Top Banner
UPDATE 2013 www.eacs.com | e: [email protected] | t: 0800 8047 256 Case Study: A High Definition Experience in the Classroom – Page 5 The Complete Solution for Enterprise Mobile Management – Page 2 Matt Watts: IT – The Service Broker, Builder or Blocker – Page 7 An Award Winning Solution – Page 9 In our first update for 2013 we’ve asked each of our technical teams to provide an overview of the changes they have seen over the past year and what they will be focusing on in the next months. According to IDC we are in the midst of a once every 20-25 years shift to a new technology platform for growth and innovation. They call it the 3rd Platform, built on mobile devices and apps, cloud services, mobile broadband networks, big data analytics and social technologies. This will supplement 1st Platform (mainframes) and 2nd Platform (distributed computing) solutions already in the market today. We will look at some of the solutions built on this 3rd Platform such as hosted desktops, file- sharing and email management in the cloud. Then we will highlight the challenges they have raised for IT departments around management, security and user expectations and how to deal with these. You can also read about other organisations who have been using IT solutions to achieve their business goals, including expanding their range of services, reducing their environmental impact and ensuring they can quickly recover from disruptions and disasters. I hope to see you at one of our Optimise IT events this year. Regards, Mike Dearlove Managing Director, EACS To register visit www.eacs.com/events.aspx Desktop & Application Delivery PAGE 2-5 Server Virtualisation & Infrastructure PAGE 6-8 Control & Collaboration PAGE 9-11 Services & Support PAGE 12 Optimise IT 2013 – Reserve Your Place! Optimise IT 2013 will take place on Wednesday 1st May at an exciting new location - The Imperial War Museum, Duxford, Cambridge. The exhibition and keynote speeches will be held in the Conservation Hall amongst the aircraft exhibits! Our flagship conference and exhibition has been running for over 10 years and is an incredibly focused and productive day designed to add value to your 2013/14 IT strategy. Via keynotes, workshops, 50+ focused breakout sessions and a vendor exhibition area you will learn about exciting developments with some of the top companies in the IT industry, including Microsoft, Citrix, VMware & NetApp. There is also the opportunity to network with IT Managers and Directors from other organisations. Plus, you will be provided with a complimentary lunch and refreshments -and have the chance to win a number of prizes on the day. Our “on tour” events will continue around the country for those who can’t make it to Cambridge. These give you the opportunity to see the most popular breakouts from our main event and will take place on: 12 June – London 17 September - Birmingham 10 October - Ipswich 12 November - Doncaster These FREE events are open to all business and technical decision makers considering their IT strategy and infrastructure and we have received fantastic feedback from our delegates: “Having a day away from the office to actually focus on IT, something I rarely get an opportunity to do…was very refreshing.” IT Manager “What a fantastic event; many interesting and current sessions, knowledgeable experts on the stands, and generally lots of nice folk who love technology in the business.” IT Director “This is the only IT seminar type event I attend each year, and I always find I get the information I need.” IT Operations Manager To reserve your place and find out more please visit www.optimiseitevent.com. FOR THE CHANCE TO WIN A TRIP IN A HOT AIR BALLOON PLEASE TURN TO THE BACK PAGE! WIN!
12
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: EACS Newsletter 2013

UPDATE 2013www.eacs.com | e: [email protected] | t: 0800 8047 256

Last year we took our annual Optimise IT conference and exhibition on tour

so many of you and I hope everyone

lot from the day – the feedback was

These events are open to all business and technical decision makers considering their IT strategy and infrastructure. They provide you with a focused opportunity to learn how leading edge technology and solutions can improve your business and how to get the most return from your investment.

UPDATE 2012

Have you booked your place at Optimise IT in 2012?

As we enter the Olympic year of

on the past 12 months and what might happen this year.

With this in mind each of our technical teams has provided an update on the changes they have

some of our customers have realised from recent projects and what their predictions are for 2012.

priorities they found that Security

predicted that Mobility will be the top theme of the year as mobile devices are

2 to 1 and generate more revenue than

more employees using these devices

need to keep up with emerging security threats.

ways you can protect your data, the new Bring Your Own (BYO) business model and the top mobile security predictions for 2012.

Plus, make sure you register to attend

ISSUE ONE

www.eacs.com e: [email protected] t: 0800 8047 256

Why Attend? Hear insightful keynote speeches

from industry leaders Select from focused breakout

sessions on major IT and business issues

Network and share ideas with like minded senior IT professionals

Visit a wide range of exhibitors, see live demonstrations of cutting-edge technology and evaluate new products

Meet industry leading suppliers face to face

It’s FREE to attend and lunch is included

This year we will be taking our event to even more locations, so make sure you reserve your place at one near you...

ruary – Luton

Desktop & Application Delivery

Server Virtualisation & Infrastructure

Control & Collaboration

Services & Support

PAGE

2-3PAGE

4-5PAGE

6-7PAGE

8

To register visit www.eacs.com/events.aspx

WIN!

Leave employees to their own devices – P2

Case Study: Robust Disaster Recovery & Business Continuity – P5

The Great Email Migration – P7

Could you benefit from Proactive IT Monitoring? – P8

coming to a location near you...

Case Study: A High Definition Experience in the Classroom – Page 5

The Complete Solution for Enterprise Mobile Management – Page 2

Matt Watts: IT – The Service Broker, Builder or Blocker – Page 7

An Award Winning Solution – Page 9

In our first update for 2013 we’ve asked each of our technical teams to provide an overview of the changes they have seen over the past year and what they will be focusing on in the next months.

According to IDC we are in the midst of a once every 20-25 years shift to a new technology platform for growth and innovation. They call it the 3rd Platform, built on mobile devices and apps, cloud services, mobile broadband networks, big data analytics

and social technologies. This will supplement 1st Platform (mainframes) and 2nd Platform (distributed computing) solutions already in the market today.

We will look at some of the solutions built on this 3rd Platform such as hosted desktops, file-sharing and email management in the cloud. Then we will highlight the challenges they have raised for IT departments around management, security and user expectations and how to deal with these.

You can also read about other organisations who have been using IT solutions to achieve their business goals, including expanding their range of services, reducing their environmental impact and ensuring they can quickly recover from disruptions and disasters.

I hope to see you at one of our Optimise IT events this year.

Regards,

Mike Dearlove Managing Director, EACS

To register visit www.eacs.com/events.aspx

Desktop &Application Delivery

PAGE

2-5Server Virtualisation& Infrastructure

PAGE

6-8Control &Collaboration

PAGE

9-11Services& Support

PAGE

12

Optimise IT 2013 – Reserve Your Place! Optimise IT 2013 will take place on Wednesday 1st May at an exciting new location - The Imperial War Museum, Duxford, Cambridge. The exhibition and keynote speeches will be held in the Conservation Hall amongst the aircraft exhibits!

Our flagship conference and exhibition has been running for over 10 years and is an incredibly focused and productive day designed to add value to your 2013/14 IT strategy.

Via keynotes, workshops, 50+ focused breakout sessions and a vendor exhibition area you will learn about exciting developments with some of the top companies in the IT industry, including Microsoft, Citrix, VMware & NetApp. There is also

the opportunity to network with IT Managers and Directors from other organisations. Plus, you will be provided with a complimentary lunch and refreshments -and have the chance to win a number of prizes on the day.

Our “on tour” events will continue around the country for those who can’t make it to Cambridge. These give you the opportunity to see the most popular breakouts from our main event and will take place on:

�12 June – London

�17 September - Birmingham

�10 October - Ipswich

�12 November - Doncaster

These FREE events are open to all business and technical decision

makers considering their IT strategy and infrastructure and we have received fantastic feedback from our delegates:

“Having a day away from the office to actually focus on IT, something I rarely get an opportunity to do…was very refreshing.” IT Manager

“What a fantastic event; many interesting and current sessions, knowledgeable experts on the stands, and generally lots of nice folk who love technology in the business.” IT Director

“This is the only IT seminar type event I attend each year, and I always find I get the information I need.” IT Operations Manager

To reserve your place and find out more please visit www.optimiseitevent.com.

FOR THE CHANCE TO

WIN A TRIP IN A HOT

AIR BALLOON PLEASE TURN TO THE

BACK PAGE!

WIN!

Page 2: EACS Newsletter 2013

Desktop &Application Delivery

Update from the Desktop & Application Delivery Team

The watchword twelve months ago was ‘change’ with a dramatic refresh in technologies; this has led on to 2012 being a year for implementing that change. If we were to pick a single word

to describe our work this year it would be ‘busy’. The volume of work coming into the team has simply been staggering, to the extent that we have doubled our technical implementation team.

The focus of this work has also changed, moving away from the classic server based computing approach and concentrating more heavily on desktop virtualisation and alternative application delivery technologies, such as application streaming. The largest uptake we have seen in this area is in the education sector where we have successfully delivered a number of medium to large scale, virtual desktop solutions.

Technology obviously hasn’t stood still with several significant events occurring, not least of which was the release of Windows Server 2012 RTM and Citrix’s Project Avalon Tech Preview.

�With Server 2012 came Hyper-V v3 and RDS v8 both of which will be key technologies for Microsoft in the Desktop and Application Delivery arena. These begin to narrow the lead that VMware & Citrix have in their respective areas and with

the advances in VDI support gives us a real third player in the Desktop Virtualisation space.

�Citrix’s Project Avalon looks to be a dramatic change in the Citrix product set. With the complete disappearance of XenApp as a separate product, it’s now well and truly just a sub component of XenDesktop with a single management interface to manage and administer all components.

Citrix’s CloudGateway product has also progressed onto v2, which represents a big step forward in functionality enabling us to securely deliver web and Windows apps, desktops and data to any device.

During all this upheaval we have still, amazingly, been able to continue with staff development activities with new team members attaining Citrix Certified Enterprise Engineer (CCEE) status, refreshing XenApp certifications and starting along the new Microsoft Certified Solution Expert (MCSE) certification path (not to be confused with the old Certified Engineer accreditation).

The Complete Solution for Enterprise Mobile Management

Our Desktop & Application Delivery Team examines some of the technologies now available from Citrix which allow people to work efficiently in today’s mobile world...

Citrix has been the leading solution for remote and mobile working for a number of years via their XenDesktop and XenApp solutions.

This has mainly been for Microsoft applications, but as the world continues to embrace consumerisation we now have numerous devices and applications to make our lives easier.

The task for IT Teams has been daunting. They need to manage these devices and applications, whilst maintaining company data.

Citrix believes you should be able to work and play from anywhere, with anyone and on any device. To accomplish this they have designed a true ‘end to end’ list of solutions. These include:

�ShareFile – an Enterprise solution that takes away

2 www.eacs.com | e: [email protected] | t: 0800 8047 256 twitter.com/EACSLTD

Page 3: EACS Newsletter 2013

3

Desktop &Application Delivery

Everything as a Service for SMEs Cloud computing is part of the latest phase in the development of the internet, which enables the use of all IT components (from computing infrastructure, applications and business processes to personal collaboration) as services – in exactly the volume that an individual element needs.

Cloud computing is an efficient answer to modern trends in the business world that demand optimisation of IT operations and (partial or total) outsourcing of IT to external providers. Thus, maintenance costs, investments in equipment and the need for internal IT experts are considerably reduced.

The essence of the technology is that computing resources (applications, data, disks, clients, safety mechanisms, etc.) are no longer located on the user’s computer, but instead are combined in a safe place at the specialised provider’s location. As these resources are not directly connected to real infrastructure, they can function independently of each other, and the users become independent of hardware, since they access their IT resources via remote servers.

The term ‘cloud computing’ encompasses several different models, the best known are: IaaS (Infrastructure as a Service), SaaS (Software as a Service), PaaS (Platform as a Service) and DaaS (Desktop as a Service).

Advanced cloud computing technology is based on the

integration and virtualisation of computer resources, which eliminates users’ dependence on hardware. All of this is made possible by the basic principle of EaaS (Everything as a Service) or use of all IT components as a service for a single monthly fee.

Clients receive the use of networking equipment, a computer, an IP phone, software and technical support. Data is stored on servers in a highly secure data centre provided by a certified provider. Clients can access their data from any location and on any device.

This solution is intended for small and medium-sized enterprises that want to optimise the performance of their entire IT system and, at the same time, realise financial savings, enabling them to focus exclusively on their business activity.

So why choose hosted desktops?

• Instant IT set-up with no initial investment

• Considerably lower regular IT costs

• A single fixed monthly bill for the entire IT service

• Extra savings in space and electricity consumption

• Employees can focus on what they do best, as they do not need to deal with IT issues

• Completely customisable system which enables high flexibility

• 100% protection from data loss

• Single IT supplier

• Greater flexibility

• More time for your professional activity

• Mobility, as cloud computing enables working from anywhere and any time

What’s included?

The provision and set up of:

• A thin client, monitor and keyboard for every workstation

• An IP phone and all-in-one printer, scanner and copier

• Virtual desktops, server space and e-mail accounts

• All the essential software: Microsoft Windows, Microsoft Office

• Business specific programs: accounting, CRM applications, Microsoft SQL, ERP and legacy programmes

• Licenses, upgrades and protection against viruses and trojans

• Security for data and backups

For further information, please call EACS on 0800 8047 256.

the pain of file-sharing and allows you to gain control of your shared data. Data can be shared and monitored via cloud or your own onsite StorageZone.

�Podio - a collaborative work platform where you can build apps and set up workspaces to support your preferred workflows and help you be more effective. Easily manage projects and other business processes and interact with clients, partners and team members, anytime, anywhere.

�GoToMeeting - web conferencing software which

makes it simple and cost-effective to collaborate online with colleagues and customers. Meeting participants can share their webcams in high definition, so you can enjoy more personal interactions – without needing a complicated setup.

Finally Citrix CloudGateway is an Enterprise Mobility Management (EMM) solution that securely delivers mobile, web and Microsoft apps and data to any device. It has a self-service enterprise app store that provides employees with access to business apps and data, leveraging the consistent, rich user

experience of Citrix Receiver.

CloudGateway also provides identity-based provisioning and control for all apps, data and devices, including employee-owned devices. This allows IT to protect enterprise apps and data with policy-based controls, such as restricting access to authorised users, automatic account de-provisioning for terminated employees and remote wipe for data and apps stored on lost devices.

Unlike traditional Mobile Device Management and Mobile Application Management, CloudGateway provides a single

solution to:

�Enable BYO to provide on-the-go productivity on any device

�Provide instant access to all business apps and data from anywhere

�Deliver secure mobile email with a great user experience

�Mobilise any corporate app securely, with full IT control

If you would like to know more register to attend one of our events at www.eacs.com/events.aspx.

www.eacs.com | e: [email protected] | t: 0800 8047 256 twitter.com/EACSLTD

Page 4: EACS Newsletter 2013

Desktop &Application Delivery

EACS and Signify: A Secure Partnership

EACS has partnered with Signify, an independent provider of two-factor authentication (2FA) solutions, since 2002. Below we look at how the need for 2FA solutions has evolved over the last ten years...

In 2002 EACS recognised the increasing importance of two-factor authentication, a secure alternative to passwords, for securing remote access to networks, data and applications. 2FA uses two independent credentials to verify the identity of staff working remotely. Most commonly, 2FA is “something you know” plus “something you have.”

EACS had been offering clients a 2FA solution but quickly realised that providing customers with an easy-to-deploy and manage hosted service was the best

approach to take advantage of the rapidly growing market for secure remote access. A hosted service eliminates the upfront costs and need for organisations to invest in additional infrastructure and skills to roll out an in-house solution.

“It soon became clear that Signify was the obvious choice,” said Mike Dearlove, Managing Director at EACS. “The company had a proven fully-hosted service that would enable us to quickly and easily get our customers up and running with 2FA. What’s more, the established track record gave us the confidence that it would not let our customers down. Reliability is so important when it comes to a managed service and it would be our reputation on the line if customers experienced any problems.”

EACS has worked with Signify for over ten years, providing 2FA to its clients, securing home working, connecting satellite offices and delivering anytime, anywhere remote access for people on the move. Signify’s secure authentication service is used by many EACS customers and is able to boast a 95% customer retention rate. With more and more staff working remotely it is vital that employers have security in place to identify and authenticate users and ensure that they have authorisation to access sensitive information and resources.

The Signify service has evolved over this time. It initially provided hardware token based authentication as an on-demand service where users have a physical token in the form of a key fob that

generates a random one time password (OTP). Today, Signify also offers software tokens that turn a smartphone or other mobile device into the token that generates the OTP, along with a tokenless solution that sends an OTP via SMS on demand to the user’s mobile.

This means companies can select the type of authentication that suits each of their user’s requirements and working patterns. For example, hardware and software tokens are often the best choice for frequent users, while the tokenless SMS solution may work better for those that need occasional access to corporate resources.

The ‘hidden costs’ of in-house 2FA are often overlooked. Token provisioning, for example is an important cost to consider. This means the deployment of new tokens to individuals in the organisation who could be anywhere in the world; dealing with issuing replacements for lost tokens and deployment of new tokens during the expiry process.

To download a 2FA Buyers Guide aimed at providing you with information and guidance to help you determine whether your organisation needs to deploy 2FA and the options available, please visit www.eacs.com/newsletter.aspx.

ShareFile StorageZones – Gives you peace of mind about where your data is stored

If part of your business strategy is to make data available to users wherever they are, but you’re uncomfortable with how you maintain control and security, ShareFile from Citrix could be the answer.

With ShareFile you now have a choice of where you hold your data. Unlike other file sharing technologies you can:

1. Define where Citrix stores your data

2. Build your own StorageZone on premise

3. Work with a trusted partner to host your StorageZone

4. Or a combination of these

If “Follow me Data” is one of your business strategies but you’re nervous about placing your data in the Cloud, ShareFile with StorageZones could be the solution. It delivers data to all smart devices so you can share files securely on tablets, smart phones, laptops (including Windows 8) and in the Citrix way – any device, anywhere, but you don’t need to be a Citrix user. What’s more, there is an audit trail with management reporting so you know who’s doing what and where. Plus, if that device is ever lost or stolen “Remote Wipe” will ensure data does not

find its way into the wrong hands.

The concept of StorageZones is powerful, and when incorporated with the Citrix Unified StoreFront (new generation WI) it delivers full integration with XenApp & XenDesktop offering a complete Desktop as a Service solution, whether that is on or off premise. It provides the opportunity to reduce IT costs whilst delivering a state of the art IT service incorporating Bring Your Own Device (BYOD) solutions with full flexibility.

The main drivers for StorageZones are fundamentally compliance and performance. It allows organisations to meet increasing

demand from users to access data and to locate that data closer to their users. Ensuring that access is simple, but also that they maintain compliance are key issues for customers. Delivering this level of control and security offers a really unique solution.

Find out more at an EACS event Visit www.eacs.com/events.aspx

4 www.eacs.com | e: [email protected] | t: 0800 8047 256 twitter.com/EACSLTD

Page 5: EACS Newsletter 2013

Desktop &Application Delivery

A High Definition Experience in the Classroom

CASE STUDY

Thomas Deacon Academy opened in September 2007 and houses approximately 2,200 students ranging from ages 11–19.

The Academy embraced IT and was held up as an example to other educational establishments for its innovative use and widespread adoption of thin client technologies. “Thin client is clearly the way forward for IT in educational establishments,” explained Thomas Deacon Academy’s IT Manager, Martin Byford-Rew. “It is an extremely affordable, flexible and expandable solution that combines solid and reliable performance with low maintenance and cost overheads.”

The Challenge

After five years, the Academy’s IT infrastructure was beginning to show its age. “Time moves on, requirements change and technology progresses. The capabilities, features and facilities that our infrastructure could deliver were falling short of our requirement.” said Martin Byford-Rew.

The Academy had refined the courses on offer and expanded its range to include programming – something that could not be realistically supported on the existing infrastructure. Additionally, an expansion in multimedia requirements also highlighted the shortfalls of the incumbent solution and, following analysis of possible alternatives, Thomas Deacon Academy decided to upgrade its desktop virtualisation infrastructure with Citrix XenDesktop.

“One of the prerequisites of the project was to deliver quick and responsive full screen, high definition video graphics into the classroom,” explained Martin Byford-Rew.

The EACS solution was based around Citrix XenDesktop running on Microsoft Windows server with Hyper-V.

With well over 1,000 devices throughout the Academy, Martin Byford-Rew was aware of the issues of managing and updating operating systems and applications. The inclusion of Provisioning Services (PVS) ensured that the Academy could decouple the operating systems, applications and data from the underlying PC hardware and move to a datacentre where they could be centrally managed. Instead of juggling thousands of static desktop images, the Academy’s IT department could now manage and update the operating system and applications once, and from a single location, before delivering desktops and applications customised to meet the performance, security and mobility requirements of each individual student.

Simplified centralised management and control of the infrastructure has freed up the Academy’s IT staff from time-consuming maintenance and support, allowing them to concentrate on developing and delivering additional IT services to support the Academy’s ambitious projects, whilst the consistent and familiar interface allows all pupils and teachers to access required applications and data quickly and easily, increasing confidence in the system.

“As well as reducing the time taken to install and deploy new applications, Citrix XenDesktop is easier to run and support, provides a consistent and uniform interface, and allows us to maximise our budgets,” said Martin Byford-Rew.

“Citrix XenDesktop is a desktop virtualisation solution that transforms Windows desktops and applications into an on-demand service available to any user, anywhere, on any device,” explained Mike Dearlove, EACS Managing Director. “This, combined with the Citrix HDX technology, which delivers a high definition desktop virtualisation user experience which balances performance with low bandwidth, provided Thomas Deacon Academy with a solution that could be enhanced and adapted as the Academy’s objectives evolve over time.”

Working closely together and against tight deadlines, EACS and the Academy’s internal IT department completed the infrastructure upgrade over a five week period during the academy’s summer holiday.

Now live, Thomas Deacon Academy’s solution is already delivering the increased performance and graphic capabilities that are needed to keep the Academy at the forefront of advances in the use of IT as a component part of the educational process.

“In addition to ensuring the delivery of full screen multimedia capabilities

into the classroom which enhances the learning experience and expands student knowledge outside of the normal curriculum, our new solution allows us to provide additional courses in technology, including programming,” commented Martin Byford-Rew. “The infrastructure is easy to manage, thanks to the training and knowledge share provided by EACS, and as EACS has now taken responsibility for the maintenance and support of the overall infrastructure, our IT team can focus on more strategic projects.”

As well as maximising its budgets through desktop virtualisation, the Academy is able to expand the infrastructure to support additional classrooms without substantial investment – a future proof solution described by Martin Byford-Rew as “pay as you grow”, and has also been able make further savings by reconfiguring its older PCs as thin client devices.

“Across the Academy, staff have been so impressed with the performance, functionality and graphics support that they have asked us to migrate the remaining teaching PCs to the same technology,” continued Martin Byford-Rew. “The entire project has been a great success and we are already working closely with EACS and looking at expanding our use of Citrix XenDesktop into other areas.”

To download the full case study, please visit www.eacs.com/newsletter.aspx.

The Solution

5www.eacs.com | e: [email protected] | t: 0800 8047 256 twitter.com/EACSLTD

Page 6: EACS Newsletter 2013

Server Virtualisation& Infrastructure

Update from the Virtualisation & Infrastructure TeamAs the demands organisations place on their IT infrastructures continue to grow at a fast pace, the need for an agile 24/7 environment has led to the design and implementation of projects that are required to meet many challenges.

Although technologies don’t change as much in this arena as they do in the application world, the need for simple Business Continuity and Disaster Recovery solutions is one area that has grown in demand.

Customers have always wanted to implement the technology but the expense can be seen as prohibitive, especially in the SME market. However hypervisors are now providing replication or virtual storage appliances that offer a level

of resilience without the need for a Storage Area Network (SAN). We believe this type of protection will become very popular during 2013.

In addition to the above data protection solutions, products like Veeam continue to develop and add features which are simple to deploy and protect VMware or Hyper-V environments.

The thirst for storage capacity and performance, if anything, is getting greater but storage vendors have responded with new technologies, or improvements for existing ones, which include storage tiering, de-duplication, compression, SSD’s and 3TB SATA disks.

The Virtualisation and Infrastructure team has deployed

many solutions which use these technologies, with capacities ranging from a few Terabytes to several Petabytes.

NetApp continues to be our storage vendor of choice and 2013 will see the take up of Ontap Cluster Mode which we are scheduled to deploy early in the New Year.

2013 will see the hypervisor battle heat up, in particular, between Microsoft and VMware. There is no doubt that the release of Microsoft Windows Server 2012 has helped in this area, its ability to integrate with the complete Microsoft System Center suite provides customers with a comprehensive Private Cloud environment from a single vendor.

The move to cloud based environments, with the exception of backups, has not had the impact we thought it would. Interest has certainly been there but companies appear to want to keep their own environment for production, but possibly use the cloud for Disaster Recovery protection. We continue to monitor the trends in this area.

With regard to the Virtualisation and Infrastructure team, this year looks like it will be an exciting and busy one. We will continue to provide strategic solutions and services on all scales to meet the far ranging demands customers make on their IT Infrastructures. New technologies will continue to be demonstrated giving your business the opportunity to stay at the forefront of the technology lifecycle and reap the associated business rewards.

Seven Questions to Determine Your Cloud Backup and Recovery Needs

Managing data has become one of the most important and complex IT challenges for businesses of all sizes. With the proliferation of endpoint devices throughout the organisation, backup administrators are challenged with keeping corporate data residing on these devices backed-up in the event data recovery is required.

Big data is also challenging IT administrators as companies are creating and saving data in unprecedented quantities. This accumulation of data is a company’s most valuable asset therefore it

must be backed-up wherever it is located, protected/encrypted, stored and made available to the organisation whenever and wherever it is needed – whether to address employee and customer issues or to address increasing demands for regulatory compliance or e- discovery.

To determine your needs and requirements for cloud backup you need to ask yourself the following seven questions:

1. Ownership: Do I need to own the cloud platform I am

storing in - public vs. private vs. hybrid (public & private) cloud ownership?

2. Responsibility: Do I want to manage my own data, or do I want to pay a vendor to store and recover it for me?

3. IT Staff: Do I have the internal resources to support and maintain my backups, upgrades and platforms or do I require external coverage?

4. BYOD: Do I need to protect data on mobile devices

such as laptops, tablets and smartphones?

5. Internal or external hosting: Do multiple developers and external contracts need to have access and interact with the development process of my data?

6. Accessing Technology: Do I have the ability to recover my data or do I need a third party vendor to ensure it is recoverable?

7. Payment: Do I prefer fixed cost of annual payment or fluctuating cost of pay as you go plans?

Once you’ve answered these questions, you should also determine what type of software platform a service provider’s cloud backup service runs on and how it best suits your business. The technology the service provider uses to power your cloud backup service has to be the right fit for you in terms of implementation and ongoing management of the solution. Also, you want to make sure the platform provides you with the flexibility to change cloud deployment models as your business needs grow and expand.

For further information on cloud backup, please call EACS on 0800 8047 256.

6 www.eacs.com | e: [email protected] | t: 0800 8047 256 twitter.com/EACSLTD

Page 7: EACS Newsletter 2013

Server Virtualisation& Infrastructure

IT – The Service Broker, Builder or Blocker Matt Watts , EMEA Director of Technology and Strategy at NetApp, has over 15 years IT experience and currently Chairs NetApp’s Senate for Strategy and Vision. He frequently attends events articulating the business value of IT and in 2012 was a keynote speaker at Optimise IT. Below he looks at the use of file-sharing services and the impact they are having on IT...

How many of you use Dropbox? I travel across the EMEA speaking at events to companies of all sizes and the majority of people respond that they do use this service. There are other services which have started to see widespread adoption, but I want to look at this one for now in more detail.

Dropbox, aside from becoming a successful provider of services, has also helped to highlight significant challenges for IT and it’s highlighted them all the way from the consumers inside our organisations, right up to Exec level.

So how has Dropbox become so successful in delivering something that you would imagine is a pretty basic service that any IT department should easily be able to deliver? It’s file-sharing, that’s it, yet 100’s of thousands of us don’t have this service. So what has stopped IT teams from delivering this? Was it a perceived lack of importance? A concern about security? Or maybe IT departments are just too busy doing other things and the value of this was hard to justify? But it clearly does have value; the adoption rate is proof of this.

This brings me to my second point. How easy is it now for users to find services outside of those that come from our own IT departments? There have always been some basic services that we could get from the Internet, but the breadth, functionality and scope of what is available now is quite incredible and all of this is easily available for users inside companies to consume. So what do IT departments do? I’ve had a number of different responses when I ask this question. Some companies assess the risk of these services and if they are perceived as a risk then they block them. IT departments that take this approach realise that this is likely to do nothing for the perception of their value to the business so most look for alternatives first.

My third point, how does IT evolve when Enterprise users have many external and often more flexible options for a given service? Are they the Blocker, constantly on the lookout for services where users are bypassing IT and then blocking them? Do they look for these ‘popular’ services then work out how to build them themselves? Or do they become a service broker, where they deliver the core services where security and confidentiality is essential and the services have the potential to create value and revenue for the business? Then they build a catalogue of other services that users may need from providers that have been assessed and can be guaranteed to deliver the right service and security needed. This needn’t be an arduous activity, we’re not necessarily talking about business applications, we’re talking about iApps. Processes need to be in place for these to be assessed and made available quickly and this could come in the form of IT as a Broker.

I like the idea that in the future companies could have catalogues similar to an ‘App Store’, where users can go to select the applications that will benefit them, some of these delivered by internal IT, some delivered by vetted external Service Providers.

The mass adoption of Dropbox has provided some clarity as to what a Cloud service really is. It’s highlighted many new challenges right up to the level of the Exec’s, who are now realising that with this particular service you give away all rights to the information that you put into it, (it can be mined and re-used), that huge numbers of people in their company are using it and that no one knows what information is already out there.

If you’re in IT then do you know how many of these types of service your users are already consuming? How many of your users use Dropbox? How many of your developers use Amazon EC2? How much of your company’s data has already been moved outside of your firewall to these types of providers? And who is responsible for the security of it?

So, what will you become for these services in the future?

The Builder - If you decide to do it yourself then clearly being able to minimise the cost is going to be important, so efficiency will be high on your list of priorities and there’s no other vendor that can offer the comprehensive level of efficiency in their technology that NetApp can. But equally as important is making sure that the infrastructure you build is highly flexible so that it can support other applications

and business needs as well, again NetApp’s Unified Storage offers extreme flexibility supporting block and file protocols, integrating with all major applications for data protection and providing complete Non Disruptive Operations for the associated data.

The Broker - Where you consume the service from a provider, many of which have built their service on NetApp for the same reasons as above, but in addition to this our technology offers them the security to deliver services to multiple customers from a shared infrastructure whilst offering complete data separation, this takes efficiency for them to a whole new level.

Or the Blocker - there are simply some Cloud type applications that you will not want your users to use and it will make sense to block these.

The strategy for most companies will be a mix of all of these. It will make sense to look at applications that don’t have the ability to add value to your business and see whether Brokering these makes better financial sense. That in turn frees up time to look at how to build a highly efficient shared infrastructure for those applications you choose to keep and new ones that you will need to adopt.

What will your strategy be?

There have always been some basic services that we could get from the Internet, but the breadth, functionality and scope of what is available now is quite incredible...

7www.eacs.com | e: [email protected] | t: 0800 8047 256 twitter.com/EACSLTD

Page 8: EACS Newsletter 2013

A Virtualised Infrastructure for East of England Co-operative Society

CASE STUDY

The East of England Co-operative Society is one of the largest independent Co-operative Societies in the UK with an annual turnover in excess of £350 million. Employing some 4,700 local people, and with a business entirely owned by its members. The Society’s diverse activities include: supermarkets, food stores and post offices, travel, pharmacy, optical and funeral branches, petrol forecourts and an Events and Conference Centre.

The Challenge

Sustainability, business continuity and disaster recovery

The East of England Co-operative Society was formed by the merger of the Ipswich and Norwich Co-op-erative Society and the Colchester and East Essex Co-operative Society, and had inherited an aging legacy estate of servers which were nearing their end of life.

As a progressive and ethical organ-isation, the Society had business plans and objectives in place to address sustainability, business continuity and disaster recovery, as well as reducing the environmental impact of the company.

“We took the strategic decision to pursue the key objectives of sus-tainability and business continuity,” explained ICT Services Controller, Richard Helliwell. “Our existing infrastructure of some 35 servers was becoming more and more difficult to maintain and we were concerned about the practicalities of restoring them in the event of a major incident. The IT team had a vision which combined disaster recovery and business continuity with a considerably reduced carbon footprint and we recognised that virtualisation was the logical way forward.”

However, such a transition was, in Richard Helliwell’s own words, a leap into the unknown. With a small internal IT team that was focused on maintaining and supporting the existing infrastructure, the Society did not have the necessary in-house expertise to manage such a large virtualisation project.

“As a Co-operative Society, we have a policy of partnering with third party organisations that can bring the specific levels of expertise to the table, as and when we need it,” explained Richard Helliwell. “We invited a number of virtualisation specialists to submit recommen-dations, including market leader, VMware.”

One of the Society’s main criteria was to select a partner that understood the objectives and constraints, who had a proven track-record of designing and imple-menting virtualisation solutions for similar businesses and who would work collaboratively alongside the Society’s internal IT team, sharing knowledge and providing training, enabling the Society to ultimately manage some aspects of the new environment internally.

A highly available infrastructure

Following detailed analysis of the Society’s underlying business objectives, and working closely with VMware’s technology experts, EACS implemented a dual site, fully virtualised environment based around HP DL380 G7 Servers running VMware vSphere Enterprise and with a Dual Controller NetApp SAN at the primary Ipswich site. The hosts at the Disaster Recovery site also operated a NetApp SAN.

To address the Society’s business continuity and disaster recovery requirements, EACS implemented VMware Site Recovery Manager.

“VMware Site Recovery Manager is a pioneering disaster recovery management and automation solution which accelerates recovery by automating the recovery process and simplifying management of disaster recovery,” said Mike Dearlove, Managing Director. “By integrating VMware Site Recovery Manager closely with VMware vSphere, VMware vCenter Server and NetApp SnapMirror, the Society was able

to make recovery rapid, reliable, affordable and manageable, with centralised management of recovery plans and automated recovery processes.”

“Our partnership with EACS has resulted in a solution that has reduced the Society’s number of servers by almost 90% whilst providing highly resilient business continuity and disaster recovery capabilities, giving us complete confidence in our ability to recover from disruptions and disasters quickly, efficiently and effectively,” concluded Richard Helliwell. “In addition to providing complete site failover of IT services from our head office to the disaster recovery site, the virtualised environment has delivered significant flexibility, a low TCO and easy management on a truly scalable platform which will drive further productivity savings. We have also significantly reduced our power and cooling energy consumption overheads.”

Benefits:• Consolidation of 35 servers to

4 physical servers - a hardware reduction of almost 90%

• Projected cost saving (power, maintenance, depreciation) of £188,840 and energy savings of 227,292 kWh over the next 4 years

• Highly resilient solution with complete site failover of IT services from the Head Office site to the DR site

• Substantially simplified infrastructure management

• Future-proof, flexible and expandable solution based around leading edge virtualisation technologies from world class vendors

To download a pdf of the full case study, or view a video, please visit: www.eacs.com/newsletter.aspx.

Server Virtualisation& Infrastructure

The Solution

8 www.eacs.com | e: [email protected] | t: 0800 8047 256 twitter.com/EACSLTD

Page 9: EACS Newsletter 2013

Control &Collaboration

EACS was named the winner in the Datacentre Solution of the Year category at the European IT Excellence Awards 2012.

“The EACS solution for the East of England Co-operative Society impressed the judges because it met and exceeded the three key business issues of sustainability, business continuity and disaster recovery,” stated John Chapman, Editorial Director at IT Europa. “In particular they took into consideration the impressive cost and energy savings.”

2012 was an excellent year for EACS with the company receiving recognition for a number of other awards including being selected as finalists in the CRN Channel Awards and Microsoft Partner of the Year Awards.

An Award Winning Solution

FINALIST

Update from the Control & Collaboration Team

For the Control and Collaboration team 2012 was a whirlwind of activity. The sheer volume of our traditional project work increased. We have been helping our customers to implement and update solutions around technologies such as Microsoft Server Operating Systems, System Management and Private Cloud, as well as Microsoft messaging and collaboration technologies, such as Exchange and Lync Server.

However 2012 was also significant for another reason, as it was a

major year for new products to hit the market. Particularly for Microsoft who released Microsoft System Center 2012 as a suite of products in lieu of a discrete set of components. This has proven to be a great solution for an otherwise complex and involving technology and has enabled EACS to add further value to our clients by implementing more of these components to work in unison with each other and extract great value solutions that are tailored to our clients’ needs.

Additionally the release of Windows Server 2012 and Windows 8 client operating systems has resulted in a changed landscape for businesses when planning their strategies for the next few years. The performance and capabilities of these new releases is unparalleled and demands attention. The Server operating system is one of Microsoft’s most accomplished updates and adds incredible “in the box” value to a large number of project situations and common requests: technologies including

Hyper-V v3.0, NIC Teaming, SMB v3.0, File System Enhancements and simplified Direct Access capabilities - to name a handful of improvements and additions.

Windows 8 client operating system is also a significant advancement from previous releases. The vision of a common experience when using the current Microsoft operating system on both Phone, Desktop and Mobile device is unparalleled to any previous release. It should be noted that a common misconception is that the new “Modern” interface is biased towards Touch input methods – this is simply not accurate. Mouse, Keyboard, Touch and Pen input devices are all first class citizens in this new environment and one is not inferior to another. It would be more accurate to say that selecting the best device with the most appropriate input interface is the best advice offered, the experience of using the operating system is otherwise identical.

This year the Control and Collaboration team anticipate helping our clients and partners make best use of these new technologies and preparing for and implementing the new releases of Microsoft Exchange, Lync, SharePoint and Office 2013. These staples of key business infrastructure are sure to be a big hit and our team of skilled and experienced consultants are on hand to help with EACS support and training services geared up to ensure we offer the most complete solution available.

9www.eacs.com | e: [email protected] | t: 0800 8047 256 twitter.com/EACSLTD

Page 10: EACS Newsletter 2013

Control &Collaboration

Email is still the dominant form of communication in businesses today. It has become a mission critical application because of the importance of the data transacted through, and stored in, email environments.

A decade or so ago, as IT departments began to recognise the growing importance of the corporate email environment, they started to add supporting services and platforms around the core server environment, which is predominantly Microsoft Exchange. Appliances, applications and services to protect and store email were added, usually driven by business problems as well as changing corporate governance requirements.

Email archiving was one such platform, and remains of critical importance today. Email archiving systems were first added to networks in the mid to late 1990s, initially designed to solve storage management problems, but more recently utilised to enable businesses to retain a complete record of their corporate knowledge and intellectual property. Long term retention of email nowadays is invariably driven by a need to respond to legal obligations, or mitigate against the threat of data loss.

The advent of cloud computing in the same timeframe has disrupted traditional on-premise email archiving markets with the capabilities of a new type of cloud-based email archive, an Interactive Archive.

The Interactive Archive, driven by the cloud allows users to leverage the archive and data therein for business intelligence, as well as end user productivity, ubiquitous access, and the corporate governance and compliance requirements that underpin the archive itself.

The concept requires a new way of realising value in a computing platform. The Interactive Archive is one that will be deployed from the cloud, but not all cloud archives are created in the same way. Simply archiving email in the cloud only removes the local storage overhead and expenditure, while giving the users a degree of flexibility in terms of access – in fact, most cloud archives are still about storage and eDiscovery.

The Interactive Archive is about much more – it’s about extending beyond this ‘simply-storage’ model by offering to leverage more of the value in the archived data. It’s a platform that puts the productivity benefits of using email back in the users’ hands

by making their personal archives available in many ways – as well as including sources of information that would otherwise need a change in work flow for end users.

The Interactive Archive acquires and consolidates the user’s desktop applications as a source of information – their web applications and services, their corporate information flows in platforms like email and mobile – then provides a central and single copy under management. Importantly a single view of all these information streams also gives the business a concise, forensic and complete repository for eDiscovery, compliance and business intelligence use. The important concept of ‘interactiveness’

comes from the use the business can make of the data; platforms such as Outlook, SharePoint, mobile devices and APIs all bring new ways to leverage the accumulated data. Delivering business intelligence back to the organisation by leveraging the data-exhaust of the Interactive Archive now becomes possible too; in short making the data within the archive worth more than simply an eDiscovery tool.

Mimecast has already extended their archiving capabilities to file archiving. To find out more download the Whitepaper “Is your Email Archive a Goldmine or a Black Hole?” at www.eacs.com/newsletter.aspx.

Microsoft System Center 2012 Training Course

EACS has a dedicated training division, Harvard Training, with particular in-house expertise in Microsoft Windows Server, Microsoft Exchange and System Center.

We recently launched a two day training course for System Center Configuration Manager 2012. Delivered by one of our technical consultants this enables systems administrators to get “hands-on” and explore the functionality and performance of SCCM 2012.

Microsoft System Center 2012 Configuration Manager helps organisations to empower people

to use the devices and applications they need to be productive, while maintaining corporate compliance and control. It accomplishes this with a unified infrastructure that gives a single pane of glass to manage physical, virtual, and mobile clients. It also provides tools and improvements that make it easier for IT administrators to do their jobs.

You will receive expert advice on day-to-day operations and general maintenance. This includes deploying the client agent, managing and controlling assets, deploying software, endpoint protection and reporting.

In addition to offering our own scheduled courses on Microsoft technologies, we have excellent industry partnerships allowing us to offer a wide variety of technical training courses across all areas.

For further information on our training courses please visit www.harvardtraining.co.uk.

Microsoft Core Infrastructure Events With Microsoft’s new product launches and announcements, we are holding a number of joint events which will enable you to learn about what’s new in the Microsoft Core Infrastructure vision, strategy and roadmap.

You will also get the latest insights into technologies such as Windows Server 2012 and System Center 2012.

• Windows Server 2012 redefines the category, delivering hundreds of new features and enhancements spanning virtualisation, networking, storage, user experience, cloud computing, automation, and more.

• System Center 2012 is a unified and flexible management platform

The Interactive Archive

for managing your traditional datacentres, private and public clouds, and client computers and devices.

For further information visit www.eacs.com/events.aspx and select your preferred event and location.

All events are free to attend.

10 www.eacs.com | e: [email protected] | t: 0800 8047 256 twitter.com/EACSLTD

Page 11: EACS Newsletter 2013

Case Study: Email is a business critical communications tool for London Overground

CASE STUDY

London Overground Rail Operations Limited (LOROL) operates London Overground rail services on behalf of Transport for London (TfL). Serving 55 stations across 20 of London’s 33 boroughs, it carries 370,000 passengers on a typical weekday, and manages 117m passenger journeys each year.

The Challenge

All of LOROL’s office based staff depend on reliable access to email, which Gareth Murphy, Head of IT at LOROL, says is the organisation’s most important application, “Email is the dominant format for communication across the business. It also plays an important role in customer communications, since the alerts that enable station staff to keep customers informed during unplanned service disruption are pushed to Android devices via email.”

However, LOROL’s email system, based on Microsoft Exchange Server 2007 and an on-premise archiving solution, was failing to deliver against these business imperatives. In particular, their archiving solution was unreliable, inefficient and made responding to audit requests difficult.

LOROL had also outgrown its email continuity solution, which was based on a lengthy restore process that would leave the business without any e-mail for far too long.

Finally, these issues had prevented Murphy’s team from upgrading to Microsoft Exchange Server 2010.

“I knew we needed to simplify the overall infrastructure to enable us to migrate to Exchange 2010 and cut the support burden. We needed a single, integrated solution to solve our issues around archiving and DR, without compromising on security,” said Gareth.

“EACS provided me with information about a solution from Mimecast, which looked like it would resolve our email archiving and continuity challenges. EACS arranged meetings and demonstrations to ensure that the technology would meet our needs in the long term”.

Murphy’s experiences during migration only served to confirm the view that LOROL had selected the right solution. “Mimecast has a clear and logical, seven step migration process, so we always felt in control. There was no disruption to email services and the archive data export was far more straightforward than I expected. Migrating five years’ worth of email data to the Mimecast cloud archive was about as smooth a transition as you could hope for.”

“Moving to the Mimecast archive has solved a multitude of issues,” Murphy says. “Storage space is no longer a constant battle, we save a full day per week in terms of management time, and responding to audit requests is quick and easy.

We now know we have a solution we can rely on, and one that can effortlessly scale with our storage demands.”

Mimecast UEM has also transformed LOROL’s email continuity - automatic failover and failback in real time ensures email continues to flow un-interrupted via the Mimecast platform during unplanned outages.

“These days, outages are both less likely and less of an issue. There is no four-hour battle to get email flowing again. Email remains available 24/7 no matter what, and there is no need for my team to do anything other than focus on getting the primary systems back up and running – Mimecast handles continuity for us.”

Murphy and his team now have the simplified, robust email management infrastructure they need to carry out a long delayed migration to Exchange 2010. “It is no longer something I think of as a risk,” he says. “In essence, we have replaced a solution that made upgrades a real headache - costly, time consuming and fraught with risk - with a solution that is permanently migration ready.”

To download the full case study please visit www.eacs.com/newsletter.aspx.

Are you getting the most from your Microsoft Licensing?

Control &Collaboration

There aren’t many topics that cause more angst and discussion amongst clients than Microsoft Licensing. Especially as they have recently upgraded or changed almost every product in their portfolio.

In addition to the product upgrades, Microsoft has taken the opportunity to reposition itself in the market. At the desktop level, Windows and Surface are seen as giving competitive advantage. At the back end architecture, Window Server 2012 and System Center are making Microsoft in the datacentre a realistic option.

This product positioning has had an impact on the methods and propositions that are available through their licensing and it would appear that this approach is encouraging customers to commit to platforms that have Microsoft as their central pillar.

With all vendors pitching their platforms it will become more expensive per head or per seat to purchase licensing on an ad hoc basis. Therefore the opportunity lies in getting to grips with current licensing arrangements and making sure best value is driven from them.

EACS can arrange a free one-to-one clinic with our licensing specialist to discuss your arrangements. Please call us on 0800 8047 256 to book (suitable for organisations with 250+ users only).

The Solution

11www.eacs.com | e: [email protected] | t: 0800 8047 256 twitter.com/EACSLTD

Page 12: EACS Newsletter 2013

Services & Support

Why consider using third party support services? In today’s environment, external support arrangements, where elements of your IT support are outsourced to a third party, have become extremely commonplace.

One of the main drivers for organisations is the reduction in IT costs through efficiencies and economies of scale, as you get access to a team of staff and their collective knowledge and skills who are available to provide support and cover as required. This saves you a vast amount of time and money by removing the considerable headache of staff management, training and recruitment.

Access to the required skills often uses an on demand model, which offers a more flexible approach, allowing your own internal staff to focus on core business IT activities or projects.

All professional support organisations will use helpdesk software to track and manage calls, with formalised call logging, call

management and an escalation process if required. As all calls and incidents are captured regular reports can be provided which highlight key business intelligence and call trends.

External support providers are often well placed to provide a non-emotional opinion on your IT landscape and potential directions. This knowledge is gained from working closely with the wider client and vendor marketplace, allowing them to provide informed advice based on what other organisations are doing with technology.

Dependent upon the type of support arrangement and contract that you select, you are often able to minimise sizeable capital expenditure on IT infrastructure by utilising Infrastructure as a Service (IaaS), this approach ensures a predictable and controllable IT spend.

Reactive or Proactive?

A reactive service provides you

with access to support when your knowledge is exhausted, you do not have the correct skills, or you are under-resourced due to staff absence.

Proactive support means a third party is appointed as the owner of a chosen technology and will proactively manage and patch accordingly.

EACS is currently helping clients with a whole array of support functions, including:

�Hosting�IaaS (Infrastructure as a Service)�Cloud Backup�Microsoft technologies�User helpdesk�Backup for existing staff�Remote server support and

management�Application delivery�Storage management and

consolidation�Virtualisation�Mobility�Security

�Bring Your Own device (BYOD)�Disaster Recovery�Hardware support

We have been providing support services to our clients since 1994 and are viewed as a trusted extension of our customers’ teams. We deal with all sizes and types of organisations, whether that support is ad hoc, scheduled, or a fully Managed Service.

Our approach takes a flexible client-centric focus, understanding that whilst many of our clients are similar, they are all unique and, as such, need a service that fits their requirements.

If you would like more information, please call us on 0800 8047 256.

12 www.eacs.com | e: [email protected] | t: 0800 8047 256 twitter.com/EACSLTD

Motor Racing UpdateEACS sponsored racing driver Tom Onslow-Cole finished his 2012 British Touring Car Championship (BTCC) campaign in 6th place after taking pole position for the last race meeting, his first of the season. Well done Tom!

Customers who joined us at Brands hatch for the BTCC were able to meet Tom in the EACS suite. Plus they had the chance to visit the Ebay Motors garage and look around the car; with some taking part in a grid walk as well.

It was Tom’s last season with eBay Motors as he has now signed a deal to drive for Team HARD. piloting a new NGTC spec. Volkswagen Passat CC for 2013 and beyond.

Byte Night UpdateByte Night is the IT industry’s annual sleep out in support of Action for Children. Each year hundreds of individuals and teams from across the IT and business community spend a night exposed to the elements in a bid to raise sponsorship and awareness of Action for Children’s work.

Last year Mike Dearlove and a team of people from EACS spent a very cold wet night sleeping out. This was the third (and wettest) year that EACS participated in this

fundraising event which raised over £950,000 across the UK. The weather hasn’t put us off and some brave volunteers will again be taking part in 2013.

If you would like to register your interest in being part of Byte Night, please visit www.bytenight.org.uk.

Thank you to everyone who sponsored EACS!

For your chance to win a once in a lifetime experience, just visit www.eacs.com/newsletter.aspx and answer three questions about this newsletter.

Your trip will include a briefing, option to help with inflating and deflating the balloon, around an hour’s flight, champagne toast and a certificate signed by your pilot.

– Good luck!

WIN A TRIP IN A

HOT AIR BALLOON!

WIN

!

Registered Office: EACS Limited, 7 Ramsay Court, Hinchingbrooke Business Park, Huntingdon, Cambridgeshire PE29 6FY. EACS is a Limited Company, number 2913587