Freedom infotech pvt. ltd. company profile
Upcoming SlideShare
Loading in...5
×
 

Freedom infotech pvt. ltd. company profile

on

  • 1,420 views

Freedom Infotech Pvt Ltd. IT infrastructure company based at Jamshedpur

Freedom Infotech Pvt Ltd. IT infrastructure company based at Jamshedpur

Statistics

Views

Total Views
1,420
Views on SlideShare
1,420
Embed Views
0

Actions

Likes
0
Downloads
7
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Freedom infotech pvt. ltd. company profile Freedom infotech pvt. ltd. company profile Presentation Transcript

  • ABSOLUTELY NEW APPRAOCHfor YOUR BUSINESSAbout Us Freedom Infotech Pvt Ltd offers a wide spectrum of IT infrastructure solutions, networking services and security solutions. Freedom Infotech focuses its energies beyond. Freedom Infotech is the only company that can provide comprehensive understanding of IT infrastructure performance built already or the ones getting built. We take pride in qualifying ourselves as a IT infrastructure company. Discipline and ethics form the core of our business. Freedom Infotech works in a collaborative environment to provide its customers with a single point of contact for all their requirements. We work on all back end collaborations to deliver end-to-end services to our customers. This ensures that our customers are able to concentrate on their core business and leave their IT infrastructure to the experts. Our door is always open and we want to assure you that we will listen to you, as communication is the key to better business success. Remember the door is never closed, so let us unlock the full potential of your business. We are here to serve you …. Technology We explore how technology and services can help people and companies address their problems and challenges, and realize their possibilities, aspirations and dreams. We apply new thinking and ideas to create more simple, valuable and trusted experiences with technology, continuously improving the way our customers live and work. We offer a complete technology product portfolio. We provide infrastructure and offerings that span from a desktop computer to some of the worlds most advanced technologies. We offer consumers a wide range of products and services from home computing and printing to high-end enterprise computing and printing to integrated solutions on Networks, Internet Connectivity, Web Services, System Security, Biometric, Bar Code Solutions, GPS Solutions, RFID Solutions and Homeland Security & Surveillance. This comprehensive portfolio helps us match the right products, services and solutions to our customers specific needs.
  • Our Products We are authorized to sale any product in Govt. sector under DGSND rates: (Pc, Laptop, Server, Think lined, Kiosk, Printer, Copier, Duplo, Projector, Smart board, EPBX etc.Products Perimeter & Building Security Systems •Computers and Work Stations •CCTV Surveillance •Laptops – Notebooks and Netbooks •Electrified Fence System •Servers and Storage Devices •Unattended Ground Sensors •Networking Devices and Equipments •Radio Frequency Based Intrusion Detection •Printers, Scanners, Copiers and Plotters •Explosives Detector •Photo Copy Machines •Fire and Smoke Detection & Control System •Peripherals and Consumables •Mobile JammersInternet & Communications Personnel & Baggage Scanning System •Broadband Internet •Identity & Access Management •Virtual Private Network •X-Ray Baggage / Container Scanner •Direct Leased Line •Metal Detectors •MPLS •VOIP – Voice Over Internet Protocol •PBX / EPBX / IP-PBX Emerging Technologies •Video Conferencing •RFID Solutions •Bar Code SolutionsManaged Network Services •GPS Solutions •Wired, Wireless & Optic Fibre Solutions •POS Solutions •Design & Implementation Services •Audit & Consultation Services Cloud Services •Remote Network Management & Monitoring •Domains, Web Hosting & Designing •Web Applications & e-CommerceManaged Network Services •Anti Virus, Anti Spyware, Firewalls & UTMs •Data Leakage Protection Gate Security Systems •Intrusion Detection System •Automatic Swing / Slide Gate & Boom Barriers •Bollard, Tyre Killers & Road BlockersHomeland Security & Electronic Systems
  • Software Enterprises Solutions •Packaged Third Party Softwares •Tally •Customized Third Party Softwares •SAP •In-House Developed Softwares •Oracle •Microsoft Navision •SageSoftware as a Service •Pronto •Customer Relationship Management •Human Resource Management Open Source Solutions •Service Oriented Architecture •Supply Chain Management •Server Virtualizations •Dealer Management •Enterprise Portals & Content •Financial Management Management •Desktop Productivity Tools •Business Intelligence •Web Conferencing •Web & Batch Applications •Enterprise Solutions •Development Architecture & •E-Learning Management Infrastructure Outsourcing Freedom Infotech delivers a complete and integrated set of managed infrastructure services, encompassing all infrastructure functions—from network access to desktop management to remote technology support. Drawing upon technology solutions that are free of proprietary bias, Freedom Infotech helps clients reduce their technology footprint while creating a measurably more cost- effective, secure and responsive infrastructure that scales and adapts to business needs. Infrastructure Outsourcing Business Process Outsourcing •Workplace Services •Customer Contact •Network & Security Services •Finance & Accounting •Storage Services •Human Resource •Service Desk •Learning •Data Centre Services •Procurement •IT Spend Management •Supply Chain •Health Administration Application Outsourcing •Insurance •Management, Development & Testing • Utilities •Capacity & Captive Services •Legacy Modernisation •Contractor Consolidation
  • Freedom InfoTech Consulting Who are we? Changing demands of increasingly complex market scenarios force businesses to act swiftly and continuously reinvent themselves to meet and exceed their customers‘ expectations. Innovative business models have become the key to sustainable competitive advantage and profitability. Freedom Infotech‘ depth and breadth of technical knowledge and expertise can provide a sound strategy to create such a model, one that is tailored specifically to your organization, and that allows it to keep pace with the latest business trends and technology advances. Let us transform the way you do business by optimizing processes, aligning IT with business needs, supporting IT operations, and designing effective risk management strategies. Freedom Infotech partners with you to define and address your organizations unique transformation imperative. We work in transparent consultation with our clients to define your business goals, devise a strategy, decide on a course of action, develop a solution, deploy it across your organization, and deliver improved business results. Our integrated consulting and IT services capabilities bring continuity and consistency to your strategic programs. Offshore Development Center setupIT Services companies or any organization that wishes to setup an Off Shore Development Center (ODC) in Jamshedpur, facesthe following challenges •Identifying suitable Real Estate •Planning Interior Decoration & Furnishing •Planning IT & other Infrastructure •Hiring Resources •Administration •Day to Day operationsWith the decades of experience in entrepreneurship, we can Help, Guide, Hand Hold or Partner with you depending on yourrequirements & preferences.
  • Our Consulting Focus Strategy Functional IT Consulting Consulting Consulting •What does my optimal • How do I improve the•Which product market supply chain network effectiveness of my IT should we enter ? look like? organization?• Should we undertake an • How do I deliver better • What should the M&A program? customer service? components of my Ent. Architecture be?• How do we compete with • How do I drive out cost Y in direct channels? from the back office? • How can I reduce the cost of BI platforms?• What should my brand • How do I manage strategy be? organizational change? • Which governance •model should I adopt for •outsourcing?
  • Our Global AlliancesBusiness Value for OUR Clients•Reduced risks and costs associated with the technology procurement process and technology ownership• Competitive advantage by leveraging Freedom Infotech‘ industry, product and service expertise and the partner‘stechnology products and services•Reduced IT costs with cost-effective solutions at scale•Reduced risks through end-to-end solutions•Ability to leverage training resources to help you plan and build solutions using Partner products•Seamless solutionsOur AlliancesFreedom Infotech has developed a powerful network of alliances with a core objective of helping our clients becomehigh-performance businesses while getting the most value out of technology investments. Our alignment with marketleaders and emerging players enables us to deliver a more complete solution to our clients. The following are some ofour esteemed alliances: HP  Quick Heal  HCL Compaq  Bradma  Hitachi Lenovo  Symbol  Toshiba Dell  Zebra Sony • Intermec D-Link • Bio-enable Canon • Matrix Microsoft • Sparsh Tally • Tatanet Shoper • SifyIDS • NEC• Bitdefender • Panasonic
  • V-SatV-Sat NetworksDeveloping a Private Network Terrestrial Network When an organization has complex connectivity & communication need in an environment where fiber & ADSL are not readily available & site are to far away from each other for wire links ; VSAT networks can solve local telecommunication issue, enabling organization to focus on their core activities without becoming constrained by Infrastructure. Management must decide whether they can operate key applications over a Public network with: •Shared Products •Best Endeavours rather than guaranteed performance Or if their needs demand a: Private network with : •Control over quality of service(QoS) •Better data security •Fixed bandwidth cost
  • Tally and it‘s customizationExtending Tally.ERP 9 using TDLThis training program is meant for programmers who intend to develop and deploy Tally extensions .The objective of this program isto provide the participants with a comprehensive knowledge on the development language of Tally.ERP 9 ie TDL(Tally definitionLanguage).They will also be oriented with the development environment of TDL ie Tally Developer.Training MethodologyInstructor led classroom training, along with hands on practice. The participants will be taken through the concepts and usage syntaxof each of the topics using PPT‘s and Demo codes. They will be given time to go through the Demo TDL‘s and do some Hands OnExercises during the session.The Training Book and comprehensive set of Demo TDL‘s provided will enable them to learn, practice and apply the concepts taughtduring the session.Program Highlights• Introduction to TDL and its Components –Definitions, Attributes & Modifiers,Actions,DataTypes,Operators,Special Symbols and Functions• Special Symbols & Prefixes •Variables, Buttons and Keys o Usage of @ and @@ o Attributes & Scope of a Variable o Usage of # and ## o Adding a Button & Key o Usage of $ and $$ o Introduction to Actions o Special symbols for Code Readability- ;, ;; • Objects & Collections o Special Symbols as Definition Modifiers-#,!,* o Object Structure, Types and Context• Dimensions & Formatting o Object association o Dimensional Attributes o Collection-Types & Sources o Alignment Attributes o Methods & Accessing Methods using Method Formula Syntax o Formatting Attributes o Basic Collection Capabilities-Filtering,Sorting,Searching•Actions in TDL o Overview of Advanced Collection Capabilities- Extraction,Aggregation,Intergration using XML Collection etc o Categories of Actions o Detailed Object Structure for various Internal objects of Tally- o Action Association and Execution In Appendix
  • CCTVCCTV International adopts AMD platform in new media operation systemClosed-circuit television (CCTV) system operators would needexceptional justification for recording sound as well as video, theInformation Commissioners Office (ICO) has warned.In a newly revised CCTV code of practice (pdf) the ICO said thatsound recording is intrusive and unnecessary in mostcircumstances, and that the use of sound recording could undermineany public support there is for CCTV.The UK has more CCTV cameras than any other country in the worldaccording to the ICO. There are an estimated 4.5 million cameras inthe country, recording the average person 300 times a day, accordingto some estimates.The ICO has raised concerns about a trend for attaching microphonesand sound recording equipment to cameras.Cameras take many shapes and formsThe most common form factors for cctv cameras are dome, bullet, and standard c-mountbodies. Pan-Tilt-Zoom, Low Light, InfraredNo-Light and License Plate technologies can be built into any of these form factors.Fears CCTV cameras used as ‗cheap alternative‘ to policingThe number of publicly owned CCTV cameras has reached unprecedented levels – with parts of Scotland the most watched in theUK.Smart software linked to CCTV can spot dubious behaviorIt could be the dawn of a new era in surveillance. For the first time, smart software will help CCTV operators spot any abnormalbehavior.If the trial due to go live in two London Underground stations this week is a success, it could accelerate the adoption of thetechnology around the world. The software, which analyses CCTV footage, could help spot suicide attempts, overcrowding, suspectpackages and trespassers. The hope is that by automating the prediction or detection of such events security staff, who often haveas many as 60 cameras to monitor simultaneously, can reach the scene in time to prevent a potential tragedy.If the technology takes off it could put an end to a long-standing problem that has dogged CCTV almost from the beginning. It issimple: there are too many cameras and too few pairs of eyes to keep track of them. With more than a million CCTV cameras in theUK alone, they are becoming increasingly difficult to manage. And besides being a tedious task, watching TV monitors also demandsa higher level of concentration than many people can manage.The new software, called the Intelligent Pedestrian Surveillance system (IPS), could change all that, says London UndergroundsPeter Tolling ton, who is overseeing the installation at the stations. "CCTV itself is fantastic, but this puts it on another plane. Itmeans that you dont have to look at a screen all of the time," he says. Indeed it seems likely this is just the beginning. Othercompanies are working on similar technologies.
  • fire stingiest and security alarm and beam detector systems Fire stingiest A fire extinguisher or extinguisher, flame extinguisher is an active fire protection device used to extinguish or control small fires, often in emergency situations. It is not intended for use on an out-of-control fire, such as one which has reached the ceiling, endangers the user (i.e., no escape route, smoke, explosion hazard, etc.), or otherwise requires the expertise of a fire department. Typically, a fire extinguisher consists of a hand-held cylindrical pressure vessel containing an agent which can be discharged to extinguish a fire. In the United States, fire extinguishers, in all buildings other than houses, are generally required to be serviced and inspected by a Fire Protection service company at least annually. Some jurisdictions require more frequent service for fire extinguishers. The servicer places a tag on the extinguisher to indicate the type of service performed (annual inspection, recharge, new fire extinguisher) and when. Using A Fire Extinguisher Pull the Pin at the top of the extinguisher. The pin releases a locking mechanism and will allow you to discharge the extinguisher. Aim at the base of the fire, not the flames. This is important - in order to put out the fire, you must extinguish the fuel. Squeeze the lever slowly. This will release the extinguishing agent in the extinguisher. If the handle is released, the discharge will stop. Sweep from side to side. Using a sweeping motion, move the fire extinguisher back and forth until the fire is completely out. Operate the extinguisher from a safe distance, several feet away, and then move towards the fire once it starts to diminish. Be sure to read the instructions on your fire extinguisher - different fire extinguishers recommend operating them from different distances. Remember: Aim at the base of the fire, not at the flames!!!! Security alarmA modern security system, with its array of electronic components, is designed to sense, decide, and act. Thesecurity system senses events such as motion in a room, decides if the event poses a threat, and then acts onthat decision. While a security system for your business isnt a do-it-yourself affair, you should understand thelanguage of security in order to communicate your needs to a security professional, understand any proposals youmay receive, and make the most of your security system after it is installed.In this introduction to security systems, I will take the sense-decide-act process as an outline and describe theelectronic hardware that performs each function. beam detector systems Beam detection has become commonplace within large open warehouses. Beam Detectors are cost effective when compared with using point detection and suitable for heights way above the operating limits of conventional smoke detection. It all sounds too good to be true however, there are important factors to consider when selecting and installing beam detectors. Beam detectors spanning 100m are prone to movement. Steel framed buildings move. This is a normal occurrence, but when trying to hit a target approximately 100mm x 100mm from 100m away even a few degrees of movement can cause problems. Correct initial alignment is critical as is a solid & secure fixing to structural steel or brickwork. In many cases bracing and special bracketary may be required. Wiring is also critical particularly with loop driven devices where a clean earth is of paramount importance. This should be one of the first things checked when problems are evident.
  • Software Development & Website DesignSoftware developmentSoftware development (also known as application development, softwaredesign, designing software, software application development, enterprise applicationdevelopment, or platform development[1]) is the development of a software product.The term "software development" may be used to refer to the activity of computerprogramming, which is the process of writing and maintaining the source code, but ina broader sense of the term it includes all that is involved between the conception ofthe desired software through to the final manifestation of the software, ideally in aplanned and structured process.[2] Therefore, software development may includeresearch, new development, prototyping, modification, reuse, re-engineering, maintenance, or any other activities that result in software products.There are several different approaches to software development.•Market research•Gathering requirements for the proposed business solution•Analyzing the problem•Devising a plan or design for the software-based solution•Implementation (coding) of the software•Testing the software•Deployment•Maintenance and bug fixing Web site A Web site is a related collection of World Wide Web (WWW) files that includes a beginning file called a home page. A company or an individual tells you how to get to their Web site by giving you the address of their home page. From the home page, you can get to all the other pages on their site. For example, the Web site for IBM has the home page address of http://www.ibm.com. (The home page address actually includes a specific file name like index.html but, as in IBMs case, when a standard default name is set up, users dont have to enter the file name.) IBMs home page address leads to thousands of pages. (But a Web site can also be just a few pages.) Since site implies a geographic place, a Web site can be confused with a Web server. A server is a computer that holds the files for one or more sites. A very large Web site may be spread over a number of servers in different geographic locations. IBM is a good example; its Web site consists of thousands of files spread out over many servers in world-wide locations. But a more typical example is probably the site you are looking at, whatis.com. We reside on a commercial space providers server with a number of other sites that have nothing to do with Internet glossaries.Related glossary terms: mail server (mail transfer/transport agent, MTA, mail router, Internet mailer), Semantic Web, bot (robot), link checker, XIPC, URL-minder, ServiceIntegration Maturity Model (SIMM)
  • NCS ProductsIT INFRUSTRUCTURE WELCOME TO THE WORLD OF MANAGED IT INFRASTRUCTURE Gone are the days when people used to sit on their sofa cozily leaving it to the hi-tech gadgets to take care of the rest ! Ours is a different time altogether. Tiny, small, large irrespective of size every IT Infrastructure today requires a robust and reliable protection ---- a subject matter of IT Infrastructure Management. Build a shield around your IT Infrastructure against the formidable hacking attacks along with the threatening virus, malware, root kit in multiples. Rely on us to fortify your set up with knowledge, expertise and guaranteed satisfaction ! A complete IT Infrastructure Management Solution Simplifying the IT Infrastructure management is the dream of every System Manager. With Own IT, System Managers can achieve this goal. Own IT is a complete system that encompasses components to Monitor, Manage and Trend Desktops, Servers and Network Devices. Own IT Advanced Predictive Trending components empower System Managers to implement and then monitor the performance, reduce the cost of ownership of the IT infrastructure. Unauthorized Information Access / Sharing. Unauthorized / Unlicensed Software / Freeware Installations which have negative impact on the network. Bandwidth / Network clogging by a single node or Process. Unauthorized hardware changes / thefts. Unauthorized/ restricted applications usage like IE/games. Virus handling. Remote machine administration / control. Hardware and Software Audit Trails. Software deployment. Network / lease line monitoring.
  • Biometric Attendance systems and time management softwareTime management softwareSavior 7202 Smartcard ReaderThe favorite of Indian Corporate Houses – The mostpreferred Smart Card Reader In India. Suitable forAttendance, Access and a variety of other applicationssuch as Canteen, Car parking, Vending, Library etc.Very secure and unduplicatable cards. Already morethan 3000 users within a short span of its launching .Allows both Read & Write functions from the sameReader. 16 Characters x 2 rows alphanumeric LCDdisplay. Many user oriented features are packed upwithin the Card / Reader.Savior Industrial Version FingerprintReaderSavior 85-MB/MX series Industrial Version ofFingerprint Reader with metallic enclosure for ruggedindustrial environment Technology uses Worlds Best Biometric Sensor Savior 7202 Smartcard Reader The favorite of Indian Corporate Houses – The most preferred Smart Card Reader In India. Suitable for Attendance, Access and a variety of other applications such as Canteen, Car parking, Vending, Library etc. Very secure and unduplicatable cards. Already more than 3000 users within a short span of its launching . Allows both Read & Write functions from the same Reader. 16 Characters x 2 rows alphanumeric LCD display. Many user oriented features are packed up within the Card / Reader.
  • Networking,wi-fi,optical fiber Communications Design Features Software techniques harden againsthacking: Pt. 2—Sandbox solutionswe need a system architecture in whichmultimedia operating systems and theirapplications can peacefully coexist with real-time, high assurance applications, hosted on areal-time, safety-rated operating system. Wireless LAN: what’s new and the impact on design and test The first popular standards for wireless LAN (IEEE 802.11a and b), and later 802.11g, were designed primarily to connect a laptop PC in the home and office, and later to allow connectivity ―on the road‖ in airports, hotels, Internet cafes, and shopping malls. Their main function was to provide a link to a wired broadband connection for Web browsing and email. Wi-Fi at the Speed of Light A wireless network that uses reflected infrared light instead of radio waves has transmitted data through the air at a speed of one gigabit per second--six to 14 times faster than the fastest Wi-Fi network. Such optical networks could provide faster, more secure communications and would be especially suitable for use in hospitals, aircraft, and factories, where radio-frequency transmission can interfere with navigation equipment, medical devices, or control systems.
  • GPRS systemsGPRS: General Packet Radio Service Introduction The introduction of second generation cellular mobile systems witnessed an impressive growth in the number of mobile subscribers. The most popular second generation systems are GSM andIS-95. The GSM system is based on FDMA-TDMA technology and is widely used in Europe, many parts of Asia and Africa. The IS-95 system is based on CDMA technology and is used in North America. With the increasing popularity of these systems there was an increasing demand for the data services over the wireless. These systems were designed for supporting circuit switched voice data and supported packet data on limited basis, but could not meet of todays trace requirements. In future it is expected that the wireless systems would be able to provide various kind of services like Internet access over wireless, streaming audio and video, text and multimedia messaging services. GSM System Architecture In GSM system the mobile handset is called Mobile Station (MS). A cell is formed by the coverage area of a Base Transceiver Station (BTS) which serves the MS in its coverage area. Several BT together are controlled by one Base Station Controller (BSC). The BTS and BSC together form Base Station Subsystem (BSS). The combined trace of the mobile stations in their respective cells is routed through a switch called Mobile Switching Center (MSC). Connection originating or terminating from external telephone (PSTN) are handled by a dedicated gateway Mobile Switching Center (GMSC). The architecture of a GSM system is shown in the below.
  • Matrix EPABXMatrix EPABX - ProtonIntroducing Matrix EPABX PROTON range, a compact PBX loaded with value addedfeatures, which reduces cost and enhances productivity. Make the best out ofyour single trunk line, the ultra-compact micro PBX. This EPABX System supportsmicrocontroller based design and state-of-the-art Surface Mount Technology(SMT) ensuring high reliability and low maintenance cost.Matrix EPABX vision range is packed with unique features, powered by Microcontroller-based design.SLIC used on extensions ensures robust, reliable and maintenance freeperformance. Its SMT hardware design ensures a very compact design and makesit more power efficient.Matrix EPABX - EternityMatrix ETERNITY Series EPABX provides true mobility to its users by allowingthem to use their mobile phones as PBX extensions. Not only users can make andreceive calls, they can also use most of the PBX functions likeTransfer, Forward, Voice Mail, Directory and Conference using their mobilephones from within and outside office. This seamless mobility means completefreedom from being tied to your desk for internal or external communication.
  • AMCAnnual Maintenance Contract (AMC) ofComputer/Server/Scanner/ Laptop/Copier/Printer(In printer – Office jet.deskjet, leaser jet, Dmp, Lineprinter)/server/plotter Description of the Work 1. The maintenance services will consist of a) Attending to complaints raised by various departments/individuals of BIS (details provided by Freedom Infotech pvt. Ltd.) on daily basis. b) Onsite preventive and corrective maintenance of computers connected in LAN and peripherals at Freedom Infotech pvt. Ltd. where the above equipment is installed as indicated from time to time. c) The maintenance contract will include necessary repairs to the installed systems and replacement of defective/damaged parts, components and other accessories free of cost. d) The maintenance contract also includes removal of virus, software patch updation,HDD crash recovery, system administration, network administration, software support /troubleshooting to keep the system fully operational and web site updated. The agency will be responsible for providing virus free computing environment at Freedom Infotech pvt. Ltd. e) The maintenance contract also includes repair, maintenance and troubleshooting of all LAN components except the switches (for which separate AMC with the Original equipment supplier exists) to keep LAN fully operational. 2. The contract will be initially for one year. The contract may be renewed for a further two years, one year at a time, at the discretion of Freedom Infotech pvt. Ltd. and based on satisfactory services provided by the agency. 3. The maintenance services will be provided on all working days from 0900 h to 1730 h(Monday to Friday). Provision of availability of service engineers on Saturdays, Sundays or other holidays should be made in case of exigency. 4. The maintenance service agency shall provide maintenance services through five qualified experienced and competent resident engineers who shall stay at Freedom Infotech pvt. Ltd. as indicated in item (3) above. The role of these engineers shall be as follows: Two support engineers for computer maintenance. The onsite engineer responsible for hardware maintenance should have expertise to cover all items of computers, printers, UPS, scanners, CD-writers and network components. One support engineer for printer, UPS and networking trouble shooting, etc. One network and system/database administrator. The network and system/database administrator would also provide user software support services including virus cleaning/patch installation, software installation, etc. He should be well conversant with the latest trends in trouble shooting of computing equipment and networking monitoring tools. One software designer/developer. The software designer/developer will be responsible for regular updating of Freedom Infotech pvt. Ltd.web site. He should be knowledgeable about various software tools and techniques for web designing and programming. (Note:-Pricing will be separately with quotation)
  • Our Customers –ListAutomobile Hotels & RestaurantASL Motors Hotel Yashwee InternationalReliable Industries, Dhanabad Hotel Dayal InternationalGulf Ashley Motors Ltd. Hotel Wave InternationalStartrack Pvt. Ltd. Hotel The BluesSant Auto Hotel AnandBebbco Toyota Hotel SmitaGaurav Earth Moving Equipments Pvt. Ltd. Bhola MaharajTatanagar Motor Services Pvt. Ltd.Transportation & Logistics Distributors, Showrooms & Service ProvidersHaulers India Jutharam Ranglal Distributors Pvt. Ltd.Shri Raj International Pvt. Ltd. Jayesh Industrial Suppliers Pvt. Ltd.Shree Roadlines J.J.Electrotech Pvt. Ltd.R.R.Logistics Arjunlal Banwarilal Co. Pvt. Ltd.West Singhbhum Roadlines ElektrokraftShiva Ventures ShreeleathersBinod Singh Roadways Pvt. Ltd. National Electronics Jamshedpur FurnishersChartered Accountants, Legal and Consultancy Veripro Sales & Services Trimurti SalesR.Gopal & Associates Accord India EnterprisesA.Gupta & Associates Chagganlal DayaljeeA.H.Bilimoria & Co. Kuldeep Sons Jewellers Pvt. Ltd.S.K.Naredi & Co. Brahmanand Narayana HrudyalayaS.Sharma & Co.Agarwal Ramesh K & Co.Construction Schools & CollegesGauri Gautam Construction Co. Pvt. Ltd. Narbheram Hansraj English SchoolSamay Construction Pvt. Ltd. DBMS Career AcademySahara Constructions Kendriya Vidyalaya, SurdaShree Housing Developers Pvt. Ltd. Kendriya Vidyalaya, JamshedpurVaastu Vihar Jamshedpur Womens CollegeChandra Awas Pvt. Ltd. Vivek Vidyalaya, GovindpurYashkamal Developers Pvt. Ltd. Gulmohar School, Telco Valley View School, Telco Convent School, Mosabani Tarapore School, Agrico
  • Our Customers –ListBanks, Public Utilities & Public Undertaking Tata Motors Ancillaries •Adityapur Industrial Area Development Authority •ASL Industries Pvt. Ltd. •Uranium Corporation of India Ltd. •Cordoba Engg. Co. Pvt. Ltd. •Atomic Mineral Development, Khasmahal •Accropoly Metal Industries Pvt. Ltd. •District Planning Office, Saraikela-Kharsawan •Caparo Engg. India Pvt. Ltd. •D.C.Office, , Saraikela-Kharsawan •Soni Auto & Allied Industries Ltd. •Govt. Polytechnic, Adityapur •Auro Plastic Injection Moulding Co. Pvt. Ltd. •Govt. Womens Polytechnic, Gamharia •Nalin Rubber Pvt. Ltd. •Govt. Polytechnic, Kharsawan •Banco Products (India) Ltd. •Union Bank of India, Bistupur •BMC Metal Cast Pvt. Ltd. •Jamshedpur Dairy •Steel City Metal Products Pvt. Ltd. •IRCTC •Newco Auto Pvt. Ltd. •Jamshedpur Blood Bank •Sumit Entrprises •Durdarshan,Barbil •Garg Engineers Ltd. •Auto Feed (India) Pvt. Ltd. Corporates •Viks Gears (India) Ltd. •Automat Engineers Lafarge India Ltd., Chapa, Chhattisgarh •Tata Cummins Ltd., Jamshedpur •Shyam DRI, Jharsuguda Manufacturing •SMS Demag, Jamshedpur •Steel Strip Wheels Ltd., Jamshedpur •Ami Enterprises Pvt. Ltd. •Adhunik Group, Jamshedpur •Prem Foods Pvt. Ltd. •Sarla Technologies, Mumbai •Union Enterprises •Bhutan Centennial Distillery, Bhutan •Sachdev Engg. Pvt. Ltd. •India Infoline Ltd. •Spoxy Gas Products Pvt. Ltd. •Wabco TVS India Ltd. •Sudisha Foundry Pvt. Ltd. •Nilanchal Iron & Power Ltd. •Spectra Super Alloys Ltd. •Accropoly Metal Industries Pvt. Ltd. •Fusion Engineering Product Ltd. •Universal Industrial Paints Pvt. Ltd. •Usha Lubes Mining, Iron & Steel and Other Metals •Synergy Power Equipments Pvt. Ltd. •My Home Industries Ltd. •India Resources Ltd., Mosabani •Flexible Foam Products Pvt. Ltd. •Dhansar Engg. Co. Pvt. Ltd., Dhanbad •Gajanan Ores Pvt. Ltd. •EMS India Ltd. •Bharat Engg. & Body Building Co. Pvt. Ltd. •Danauli Engg. & Mining Co. Pvt. Ltd. •Hitech Chemicals Pvt. Ltd. •Orissa Manganese & Minerals Pvt. Ltd. •ASL Enterprises Ltd. Engineering and Allied Industries •PPG Steel Pvt. Ltd. •Babu Ram & Co. •Jupiter Hi-Tech Systems, Agrico •Shiv Sambhu Iron & Steel Pvt. Ltd. •Shiva Project & Marketing Pvt. Ltd. •Zoom Vallabh Steel Ltd. •Bihar Engg. & Manufacturing Co. Pvt. Ltd. •Nilachal Iron & Power Ltd. •Paradigm Engg. & Consultants Pvt. Ltd. •Bimaldeep Steel Pvt. Ltd. •Aastha Developers Pvt. Ltd. •Kohinoor Steel Pvt. Ltd. •Narsingh Ispat Ltd.
  • Contact UsFreedom Infotech Pvt LtdCorporate OfficeBasement, Aditya Tower, Opp Police Station,Bistupur, Jamshedpur,-831001, Jharkhand,IndiaPhone- +91- 657- 2249258, 2249259,3242520Registered Office1st Floor, Punwari Chambers,7B, Kiran Shankar Roy Road, Kolkata-700001, West Bengal, IndiaBranch OfficeSwastik SadanShastri Nagar (East), Dhobatand, Dhanbad-826001, Jharkhand, IndiaPhone -+91- 326-2307033Business Inquiry:Sales Team: sales@freedominfotech.comTechnical Team: support@freedominfotech.com