allow us to develop the project in the shortest possible time and check the idea on real users.\r\nProof of the concept is one of the important stages in the development of complex and expensive projects. It allows with high probability to determine the value of the project even before the begins development. Typically, the process takes from a few days to a couple of weeks. It gives a clear idea of how the project will work and what functions it will perform. If you approach the feedback analysis process with a clean head, this step in the future can save you money and time.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Proof_of_Concept.png"},{"id":739,"title":"Deployment and Integration Services","alias":"deployment-and-integration-services","description":" The number of various solutions implemented by customers today is quite large. Often, the subsystems of the seemingly unified IT landscape are either weakly connected with each other, or the interaction between them is established in the mode of transferring files and data by mail or “from hand to hand”.\r\nWestern IT vendors, following a certain trend, offer the customer complete and unified solutions. Such blocks of subsystems solve a specific task and form separate IT centers, which also require the mutual integration of infrastructures. This, oddly enough, is even more difficult, as a complete solution does not allow to penetrate deeply and get access to the required information or control subsystems.\r\nNevertheless, the integration and interconnection of information flows can significantly simplify business processes and lead to an increase in the efficiency of interaction both inside and outside the company (with customers and partners).\r\nThe integration task itself is important for business, as it provides a qualitatively new level of services. This is especially important for companies where IT is the immediate tool for achieving business goals. But it is equally important to make integration optimal in the light of minimizing not only the cost of purchasing equipment and software but also preserving previous IT investments.","materialsDescription":" <span style=\"font-weight: bold; \">The main types of implementation and integration services offered by companies:</span>\r\n<ul><li>Designing IT architecture for integration solutions in the field of analytics, automation and monitoring of business processes;</li><li>Development and integration of network infrastructure subsystems, including scalable telecommunications equipment, server equipment and workstations;</li><li>Defining a single platform and developing a solution for integrating enterprise applications, data and business processes;</li><li>Implementation and maintenance of integrated integration solutions in the field of enterprise management (ERP-systems);</li><li>Implementation and maintenance of integration solutions in the field of accounting and analysis of sales and customer relations (CRM-system);</li><li>Implementation and maintenance of integration solutions in the field of accounting and financial analysis;</li><li>Impairment, testing and development of solutions for ensuring information security of a business.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Deployment_and_Integration_Services.png"},{"id":737,"title":"IT System Testing","alias":"it-system-testing","description":" System testing is testing conducted on a complete integrated system to evaluate the system's compliance with its specified requirements.\r\nSystem testing takes, as its input, all of the integrated components that have passed integration testing. The purpose of integration testing is to detect any inconsistencies between the units that are integrated together (called assemblages). System testing seeks to detect defects both within the "inter-assemblages" and also within the system as a whole. The actual result is the behavior produced or observed when a component or system is tested.\r\nSystem testing is performed on the entire system in the context of either functional requirement specifications (FRS) or system requirement specification (SRS), or both. System testing tests not only the design but also the behavior and even the believed expectations of the customer. It is also intended to test up to and beyond the bounds defined in the software or hardware requirements specification(s).\r\nSoftware testing is an investigation conducted to provide stakeholders with information about the quality of the software product or service under test. Software testing can also provide an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation. Software testing involves the execution of a software component or system component to evaluate one or more properties of interest. In general, these properties indicate the extent to which the component or system under test meets the requirements that guided its design and development, responds correctly to all kinds of inputs, performs its functions within an acceptable time, is sufficiently usable, can be installed and run in its intended environments, and achieves the general result its stakeholders desire. As the number of possible tests for even simple software components is practically infinite, all software testing uses some strategy to select tests that are feasible for the available time and resources.\r\nMobile-device testing assures the quality of mobile devices, like mobile phones, PDAs, etc. The testing will be conducted on both hardware and software. And from the view of different procedures, the testing comprises R&D testing, factory testing and certification testing. Mobile-device testing involves a set of activities from monitoring and troubleshooting mobile applications, content and services on real handsets. Testing includes verification and validation of hardware devices and software applications.","materialsDescription":" <span style=\"font-weight: bold;\">What is System Testing?</span>\r\nSystem Testing is the testing of a complete and fully integrated software product. Usually, the software is only one element of a larger computer-based system. Ultimately, the software is interfaced with other software/hardware systems. System Testing is actually a series of different tests whose sole purpose is to exercise the full computer-based system.\r\nTwo Category of Software Testing:\r\n<ul><li>Black Box Testing;</li><li>White Box Testing.</li></ul>\r\nSystem test falls under the black box testing category of software testing.\r\nWhite box testing is the testing of the internal workings or code of a software application. In contrast, black box or System Testing is the opposite. The system test involves the external workings of the software from the user's perspective.\r\n<span style=\"font-weight: bold;\">What do you verify in System Testing?</span>\r\nSystem Testing involves testing the software code for following:\r\n<ul><li>Testing the fully integrated applications including external peripherals in order to check how components interact with one another and with the system as a whole. This is also called End to End testing scenario.</li><li>Verify thorough testing of every input in the application to check for desired outputs.</li><li>Testing of the user's experience with the application.</li></ul>\r\nThat is a very basic description of what is involved in system testing. You need to build detailed test cases and test suites that test each aspect of the application as seen from the outside without looking at the actual source code.\r\n<span style=\"font-weight: bold;\">What Types of System Testing Should Testers Use?</span>\r\nThere are over 50 different types of system testing. The specific types used by a tester depend on several variables. Those variables include:\r\n<ul><li><span style=\"font-weight: bold;\">Who the tester works for</span> - This is a major factor in determining the types of system testing a tester will use. Methods used by large companies are different than those used by medium and small companies.</li><li><span style=\"font-weight: bold;\">Time available for testing</span> - Ultimately, all 50 testing types could be used. Time is often what limits us to using only the types that are most relevant for the software project.</li><li><span style=\"font-weight: bold;\">Resources available to the tester</span> - Of course some testers will not have the necessary resources to conduct a testing type. For example, if you are a tester working for a large software development firm, you are likely to have expensive automated testing software not available to others.</li><li><span style=\"font-weight: bold;\">Software Tester's Education</span> - There is a certain learning curve for each type of software testing available. To use some of the software involved, a tester has to learn how to use it.</li><li><span style=\"font-weight: bold;\">Testing Budget</span> - Money becomes a factor not just for smaller companies and individual software developers but large companies as well.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_System_testing.png"},{"id":735,"title":"Installation and configuration","alias":"installation-and-configuration","description":" Installation or setup is the act of making the system or program ready for execution. Because the process varies for each program and each computer, programs (including operating systems) often come with an installer, a specialized program responsible for doing whatever is needed for their installation. The configuration is an arrangement of functional units according to their nature, number, and chief characteristics. Often, configuration pertains to the choice of hardware, software, firmware, settings, and documentation. The configuration affects system function and performance.\r\nSome computer programs can be executed by simply copying them into a folder stored on a computer and executing them. Other programs are supplied in a form unsuitable for immediate execution and therefore need an installation procedure. Once installed, the program can be executed again and again, without the need to reinstall before each execution.\r\nCommon operations performed during software installations include:\r\n<ul><li>Making sure that necessary system requirements are met</li><li>Checking for existing versions of the software</li><li>Creating or updating program files and folders</li><li>Adding configuration data such as configuration files, Windows registry entries or environment variables</li><li>Making the software accessible to the user, for instance by creating links, shortcuts or bookmarks</li><li>Configuring components that run automatically, such as daemons or Windows services</li><li>Performing product activation</li><li>Updating the software versions</li></ul>\r\nThese operations may require some charges or be free of charge. In case of payment, installation costs means the costs connected and relevant to or incurred as a result of installing the drivers or the equipment in the customers' premises. ","materialsDescription":"<span style=\"font-weight: bold;\">What does "Installation" mean?</span>\r\nInstallation is the process of making hardware and/or software ready for use. Obviously, different systems require different types of installations. While certain installations are simple and straightforward and can be performed by non-professionals, others are more complex and time-consuming and may require the involvement of specialists.\r\n<span style=\"font-weight: bold; \">What does the "Configuration" mean?</span>\r\nThe way a system is set up, or the assortment of components that make up the system. Configuration can refer to either hardware or software, or the combination of both. For instance, a typical configuration for a PC consists of 32MB (megabytes) main memory, a floppy drive, a hard disk, a modem, a CD-ROM drive, a VGA monitor, and the Windows operating system.\r\nMany software products require that the computer have a certain minimum configuration. For example, the software might require a graphics display monitor and a video adapter, a particular microprocessor, and a minimum amount of main memory.\r\nWhen you install a new device or program, you sometimes need to configure it, which means to set various switches and jumpers (for hardware) and to define values of parameters (for software). For example, the device or program may need to know what type of video adapter you have and what type of printer is connected to the computer. Thanks to new technologies, such as plug-and-play, much of this configuration is performed automatically.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Installation_and_configuration.png"},{"id":733,"title":"Technical Support","alias":"technical-support","description":" Technical support (often shortened to tech support) refers to services that entities provide to users of technology products or services. In general, technical support provide help regarding specific problems with a product or service, rather than providing training, provision or customization of product, or other support services. Most companies offer technical support for the services or products they sell, either included in the cost or for an additional fee. Technical support may be delivered over by phone, e-mail, live support software on a website, or other tool where users can log an incident. Larger organizations frequently have internal technical support available to their staff for computer-related problems. The Internet can also be a good source for freely available tech support, where experienced users help users find solutions to their problems. In addition, some fee-based service companies charge for premium technical support services.\r\nTechnical support may be delivered by different technologies depending on the situation. For example, direct questions can be addressed using telephone calls, SMS, Online chat, Support Forums, E-mail or Fax; basic software problems can be addressed over the telephone or, increasingly, by using remote access repair services; while more complicated problems with hardware may need to be dealt with in person.\r\nTechnical support is a range of services providing assistance with technology such as televisions, computers, and software, typically aiming to help the user with a specific problem.","materialsDescription":"<span style=\"font-weight: bold; \">What are the categories of technical support?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Call in</span></span>\r\nThis type of technical support has been very common in the services industry.[citation needed] It is also known as "Time and Materials" (T&M) IT support.[citation needed] The customer pays for the materials (hard drive, memory, computer, digital devices, etc.) and also pays the technician based on the pre-negotiated rate when a problem occurs.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Block hours</span></span>\r\nBlock hours allow the client to purchase a number of hours upfront at an agreed price. While it is commonly used to offer a reduced hourly rate, it can also simply be a standard non-reduced rate, or represent a minimum fee charged to a client before providing service. The premise behind this type of support is that the customer has purchased a fixed number of hours to use either per month or year. This allows them the flexibility to use the hours as they please without doing the paperwork and the hassle of paying multiple bills.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Managed services</span></span>\r\nManaged services means a company will receive a list of well-defined services on an ongoing basis, with well-defined "response and resolution times" for a fixed rate or a flat fee. This can include things like 24/7 monitoring of servers, 24/7 help desk support for daily computer issues, and on-site visits by a technician when issues cannot be resolved remotely.[citation needed] Some companies also offer additional services like project management, backup and disaster recovery, and vendor management in the monthly price. The companies that offer this type of tech support are known as managed services providers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Crowdsourced technical support</span></span>\r\nMany companies and organizations provide discussion boards for users of their products to interact; such forums allow companies to reduce their support costs without losing the benefit of customer feedback.\r\n<span style=\"font-weight: bold;\">What is outsourcing technical support?</span>\r\nWith the increasing use of technology in modern times, there is a growing requirement to provide technical support. Many organizations locate their technical support departments or call centers in countries or regions with lower costs. Dell was amongst the first companies to outsource their technical support and customer service departments to India in 2001. There has also been a growth in companies specializing in providing technical support to other organizations. These are often referred to as MSPs (Managed Service Providers).\r\nFor businesses needing to provide technical support, outsourcing allows them to maintain a high availability of service. Such need may result from peaks in call volumes during the day, periods of high activity due to introduction of new products or maintenance service packs, or the requirement to provide customers with a high level of service at a low cost to the business. For businesses needing technical support assets, outsourcing enables their core employees to focus more on their work in order to maintain productivity. It also enables them to utilize specialized personnel whose technical knowledge base and experience may exceed the scope of the business, thus providing a higher level of technical support to their employees.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Technical_Support.png"},{"id":731,"title":"IT Project Management","alias":"it-project-management","description":" IT project management is the process of planning, organizing and delineating responsibility for the completion of an organizations' specific information technology (IT) goals.\r\nIT project management includes overseeing projects for software development, hardware installations, network upgrades, cloud computing and virtualization rollouts, business analytics and data management projects and implementing IT services.\r\nIn addition to the normal problems that can cause a project to fail, factors that can negatively affect the success of an IT project include advances in technology during the project's execution, infrastructure changes that impact security and data management and unknown dependent relationships among hardware, software, network infrastructure and data. IT projects may also succumb to the first-time, first-use penalty which represents the total risk an organization assumes when implementing new technology for the first time. Because the technology hasn’t been implemented or used before in the organization, there are likely to be complications that will affect the project’s likelihood of success.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Project?</span>\r\nA Project is an initiative launched to create a unique product or service. A Project has a defined start date and a defined end date. The start date represents when the project will be launched. The end date specifies when the project will be completed.\r\nA Project is not a reoccurring activity; but rather is a single effort to produce something new.\r\n<span style=\"font-weight: bold;\">What is Project Management?</span>\r\nProject Management is the collection and application of skills, knowledge, processes, and activities to meet a specific objective that may take the form of a product or service. Project Management is an integrated process of applying 5 major processes and their related activities throughout a project lifecycle: initiating, planning, executing, monitoring and Controlling, Closeout.\r\n<span style=\"font-weight: bold;\">What is a Project Management Methodology?</span>\r\nA Project Management Methodology is the overall approach (system) that will be followed to meet the project objectives.\r\n<span style=\"font-weight: bold;\">What are the characteristics of a project?</span>\r\nA Project has three characteristics:\r\n<ul><li>Temporal nature (Is not ongoing and has a definite start and end date.)</li><li>Unique Deliverable (Produces a new unique product or service that does not exist.)</li><li>Progressive (Actions follow a sequence or pattern and progress over time.)</li></ul>\r\n<span style=\"font-weight: bold;\">Who is responsible for the project?</span>\r\nThe Project Manager is directly responsible for the results of the project. He/She should use the necessary skills, knowledge, and tools to meet the project objectives. During the early phases of the project, the Project Manager, working with the project team, should be able to:\r\n<ul><li>Determine project goals and objectives</li><li>Determine assumptions and constraints</li><li>Define and validate product description</li><li>Determine project requirements</li><li>Define Project deliverables</li><li>Estimate and monitor project resource allocation</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Management.png"},{"id":725,"title":"IT Audit","alias":"it-audit","description":"An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.\r\nIT audits are also known as automated data processing audits (ADP audits) and computer audits. They were formerly called electronic data processing audits (EDP audits).\r\nAn IT audit is different from a financial statement audit. While a financial audit's purpose is to evaluate whether the financial statements present fairly, in all material respects, an entity's financial position, results of operations, and cash flows in conformity to standard accounting practices, the purposes of an IT audit is to evaluate the system's internal control design and effectiveness. This includes, but is not limited to, efficiency and security protocols, development processes, and IT governance or oversight. Installing controls are necessary but not sufficient to provide adequate security. People responsible for security must consider if the controls are installed as intended, if they are effective, or if any breach in security has occurred and if so, what actions can be done to prevent future breaches. These inquiries must be answered by independent and unbiased observers. These observers are performing the task of information systems auditing. In an Information Systems (IS) environment, an audit is an examination of information systems, their inputs, outputs, and processing.\r\nThe primary functions of an IT audit are to evaluate the systems that are in place to guard an organization's information. Specifically, information technology audits are used to evaluate the organization's ability to protect its information assets and to properly dispense information to authorized parties. The IT audit aims to evaluate the following:\r\nWill the organization's computer systems be available for the business at all times when required? (known as availability) Will the information in the systems be disclosed only to authorized users? (known as security and confidentiality) Will the information provided by the system always be accurate, reliable, and timely? (measures the integrity) In this way, the audit hopes to assess the risk to the company's valuable asset (its information) and establish methods of minimizing those risks. ","materialsDescription":" <span style=\"font-weight: bold;\">What Is an IT Audit?</span>\r\nIn the typical software audit, your system administrators will be asked to show that software is not illegally loaded onto machines it shouldn’t be on, that the number of licenses matches up with the number of users or, if you purchased a bulk license, that you don’t exceed the bounds of that license. One thing you definitely don’t want to happen is for an auditor to find that an employee has brought a home version of a software package and installed it on his or her work computer.\r\n<span style=\"font-weight: bold;\">What Do Auditors Want?</span>\r\nIn short, software auditors want to know that companies are following the rules with regard to software licenses. How much slack they’ll give you if they find a minor violation depends on several factors. If you can show your company makes a good-faith effort to stay on top of all software license requirements, it could act in your favor.\r\n<span style=\"font-weight: bold;\">What Should We Do to Prepare for an IT Audit?</span>\r\nIf you have a strong IT asset management program in place, preparation for an audit is far less stressful. When you can easily create reports showing the number of copies installed, the number of licenses, license expiration dates, and hardware where the software is installed, you can create those reports in advance and look for potential problems. If you notice discrepancies, you can take steps to correct them before the auditors arrive.\r\n<span style=\"font-weight: bold;\">How Can We Do a Self-Audit Beforehand?</span>\r\nPerforming periodic self-audits is not just busywork, but could potentially save your company a lot of money and embarrassment. The three main steps in a self-audit are: reading the vendor’s contract, gathering purchase information, and getting an accurate count of how many licenses are deployed:\r\n<ul><li><span style=\"font-weight: bold;\">Read the Contract</span> – Understand license types and models, including maintenance requirements. Learn if there are limitations on where the software can or cannot be used. For example, are you allowed to use it on laptops that travel outside the US?</li><li><span style=\"font-weight: bold;\">Gather Purchase Information</span> – Know where to get your hands on purchase data. If you purchased from a reseller, make sure that the reseller passed on your purchase information to the vendor.</li><li><span style=\"font-weight: bold;\">Get an Accurate License Deployment Count</span> – If your company has a solid IT asset management program, this shouldn’t be a challenge. Otherwise, you’ll need to manually locate receipts and serial numbers and match them up to the machines where the software is deployed.</li></ul>\r\nThe self-audit is much easier to do when you don’t have an actual audit staring you in the face.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Audit.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.solti.ua/proyektirovaniye-montazh-i-puskonaladochnyye-raboty-po-sozdaniyu-sks-v-kharkovskoy-oblastnoy-gosadministratsii/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"unify-openscape-voice-for-the-leading-industrial-enterprise-of-ukroboronprom":{"id":1003,"title":"Unify OpenScape Voice for the leading industrial enterprise of Ukroboronprom","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"unify-openscape-voice-for-the-leading-industrial-enterprise-of-ukroboronprom","roi":0,"seo":{"title":"Unify OpenScape Voice for the leading industrial enterprise of Ukroboronprom","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Unify OpenScape Voice for the leading industrial enterprise of Ukroboronprom","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""},"vendors":[{"id":2808,"title":"Unify (Vendor)","logoURL":"https://roi4cio.com/uploads/roi/company/Unify.png","alias":"unify","address":"","roles":[],"description":"Unify, is an Atos SE company.\r\n\r\nUnify is headquartered in Munich, Germany and is present in over 100 countries. The company provides software-based enterprise unified communications including voice, Web collaboration, video conferencing and contact center, networking product and services.\r\n\r\nUntil January 21, 2016 Unify was a joint venture between The Gores Group and Siemens AG. Originally announced July 29, 2008, the joint venture started operating October 1, 2013, with The Gores Group holding a 51% stake, and 49% held by Siemens AG. On February 17, 2016 Jon Pritchard was appointed Chief Executive Officer (CEO) of Unify.\r\n\r\nSource: https://en.wikipedia.org/wiki/Unify_Software_and_Solutions_GmbH_%26_Co._KG.","companyTypes":[],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":1,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"http://www.unify.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Unify (Vendor)","keywords":"Unify, venture, Group, 2016, joint, Gores, company, Siemens","description":"Unify, is an Atos SE company.\r\n\r\nUnify is headquartered in Munich, Germany and is present in over 100 countries. The company provides software-based enterprise unified communications including voice, Web collaboration, video conferencing and contact center, ne","og:title":"Unify (Vendor)","og:description":"Unify, is an Atos SE company.\r\n\r\nUnify is headquartered in Munich, Germany and is present in over 100 countries. The company provides software-based enterprise unified communications including voice, Web collaboration, video conferencing and contact center, ne","og:image":"https://roi4cio.com/uploads/roi/company/Unify.png"},"eventUrl":""}],"products":[{"id":5065,"logo":false,"scheme":false,"title":"Unify OpenScape Voice","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"alias":"unify-openscape-voice","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Speaking with a unified voice</span>\r\nAs part of the OpenScape Enterprise portfolio, OpenScape Voice enables your enterprise to talk—with each other, with your customers, with all your stakeholders, with immediacy and richness.<br />As a stand-alone voice application or integrated with other unified communications applications, OpenScape Voice combines carrier-grade reliability, security, massive scalability (up to 100,000 users per node) and flexible on-premise or cloud deployment with the features your enterprise needs.<br />OpenScape Voice seamlessly synchronizes voice with mobility, video and web conferencing, chat, messaging, presence, one-number service and more. Embed voice into your business applications. You can even unify your in-place multi-vendor voice network without ripping and replacing. All with one elegant framework. <br /><br /><span style=\"font-weight: bold;\">Make your conversations vibrant — down the hall or around the world</span><br />\r\n\r\n<ul><li>Next Gen (100% SIP-based) Enterprise VoIP solution</li></ul>\r\n<ul><li>Carrier Grade Reliability (5 9s) Active – Active Server architecture</li></ul>\r\n<ul><li>Carrier Grade Routing and Translation for cloud / overlay deployments (IP-Least Cost Routing)</li></ul>\r\n<ul><li>Fits into virtualized architecture (VMware), delivered as a vApp</li></ul>\r\n<ul><li>Industry leading scalability up to 100,000 users on a system</li></ul>\r\n<ul><li>100% call failover support – no lost calls on a single node failure</li></ul>\r\n<ul><li>Multi-tenant support</li></ul>\r\n<ul><li>Licensing options – Permanent (CAPEX), Subscription (OPEX)</li></ul>","shortDescription":"OpenScape Voice is IP-based Unified Communications Platforms: We’ve learned to communicate in a lot of ways, but when it really counts, we use the tool that matters most — our voice.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Unify OpenScape Voice","keywords":"","description":"<span style=\"font-weight: bold;\">Speaking with a unified voice</span>\r\nAs part of the OpenScape Enterprise portfolio, OpenScape Voice enables your enterprise to talk—with each other, with your customers, with all your stakeholders, with immediacy and richness.","og:title":"Unify OpenScape Voice","og:description":"<span style=\"font-weight: bold;\">Speaking with a unified voice</span>\r\nAs part of the OpenScape Enterprise portfolio, OpenScape Voice enables your enterprise to talk—with each other, with your customers, with all your stakeholders, with immediacy and richness."},"eventUrl":"","translationId":5066,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":152,"title":"Contact Center","alias":"contact-center","description":"A contact center is a central point from where you can contact.\r\nThe contact center typically includes one or more call centers but may include other types of customer contact, as well. A contact center is generally part of an enterprise's overall customer relationship management (CRM) strategy.<br />Contact centers and call centers are both centers for customer service, and the two terms are often used interchangeably, but a contact center supports more services than a typical call center.\r\nContact centers offer omnichannel customer support, including email, chat, voice over IP (VoIP) and website support. A call center typically uses phones as the main channel of communication and can handle a mass volume of calls.<br />Contact centers are used for inbound communication, outbound communication or a hybrid of both. Contact center agents also interact with customers via web chat, phone, email or other communication channels.\r\nThe contact center infrastructure that is necessary to support communications may be located on the same premises as the contact center, or it can be located externally.\r\nIn an on-premises scenario, the company that owns the contact center also owns and manages its own hardware and software. This requires staffing and IT investments that some companies choose to forgo by outsourcing those tasks to cloud providers or hosting companies.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Call Center?</span>\r\nTraditionally, a call center is an office where a large number of call center agents provide customer service over the telephone. Inbound call centers receive calls for customer support and often serve as a knowledge base for tech support, billing questions, and other customer service issues. These call centers focus on quick call resolution times and agent productivity. In outbound call centers, agents make calls rather than receive them. These could be sales calls, marketing offers, surveys, fundraising requests, or debt collection, for example.\r\nThe term “call center” conjures an image for many people of waiting on perpetual hold or being routed through an endless IVR that never gives them what they need. Because so many consumers have had a dreadful customer service experience along these lines, call centers have developed a bad rap. But as legacy phone systems give way to newer digital technologies, call centers are evolving.\r\n<span style=\"font-weight: bold;\">What is a Contact Center?</span>\r\nThe term "contact center" (or “contact centre”) reflects the modern reality that there are many other ways to connect with a customer these days besides by telephone. The combined trends of increased customer expectations and newer technologies that allow for many channels of communication are creating a shift in the traditional call center model which has existed for decades. Consumers want more ways to reach businesses, and businesses are looking for new ways to improve customer experience.\r\nWhile call center agents generally focus on inbound and outbound calls, either on traditional phone lines or over VoIP, contact center agents handle a wide variety of communications. In a modern multichannel contact center, technical support might be delivered over in-app chat or video, while order status updates are delivered via SMS, event promotions are sent as push notifications, surveys are deployed over Facebook Messenger, and sales inquiries received by email are sent directly to an agent to connect by phone. Call centers handle voice communications, contact centers handle all communications.\r\nA company’s contact center is usually integrated with their customer relationship management (CRM) system, where all interactions between the organization and the public are tracked, coordinated, and managed. Depending on the infrastructure and ecosystem, it could be comprised of an alphabet soup of complex components. Many companies have purchased off-the-shelf systems or a highly customized network of technologies from multiple vendors. Some companies have adopted a cloud-based solution or two, but they remain siloed from the rest of their systems and can’t talk to each other.","iconURL":"https://roi4cio.com/fileadmin/user_upload/Contact_Center1.png"},{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":10,"title":"Ensure Compliance"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":370,"title":"No automated business processes"},{"id":375,"title":"No support for mobile and remote users"},{"id":377,"title":"Separate communications channels"},{"id":378,"title":"Low employee productivity"},{"id":398,"title":"Poor communication and coordination among staff"}]}},"categories":[{"id":152,"title":"Contact Center","alias":"contact-center","description":"A contact center is a central point from where you can contact.\r\nThe contact center typically includes one or more call centers but may include other types of customer contact, as well. A contact center is generally part of an enterprise's overall customer relationship management (CRM) strategy.<br />Contact centers and call centers are both centers for customer service, and the two terms are often used interchangeably, but a contact center supports more services than a typical call center.\r\nContact centers offer omnichannel customer support, including email, chat, voice over IP (VoIP) and website support. A call center typically uses phones as the main channel of communication and can handle a mass volume of calls.<br />Contact centers are used for inbound communication, outbound communication or a hybrid of both. Contact center agents also interact with customers via web chat, phone, email or other communication channels.\r\nThe contact center infrastructure that is necessary to support communications may be located on the same premises as the contact center, or it can be located externally.\r\nIn an on-premises scenario, the company that owns the contact center also owns and manages its own hardware and software. This requires staffing and IT investments that some companies choose to forgo by outsourcing those tasks to cloud providers or hosting companies.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Call Center?</span>\r\nTraditionally, a call center is an office where a large number of call center agents provide customer service over the telephone. Inbound call centers receive calls for customer support and often serve as a knowledge base for tech support, billing questions, and other customer service issues. These call centers focus on quick call resolution times and agent productivity. In outbound call centers, agents make calls rather than receive them. These could be sales calls, marketing offers, surveys, fundraising requests, or debt collection, for example.\r\nThe term “call center” conjures an image for many people of waiting on perpetual hold or being routed through an endless IVR that never gives them what they need. Because so many consumers have had a dreadful customer service experience along these lines, call centers have developed a bad rap. But as legacy phone systems give way to newer digital technologies, call centers are evolving.\r\n<span style=\"font-weight: bold;\">What is a Contact Center?</span>\r\nThe term "contact center" (or “contact centre”) reflects the modern reality that there are many other ways to connect with a customer these days besides by telephone. The combined trends of increased customer expectations and newer technologies that allow for many channels of communication are creating a shift in the traditional call center model which has existed for decades. Consumers want more ways to reach businesses, and businesses are looking for new ways to improve customer experience.\r\nWhile call center agents generally focus on inbound and outbound calls, either on traditional phone lines or over VoIP, contact center agents handle a wide variety of communications. In a modern multichannel contact center, technical support might be delivered over in-app chat or video, while order status updates are delivered via SMS, event promotions are sent as push notifications, surveys are deployed over Facebook Messenger, and sales inquiries received by email are sent directly to an agent to connect by phone. Call centers handle voice communications, contact centers handle all communications.\r\nA company’s contact center is usually integrated with their customer relationship management (CRM) system, where all interactions between the organization and the public are tracked, coordinated, and managed. Depending on the infrastructure and ecosystem, it could be comprised of an alphabet soup of complex components. Many companies have purchased off-the-shelf systems or a highly customized network of technologies from multiple vendors. Some companies have adopted a cloud-based solution or two, but they remain siloed from the rest of their systems and can’t talk to each other.","iconURL":"https://roi4cio.com/fileadmin/user_upload/Contact_Center1.png"},{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.solti.ua/proyekt-postroyeniya-sistemy-ip-telefonii-s-vozmozhnostyu-uc-na-baze-tekhnologii-openscape-voice-unify/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"video-conferencing-for-large-engineering-company":{"id":1005,"title":"Video conferencing for large engineering company","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"video-conferencing-for-large-engineering-company","roi":0,"seo":{"title":"Video conferencing for large engineering company","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Video conferencing for large engineering company","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":7575,"title":"GIPROKOKS","logoURL":"https://roi4cio.com/uploads/roi/company/giprokoks_logo.png","alias":"giprokoks","address":"60 Sumska str., Kharkiv 61002, Ukraine","roles":[],"description":"State enterprise "State institute for designing enterprises of coke oven and by-product plants", SE "GIPROKOKS" was founded in 1929 in Kharkov – the largest scientific and engineering center of Ukraine. For more than 85 years GIPROKOKS has elaborated 400 projects of coke oven batteries with total production capacity exceeding 200 mln. tons of coke per year. Today geography of GIPROKOKS supplies covers 26 countries. The whole coke oven and by-product industry of Ukraine and CIS countries was built according to GIPROKOKS designs.\r\nThe archive of GIPROKOKS scientific and engineering products keeps design documentation according to which over 20% of world’s coke oven batteries have been built. Technological developments of GIPROKOKS correspond to the world’s standards and are protected with more than 500 author certificates and patents. GIPROKOKS has sold more than 50 licenses and know-how to companies from Germany, Japan, Italy, Great Britain, China, Poland, Turkey, Finland and other countries.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.giprokoks.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"GIPROKOKS","keywords":"","description":"State enterprise "State institute for designing enterprises of coke oven and by-product plants", SE "GIPROKOKS" was founded in 1929 in Kharkov – the largest scientific and engineering center of Ukraine. For more than 85 years GIPROKOKS has ","og:title":"GIPROKOKS","og:description":"State enterprise "State institute for designing enterprises of coke oven and by-product plants", SE "GIPROKOKS" was founded in 1929 in Kharkov – the largest scientific and engineering center of Ukraine. For more than 85 years GIPROKOKS has ","og:image":"https://roi4cio.com/uploads/roi/company/giprokoks_logo.png"},"eventUrl":""},"supplier":{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""},"vendors":[{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""}],"products":[{"id":5069,"logo":false,"scheme":false,"title":"Видеоконференцсвязь by SOLTI","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"alias":"videokonferencsvjaz-by-solti","companyTypes":[],"description":" SOLTI проектирует, создает, интегрирует и обслуживает подсистемы видеоконференцсвязи, обеспечивая двустороннюю передачу и обработку интерактивной информации в режиме реального времени в закрытых локальных сетях предприятия или через интернет на большие расстояния.\r\nПрофессиональные решения (Grandstream, Polycom, Cisco), в отличие от привычных бытовых бесплатных сервисов видеосвязи (Skype, Viber и т.д.) гарантируют:\r\n<ul><li>безопасность передаваемых данных;</li></ul>\r\n<ul><li>высокое качество изображения;</li></ul>\r\n<ul><li>бесперебойность сигнала и отказоустойчивость.</li></ul>\r\n<br /><span style=\"font-weight: bold;\">ОТРАСЛЕВЫЕ РЕШЕНИЯ SOLTI</span><br />\r\nБИЗНЕС И ПРОМЫШЛЕННОСТЬ\r\n<ul><li>снижение затрат на командировки</li></ul>\r\n<ul><li>оперативность принятия решений</li></ul>\r\n<ul><li>контроль процесса производства</li></ul>\r\n<ul><li>мониторинг удаленных объектов</li></ul>\r\n<ul><li>коммуникаций с зарубежными партнерами</li></ul>\r\n<ul><li>консультации клиентов (звонки с сайта)</li></ul>\r\nГОСУДАРСТВЕННЫЙ СЕКТОР<br />\r\n\r\n<ul><li>повышение эффективности управления</li></ul>\r\n<ul><li>сокращение расходов на содержание аппарата</li></ul>\r\n<ul><li>быстрое реагирование в кризисных ситуациях</li></ul>\r\n<ul><li>усиление взаимодействия между подразделениям</li></ul>\r\n<ul><li>снижение затрат на командировки</li></ul>\r\nЗДРАВООХРАНЕНИЕ. ТЕЛЕМЕДИЦИНА<br />\r\n\r\n<ul><li>дистанционные консультации</li></ul>\r\n<ul><li>контроль физиологических параметров</li></ul>\r\n<ul><li>удаленная диагностика</li></ul>\r\n<ul><li>руководство лечебными манипуляциями</li></ul>\r\n<ul><li>видеосеминары и видеолекции</li></ul>\r\nУЧЕБНЫЕ ЗАВЕДЕНИЯ. ДИСТАНЦИОННОЕ ОБУЧЕНИЕ\r\n<ul><li>доступ к лекциям лучших вузов</li></ul>\r\n<ul><li>территориальная независимость</li></ul>\r\n<ul><li>получение знаний на дому</li></ul>\r\n<ul><li>контроль учебного процесса</li></ul>\r\n<ul><li>удобство для людей с ограниченными возможностями</li></ul>","shortDescription":"SOLTI проектирует, создает, интегрирует и обслуживает подсистемы видеоконференцсвязи","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Видеоконференцсвязь by SOLTI","keywords":"","description":" SOLTI проектирует, создает, интегрирует и обслуживает подсистемы видеоконференцсвязи, обеспечивая двустороннюю передачу и обработку интерактивной информации в режиме реального времени в закрытых локальных сетях предприятия или через интернет на большие рассто","og:title":"Видеоконференцсвязь by SOLTI","og:description":" SOLTI проектирует, создает, интегрирует и обслуживает подсистемы видеоконференцсвязи, обеспечивая двустороннюю передачу и обработку интерактивной информации в режиме реального времени в закрытых локальных сетях предприятия или через интернет на большие рассто"},"eventUrl":"","translationId":7090,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":729,"title":"IT Project Deployment Services","alias":"it-project-deployment-services","description":" Companies invest in projects for the implementation of IT systems that are consistent with the organization's values, with the goal of realizing a business vision, stable support for operational activities, and gaining competitive advantages. In this regard, technological projects are becoming increasingly large-scale, affecting more departments of the organization, and pose a risk to the company if the operation of information systems is disrupted.\r\nThe introduction of new IT requires the project team to carry out at least two principal stages:\r\n<ul><li>pre-project analysis of the enterprise, when, with the help of specialists in the proposed IP and specialists of the enterprise, compliance and discrepancies between the system and its future use is revealed. As a result of the survey, ways to eliminate inconsistencies are determined based on the initial assessment of the required resources and time. The survey is conducted using questions and answers, to some extent formalized, and special software tools that allow you to describe the processes of the system and the enterprise and compare them visually. No changes take place at the enterprise unless individual employees are distracted from their direct duties, which is both a virtue and a disadvantage of this approach;</li><li>trial implementation carried out on the most characteristic site of work. Based on this test work, a general assessment of future implementation is determined and a fundamental decision is made on the use of IP.</li></ul>\r\nThere is a lot of confusion and substitution of the concept of “project team” with the idea of it as a “group”, “pack”, “family”, etc. There are several understandings that there is a modern “project team/group” and “integrated project team”, however, the fundamental characteristic of the team is that it does not exist outside the project. A team with all its human strengths and weaknesses is a necessary and inseparable element of any project. It is a developing element of the technology of the project and affects the project itself.\r\nThe project itself is not “done” - it is made by people, and where people are affected by the influence of biology, instincts, gender parameters, “conscious” and “unconscious”, etc. If people are in the organizational “system” (family, flock, group, team, etc.), systemic effects arise that should be foreseen in the formation of a set of people due to the competent selection, placement and development of the team in the right direction. This is not just an ordinary organizational question, but a question of the depth of understanding of the essence of the project, its management and the skill of the leader.","materialsDescription":" <span style=\"font-weight: bold;\">What is an IT project?</span>\r\nAn IT project is a project that includes work related to information technology.\r\n<span style=\"font-weight: bold;\">What is information technology?</span>\r\nInformation technology is a technology aimed at the creation, development and support of information systems.\r\n<span style=\"font-weight: bold;\">What are the main ideas underlying the project team model of an IT project?</span>\r\n<ul><li>interdependent and interrelated roles in a small group;</li><li>determination of the role, special mission and area of responsibility for each member of the project team;</li><li>distributed project management and responsibility;</li><li>each is focused on the success of the project and is set to work throughout the project cycle;</li><li>communication between project team members is a key success factor;</li><li>users and training staff are included in the project team;</li><li>parallel engineering - parallel work of all team members on a project.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Deployment_Services.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5069,"logo":false,"scheme":false,"title":"Видеоконференцсвязь by SOLTI","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"alias":"videokonferencsvjaz-by-solti","companyTypes":[],"description":" SOLTI проектирует, создает, интегрирует и обслуживает подсистемы видеоконференцсвязи, обеспечивая двустороннюю передачу и обработку интерактивной информации в режиме реального времени в закрытых локальных сетях предприятия или через интернет на большие расстояния.\r\nПрофессиональные решения (Grandstream, Polycom, Cisco), в отличие от привычных бытовых бесплатных сервисов видеосвязи (Skype, Viber и т.д.) гарантируют:\r\n<ul><li>безопасность передаваемых данных;</li></ul>\r\n<ul><li>высокое качество изображения;</li></ul>\r\n<ul><li>бесперебойность сигнала и отказоустойчивость.</li></ul>\r\n<br /><span style=\"font-weight: bold;\">ОТРАСЛЕВЫЕ РЕШЕНИЯ SOLTI</span><br />\r\nБИЗНЕС И ПРОМЫШЛЕННОСТЬ\r\n<ul><li>снижение затрат на командировки</li></ul>\r\n<ul><li>оперативность принятия решений</li></ul>\r\n<ul><li>контроль процесса производства</li></ul>\r\n<ul><li>мониторинг удаленных объектов</li></ul>\r\n<ul><li>коммуникаций с зарубежными партнерами</li></ul>\r\n<ul><li>консультации клиентов (звонки с сайта)</li></ul>\r\nГОСУДАРСТВЕННЫЙ СЕКТОР<br />\r\n\r\n<ul><li>повышение эффективности управления</li></ul>\r\n<ul><li>сокращение расходов на содержание аппарата</li></ul>\r\n<ul><li>быстрое реагирование в кризисных ситуациях</li></ul>\r\n<ul><li>усиление взаимодействия между подразделениям</li></ul>\r\n<ul><li>снижение затрат на командировки</li></ul>\r\nЗДРАВООХРАНЕНИЕ. ТЕЛЕМЕДИЦИНА<br />\r\n\r\n<ul><li>дистанционные консультации</li></ul>\r\n<ul><li>контроль физиологических параметров</li></ul>\r\n<ul><li>удаленная диагностика</li></ul>\r\n<ul><li>руководство лечебными манипуляциями</li></ul>\r\n<ul><li>видеосеминары и видеолекции</li></ul>\r\nУЧЕБНЫЕ ЗАВЕДЕНИЯ. ДИСТАНЦИОННОЕ ОБУЧЕНИЕ\r\n<ul><li>доступ к лекциям лучших вузов</li></ul>\r\n<ul><li>территориальная независимость</li></ul>\r\n<ul><li>получение знаний на дому</li></ul>\r\n<ul><li>контроль учебного процесса</li></ul>\r\n<ul><li>удобство для людей с ограниченными возможностями</li></ul>","shortDescription":"SOLTI проектирует, создает, интегрирует и обслуживает подсистемы видеоконференцсвязи","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Видеоконференцсвязь by SOLTI","keywords":"","description":" SOLTI проектирует, создает, интегрирует и обслуживает подсистемы видеоконференцсвязи, обеспечивая двустороннюю передачу и обработку интерактивной информации в режиме реального времени в закрытых локальных сетях предприятия или через интернет на большие рассто","og:title":"Видеоконференцсвязь by SOLTI","og:description":" SOLTI проектирует, создает, интегрирует и обслуживает подсистемы видеоконференцсвязи, обеспечивая двустороннюю передачу и обработку интерактивной информации в режиме реального времени в закрытых локальных сетях предприятия или через интернет на большие рассто"},"eventUrl":"","translationId":7090,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":729,"title":"IT Project Deployment Services","alias":"it-project-deployment-services","description":" Companies invest in projects for the implementation of IT systems that are consistent with the organization's values, with the goal of realizing a business vision, stable support for operational activities, and gaining competitive advantages. In this regard, technological projects are becoming increasingly large-scale, affecting more departments of the organization, and pose a risk to the company if the operation of information systems is disrupted.\r\nThe introduction of new IT requires the project team to carry out at least two principal stages:\r\n<ul><li>pre-project analysis of the enterprise, when, with the help of specialists in the proposed IP and specialists of the enterprise, compliance and discrepancies between the system and its future use is revealed. As a result of the survey, ways to eliminate inconsistencies are determined based on the initial assessment of the required resources and time. The survey is conducted using questions and answers, to some extent formalized, and special software tools that allow you to describe the processes of the system and the enterprise and compare them visually. No changes take place at the enterprise unless individual employees are distracted from their direct duties, which is both a virtue and a disadvantage of this approach;</li><li>trial implementation carried out on the most characteristic site of work. Based on this test work, a general assessment of future implementation is determined and a fundamental decision is made on the use of IP.</li></ul>\r\nThere is a lot of confusion and substitution of the concept of “project team” with the idea of it as a “group”, “pack”, “family”, etc. There are several understandings that there is a modern “project team/group” and “integrated project team”, however, the fundamental characteristic of the team is that it does not exist outside the project. A team with all its human strengths and weaknesses is a necessary and inseparable element of any project. It is a developing element of the technology of the project and affects the project itself.\r\nThe project itself is not “done” - it is made by people, and where people are affected by the influence of biology, instincts, gender parameters, “conscious” and “unconscious”, etc. If people are in the organizational “system” (family, flock, group, team, etc.), systemic effects arise that should be foreseen in the formation of a set of people due to the competent selection, placement and development of the team in the right direction. This is not just an ordinary organizational question, but a question of the depth of understanding of the essence of the project, its management and the skill of the leader.","materialsDescription":" <span style=\"font-weight: bold;\">What is an IT project?</span>\r\nAn IT project is a project that includes work related to information technology.\r\n<span style=\"font-weight: bold;\">What is information technology?</span>\r\nInformation technology is a technology aimed at the creation, development and support of information systems.\r\n<span style=\"font-weight: bold;\">What are the main ideas underlying the project team model of an IT project?</span>\r\n<ul><li>interdependent and interrelated roles in a small group;</li><li>determination of the role, special mission and area of responsibility for each member of the project team;</li><li>distributed project management and responsibility;</li><li>each is focused on the success of the project and is set to work throughout the project cycle;</li><li>communication between project team members is a key success factor;</li><li>users and training staff are included in the project team;</li><li>parallel engineering - parallel work of all team members on a project.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Deployment_Services.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":254,"title":"Centralize management"},{"id":262,"title":"Support Customers"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":370,"title":"No automated business processes"},{"id":378,"title":"Low employee productivity"},{"id":395,"title":"Decentralization of management"},{"id":398,"title":"Poor communication and coordination among staff"}]}},"categories":[{"id":729,"title":"IT Project Deployment Services","alias":"it-project-deployment-services","description":" Companies invest in projects for the implementation of IT systems that are consistent with the organization's values, with the goal of realizing a business vision, stable support for operational activities, and gaining competitive advantages. In this regard, technological projects are becoming increasingly large-scale, affecting more departments of the organization, and pose a risk to the company if the operation of information systems is disrupted.\r\nThe introduction of new IT requires the project team to carry out at least two principal stages:\r\n<ul><li>pre-project analysis of the enterprise, when, with the help of specialists in the proposed IP and specialists of the enterprise, compliance and discrepancies between the system and its future use is revealed. As a result of the survey, ways to eliminate inconsistencies are determined based on the initial assessment of the required resources and time. The survey is conducted using questions and answers, to some extent formalized, and special software tools that allow you to describe the processes of the system and the enterprise and compare them visually. No changes take place at the enterprise unless individual employees are distracted from their direct duties, which is both a virtue and a disadvantage of this approach;</li><li>trial implementation carried out on the most characteristic site of work. Based on this test work, a general assessment of future implementation is determined and a fundamental decision is made on the use of IP.</li></ul>\r\nThere is a lot of confusion and substitution of the concept of “project team” with the idea of it as a “group”, “pack”, “family”, etc. There are several understandings that there is a modern “project team/group” and “integrated project team”, however, the fundamental characteristic of the team is that it does not exist outside the project. A team with all its human strengths and weaknesses is a necessary and inseparable element of any project. It is a developing element of the technology of the project and affects the project itself.\r\nThe project itself is not “done” - it is made by people, and where people are affected by the influence of biology, instincts, gender parameters, “conscious” and “unconscious”, etc. If people are in the organizational “system” (family, flock, group, team, etc.), systemic effects arise that should be foreseen in the formation of a set of people due to the competent selection, placement and development of the team in the right direction. This is not just an ordinary organizational question, but a question of the depth of understanding of the essence of the project, its management and the skill of the leader.","materialsDescription":" <span style=\"font-weight: bold;\">What is an IT project?</span>\r\nAn IT project is a project that includes work related to information technology.\r\n<span style=\"font-weight: bold;\">What is information technology?</span>\r\nInformation technology is a technology aimed at the creation, development and support of information systems.\r\n<span style=\"font-weight: bold;\">What are the main ideas underlying the project team model of an IT project?</span>\r\n<ul><li>interdependent and interrelated roles in a small group;</li><li>determination of the role, special mission and area of responsibility for each member of the project team;</li><li>distributed project management and responsibility;</li><li>each is focused on the success of the project and is set to work throughout the project cycle;</li><li>communication between project team members is a key success factor;</li><li>users and training staff are included in the project team;</li><li>parallel engineering - parallel work of all team members on a project.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Deployment_Services.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.solti.ua/sozdaniye-zashchishchennoy-sistemy-videokonferentssvyazi-korporativnogo-klassa-dlya-gp-giprokoks/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},"wireless-data-networks-wi-fi-by-solti-for-restaurant":{"id":999,"title":"Wireless data networks (Wi-Fi) by SOLTI for restaurant","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"wireless-data-networks-wi-fi-by-solti-for-restaurant","roi":0,"seo":{"title":"Wireless data networks (Wi-Fi) by SOLTI for restaurant","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Wireless data networks (Wi-Fi) by SOLTI for restaurant","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":7571,"title":"PROBKA resto&music hall","logoURL":"https://roi4cio.com/uploads/roi/company/Probka-beer-hall-logo.png","alias":"probka-restomusic-hall","address":"","roles":[],"description":" Founded in 2014, PROBKA resto & music hall is an atmospheric restaurant with its own brewery with 500 seats. Four times the nominee of the National restaurant award SALT as the best beer restaurant in Ukraine. Four of them - in the final among the 9 best restaurants.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://probka.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"PROBKA resto&music hall","keywords":"","description":" Founded in 2014, PROBKA resto & music hall is an atmospheric restaurant with its own brewery with 500 seats. Four times the nominee of the National restaurant award SALT as the best beer restaurant in Ukraine. Four of them - in the final among the 9 best ","og:title":"PROBKA resto&music hall","og:description":" Founded in 2014, PROBKA resto & music hall is an atmospheric restaurant with its own brewery with 500 seats. Four times the nominee of the National restaurant award SALT as the best beer restaurant in Ukraine. Four of them - in the final among the 9 best ","og:image":"https://roi4cio.com/uploads/roi/company/Probka-beer-hall-logo.png"},"eventUrl":""},"supplier":{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""},"vendors":[{"id":2103,"title":"SOLTI","logoURL":"https://roi4cio.com/uploads/roi/company/SOLTI.png","alias":"solti","address":"","roles":[],"description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another well-known Ukrainian brand, and stood at the origins of IT-market integration of Ukraine.<br />Experience and professionalism<br />SOLTI experts - professionals of the highest level, with more than 15 years of experience in implementing projects in the field of design, modernization and construction of high-level corporate IT-infrastructure complexity. Among the main achievements of the team - the creation of one of the first in Ukraine, distributed video conferencing system, one of the first digital library systems.<br />Specialists of the company during the years of their activities implemented hundreds of complex projects, many of which were at the time of the introduction of an innovative breakthrough in the field of corporate IT-technologies.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":137,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":10,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.solti.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SOLTI","keywords":"SOLTI, experts, team, first, Ukraine, projects, years, company","description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:title":"SOLTI","og:description":"SOLTI (solution / technology / integration) is a system integrator of complex IT-solutions for business<br />As an independent company structure SOLTI formed in 2014 by a team of leading experts, previously constituted the core of System Integration of another","og:image":"https://roi4cio.com/uploads/roi/company/SOLTI.png"},"eventUrl":""}],"products":[{"id":5063,"logo":false,"scheme":false,"title":"Беспроводные сети передачи данных (Wi‑Fi) by SOLTI","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"alias":"besprovodnye-seti-peredachi-dannykh-wi-fi-by-solti","companyTypes":[],"description":" \r\nSOLTI проектирует, создает и обслуживает беспроводные (Wi-Fi) сети, не уступающие проводным сетям по эффективности и надежности:\r\n<ul><li>простые потребительские;</li></ul>\r\n<ul><li>профессиональные корпоративные.</li></ul>\r\nПроектирование и создании корпоративных беспроводных сетей специалистами SOLTI выполняется с учетом жестких требований к информационной безопасности Wi-Fi сетей:\r\n<ul><li>персональная аутентификация для каждого пользователя, которую он проходит с помощью собственного ключа;</li></ul>\r\n<ul><li>обязательное использование двухсторонней аутентификации (серверной и клиентской стороны);</li></ul>\r\n<ul><li>надежный уровень шифрования для защиты данных от перехвата и подмены.</li></ul>\r\nВ построенных SOLTI профессиональных сетях могут работать сотни точек доступа. При перемещении пользователей из зоны действия одной точки к другой точке обеспечиваем плавный, «бесшовный» роуминг.<br />\r\nСпециалисты SOLTI создают системы, использующие технологию RFID-меток, что позволяет отслеживать местоположение мобильных устройств в помещениях офиса, осуществлять привязку угроз безопасности к географической карте радиопокрытия, сохранять историю перемещения объектов и с высокой точностью выявлять мошеннические точки доступа.<br /><span style=\"font-weight: bold;\"><br />ОТРАСЛЕВЫЕ РЕШЕНИЯ WI-FI</span><br />\r\nОФИС. БАНКИ. ГОСУЧРЕЖДЕНИЯ\r\n<ul><li>радиомост для территориально распределенных офисов</li></ul>\r\n<ul><li>гостевой беспроводной доступ в интернет для гостей</li></ul>\r\n<ul><li>бесшовный роуминг: стабильное функционирование голосовых (VoIP) и видео сервисов</li></ul>\r\n<ul><li>безопасность и стабильность работы</li></ul>\r\nРЕСТОРАНЫ. ОТЕЛИ\r\n<ul><li>повышение качества обслуживания</li></ul>\r\n<ul><li>усиление лояльности посетителей</li></ul>\r\n<ul><li>привлечение внимания гостей</li></ul>\r\n<ul><li>создание собственной рекламной площадки</li></ul>\r\n<ul><li>увеличение прибыли</li></ul>\r\nМЕДУЧРЕЖДЕНИЯ\r\n<ul><li>оперативность информации о пациентах</li></ul>\r\n<ul><li>учет работы на всей территории учреждения</li></ul>\r\n<ul><li>местоположение персонала, оборудования</li></ul>\r\n<ul><li>температурный мониторинг при хранении препаратов</li></ul>\r\n<ul><li>доступ к корпоративной сети</li></ul>\r\nПРОМЫШЛЕННОСТЬ. СКЛАДЫ\r\n<ul><li>сокращение затрат на складское хранение</li></ul>\r\n<ul><li>снижение времени всех операций</li></ul>\r\n<ul><li>уменьшение количества ошибочных операций</li></ul>\r\n<ul><li>точности и оперативность учета</li></ul>\r\n<ul><li>оперативность информации о технологических процессах</li></ul>\r\n<ul><li>учет работы на всей территории</li></ul>\r\n<br /><span style=\"font-weight: bold;\">ПОСТРОЕНИЕ БЕСПРОВОДНОЙ СЕТИ WI-FI</span><br />\r\n1 Этап. Формирование требований и разработка технического задания<br />2 Этап. Планирование радиосреды. Планирование зоны покрытия<br />3 Этап. Развертывание сети Wi-Fi<br /><br />АУТСОРСИНГ: СОПРОВОЖДЕНИЕ/АДМИНИСТРИРОВАНИЕ<br />\r\nДля поддержания работоспособности Wi-Fi и обеспечения высокого уровня информационной безопасности предприятия SOLTI предлагает аутсорсинг офисных беспроводных сетей, использующих большое количество точек доступа, находящихся на значительном расстоянии друг от друга. SOLTI гарантируют:\r\n<ul><li>планирование и установку дополнительного ПО;</li></ul>\r\n<ul><li>консультационные мероприятия;</li></ul>\r\n<ul><li>быстрое восстановление нормальной работы сети.</li></ul>","shortDescription":"Проектирование и создании корпоративных беспроводных сетей специалистами SOLTI выполняется с учетом жестких требований к информационной безопасности Wi-Fi сетей.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Беспроводные сети передачи данных (Wi‑Fi) by SOLTI","keywords":"","description":" \r\nSOLTI проектирует, создает и обслуживает беспроводные (Wi-Fi) сети, не уступающие проводным сетям по эффективности и надежности:\r\n<ul><li>простые потребительские;</li></ul>\r\n<ul><li>профессиональные корпоративные.</li></ul>\r\nПроектирование и создании корпор","og:title":"Беспроводные сети передачи данных (Wi‑Fi) by SOLTI","og:description":" \r\nSOLTI проектирует, создает и обслуживает беспроводные (Wi-Fi) сети, не уступающие проводным сетям по эффективности и надежности:\r\n<ul><li>простые потребительские;</li></ul>\r\n<ul><li>профессиональные корпоративные.</li></ul>\r\nПроектирование и создании корпор"},"eventUrl":"","translationId":7087,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":729,"title":"IT Project Deployment Services","alias":"it-project-deployment-services","description":" Companies invest in projects for the implementation of IT systems that are consistent with the organization's values, with the goal of realizing a business vision, stable support for operational activities, and gaining competitive advantages. In this regard, technological projects are becoming increasingly large-scale, affecting more departments of the organization, and pose a risk to the company if the operation of information systems is disrupted.\r\nThe introduction of new IT requires the project team to carry out at least two principal stages:\r\n<ul><li>pre-project analysis of the enterprise, when, with the help of specialists in the proposed IP and specialists of the enterprise, compliance and discrepancies between the system and its future use is revealed. As a result of the survey, ways to eliminate inconsistencies are determined based on the initial assessment of the required resources and time. The survey is conducted using questions and answers, to some extent formalized, and special software tools that allow you to describe the processes of the system and the enterprise and compare them visually. No changes take place at the enterprise unless individual employees are distracted from their direct duties, which is both a virtue and a disadvantage of this approach;</li><li>trial implementation carried out on the most characteristic site of work. Based on this test work, a general assessment of future implementation is determined and a fundamental decision is made on the use of IP.</li></ul>\r\nThere is a lot of confusion and substitution of the concept of “project team” with the idea of it as a “group”, “pack”, “family”, etc. There are several understandings that there is a modern “project team/group” and “integrated project team”, however, the fundamental characteristic of the team is that it does not exist outside the project. A team with all its human strengths and weaknesses is a necessary and inseparable element of any project. It is a developing element of the technology of the project and affects the project itself.\r\nThe project itself is not “done” - it is made by people, and where people are affected by the influence of biology, instincts, gender parameters, “conscious” and “unconscious”, etc. If people are in the organizational “system” (family, flock, group, team, etc.), systemic effects arise that should be foreseen in the formation of a set of people due to the competent selection, placement and development of the team in the right direction. This is not just an ordinary organizational question, but a question of the depth of understanding of the essence of the project, its management and the skill of the leader.","materialsDescription":" <span style=\"font-weight: bold;\">What is an IT project?</span>\r\nAn IT project is a project that includes work related to information technology.\r\n<span style=\"font-weight: bold;\">What is information technology?</span>\r\nInformation technology is a technology aimed at the creation, development and support of information systems.\r\n<span style=\"font-weight: bold;\">What are the main ideas underlying the project team model of an IT project?</span>\r\n<ul><li>interdependent and interrelated roles in a small group;</li><li>determination of the role, special mission and area of responsibility for each member of the project team;</li><li>distributed project management and responsibility;</li><li>each is focused on the success of the project and is set to work throughout the project cycle;</li><li>communication between project team members is a key success factor;</li><li>users and training staff are included in the project team;</li><li>parallel engineering - parallel work of all team members on a project.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Deployment_Services.png"},{"id":743,"title":"IT System documentation writing","alias":"it-system-documentation-writing","description":" Without the development of technical documentation, it is impossible to create any complex technical solution. High-quality documentation, that is, informative, complete and understandable, is the key to the success of products at all stages of its life cycle. Properly written documentation is the basis of the functionality and effectiveness of information systems. It is with its use that the processes of creating databases, developing software, selecting and configuring network and server software are carried out.\r\nMany organizations at the initial stages of creating and implementing technical solutions do not pay enough attention to this factor, which often prevents the entry of a new product to the market.\r\nWriting documentation requires the contractor to have specific knowledge and skills, certain experience and considerable labor costs.\r\nThe main task of the working documentation is to give a complete picture of how the system is structured, what it consists of and how it functions.\r\nThere is no single standard for the development of this type of documentation. In most cases, its structure is selected for a specific situation. But you can take any algorithm that has already proven its effectiveness as the basis.","materialsDescription":"<span style=\"font-weight: bold; \">What is software documentation?</span>\r\nSoftware documentation - printed user manuals, online (online) documentation and help text describing how to use the software product.\r\n<span style=\"font-weight: bold; \">What is process documentation?</span>\r\nA process document outlines the steps necessary to complete a task or process. It is internal, ongoing documentation of the process while it is occurring—documentation cares more about the “how” of implementation than the “what” of process impact.\r\n<span style=\"font-weight: bold;\">What should be in the working documentation?</span>\r\nFirst of all, technical descriptions of implemented solutions. These are IT infrastructure diagrams, configuration descriptions, etc.\r\n<span style=\"font-weight: bold;\">What does well-written working documentation give?</span>\r\n<ul><li>systematizes data on IT infrastructure;</li><li>helps to understand the system architecture and functioning of connected services;</li><li>facilitates management decisions (for example, shows which service can be removed or replaced and how it will be displayed on the whole system);</li><li>makes it possible to comprehensively evaluate the selected IT structure and, also, timely notice the mistakes made or holes in the architecture.</li></ul>\r\n<span style=\"font-weight: bold;\">What are the key benefits of writing technical documentation?</span>\r\nThe development of documentation will allow you to:\r\n<ul><li>increase user satisfaction</li><li>reduce the load on the system administrator;</li><li>reduce system support costs.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_System_documentation_writing.png"},{"id":741,"title":"Proof of Concept","alias":"proof-of-concept","description":"Proof of concept (PoC) is a realization of a certain method or idea in order to demonstrate its feasibility, or a demonstration in principle with the aim of verifying that some concept or theory has practical potential. A proof of concept is usually small and may or may not be complete.\r\nProof of concept (POC) is used to test the idea of a certain technical feature or the general design of a product and prove that it is possible to apply those ideas.\r\nIt could be used to test something on just one part of the product before it is tried in practice with making a prototype.\r\nYou can think of this as a pre-prototype version of the product, but it is not even that since POC shouldn’t have all the features as the final product, not even as the prototype.\r\nThe main goal of POC is to prove that it is actually possible to develop that idea and include it as part of the final product.","materialsDescription":" <span style=\"font-weight: bold;\">What is a proof of concept?</span>\r\nProof of concept is the testing of the finished product based on the idea. Thus, this stage is the first phase in the design of the application. It explains how the project should work on the basis of a detailed description of requirements and specifications. The proof is the complete satisfaction of those functions that need to be realized. This approach makes it easier to hire developers for a startup in the future.\r\nIn order to confirm the concept in software development, it is necessary to determine the main tasks and perform the following steps:\r\n<ol><li>Identify project goals and methods for their implementation.</li><li>Receive feedback from users and customers.</li><li>Correct the idea and start implementing it.</li></ol>\r\n<span style=\"font-weight: bold;\">Project goals and methods of implementation</span>\r\nBefore you start, you need to understand what goal will perform a project. A web project can be a large marketplace or social network with unique features and a convenient solution. Also, it may be a CRM system and help the business to increase sales or improve the accounting of business resources. One way or another, each platform has a specific purpose.\r\nThe next step is to build methods of achieving the goal. At this stage, it is important not to delve into the details, but to evaluate common elements. How the project will work, what functions will be implemented, how the web application will interact with users, etc. It is very important to consider each item and write it down in the report. In fact, this is a small brainstorm. Typically, it takes from a few days to a couple of weeks. When the implementation plan is completed, you can begin to collect feedback from future users.\r\n<span style=\"font-weight: bold;\">Feedback from users and customers</span>\r\nWhen you have a ready document with a description of the project and the functions, then you need to get feedback from users or customers. Offer them your solution to a particular problem. Familiarize them with the implementation methods. You will receive many suggestions for improvement. At this point, some of your guesswork will be broken. It is important to listen and collect feedback. There is no need to hurry and change the concept or implement everything that future users are asking for. They don't have an expert evaluation and this is only their proposal.\r\n<span style=\"font-weight: bold;\">Idea correction and implementation</span>\r\nIt is at this stage that the final proof of the concept takes place. Having received feedback, you can clearly understand how users will interact with your project. What emotions it will cause. It is necessary to understand that this is a preliminary evaluation of the concept. Some recommendations may not have value, as others can significantly affect the further development. Thus, based on the information received, it is necessary to consider what can be changed to make the project more convenient. If you received a lot of negative feedback, it makes sense to stop the development process. Or at least think about a new improved version. So, if you really decided to start the development, we recommend starting the design with MVP. The minimal version will allow us to develop the project in the shortest possible time and check the idea on real users.\r\nProof of the concept is one of the important stages in the development of complex and expensive projects. It allows with high probability to determine the value of the project even before the begins development. Typically, the process takes from a few days to a couple of weeks. It gives a clear idea of how the project will work and what functions it will perform. If you approach the feedback analysis process with a clean head, this step in the future can save you money and time.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Proof_of_Concept.png"},{"id":739,"title":"Deployment and Integration Services","alias":"deployment-and-integration-services","description":" The number of various solutions implemented by customers today is quite large. Often, the subsystems of the seemingly unified IT landscape are either weakly connected with each other, or the interaction between them is established in the mode of transferring files and data by mail or “from hand to hand”.\r\nWestern IT vendors, following a certain trend, offer the customer complete and unified solutions. Such blocks of subsystems solve a specific task and form separate IT centers, which also require the mutual integration of infrastructures. This, oddly enough, is even more difficult, as a complete solution does not allow to penetrate deeply and get access to the required information or control subsystems.\r\nNevertheless, the integration and interconnection of information flows can significantly simplify business processes and lead to an increase in the efficiency of interaction both inside and outside the company (with customers and partners).\r\nThe integration task itself is important for business, as it provides a qualitatively new level of services. This is especially important for companies where IT is the immediate tool for achieving business goals. But it is equally important to make integration optimal in the light of minimizing not only the cost of purchasing equipment and software but also preserving previous IT investments.","materialsDescription":" <span style=\"font-weight: bold; \">The main types of implementation and integration services offered by companies:</span>\r\n<ul><li>Designing IT architecture for integration solutions in the field of analytics, automation and monitoring of business processes;</li><li>Development and integration of network infrastructure subsystems, including scalable telecommunications equipment, server equipment and workstations;</li><li>Defining a single platform and developing a solution for integrating enterprise applications, data and business processes;</li><li>Implementation and maintenance of integrated integration solutions in the field of enterprise management (ERP-systems);</li><li>Implementation and maintenance of integration solutions in the field of accounting and analysis of sales and customer relations (CRM-system);</li><li>Implementation and maintenance of integration solutions in the field of accounting and financial analysis;</li><li>Impairment, testing and development of solutions for ensuring information security of a business.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Deployment_and_Integration_Services.png"},{"id":737,"title":"IT System Testing","alias":"it-system-testing","description":" System testing is testing conducted on a complete integrated system to evaluate the system's compliance with its specified requirements.\r\nSystem testing takes, as its input, all of the integrated components that have passed integration testing. The purpose of integration testing is to detect any inconsistencies between the units that are integrated together (called assemblages). System testing seeks to detect defects both within the "inter-assemblages" and also within the system as a whole. The actual result is the behavior produced or observed when a component or system is tested.\r\nSystem testing is performed on the entire system in the context of either functional requirement specifications (FRS) or system requirement specification (SRS), or both. System testing tests not only the design but also the behavior and even the believed expectations of the customer. It is also intended to test up to and beyond the bounds defined in the software or hardware requirements specification(s).\r\nSoftware testing is an investigation conducted to provide stakeholders with information about the quality of the software product or service under test. Software testing can also provide an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation. Software testing involves the execution of a software component or system component to evaluate one or more properties of interest. In general, these properties indicate the extent to which the component or system under test meets the requirements that guided its design and development, responds correctly to all kinds of inputs, performs its functions within an acceptable time, is sufficiently usable, can be installed and run in its intended environments, and achieves the general result its stakeholders desire. As the number of possible tests for even simple software components is practically infinite, all software testing uses some strategy to select tests that are feasible for the available time and resources.\r\nMobile-device testing assures the quality of mobile devices, like mobile phones, PDAs, etc. The testing will be conducted on both hardware and software. And from the view of different procedures, the testing comprises R&D testing, factory testing and certification testing. Mobile-device testing involves a set of activities from monitoring and troubleshooting mobile applications, content and services on real handsets. Testing includes verification and validation of hardware devices and software applications.","materialsDescription":" <span style=\"font-weight: bold;\">What is System Testing?</span>\r\nSystem Testing is the testing of a complete and fully integrated software product. Usually, the software is only one element of a larger computer-based system. Ultimately, the software is interfaced with other software/hardware systems. System Testing is actually a series of different tests whose sole purpose is to exercise the full computer-based system.\r\nTwo Category of Software Testing:\r\n<ul><li>Black Box Testing;</li><li>White Box Testing.</li></ul>\r\nSystem test falls under the black box testing category of software testing.\r\nWhite box testing is the testing of the internal workings or code of a software application. In contrast, black box or System Testing is the opposite. The system test involves the external workings of the software from the user's perspective.\r\n<span style=\"font-weight: bold;\">What do you verify in System Testing?</span>\r\nSystem Testing involves testing the software code for following:\r\n<ul><li>Testing the fully integrated applications including external peripherals in order to check how components interact with one another and with the system as a whole. This is also called End to End testing scenario.</li><li>Verify thorough testing of every input in the application to check for desired outputs.</li><li>Testing of the user's experience with the application.</li></ul>\r\nThat is a very basic description of what is involved in system testing. You need to build detailed test cases and test suites that test each aspect of the application as seen from the outside without looking at the actual source code.\r\n<span style=\"font-weight: bold;\">What Types of System Testing Should Testers Use?</span>\r\nThere are over 50 different types of system testing. The specific types used by a tester depend on several variables. Those variables include:\r\n<ul><li><span style=\"font-weight: bold;\">Who the tester works for</span> - This is a major factor in determining the types of system testing a tester will use. Methods used by large companies are different than those used by medium and small companies.</li><li><span style=\"font-weight: bold;\">Time available for testing</span> - Ultimately, all 50 testing types could be used. Time is often what limits us to using only the types that are most relevant for the software project.</li><li><span style=\"font-weight: bold;\">Resources available to the tester</span> - Of course some testers will not have the necessary resources to conduct a testing type. For example, if you are a tester working for a large software development firm, you are likely to have expensive automated testing software not available to others.</li><li><span style=\"font-weight: bold;\">Software Tester's Education</span> - There is a certain learning curve for each type of software testing available. To use some of the software involved, a tester has to learn how to use it.</li><li><span style=\"font-weight: bold;\">Testing Budget</span> - Money becomes a factor not just for smaller companies and individual software developers but large companies as well.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_System_testing.png"},{"id":735,"title":"Installation and configuration","alias":"installation-and-configuration","description":" Installation or setup is the act of making the system or program ready for execution. Because the process varies for each program and each computer, programs (including operating systems) often come with an installer, a specialized program responsible for doing whatever is needed for their installation. The configuration is an arrangement of functional units according to their nature, number, and chief characteristics. Often, configuration pertains to the choice of hardware, software, firmware, settings, and documentation. The configuration affects system function and performance.\r\nSome computer programs can be executed by simply copying them into a folder stored on a computer and executing them. Other programs are supplied in a form unsuitable for immediate execution and therefore need an installation procedure. Once installed, the program can be executed again and again, without the need to reinstall before each execution.\r\nCommon operations performed during software installations include:\r\n<ul><li>Making sure that necessary system requirements are met</li><li>Checking for existing versions of the software</li><li>Creating or updating program files and folders</li><li>Adding configuration data such as configuration files, Windows registry entries or environment variables</li><li>Making the software accessible to the user, for instance by creating links, shortcuts or bookmarks</li><li>Configuring components that run automatically, such as daemons or Windows services</li><li>Performing product activation</li><li>Updating the software versions</li></ul>\r\nThese operations may require some charges or be free of charge. In case of payment, installation costs means the costs connected and relevant to or incurred as a result of installing the drivers or the equipment in the customers' premises. ","materialsDescription":"<span style=\"font-weight: bold;\">What does "Installation" mean?</span>\r\nInstallation is the process of making hardware and/or software ready for use. Obviously, different systems require different types of installations. While certain installations are simple and straightforward and can be performed by non-professionals, others are more complex and time-consuming and may require the involvement of specialists.\r\n<span style=\"font-weight: bold; \">What does the "Configuration" mean?</span>\r\nThe way a system is set up, or the assortment of components that make up the system. Configuration can refer to either hardware or software, or the combination of both. For instance, a typical configuration for a PC consists of 32MB (megabytes) main memory, a floppy drive, a hard disk, a modem, a CD-ROM drive, a VGA monitor, and the Windows operating system.\r\nMany software products require that the computer have a certain minimum configuration. For example, the software might require a graphics display monitor and a video adapter, a particular microprocessor, and a minimum amount of main memory.\r\nWhen you install a new device or program, you sometimes need to configure it, which means to set various switches and jumpers (for hardware) and to define values of parameters (for software). For example, the device or program may need to know what type of video adapter you have and what type of printer is connected to the computer. Thanks to new technologies, such as plug-and-play, much of this configuration is performed automatically.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Installation_and_configuration.png"},{"id":733,"title":"Technical Support","alias":"technical-support","description":" Technical support (often shortened to tech support) refers to services that entities provide to users of technology products or services. In general, technical support provide help regarding specific problems with a product or service, rather than providing training, provision or customization of product, or other support services. Most companies offer technical support for the services or products they sell, either included in the cost or for an additional fee. Technical support may be delivered over by phone, e-mail, live support software on a website, or other tool where users can log an incident. Larger organizations frequently have internal technical support available to their staff for computer-related problems. The Internet can also be a good source for freely available tech support, where experienced users help users find solutions to their problems. In addition, some fee-based service companies charge for premium technical support services.\r\nTechnical support may be delivered by different technologies depending on the situation. For example, direct questions can be addressed using telephone calls, SMS, Online chat, Support Forums, E-mail or Fax; basic software problems can be addressed over the telephone or, increasingly, by using remote access repair services; while more complicated problems with hardware may need to be dealt with in person.\r\nTechnical support is a range of services providing assistance with technology such as televisions, computers, and software, typically aiming to help the user with a specific problem.","materialsDescription":"<span style=\"font-weight: bold; \">What are the categories of technical support?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Call in</span></span>\r\nThis type of technical support has been very common in the services industry.[citation needed] It is also known as "Time and Materials" (T&M) IT support.[citation needed] The customer pays for the materials (hard drive, memory, computer, digital devices, etc.) and also pays the technician based on the pre-negotiated rate when a problem occurs.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Block hours</span></span>\r\nBlock hours allow the client to purchase a number of hours upfront at an agreed price. While it is commonly used to offer a reduced hourly rate, it can also simply be a standard non-reduced rate, or represent a minimum fee charged to a client before providing service. The premise behind this type of support is that the customer has purchased a fixed number of hours to use either per month or year. This allows them the flexibility to use the hours as they please without doing the paperwork and the hassle of paying multiple bills.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Managed services</span></span>\r\nManaged services means a company will receive a list of well-defined services on an ongoing basis, with well-defined "response and resolution times" for a fixed rate or a flat fee. This can include things like 24/7 monitoring of servers, 24/7 help desk support for daily computer issues, and on-site visits by a technician when issues cannot be resolved remotely.[citation needed] Some companies also offer additional services like project management, backup and disaster recovery, and vendor management in the monthly price. The companies that offer this type of tech support are known as managed services providers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Crowdsourced technical support</span></span>\r\nMany companies and organizations provide discussion boards for users of their products to interact; such forums allow companies to reduce their support costs without losing the benefit of customer feedback.\r\n<span style=\"font-weight: bold;\">What is outsourcing technical support?</span>\r\nWith the increasing use of technology in modern times, there is a growing requirement to provide technical support. Many organizations locate their technical support departments or call centers in countries or regions with lower costs. Dell was amongst the first companies to outsource their technical support and customer service departments to India in 2001. There has also been a growth in companies specializing in providing technical support to other organizations. These are often referred to as MSPs (Managed Service Providers).\r\nFor businesses needing to provide technical support, outsourcing allows them to maintain a high availability of service. Such need may result from peaks in call volumes during the day, periods of high activity due to introduction of new products or maintenance service packs, or the requirement to provide customers with a high level of service at a low cost to the business. For businesses needing technical support assets, outsourcing enables their core employees to focus more on their work in order to maintain productivity. It also enables them to utilize specialized personnel whose technical knowledge base and experience may exceed the scope of the business, thus providing a higher level of technical support to their employees.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Technical_Support.png"},{"id":731,"title":"IT Project Management","alias":"it-project-management","description":" IT project management is the process of planning, organizing and delineating responsibility for the completion of an organizations' specific information technology (IT) goals.\r\nIT project management includes overseeing projects for software development, hardware installations, network upgrades, cloud computing and virtualization rollouts, business analytics and data management projects and implementing IT services.\r\nIn addition to the normal problems that can cause a project to fail, factors that can negatively affect the success of an IT project include advances in technology during the project's execution, infrastructure changes that impact security and data management and unknown dependent relationships among hardware, software, network infrastructure and data. IT projects may also succumb to the first-time, first-use penalty which represents the total risk an organization assumes when implementing new technology for the first time. Because the technology hasn’t been implemented or used before in the organization, there are likely to be complications that will affect the project’s likelihood of success.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Project?</span>\r\nA Project is an initiative launched to create a unique product or service. A Project has a defined start date and a defined end date. The start date represents when the project will be launched. The end date specifies when the project will be completed.\r\nA Project is not a reoccurring activity; but rather is a single effort to produce something new.\r\n<span style=\"font-weight: bold;\">What is Project Management?</span>\r\nProject Management is the collection and application of skills, knowledge, processes, and activities to meet a specific objective that may take the form of a product or service. Project Management is an integrated process of applying 5 major processes and their related activities throughout a project lifecycle: initiating, planning, executing, monitoring and Controlling, Closeout.\r\n<span style=\"font-weight: bold;\">What is a Project Management Methodology?</span>\r\nA Project Management Methodology is the overall approach (system) that will be followed to meet the project objectives.\r\n<span style=\"font-weight: bold;\">What are the characteristics of a project?</span>\r\nA Project has three characteristics:\r\n<ul><li>Temporal nature (Is not ongoing and has a definite start and end date.)</li><li>Unique Deliverable (Produces a new unique product or service that does not exist.)</li><li>Progressive (Actions follow a sequence or pattern and progress over time.)</li></ul>\r\n<span style=\"font-weight: bold;\">Who is responsible for the project?</span>\r\nThe Project Manager is directly responsible for the results of the project. He/She should use the necessary skills, knowledge, and tools to meet the project objectives. During the early phases of the project, the Project Manager, working with the project team, should be able to:\r\n<ul><li>Determine project goals and objectives</li><li>Determine assumptions and constraints</li><li>Define and validate product description</li><li>Determine project requirements</li><li>Define Project deliverables</li><li>Estimate and monitor project resource allocation</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":340,"title":"Low quality of customer service"},{"id":390,"title":"Low quality of customer support"},{"id":398,"title":"Poor communication and coordination among staff"}]}},"categories":[{"id":729,"title":"IT Project Deployment Services","alias":"it-project-deployment-services","description":" Companies invest in projects for the implementation of IT systems that are consistent with the organization's values, with the goal of realizing a business vision, stable support for operational activities, and gaining competitive advantages. In this regard, technological projects are becoming increasingly large-scale, affecting more departments of the organization, and pose a risk to the company if the operation of information systems is disrupted.\r\nThe introduction of new IT requires the project team to carry out at least two principal stages:\r\n<ul><li>pre-project analysis of the enterprise, when, with the help of specialists in the proposed IP and specialists of the enterprise, compliance and discrepancies between the system and its future use is revealed. As a result of the survey, ways to eliminate inconsistencies are determined based on the initial assessment of the required resources and time. The survey is conducted using questions and answers, to some extent formalized, and special software tools that allow you to describe the processes of the system and the enterprise and compare them visually. No changes take place at the enterprise unless individual employees are distracted from their direct duties, which is both a virtue and a disadvantage of this approach;</li><li>trial implementation carried out on the most characteristic site of work. Based on this test work, a general assessment of future implementation is determined and a fundamental decision is made on the use of IP.</li></ul>\r\nThere is a lot of confusion and substitution of the concept of “project team” with the idea of it as a “group”, “pack”, “family”, etc. There are several understandings that there is a modern “project team/group” and “integrated project team”, however, the fundamental characteristic of the team is that it does not exist outside the project. A team with all its human strengths and weaknesses is a necessary and inseparable element of any project. It is a developing element of the technology of the project and affects the project itself.\r\nThe project itself is not “done” - it is made by people, and where people are affected by the influence of biology, instincts, gender parameters, “conscious” and “unconscious”, etc. If people are in the organizational “system” (family, flock, group, team, etc.), systemic effects arise that should be foreseen in the formation of a set of people due to the competent selection, placement and development of the team in the right direction. This is not just an ordinary organizational question, but a question of the depth of understanding of the essence of the project, its management and the skill of the leader.","materialsDescription":" <span style=\"font-weight: bold;\">What is an IT project?</span>\r\nAn IT project is a project that includes work related to information technology.\r\n<span style=\"font-weight: bold;\">What is information technology?</span>\r\nInformation technology is a technology aimed at the creation, development and support of information systems.\r\n<span style=\"font-weight: bold;\">What are the main ideas underlying the project team model of an IT project?</span>\r\n<ul><li>interdependent and interrelated roles in a small group;</li><li>determination of the role, special mission and area of responsibility for each member of the project team;</li><li>distributed project management and responsibility;</li><li>each is focused on the success of the project and is set to work throughout the project cycle;</li><li>communication between project team members is a key success factor;</li><li>users and training staff are included in the project team;</li><li>parallel engineering - parallel work of all team members on a project.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Deployment_Services.png"},{"id":743,"title":"IT System documentation writing","alias":"it-system-documentation-writing","description":" Without the development of technical documentation, it is impossible to create any complex technical solution. High-quality documentation, that is, informative, complete and understandable, is the key to the success of products at all stages of its life cycle. Properly written documentation is the basis of the functionality and effectiveness of information systems. It is with its use that the processes of creating databases, developing software, selecting and configuring network and server software are carried out.\r\nMany organizations at the initial stages of creating and implementing technical solutions do not pay enough attention to this factor, which often prevents the entry of a new product to the market.\r\nWriting documentation requires the contractor to have specific knowledge and skills, certain experience and considerable labor costs.\r\nThe main task of the working documentation is to give a complete picture of how the system is structured, what it consists of and how it functions.\r\nThere is no single standard for the development of this type of documentation. In most cases, its structure is selected for a specific situation. But you can take any algorithm that has already proven its effectiveness as the basis.","materialsDescription":"<span style=\"font-weight: bold; \">What is software documentation?</span>\r\nSoftware documentation - printed user manuals, online (online) documentation and help text describing how to use the software product.\r\n<span style=\"font-weight: bold; \">What is process documentation?</span>\r\nA process document outlines the steps necessary to complete a task or process. It is internal, ongoing documentation of the process while it is occurring—documentation cares more about the “how” of implementation than the “what” of process impact.\r\n<span style=\"font-weight: bold;\">What should be in the working documentation?</span>\r\nFirst of all, technical descriptions of implemented solutions. These are IT infrastructure diagrams, configuration descriptions, etc.\r\n<span style=\"font-weight: bold;\">What does well-written working documentation give?</span>\r\n<ul><li>systematizes data on IT infrastructure;</li><li>helps to understand the system architecture and functioning of connected services;</li><li>facilitates management decisions (for example, shows which service can be removed or replaced and how it will be displayed on the whole system);</li><li>makes it possible to comprehensively evaluate the selected IT structure and, also, timely notice the mistakes made or holes in the architecture.</li></ul>\r\n<span style=\"font-weight: bold;\">What are the key benefits of writing technical documentation?</span>\r\nThe development of documentation will allow you to:\r\n<ul><li>increase user satisfaction</li><li>reduce the load on the system administrator;</li><li>reduce system support costs.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_System_documentation_writing.png"},{"id":741,"title":"Proof of Concept","alias":"proof-of-concept","description":"Proof of concept (PoC) is a realization of a certain method or idea in order to demonstrate its feasibility, or a demonstration in principle with the aim of verifying that some concept or theory has practical potential. A proof of concept is usually small and may or may not be complete.\r\nProof of concept (POC) is used to test the idea of a certain technical feature or the general design of a product and prove that it is possible to apply those ideas.\r\nIt could be used to test something on just one part of the product before it is tried in practice with making a prototype.\r\nYou can think of this as a pre-prototype version of the product, but it is not even that since POC shouldn’t have all the features as the final product, not even as the prototype.\r\nThe main goal of POC is to prove that it is actually possible to develop that idea and include it as part of the final product.","materialsDescription":" <span style=\"font-weight: bold;\">What is a proof of concept?</span>\r\nProof of concept is the testing of the finished product based on the idea. Thus, this stage is the first phase in the design of the application. It explains how the project should work on the basis of a detailed description of requirements and specifications. The proof is the complete satisfaction of those functions that need to be realized. This approach makes it easier to hire developers for a startup in the future.\r\nIn order to confirm the concept in software development, it is necessary to determine the main tasks and perform the following steps:\r\n<ol><li>Identify project goals and methods for their implementation.</li><li>Receive feedback from users and customers.</li><li>Correct the idea and start implementing it.</li></ol>\r\n<span style=\"font-weight: bold;\">Project goals and methods of implementation</span>\r\nBefore you start, you need to understand what goal will perform a project. A web project can be a large marketplace or social network with unique features and a convenient solution. Also, it may be a CRM system and help the business to increase sales or improve the accounting of business resources. One way or another, each platform has a specific purpose.\r\nThe next step is to build methods of achieving the goal. At this stage, it is important not to delve into the details, but to evaluate common elements. How the project will work, what functions will be implemented, how the web application will interact with users, etc. It is very important to consider each item and write it down in the report. In fact, this is a small brainstorm. Typically, it takes from a few days to a couple of weeks. When the implementation plan is completed, you can begin to collect feedback from future users.\r\n<span style=\"font-weight: bold;\">Feedback from users and customers</span>\r\nWhen you have a ready document with a description of the project and the functions, then you need to get feedback from users or customers. Offer them your solution to a particular problem. Familiarize them with the implementation methods. You will receive many suggestions for improvement. At this point, some of your guesswork will be broken. It is important to listen and collect feedback. There is no need to hurry and change the concept or implement everything that future users are asking for. They don't have an expert evaluation and this is only their proposal.\r\n<span style=\"font-weight: bold;\">Idea correction and implementation</span>\r\nIt is at this stage that the final proof of the concept takes place. Having received feedback, you can clearly understand how users will interact with your project. What emotions it will cause. It is necessary to understand that this is a preliminary evaluation of the concept. Some recommendations may not have value, as others can significantly affect the further development. Thus, based on the information received, it is necessary to consider what can be changed to make the project more convenient. If you received a lot of negative feedback, it makes sense to stop the development process. Or at least think about a new improved version. So, if you really decided to start the development, we recommend starting the design with MVP. The minimal version will allow us to develop the project in the shortest possible time and check the idea on real users.\r\nProof of the concept is one of the important stages in the development of complex and expensive projects. It allows with high probability to determine the value of the project even before the begins development. Typically, the process takes from a few days to a couple of weeks. It gives a clear idea of how the project will work and what functions it will perform. If you approach the feedback analysis process with a clean head, this step in the future can save you money and time.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Proof_of_Concept.png"},{"id":739,"title":"Deployment and Integration Services","alias":"deployment-and-integration-services","description":" The number of various solutions implemented by customers today is quite large. Often, the subsystems of the seemingly unified IT landscape are either weakly connected with each other, or the interaction between them is established in the mode of transferring files and data by mail or “from hand to hand”.\r\nWestern IT vendors, following a certain trend, offer the customer complete and unified solutions. Such blocks of subsystems solve a specific task and form separate IT centers, which also require the mutual integration of infrastructures. This, oddly enough, is even more difficult, as a complete solution does not allow to penetrate deeply and get access to the required information or control subsystems.\r\nNevertheless, the integration and interconnection of information flows can significantly simplify business processes and lead to an increase in the efficiency of interaction both inside and outside the company (with customers and partners).\r\nThe integration task itself is important for business, as it provides a qualitatively new level of services. This is especially important for companies where IT is the immediate tool for achieving business goals. But it is equally important to make integration optimal in the light of minimizing not only the cost of purchasing equipment and software but also preserving previous IT investments.","materialsDescription":" <span style=\"font-weight: bold; \">The main types of implementation and integration services offered by companies:</span>\r\n<ul><li>Designing IT architecture for integration solutions in the field of analytics, automation and monitoring of business processes;</li><li>Development and integration of network infrastructure subsystems, including scalable telecommunications equipment, server equipment and workstations;</li><li>Defining a single platform and developing a solution for integrating enterprise applications, data and business processes;</li><li>Implementation and maintenance of integrated integration solutions in the field of enterprise management (ERP-systems);</li><li>Implementation and maintenance of integration solutions in the field of accounting and analysis of sales and customer relations (CRM-system);</li><li>Implementation and maintenance of integration solutions in the field of accounting and financial analysis;</li><li>Impairment, testing and development of solutions for ensuring information security of a business.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Deployment_and_Integration_Services.png"},{"id":737,"title":"IT System Testing","alias":"it-system-testing","description":" System testing is testing conducted on a complete integrated system to evaluate the system's compliance with its specified requirements.\r\nSystem testing takes, as its input, all of the integrated components that have passed integration testing. The purpose of integration testing is to detect any inconsistencies between the units that are integrated together (called assemblages). System testing seeks to detect defects both within the "inter-assemblages" and also within the system as a whole. The actual result is the behavior produced or observed when a component or system is tested.\r\nSystem testing is performed on the entire system in the context of either functional requirement specifications (FRS) or system requirement specification (SRS), or both. System testing tests not only the design but also the behavior and even the believed expectations of the customer. It is also intended to test up to and beyond the bounds defined in the software or hardware requirements specification(s).\r\nSoftware testing is an investigation conducted to provide stakeholders with information about the quality of the software product or service under test. Software testing can also provide an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation. Software testing involves the execution of a software component or system component to evaluate one or more properties of interest. In general, these properties indicate the extent to which the component or system under test meets the requirements that guided its design and development, responds correctly to all kinds of inputs, performs its functions within an acceptable time, is sufficiently usable, can be installed and run in its intended environments, and achieves the general result its stakeholders desire. As the number of possible tests for even simple software components is practically infinite, all software testing uses some strategy to select tests that are feasible for the available time and resources.\r\nMobile-device testing assures the quality of mobile devices, like mobile phones, PDAs, etc. The testing will be conducted on both hardware and software. And from the view of different procedures, the testing comprises R&D testing, factory testing and certification testing. Mobile-device testing involves a set of activities from monitoring and troubleshooting mobile applications, content and services on real handsets. Testing includes verification and validation of hardware devices and software applications.","materialsDescription":" <span style=\"font-weight: bold;\">What is System Testing?</span>\r\nSystem Testing is the testing of a complete and fully integrated software product. Usually, the software is only one element of a larger computer-based system. Ultimately, the software is interfaced with other software/hardware systems. System Testing is actually a series of different tests whose sole purpose is to exercise the full computer-based system.\r\nTwo Category of Software Testing:\r\n<ul><li>Black Box Testing;</li><li>White Box Testing.</li></ul>\r\nSystem test falls under the black box testing category of software testing.\r\nWhite box testing is the testing of the internal workings or code of a software application. In contrast, black box or System Testing is the opposite. The system test involves the external workings of the software from the user's perspective.\r\n<span style=\"font-weight: bold;\">What do you verify in System Testing?</span>\r\nSystem Testing involves testing the software code for following:\r\n<ul><li>Testing the fully integrated applications including external peripherals in order to check how components interact with one another and with the system as a whole. This is also called End to End testing scenario.</li><li>Verify thorough testing of every input in the application to check for desired outputs.</li><li>Testing of the user's experience with the application.</li></ul>\r\nThat is a very basic description of what is involved in system testing. You need to build detailed test cases and test suites that test each aspect of the application as seen from the outside without looking at the actual source code.\r\n<span style=\"font-weight: bold;\">What Types of System Testing Should Testers Use?</span>\r\nThere are over 50 different types of system testing. The specific types used by a tester depend on several variables. Those variables include:\r\n<ul><li><span style=\"font-weight: bold;\">Who the tester works for</span> - This is a major factor in determining the types of system testing a tester will use. Methods used by large companies are different than those used by medium and small companies.</li><li><span style=\"font-weight: bold;\">Time available for testing</span> - Ultimately, all 50 testing types could be used. Time is often what limits us to using only the types that are most relevant for the software project.</li><li><span style=\"font-weight: bold;\">Resources available to the tester</span> - Of course some testers will not have the necessary resources to conduct a testing type. For example, if you are a tester working for a large software development firm, you are likely to have expensive automated testing software not available to others.</li><li><span style=\"font-weight: bold;\">Software Tester's Education</span> - There is a certain learning curve for each type of software testing available. To use some of the software involved, a tester has to learn how to use it.</li><li><span style=\"font-weight: bold;\">Testing Budget</span> - Money becomes a factor not just for smaller companies and individual software developers but large companies as well.</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_System_testing.png"},{"id":735,"title":"Installation and configuration","alias":"installation-and-configuration","description":" Installation or setup is the act of making the system or program ready for execution. Because the process varies for each program and each computer, programs (including operating systems) often come with an installer, a specialized program responsible for doing whatever is needed for their installation. The configuration is an arrangement of functional units according to their nature, number, and chief characteristics. Often, configuration pertains to the choice of hardware, software, firmware, settings, and documentation. The configuration affects system function and performance.\r\nSome computer programs can be executed by simply copying them into a folder stored on a computer and executing them. Other programs are supplied in a form unsuitable for immediate execution and therefore need an installation procedure. Once installed, the program can be executed again and again, without the need to reinstall before each execution.\r\nCommon operations performed during software installations include:\r\n<ul><li>Making sure that necessary system requirements are met</li><li>Checking for existing versions of the software</li><li>Creating or updating program files and folders</li><li>Adding configuration data such as configuration files, Windows registry entries or environment variables</li><li>Making the software accessible to the user, for instance by creating links, shortcuts or bookmarks</li><li>Configuring components that run automatically, such as daemons or Windows services</li><li>Performing product activation</li><li>Updating the software versions</li></ul>\r\nThese operations may require some charges or be free of charge. In case of payment, installation costs means the costs connected and relevant to or incurred as a result of installing the drivers or the equipment in the customers' premises. ","materialsDescription":"<span style=\"font-weight: bold;\">What does "Installation" mean?</span>\r\nInstallation is the process of making hardware and/or software ready for use. Obviously, different systems require different types of installations. While certain installations are simple and straightforward and can be performed by non-professionals, others are more complex and time-consuming and may require the involvement of specialists.\r\n<span style=\"font-weight: bold; \">What does the "Configuration" mean?</span>\r\nThe way a system is set up, or the assortment of components that make up the system. Configuration can refer to either hardware or software, or the combination of both. For instance, a typical configuration for a PC consists of 32MB (megabytes) main memory, a floppy drive, a hard disk, a modem, a CD-ROM drive, a VGA monitor, and the Windows operating system.\r\nMany software products require that the computer have a certain minimum configuration. For example, the software might require a graphics display monitor and a video adapter, a particular microprocessor, and a minimum amount of main memory.\r\nWhen you install a new device or program, you sometimes need to configure it, which means to set various switches and jumpers (for hardware) and to define values of parameters (for software). For example, the device or program may need to know what type of video adapter you have and what type of printer is connected to the computer. Thanks to new technologies, such as plug-and-play, much of this configuration is performed automatically.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Installation_and_configuration.png"},{"id":733,"title":"Technical Support","alias":"technical-support","description":" Technical support (often shortened to tech support) refers to services that entities provide to users of technology products or services. In general, technical support provide help regarding specific problems with a product or service, rather than providing training, provision or customization of product, or other support services. Most companies offer technical support for the services or products they sell, either included in the cost or for an additional fee. Technical support may be delivered over by phone, e-mail, live support software on a website, or other tool where users can log an incident. Larger organizations frequently have internal technical support available to their staff for computer-related problems. The Internet can also be a good source for freely available tech support, where experienced users help users find solutions to their problems. In addition, some fee-based service companies charge for premium technical support services.\r\nTechnical support may be delivered by different technologies depending on the situation. For example, direct questions can be addressed using telephone calls, SMS, Online chat, Support Forums, E-mail or Fax; basic software problems can be addressed over the telephone or, increasingly, by using remote access repair services; while more complicated problems with hardware may need to be dealt with in person.\r\nTechnical support is a range of services providing assistance with technology such as televisions, computers, and software, typically aiming to help the user with a specific problem.","materialsDescription":"<span style=\"font-weight: bold; \">What are the categories of technical support?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Call in</span></span>\r\nThis type of technical support has been very common in the services industry.[citation needed] It is also known as "Time and Materials" (T&M) IT support.[citation needed] The customer pays for the materials (hard drive, memory, computer, digital devices, etc.) and also pays the technician based on the pre-negotiated rate when a problem occurs.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Block hours</span></span>\r\nBlock hours allow the client to purchase a number of hours upfront at an agreed price. While it is commonly used to offer a reduced hourly rate, it can also simply be a standard non-reduced rate, or represent a minimum fee charged to a client before providing service. The premise behind this type of support is that the customer has purchased a fixed number of hours to use either per month or year. This allows them the flexibility to use the hours as they please without doing the paperwork and the hassle of paying multiple bills.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Managed services</span></span>\r\nManaged services means a company will receive a list of well-defined services on an ongoing basis, with well-defined "response and resolution times" for a fixed rate or a flat fee. This can include things like 24/7 monitoring of servers, 24/7 help desk support for daily computer issues, and on-site visits by a technician when issues cannot be resolved remotely.[citation needed] Some companies also offer additional services like project management, backup and disaster recovery, and vendor management in the monthly price. The companies that offer this type of tech support are known as managed services providers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Crowdsourced technical support</span></span>\r\nMany companies and organizations provide discussion boards for users of their products to interact; such forums allow companies to reduce their support costs without losing the benefit of customer feedback.\r\n<span style=\"font-weight: bold;\">What is outsourcing technical support?</span>\r\nWith the increasing use of technology in modern times, there is a growing requirement to provide technical support. Many organizations locate their technical support departments or call centers in countries or regions with lower costs. Dell was amongst the first companies to outsource their technical support and customer service departments to India in 2001. There has also been a growth in companies specializing in providing technical support to other organizations. These are often referred to as MSPs (Managed Service Providers).\r\nFor businesses needing to provide technical support, outsourcing allows them to maintain a high availability of service. Such need may result from peaks in call volumes during the day, periods of high activity due to introduction of new products or maintenance service packs, or the requirement to provide customers with a high level of service at a low cost to the business. For businesses needing technical support assets, outsourcing enables their core employees to focus more on their work in order to maintain productivity. It also enables them to utilize specialized personnel whose technical knowledge base and experience may exceed the scope of the business, thus providing a higher level of technical support to their employees.","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_Technical_Support.png"},{"id":731,"title":"IT Project Management","alias":"it-project-management","description":" IT project management is the process of planning, organizing and delineating responsibility for the completion of an organizations' specific information technology (IT) goals.\r\nIT project management includes overseeing projects for software development, hardware installations, network upgrades, cloud computing and virtualization rollouts, business analytics and data management projects and implementing IT services.\r\nIn addition to the normal problems that can cause a project to fail, factors that can negatively affect the success of an IT project include advances in technology during the project's execution, infrastructure changes that impact security and data management and unknown dependent relationships among hardware, software, network infrastructure and data. IT projects may also succumb to the first-time, first-use penalty which represents the total risk an organization assumes when implementing new technology for the first time. Because the technology hasn’t been implemented or used before in the organization, there are likely to be complications that will affect the project’s likelihood of success.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Project?</span>\r\nA Project is an initiative launched to create a unique product or service. A Project has a defined start date and a defined end date. The start date represents when the project will be launched. The end date specifies when the project will be completed.\r\nA Project is not a reoccurring activity; but rather is a single effort to produce something new.\r\n<span style=\"font-weight: bold;\">What is Project Management?</span>\r\nProject Management is the collection and application of skills, knowledge, processes, and activities to meet a specific objective that may take the form of a product or service. Project Management is an integrated process of applying 5 major processes and their related activities throughout a project lifecycle: initiating, planning, executing, monitoring and Controlling, Closeout.\r\n<span style=\"font-weight: bold;\">What is a Project Management Methodology?</span>\r\nA Project Management Methodology is the overall approach (system) that will be followed to meet the project objectives.\r\n<span style=\"font-weight: bold;\">What are the characteristics of a project?</span>\r\nA Project has three characteristics:\r\n<ul><li>Temporal nature (Is not ongoing and has a definite start and end date.)</li><li>Unique Deliverable (Produces a new unique product or service that does not exist.)</li><li>Progressive (Actions follow a sequence or pattern and progress over time.)</li></ul>\r\n<span style=\"font-weight: bold;\">Who is responsible for the project?</span>\r\nThe Project Manager is directly responsible for the results of the project. He/She should use the necessary skills, knowledge, and tools to meet the project objectives. During the early phases of the project, the Project Manager, working with the project team, should be able to:\r\n<ul><li>Determine project goals and objectives</li><li>Determine assumptions and constraints</li><li>Define and validate product description</li><li>Determine project requirements</li><li>Define Project deliverables</li><li>Estimate and monitor project resource allocation</li></ul>","iconURL":"https://roi4cio.com/fileadmin/user_upload/icon_IT_Project_Management.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.solti.ua/postroenie-besprovodnoj-seti-wifi-s-centralizovannym-upravleniem-v-pivnom-restorane-probka/","title":"Supplier's web site"}},"comments":[],"referencesCount":0}},"aliases":{"1":["acs-access-control-and-management-system-for-the-kharkiv-regional-state-administration","ip-telephony-for-ukrainian-coal-mining-company","microsoft-hyper-v-for-kharkiv-city-council","microsoft-project-server-2013-with-microsoft-sharepoint-integration-for-large-engineering-company","microsoft-sql-server-2016-for-utility-company-kharkivvodokanal","modernization-of-the-power-supply-system-for-utility-company","structured-cabling-system-scs-for-the-kharkiv-regional-state-administration","unify-openscape-voice-for-the-leading-industrial-enterprise-of-ukroboronprom","video-conferencing-for-large-engineering-company","wireless-data-networks-wi-fi-by-solti-for-restaurant"]},"links":{"first":"http://b4r_be/api/implementations?page=1","last":"http://b4r_be/api/implementations?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://b4r_be/api/implementations","per_page":20,"to":10,"total":10},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}