|
|
User Controls
|
New User
|
Login
|
Edit/View My Profile
|
|
|
|
ActiveMac
|
Articles
|
Forums
|
Links
|
News
|
News Search
|
Reviews
|
|
|
|
News Centers
|
Windows/Microsoft
|
DVD
|
ActiveHardware
|
Xbox
|
MaINTosh
|
News Search
|
|
|
|
ANet Chats
|
The Lobby
|
Special Events Room
|
Developer's Lounge
|
XBox Chat
|
|
|
|
FAQ's
|
Windows 98/98 SE
|
Windows 2000
|
Windows Me
|
Windows "Whistler" XP
|
Windows CE
|
Internet Explorer 6
|
Internet Explorer 5
|
Xbox
|
DirectX
|
DVD's
|
|
|
|
TopTechTips
|
Registry Tips
|
Windows 95/98
|
Windows 2000
|
Internet Explorer 4
|
Internet Explorer 5
|
Windows NT Tips
|
Program Tips
|
Easter Eggs
|
Hardware
|
DVD
|
|
|
|
Latest Reviews
|
Applications
|
Microsoft Windows XP Professional
|
Norton SystemWorks 2002
|
|
Hardware
|
Intel Personal Audio Player
3000
|
Microsoft Wireless IntelliMouse
Explorer
|
|
|
|
Site News/Info
|
About This Site
|
Affiliates
|
ANet Forums
|
Contact Us
|
Default Home Page
|
Link To Us
|
Links
|
Member Pages
|
Site Search
|
Awards
|
|
|
|
Credits
©1997/2004, Active Network. All
Rights Reserved.
Layout & Design by
Designer Dream. Content
written by the Active Network team. Please click
here for full terms of
use and restrictions or read our
Privacy Statement.
|
|
|
|
|
|
|
|
Time:
00:00 EST/05:00 GMT | News Source:
ActiveWin.com |
Posted By: Robert Stein |
The Office 365 team strives to provide exceptional service to all of our customers. On Thursday, November 8 and Tuesday, November 13 we experienced two separate service issues that impacted customers served from our data centers in the Americas. We apologize for the inconvenience these issues caused you and your employees.
We are committed to communicating with our customers in an open and honest manner about service issues and the steps we’re taking to prevent recurrences.
Here are more details about the recent issues:
- The first service incident occurred on November 8 and resulted in prolonged mail flow delays for many of our customers in North and South America. Office 365 utilizes multiple anti-virus engines to identify and clean virus messages from our customers' inboxes. Going forward, we have built and implemented better recovery tools that allow us to remediate these situations much faster, and we are also adding some additional architectural safeguards that automatically remediate issues of this general nature.
- On November 13, some customers in North and South America were unable to access email services. This service incident resulted from a combination of issues related to maintenance, network element failures, and increased load on the service. These three issues in combination caused customer access to email services to be degraded for an extended period of time. Significant capacity increases are already underway and we are also adding automated handling on these type of failures to speed recovery time.
Across the organization, we are executing a full review of our processes to proactively identify further actions needed to avoid these situations.
We understand that any disruption in service may result in a disruption to your business. As a gesture of our commitment to ensuring the highest quality service experience Microsoft is changing the standard credit procedure for this incident and is proactively providing your organization a credit equal to 25 percent of your monthly invoice. The credit will appear on a future invoice, and there’s no need to contact Microsoft to receive this credit. Please note, processing of the credit may take as long as 90 days.
If you have additional questions, please do not hesitate to contact us. Questions and answers about this and other Office 365 issues can be found at our Office 365 community site.
Thank you for choosing Office 365 to host your business productivity applications. We appreciate the serious responsibility we have as a service provider to you, and we know that any issue with the service is a disruption to your business and that’s not acceptable. We apologize for the inconvenience these issues caused you and your employees.
|
|
#1 By
958138 (120.37.210.105)
at
12/14/2012 5:25:12 AM
|
From Cheap Kobe 7 Shoes creative inspiration, condensed Cheap Kobe Shoes warlords technology and design, a pair of Nike Zoom Kobe VII System basketball shoes, for the players to create the perfect protection and the ultimate <a href=http://www.nbalebron10.com><b>Lebron 10</b></a> performance, help <a href=http://www.lebronoffice.com><b>Lebron Office Shoes</b></a> you to more emotion confidence control course.Nike Zoom Kobe VII System Nike Zoom basketball shoes air cushion function of play to the extreme, the one <a href=http://www.kobeoffice.com><b>Kobe Office Shoes</b></a> and only ultra-light, ultrafast response performance can make feet focus closer to the ground, keeping the feet at boot time can quickly complete contact with the ground, increase your gait flexibility and fluency; Cheap Kobe 7 Elite even within the light with <a href=http://www.airmaxshoes365.com><b>Air Max Shoes</b></a> boots Phylon midsole, for every time you backboard dunk contest and provide the most powerful shock absorption function support feet, make time enjoy top safety protection.
YJREED12
|
#2 By
958138 (112.111.188.136)
at
12/29/2012 5:14:35 PM
|
<a href=http://www.nikelebronjamesoutlet.com>Lebron James Outlet</a>
<a href=http://www.lebronfactory.com>Lebron Shoes</a>
 Cheap Lebron 9 Shoes as ninth pairs of individual signature boots to the king trend debut.The shoes with innovative Hyperfuse technology strong back, super light, super wear-resistant, strong support and cushioning performance of the perfect perfect defend small emperor's new NBA journey.Lebron 9 Galaxy The mesh and the filling layer composite tongue, which can be snugly foot while ensuring excellent air permeability and comfort.Arch fixed design using Flywire lifting support effect, combined with the built-in elastic inner boots, can be firmly attached to the foot.Lebron 9 Elite Cast in a type Phylon light in the end to reduce weight, provides shock absorption, ensure comfortable.Carbon glass shoes bone bearing plate and enhanced resistance to torsion and support performance.Hard rubber outsole signature lines to create excellent durability.
<a href=http://www.latestkobeshoes.com>Kobe 8 Shoes</a>
<a href=http://www.nikelebronoutlet.com>Nike Lebron Outlet</a>
<a href=http://www.cheapkobe2012.com>Cheap Kobe 2012</a>
fsJREED12
|
#3 By
1044528 (199.15.234.64)
at
3/7/2013 5:59:23 PM
|
A proxy is a typical expression that is now employed by many net consumers. In English, proxy refers to a man or woman, who is approved to act for some other individual. In straightforward phrases, the motion essential to be completed by one individual can be completed by one more individual without having revealing his identity. The meaning of proxy differs with the context.
Proxy and [url=http://scrapeboxfaq.com/where-can-i-get-private-proxies ]proxies Packet Flip [/url] are two phrases utilized by intermediate world wide web customers. A proxy refers to a site, which can be utilized to blocked data. In other terms, without having any limits, you can get obtain to any details above the net with the use of proxy internet sites. These proxy sites are simply named as proxies. Proxy server is an intermediate server, which handles data sharing among a shopper and a server. Any data shared between the shopper and the server must pass proxy servers. Proxy internet sites are designed to fool proxy servers.
Virtually all workplaces and academic establishments install a proxy server, which acts as a firewall. Web connection to different computer systems inside of the building is presented only by way of the proxy server. Each and every piece of info, which passes by means of the proxy server, is logged. This way, the officers can control the web access of their subordinates or pupils. A firewall is mounted within a proxy server, which restricts access to many internet sites. In most of the cases, many recognized leisure and grownup web sites are blocked by proxy servers.
Proxies are developed to get access to any site of the user's decision with no acquiring caught by the proxy server. When you use a proxy website, your identity is concealed and the internet site, which you want to obtain, is also concealed. These proxy websites are authorized by proxy servers and you can get any information you would like. You can entry many blocked internet sites from your place of work or college utilizing proxy internet sites.
Proxy servers are employed to management internet obtain in the workplace. Apart from blocking sites, proxy servers are used to give a protected and safe browsing environment. All information passing by means of proxy servers can be analyzed ahead of they achieve any terminal. This feature is employed to block spyware and other viruses from influencing a user's personal computer also. To improve network security and obtain management, proxy servers are employed. When the community connects a large amount of computers, use of proxy servers turns into vital to have a centralized entry to the net.
A proxy hides your identification and lets you surf the internet with out revealing your IP tackle. Proxies are now utilized by a lot of end users, who wish to conceal their id and escape from invaders. Anonymous browsing is now achievable with the use of proxies. Proxies for social networking internet sites are now identified all over the internet because folks want to use social networking internet sites when they are at work. While the topic of using proxy to overrule access handle is a controversial stage, you can use these proxies as lengthy as your proxy server identifies and blocks proxies.
|
|
|
|
|