Thursday, July 24, 2014

Whats new with RightFAX

RightFax version 10.6
OpenText RightFax 10.6 provided exciting new features, functionality and improvements.

Enterprise Grade Functionality
  • Office 2013 support
  • Shared Services improvements and now up to 12 servers in a collective
  • Windows Server 2012 Support
New compliance and security Modules to sell!
  • RightFax Encryption Module that safely encrypts all faxes stored on the server
  • RightFax Vault for an integrated approach to fax archiving
What to look for in FY15!
  • 10.6 Feature Pack 1 which will include the RightFax Web API SDK, Windows Server 2012 R2 support and a number of general usability and performance enhancements

The Best of Both Worlds! RightFax Connect
OpenText RightFax Connect is the cloud-based fax service that makes it easy to fax with any OpenText RightFax or RightFax Express fax server without the cost, time, or hassle of managing a telephone connection to your fax server. RightFax Connect has become the fastest growing product line ever and improvements have made it one of the most exciting products at OpenText for FY15!  Visit our website.

NEW PRODUCT!  RightFax Express

Designed for small to medium-sized businesses (SMBs) and departments or branch offices of large organizations, RightFax Express is an information exchange solution that allows users to fax, conveniently and cost-effectively, from the applications that drive their business. RightFax Express is simple to deploy, easy to integrate, and provides a best-in-class fax solution.

All partners may purchase the appliance models, the software only option, and the hybrid option (which provides the RightFax Express software for free when selling a RightFax Connect service plan) directly from OpenText.

OpenText Fax2Mail

OpenText Fax2Mail provides cloud faxing capabilities (fax-to-email/email-to-fax services) that eliminate the cost, inefficiency, and hardware footprint associated with stand-alone fax machines.

NEW CONNECTOR!  The Fax2Mail Connector for Xerox MFPs is now available; the connector gives users the ability to access their Fax2Mail accounts, and fax via the cloud directly at certain Xerox multi-function devices The Fax2Mail product folder has been updated with a product overview; SKU’s for this $0 item can be found in the current
price books.

ACTIVE DIRECTORY INTEGRATION:  Fax2Mail supports Active Directory Synchronization, giving Fax2Mail users the ability to administer contact updates minus manual or bulk uploads; users can also automatically reserve new fax numbers and eliminate old ones in order to streamline new user onboarding. 

PCI-DSS COMPLIANCE:  OpenText’s data center in Ashburn, VA is now fully certified as PCI-DSS compliant, meaning it adheres to strict government policies pertaining to protecting payment card information; protective measures include encrypted transmission security, data at rest encryption, immediate document deletion as well as controls preventing unauthorized personnel from accessing fax data.

CLOUD CAPTURE: Cloud Capture automatically extracts and converts customers’ fax data into formats needed for efficient delivery into their backend systems. The service is implemented quickly at no risk or capital costs, integrating seamlessly with existing fax infrastructure and workflow systems.


Secure Mail is a cloud-based secure messaging solution with tight integrations with existing email systems for encrypting, tracking and preventing the leakage of confidential information. It is simple to use and enables internal and external users as well as applications to easily exchange secure messages and attachments. Users can access Secure Mail via mobile apps or through the web portal from any device.

FY14 saw its first big deal for Secure Mail, $97K to a healthcare company.  The feedback from the decision maker was “OpenText Secure Mail was extremely easy to use and implement, with functionality that meets all our requirements”. 


Unbounded by email attachment size limits and circumventing the often complicated traditional file transfer services, OpenText Secure MFT empowers business users to independently execute file transfers not only between local employees but global departments, partners, customers and service providers using the most common and familiar business tool – Emails. Managed File Transfer is available as both Cloud and On-Premises solutions.


OpenText  offers a comprehensive portfolio of “any to any”, cloud-based business messaging and transaction services that can bridge the most challenging technology gaps while creating significant cost efficiencies across an organization. From Desktop Fax and Production Messaging to B2B Integration, Managed File Transfer, Document Capture and Management, Secure Messaging and Notifications we help companies drive costs out of their operations. 

Enterprise World 2014- New Dates and Location

Due to overwhelming growth and interest in Enterprise World 2014, OpenText is thrilled to be moving to the
Walt Disney World Swan and Dolphin Resort.

Enterprise World 2014 will take place November 9-14 in Orlando, FL. 

How to Keep Your Laptop From Overheating This Summer

 Heat can be damaging to laptops, so when temperatures are soaring, you need to take a few extra precautions to keep your system running quickly and your hard drive from frying. To avoid data loss and to give your machine a longer lifespan, follow these important tips.

1) Clean your laptop's interior. Never is dusting your computer more important than in warm temperatures. The dust that coats your computer's interior adds a layer of insulation to hot-running circuits. If you don't clean the dust, the circuits can overheat. This problem is exacerbated in high ambient temperatures when this heat can't diffuse through cold air. Open your laptop's casing (or bring it to a professional) to thoroughly remove dust that has entered through the vent and the keyboard.

2) Don't leave your laptop in the car. This is good advice at any time in the year, but it's especially crucial in the summer when your car becomes a greenhouse. Remember, your parked car will accumulate extremely high temperatures that will damage the hardware.

3) Leave your laptop far away from the window. Direct sunlight can also cause your laptop to overheat, so store your laptop somewhere cool and away from direct sunlight. 

4) Only run essential programs. The more programs you run, the more strained the circuits will be. On hot days, close all programs you are not using, and learn to differentiate between programs you want and programs you actually need. Heavy-use programs, such as video players and video games, will require you to take extra measures to keep the circuits cool. 

5) Only operate laptops on well-ventilated surfaces. Don't put your laptop on your lap, on the sofa, or on the carpeted floor. These surfaces will all smother your laptop with fabric and inhibit ventilation, leading to overheating. Only run your laptop on a cool, well ventilated surface. You can also purchase a ventilating laptop stand with a fan or holes to help cool your computer during heavy use. 

If your fan is humming loudly and your computer is hot to the touch, you are very likely causing damage to your machine and risking hard drive damage and data loss. Use these tips to keep your computer cool and running smoothly.

Friday, July 18, 2014

Bit by Bit - July Newsletter 2014 - Tips for internet safety.

Happy Independence Day!
Happy Independence Day!
If you're having trouble viewing this email, you may see it online.

The BIT Newsletter July 2014 Edition

Tips for Safe Internet Surfing

The Internet has become an indispensable feature of our everyday life. We trust and use it even for important tasks such as banking and shopping. However, if you are not careful, you may easily fall prey to cyber crime and fraud. This article provides useful advice to make you aware of common online hazards, and how to negotiate them.
Tips for Safe Online Browsing 
  • Some websites offer freebies for which you need to provide your personal information like address, telephone number, etc. Resist the temptation for the free stuff and refrain from revealing sensitive personal data. This can prevent you from falling victim to crimes like identity theft.  
  • Social media websites are all the rage today. However, users need to be careful about what they post online as embarrassing photos and content can be hard to erase from the Internet. So think twice, and do not post anything that may rankle your employer or loved ones. 
  • Remembering passwords for multiple sites is a hassle. However, you need to suck it up and prepare a strong and unique password for each website that needs one. Do not reveal your passwords to anyone, however close they may be to you. 
  • Invest in a reputed antivirus program that can protect your computer from viruses, malware, and other dangers. Do try to pinch a penny by downloading a free antivirus suite. Free software do not offer all the features of the paid version, and you might put your computer security at risk by depending on them. 
  • Shop only on reputed retail websites. Such sites have "https" in the URL and the padlock symbol in the address bar. 
  • Be cautious about emails that have a link. Clicking on it could expose you to malware. Do not pay attention to such emails and delete them immediately. 
  • Many websites that offer free music and movies could expose you to viruses. So, be careful about the material you download on the Internet. 
  • If you have children, use parental control software to make sure your kids do not see adult content on the Web. Teach them about online dangers and advise them to be vigilant while using the Internet. 
  • Some free live streaming websites require you to download a media player version that could infect your computer with malware. So, exercise caution if you wish to watch something live for free. 
  • Many people try online dating to hook up with someone interesting. Men, women and young boys and girls need to be very careful on online dating sites. They should refrain from providing their personal information to strangers on such sites. Try to make contact offline only after you are sure the other party is genuine and can be trusted.
  • Avoid porn and online gaming websites as you could end up downloading harmful material when you visit them. 
  • Many naive users have fallen prey to email lottery scams. If you receive an email that states you have won a lottery amount, delete it immediately. This scam lures gullible people into depositing a "processing fee" to claim the amount they "won." Needless to say, you can say goodbye to this amount as you will never hear from them again. 
The Internet has certainly made life easier for us as we can do plenty of important tasks from the comfort of our home. However, we need to think and surf smartly to keep a step ahead of online criminals and fraudsters. Try to implement the above tips to ensure a safe surfing experience for yourself and your family members.

What is a Managed Service Provider?

Managed services provider (MSP) is most often an information technology (IT) services provider that manages and assumes responsibility for providing a defined set of services to its clients either proactively or as the MSP (not the client) determines that services are needed. Most MSPs bill an upfront setup or transition fee and an ongoing flat or near-fixed monthly fee, which benefits clients by providing them with predictable IT support costs.
Sometimes, MSPs are contracted to manage multiple staffing vendors and to measure their effectiveness in filling positions according to a customer's standards and requirements. In effect, the MSP serves as a "neutral" party that offers the customer a complete workforce solution while ensuring efficient operation and leveraging multiple staffing companies to obtain competitive rates.  In this situation, MSPs typically use a Vendor Management System (VMS) as a software tool to provide transparency and efficiency — along with detailed metrics to the user — related to every aspect of the contingent and contract workforce.  The model has proven its usefulness in the private sector, notably among Fortune 500 companies, and is poised to become more common in the government arena.
MSPs often use specialized software, in order to control and deploy managed services to their customers known as Remote Monitoring and Management (RMM) software.
Bit by Bit is a full service technology firm. If we can help with any of your technology needs please contact us for additional  information. 1.877.860.5831 or email
Twitter Facebook LinkedIn
Just Bits...
What I regret most in life are failures of kindness - George Saunders
Each year, one vicious habit rooted out in time ought to make the worst man good. - Benjamin Franklin
Our standard is to deliver reliable, specialized and affordable network support systems both relative to your needs and built to grow with your company. No task is too big or too small – from fully outsourced network services to an added layer of extra security. We keep your systems up and running smoothly.
Private Cloud
  • Hosted Desktop
  • Hosted IP Phones
  • Helpdesk
  • Hosted Fax
  • Hosting

RightFax is the market leading "gold-standard" of  network fax solutions, with almost four- times the market share of the next competitor.
  • Citrix
  • Box
  • Fortinet
  • Fortivoice
  • Cisco / Meraki
  • VMware
  • HP
  • Dropbox
  • Web / Ecommerce
  • Application
  • Database
  • New York
  • Texas
  • Arizona
  • New Jersey
  • Vermont
  • Oregon