SlideShare a Scribd company logo
ABSOLUTELY NEW APPRAOCH
for YOUR BUSINESS


About Us

                              Freedom Infotech Pvt Ltd offers a wide spectrum of IT infrastructure solutions, networking
                              services and security solutions. Freedom Infotech focuses its energies beyond. Freedom Infotech
                              is the only company that can provide comprehensive understanding of IT infrastructure
                              performance built already or the ones getting built. We take pride in qualifying ourselves as a IT
                              infrastructure company. Discipline and ethics form the core of our business. Freedom Infotech
                              works in a collaborative environment to provide its customers' with a single point of contact for all
                              their requirements. We work on all back end collaborations to deliver end-to-end services to our
                              customers. This ensures that our customers are able to concentrate on their core business and
                              leave their IT infrastructure to the experts. Our door is always open and we want to assure you
                              that we will listen to you, as communication is the key to better business success. Remember the
                              door is never closed, so let us unlock the full potential of your business. We are here to serve you
                              ….


                                                                                                            Technology
 We explore how technology and services can help people and companies address their
 problems and challenges, and realize their possibilities, aspirations and dreams. We
 apply new thinking and ideas to create more simple, valuable and trusted experiences
 with technology, continuously improving the way our customers live and work.

 We offer a complete technology product portfolio. We provide infrastructure and
 offerings that span from a desktop computer to some of the world's most advanced
 technologies. We offer consumers a wide range of products and services from home
 computing and printing to high-end enterprise computing and printing to integrated
 solutions    on    Networks,    Internet    Connectivity,    Web   Services, System
 Security, Biometric, Bar Code Solutions, GPS Solutions, RFID Solutions and Homeland
 Security & Surveillance. This comprehensive portfolio helps us match the right
 products, services and solutions to our customers' specific needs.
Our Products
  We are authorized to sale any product in Govt. sector under DGSND rates:
  (Pc, Laptop, Server, Think lined, Kiosk, Printer, Copier, Duplo, Projector, Smart board, EPBX etc.

Products                                                                    Perimeter & Building Security Systems
           •Computers and Work Stations                                               •CCTV Surveillance
           •Laptops – Notebooks and Netbooks                                          •Electrified Fence System
           •Servers and Storage Devices                                               •Unattended Ground Sensors
           •Networking Devices and Equipments                                         •Radio Frequency Based Intrusion Detection
           •Printers, Scanners, Copiers and Plotters                                  •Explosives Detector
           •Photo Copy Machines                                                       •Fire and Smoke Detection & Control System
           •Peripherals and Consumables                                               •Mobile Jammers


Internet & Communications                                                   Personnel & Baggage Scanning System
           •Broadband Internet                                                        •Identity & Access Management
           •Virtual Private Network                                                   •X-Ray Baggage / Container Scanner
           •Direct Leased Line                                                        •Metal Detectors
           •MPLS
           •VOIP – Voice Over Internet Protocol
           •PBX / EPBX / IP-PBX
                                                                            Emerging Technologies
           •Video Conferencing
                                                                                      •RFID Solutions
                                                                                      •Bar Code Solutions
Managed Network Services                                                              •GPS Solutions
           •Wired, Wireless & Optic Fibre Solutions
                                                                                      •POS Solutions
           •Design & Implementation Services
           •Audit & Consultation Services
                                                                            Cloud Services
           •Remote Network Management & Monitoring
                                                                                      •Domains, Web Hosting & Designing
                                                                                      •Web Applications & e-Commerce
Managed Network Services
           •Anti Virus, Anti Spyware, Firewalls & UTMs
           •Data Leakage Protection                                          Gate Security Systems
           •Intrusion Detection System                                                •Automatic Swing / Slide Gate & Boom Barriers
                                                                                      •Bollard, Tyre Killers & Road Blockers

Homeland Security & Electronic Systems
Software                                                                   Enterprises Solutions
       •Packaged Third Party Software's                                           •Tally
       •Customized Third Party Software's                                         •SAP
       •In-House Developed Software's                                             •Oracle
                                                                                  •Microsoft Navision
                                                                                  •Sage
Software as a Service                                                             •Pronto
       •Customer Relationship Management
       •Human Resource Management                                        Open Source Solutions
                                                                                  •Service Oriented Architecture
       •Supply Chain Management
                                                                                  •Server Virtualizations
       •Dealer Management
                                                                                  •Enterprise Portals & Content
       •Financial Management
                                                                                  Management
       •Desktop Productivity Tools
                                                                                  •Business Intelligence
       •Web Conferencing
                                                                                  •Web & Batch Applications
       •Enterprise Solutions
                                                                                  •Development Architecture &
       •E-Learning
                                                                                      Management
  Infrastructure Outsourcing
  Freedom Infotech delivers a complete and integrated set of managed infrastructure services, encompassing all infrastructure
  functions—from network access to desktop management to remote technology support. Drawing upon technology solutions that are
  free of proprietary bias, Freedom Infotech helps clients reduce their technology footprint while creating a measurably more cost-
  effective, secure and responsive infrastructure that scales and adapts to business needs.

  Infrastructure Outsourcing                                             Business Process Outsourcing
           •Workplace Services                                                    •Customer Contact
           •Network & Security Services                                           •Finance & Accounting
           •Storage Services                                                      •Human Resource
           •Service Desk                                                          •Learning
           •Data Centre Services                                                  •Procurement
           •IT Spend Management                                                   •Supply Chain
                                                                                  •Health Administration
  Application Outsourcing
                                                                                  •Insurance
           •Management, Development & Testing
                                                                                  • Utilities
           •Capacity & Captive Services
           •Legacy Modernisation
           •Contractor Consolidation
Freedom InfoTech Consulting


                         Who are we?
                         Changing demands of increasingly complex market scenarios force businesses to act swiftly and
                         continuously reinvent themselves to meet and exceed their customers‘ expectations. Innovative
                         business models have become the key to sustainable competitive advantage and profitability.


                         Freedom Infotech‘ depth and breadth of technical knowledge and expertise can provide a sound
                         strategy to create such a model, one that is tailored specifically to your organization, and that
                         allows it to keep pace with the latest business trends and technology advances. Let us transform
                         the way you do business by optimizing processes, aligning IT with business needs, supporting IT
                         operations, and designing effective risk management strategies.


                         Freedom    Infotech     partners   with   you   to   define   and   address   your   organization's   unique
                         transformation imperative. We work in transparent consultation with our clients to define your
                         business goals, devise a strategy, decide on a course of action, develop a solution, deploy it across
                         your organization, and deliver improved business results. Our integrated consulting and IT services
                         capabilities bring continuity and consistency to your strategic programs.



  Offshore Development Center setup
IT Services companies or any organization that wishes to setup an Off Shore Development Center (ODC) in Jamshedpur, faces
the following challenges


    •Identifying suitable Real Estate
    •Planning Interior Decoration & Furnishing
    •Planning IT & other Infrastructure
    •Hiring Resources
    •Administration
    •Day to Day operations


With the decades of experience in entrepreneurship, we can Help, Guide, Hand Hold or Partner with you depending on your
requirements & preferences.
Our Consulting Focus




      Strategy                  Functional                     IT
     Consulting                 Consulting                  Consulting




                           •What does my optimal       • How do I improve the
•Which product market
                            supply chain network         effectiveness of my IT
 should we enter ?
                            look like?                   organization?
• Should we undertake an
                           • How do I deliver better   • What should the
  M&A program?
                             customer service?           components of my Ent.
                                                         Architecture be?
• How do we compete with
                           • How do I drive out cost
  Y in direct channels?
                             from the back office?     • How can I reduce the
                                                         cost of BI platforms?
• What should my brand
                           • How do I manage
  strategy be?
                             organizational change?    • Which governance
                                                       •model should I adopt for
                                                       •outsourcing?
Our Global Alliances

Business Value for OUR Clients

•Reduced risks and costs associated with the technology procurement process and technology ownership
• Competitive advantage by leveraging Freedom Infotech‘ industry, product and service expertise and the partner‘s
technology products and services
•Reduced IT costs with cost-effective solutions at scale
•Reduced risks through end-to-end solutions
•Ability to leverage training resources to help you plan and build solutions using Partner products
•Seamless solutions



Our Alliances
Freedom Infotech has developed a powerful network of alliances with a core objective of helping our clients become
high-performance businesses while getting the most value out of technology investments. Our alignment with market
leaders and emerging players enables us to deliver a more complete solution to our clients. The following are some of
our esteemed alliances:



 HP
                                                       Quick Heal                                     HCL
 Compaq
                                                       Bradma                                         Hitachi
 Lenovo
                                                       Symbol                                         Toshiba
 Dell
                                                       Zebra
 Sony
                                                      • Intermec
 D-Link
                                                      • Bio-enable
 Canon
                                                      • Matrix
 Microsoft
                                                      • Sparsh
 Tally
                                                      • Tatanet
 Shoper
                                                      • Sify
IDS
                                                      • NEC
• Bitdefender
                                                      • Panasonic
V-Sat

V-Sat Networks
Developing a Private Network




                                               Terrestrial Network




  When an organization has complex connectivity & communication need in an environment where fiber & ADSL are not readily
  available & site are to far away from each other for wire links ; VSAT networks can solve local telecommunication issue, enabling
  organization to focus on their core activities without becoming constrained by Infrastructure.

  Management must decide whether they can operate key applications over a


  Public network with:
  •Shared Products
  •Best Endeavour's rather than guaranteed performance

  Or if their needs demand a:


  Private network with :
  •Control over quality of service(QoS)
  •Better data security
  •Fixed bandwidth cost
Tally and it‘s customization

Extending Tally.ERP 9 using TDL

This training program is meant for programmers who intend to develop and deploy Tally extensions .The objective of this program is
to provide the participants with a comprehensive knowledge on the development language of Tally.ERP 9 ie TDL(Tally definition
Language).They will also be oriented with the development environment of TDL ie Tally Developer.


Training Methodology
Instructor led classroom training, along with hands on practice. The participants will be taken through the concepts and usage syntax
of each of the topics using PPT‘s and Demo codes. They will be given time to go through the Demo TDL‘s and do some Hands On
Exercises during the session.
The Training Book and comprehensive set of Demo TDL‘s provided will enable them to learn, practice and apply the concepts taught
during the session.

Program Highlights

• Introduction to TDL and its Components –Definitions, Attributes & Modifiers,Actions,DataTypes,Operators,Special Symbols and
  Functions

• Special Symbols & Prefixes                                      •Variables, Buttons and Keys

         o Usage of @ and @@                                             o Attributes & Scope of a Variable

         o Usage of # and ##                                             o Adding a Button & Key

         o Usage of $ and $$                                             o Introduction to Actions

         o Special symbols for Code Readability- ;, ;;            • Objects & Collections

         o Special Symbols as Definition Modifiers-#,!,*                 o Object Structure, Types and Context

• Dimensions & Formatting                                                o Object association

         o Dimensional Attributes                                        o Collection-Types & Sources

         o Alignment Attributes                                          o Methods & Accessing Methods using Method Formula Syntax

         o Formatting Attributes                                         o Basic Collection Capabilities-Filtering,Sorting,Searching

•Actions in TDL                                                          o Overview of Advanced Collection Capabilities-
                                                                           Extraction,Aggregation,Intergration using XML Collection etc
         o Categories of Actions
                                                                         o Detailed Object Structure for various Internal objects of Tally-
         o Action Association and Execution                                In Appendix
CCTV

CCTV International adopts AMD platform in new media operation system

Closed-circuit television (CCTV) system operators would need
exceptional justification for recording sound as well as video, the
Information Commissioner's Office (ICO) has warned.
In a newly revised CCTV code of practice (pdf) the ICO said that
sound    recording     is  intrusive  and   unnecessary   in   most
circumstances, and that the use of sound recording could undermine
any public support there is for CCTV.
The UK has more CCTV cameras than any other country in the world
according to the ICO. There are an estimated 4.5 million cameras in
the country, recording the average person 300 times a day, according
to some estimates.
The ICO has raised concerns about a trend for attaching microphones
and sound recording equipment to cameras.

Cameras take many shapes and forms
The most common form factors for cctv cameras are dome, bullet, and standard c-mountbodies. Pan-Tilt-Zoom, Low Light, Infrared
No-Light and License Plate technologies can be built into any of these form factors.

Fears CCTV cameras used as ‗cheap alternative‘ to policing

The number of publicly owned CCTV cameras has reached unprecedented levels – with parts of Scotland the most watched in the
UK.

Smart software linked to CCTV can spot dubious behavior

It could be the dawn of a new era in surveillance. For the first time, smart software will help CCTV operators spot any abnormal
behavior.

If the trial due to go live in two London Underground stations this week is a success, it could accelerate the adoption of the
technology around the world. The software, which analyses CCTV footage, could help spot suicide attempts, overcrowding, suspect
packages and trespassers. The hope is that by automating the prediction or detection of such events security staff, who often have
as many as 60 cameras to monitor simultaneously, can reach the scene in time to prevent a potential tragedy.

If the technology takes off it could put an end to a long-standing problem that has dogged CCTV almost from the beginning. It is
simple: there are too many cameras and too few pairs of eyes to keep track of them. With more than a million CCTV cameras in the
UK alone, they are becoming increasingly difficult to manage. And besides being a tedious task, watching TV monitors also demands
a higher level of concentration than many people can manage.

The new software, called the Intelligent Pedestrian Surveillance system (IPS), could change all that, says London Underground's
Peter Tolling ton, who is overseeing the installation at the stations. "CCTV itself is fantastic, but this puts it on another plane. It
means that you don't have to look at a screen all of the time," he says. Indeed it seems likely this is just the beginning. Other
companies are working on similar technologies.
fire stingiest and security alarm and beam detector systems

  Fire stingiest A fire extinguisher or extinguisher, flame extinguisher is an active fire protection device used to extinguish or
                    control small fires, often in emergency situations. It is not intended for use on an out-of-control fire, such as one
                    which has reached the ceiling, endangers the user (i.e., no escape route, smoke, explosion hazard, etc.), or
                    otherwise requires the expertise of a fire department. Typically, a fire extinguisher consists of a hand-held
                    cylindrical pressure vessel containing an agent which can be discharged to extinguish a fire.
                    In the United States, fire extinguishers, in all buildings other than houses, are generally required to be serviced and
                    inspected by a Fire Protection service company at least annually. Some jurisdictions require more frequent service
                    for fire extinguishers. The servicer places a tag on the extinguisher to indicate the type of service performed
                    (annual inspection, recharge, new fire extinguisher) and when.

                    Using A Fire Extinguisher

                    Pull the Pin at the top of the extinguisher. The pin releases a locking mechanism and will allow you to discharge
                    the extinguisher.
                    Aim at the base of the fire, not the flames. This is important - in order to put out the fire, you must extinguish
                    the fuel.
                    Squeeze the lever slowly. This will release the extinguishing agent in the extinguisher. If the handle is
                    released, the discharge will stop.
                    Sweep from side to side. Using a sweeping motion, move the fire extinguisher back and forth until the fire is
                    completely out. Operate the extinguisher from a safe distance, several feet away, and then move towards the fire
                    once it starts to diminish. Be sure to read the instructions on your fire extinguisher - different fire extinguishers
                    recommend operating them from different distances. Remember: Aim at the base of the fire, not at the flames!!!!


                                                                                                                         Security alarm
A modern security system, with its array of electronic components, is designed to sense, decide, and act. The
security system senses events such as motion in a room, decides if the event poses a threat, and then acts on
that decision. While a security system for your business isn't a do-it-yourself affair, you should understand the
language of security in order to communicate your needs to a security professional, understand any proposals you
may receive, and make the most of your security system after it is installed.
In this introduction to security systems, I will take the sense-decide-act process as an outline and describe the
electronic hardware that performs each function.




  beam detector systems            Beam detection has become commonplace within large open warehouses. Beam Detectors are cost
                                   effective when compared with using point detection and suitable for heights way above the operating
                                   limits of conventional smoke detection.
                                   It all sounds too good to be true however, there are important factors to consider when selecting and
                                   installing beam detectors.
                                   Beam detectors spanning 100m are prone to movement. Steel framed buildings move. This is a normal
                                   occurrence, but when trying to hit a target approximately 100mm x 100mm from 100m away even a
                                   few degrees of movement can cause problems. Correct initial alignment is critical as is a solid & secure
                                   fixing to structural steel or brickwork. In many cases bracing and special bracketary may be required.
                                   Wiring is also critical particularly with loop driven devices where a clean earth is of paramount
                                   importance. This should be one of the first things checked when problems are evident.
Software Development & Website Design

Software development
Software development (also known as application development, software
design, designing software, software application development, enterprise application
development, or platform development[1]) is the development of a software product.
The term "software development" may be used to refer to the activity of computer
programming, which is the process of writing and maintaining the source code, but in
a broader sense of the term it includes all that is involved between the conception of
the desired software through to the final manifestation of the software, ideally in a
planned and structured process.[2] Therefore, software development may include
research,    new     development,      prototyping,       modification,    reuse,   re-
engineering, maintenance, or any other activities that result in software products.

There are several different approaches to software development.

•Market research
•Gathering requirements for the proposed business solution
•Analyzing the problem
•Devising a plan or design for the software-based solution
•Implementation (coding) of the software
•Testing the software
•Deployment
•Maintenance and bug fixing



                                                                                                                                                       Web site
                                                A Web site is a related collection of World Wide Web (WWW) files that includes a beginning
                                                file called a home page. A company or an individual tells you how to get to their Web site by
                                                giving you the address of their home page. From the home page, you can get to all the other
                                                pages on their site. For example, the Web site for IBM has the home page address of
                                                http://www.ibm.com. (The home page address actually includes a specific file name like
                                                index.html but, as in IBM's case, when a standard default name is set up, users don't have to
                                                enter the file name.) IBM's home page address leads to thousands of pages. (But a Web site
                                                can also be just a few pages.)
                                                Since site implies a geographic place, a Web site can be confused with a Web server. A server
                                                is a computer that holds the files for one or more sites. A very large Web site may be spread
                                                over a number of servers in different geographic locations. IBM is a good example; its Web
                                                site consists of thousands of files spread out over many servers in world-wide locations. But a
                                                more typical example is probably the site you are looking at, whatis.com. We reside on a
                                                commercial space provider's server with a number of other sites that have nothing to do with
                                                Internet glossaries.


Related glossary terms: mail server (mail transfer/transport agent, MTA, mail router, Internet mailer), Semantic Web, bot (robot), link checker, XIPC, URL-minder, Service
Integration Maturity Model (SIMM)
NCS Products

IT INFRUSTRUCTURE




                                                 WELCOME TO THE WORLD OF MANAGED IT INFRASTRUCTURE

        Gone are the days when people used to sit on their sofa cozily leaving it to the hi-tech gadgets to take care of the
        rest                                                                                                               !

        Ours is a different time altogether. Tiny, small, large irrespective of size every IT Infrastructure today requires a
        robust    and    reliable   protection    ----   a    subject     matter    of   IT    Infrastructure   Management.

        Build a shield around your IT Infrastructure against the formidable hacking attacks along with the threatening virus,
        malware, root kit in multiples. Rely on us to fortify your set up with knowledge, expertise and guaranteed satisfaction
                                                                     !
        A complete IT Infrastructure Management Solution Simplifying the IT Infrastructure management is the dream of
        every System Manager. With Own IT, System Managers can achieve this goal. Own IT is a complete system that
        encompasses components to Monitor, Manage and Trend Desktops, Servers and Network Devices. Own IT Advanced
        Predictive Trending components empower System Managers to implement and then monitor the performance, reduce
        the cost of ownership of the IT infrastructure.

        Unauthorized Information Access / Sharing. Unauthorized / Unlicensed Software / Freeware Installations which have
        negative impact on the network. Bandwidth / Network clogging by a single node or Process. Unauthorized hardware
        changes / thefts. Unauthorized/ restricted applications usage like IE/games. Virus handling. Remote machine
        administration / control. Hardware and Software Audit Trails. Software deployment. Network / lease line monitoring.
Biometric Attendance systems and time management software

Time management software


Savior 7202 Smartcard Reader
The favorite of Indian Corporate Houses – The most
preferred Smart Card Reader In India. Suitable for
Attendance, Access and a variety of other applications
such as Canteen, Car parking, Vending, Library etc.
Very secure and unduplicatable cards. Already more
than 3000 users within a short span of its launching .
Allows both Read & Write functions from the same
Reader. 16 Characters x 2 rows alphanumeric LCD
display. Many user oriented features are packed up
within the Card / Reader.



Savior Industrial Version Fingerprint
Reader
Savior 85-MB/MX series Industrial Version of
Fingerprint Reader with metallic enclosure for rugged
industrial environment



                             Technology uses Worlds Best Biometric Sensor

                              Savior 7202 Smartcard Reader
                              The favorite of Indian Corporate Houses – The most
                              preferred Smart Card Reader In India. Suitable for
                              Attendance, Access and a variety of other applications
                              such as Canteen, Car parking, Vending, Library etc.
                              Very secure and unduplicatable cards. Already more
                              than 3000 users within a short span of its launching .
                              Allows both Read & Write functions from the same
                              Reader. 16 Characters x 2 rows alphanumeric LCD
                              display. Many user oriented features are packed up
                              within the Card / Reader.
Networking,wi-fi,optical fiber

                                                 Communications Design Features
  Software techniques harden against
hacking: Pt. 2—Sandbox
            solutions

we need a system architecture in which
multimedia operating systems and their
applications can peacefully coexist with real-
time, high assurance applications, hosted on a
real-time, safety-rated operating system.




                                  Wireless LAN: what’s new and the
                                    impact on design and test

                                  The first popular standards for
                                  wireless LAN (IEEE 802.11a and
                                  b), and later 802.11g, were designed
                                  primarily to connect a laptop PC in
                                  the home and office, and later to
                                  allow connectivity ―on the road‖ in
                                  airports, hotels, Internet cafes, and
                                  shopping malls. Their main function
                                  was to provide a link to a wired
                                  broadband     connection    for  Web
                                  browsing and email.


                                                                Wi-Fi at the Speed of Light

                                                              A    wireless   network     that  uses
                                                              reflected infrared light instead of
                                                              radio waves has transmitted data
                                                              through the air at a speed of one
                                                              gigabit per second--six to 14 times
                                                              faster than the fastest Wi-Fi network.
                                                              Such optical networks could provide
                                                              faster, more secure communications
                                                              and would be especially suitable for
                                                              use in hospitals, aircraft, and
                                                              factories,    where    radio-frequency
                                                              transmission    can    interfere  with
                                                              navigation     equipment,       medical
                                                              devices, or control systems.
GPRS systems

GPRS: General Packet Radio Service
  Introduction
  The introduction of second generation cellular mobile systems
  witnessed an impressive growth in the number of mobile
  subscribers. The most popular second generation systems are
  GSM andIS-95. The GSM system is based on FDMA-TDMA
  technology and is widely used in Europe, many parts of Asia
  and Africa. The IS-95 system is based on CDMA technology and
  is used in North America. With the increasing popularity of
  these systems there was an increasing demand for the data
  services over the wireless. These systems were designed for
  supporting circuit switched voice data and supported packet
  data on limited basis, but could not meet of today's trace
  requirements. In future it is expected that the wireless systems
  would be able to provide various kind of services like Internet
  access over wireless, streaming audio and video, text and
  multimedia messaging services.


  GSM System Architecture
  In GSM system the mobile handset is called Mobile Station (MS). A cell is formed by the coverage area of a Base Transceiver
  Station (BTS) which serves the MS in its coverage area. Several BT together are controlled by one Base Station Controller (BSC).
  The BTS and BSC together form Base Station Subsystem (BSS). The combined trace of the mobile stations in their respective
  cells is routed through a switch called Mobile Switching Center (MSC). Connection originating or terminating from external
  telephone (PSTN) are handled by a dedicated gateway Mobile Switching Center (GMSC). The architecture of a GSM system is
  shown in the below.
Matrix EPABX

Matrix EPABX - Proton
Introducing Matrix EPABX PROTON range, a compact PBX loaded with value added
features, which reduces cost and enhances productivity. Make the best out of
your single trunk line, the ultra-compact micro PBX. This EPABX System supports
microcontroller based design and state-of-the-art Surface Mount Technology
(SMT) ensuring high reliability and low maintenance cost.




Matrix EPABX vision

 range is packed with unique features, powered by Microcontroller-based design.
SLIC used on extensions ensures robust, reliable and maintenance free
performance. Its SMT hardware design ensures a very compact design and makes
it more power efficient.




Matrix EPABX - Eternity
Matrix ETERNITY Series EPABX provides true mobility to its users by allowing
them to use their mobile phones as PBX extensions. Not only users can make and
receive calls, they can also use most of the PBX functions like
Transfer, Forward, Voice Mail, Directory and Conference using their mobile
phones from within and outside office. This seamless mobility means complete
freedom from being tied to your desk for internal or external communication.
AMC

Annual Maintenance Contract (AMC) of
Computer/Server/Scanner/ Laptop/Copier/Printer(In printer – Office jet.deskjet, leaser jet, Dmp, Line
printer)/server/plotter

 Description of the Work

 1. The maintenance services will consist of
 a) Attending to complaints raised by various departments/individuals of
 BIS (details
 provided by Freedom Infotech pvt. Ltd.) on daily
 basis.
 b) Onsite preventive and corrective maintenance of computers connected
 in LAN
 and peripherals at Freedom Infotech pvt. Ltd.
 where the above equipment is installed as indicated from time to time.
 c) The maintenance contract will include necessary repairs to the installed
 systems
 and replacement of defective/damaged parts, components and other
 accessories
 free of cost.

 d) The maintenance contract also includes removal of virus, software patch updation,HDD crash recovery, system
 administration, network administration, software support /troubleshooting to keep the system fully operational and web site
 updated. The agency will be responsible for providing virus free computing environment at Freedom Infotech pvt. Ltd.
 e) The maintenance contract also includes repair, maintenance and troubleshooting of all LAN components except the switches (for
 which separate AMC with the Original equipment supplier exists) to keep LAN fully operational.
 2. The contract will be initially for one year. The contract may be renewed for a further two years, one year at a time, at the
 discretion of Freedom Infotech pvt. Ltd. and based on satisfactory services provided by the agency.
 3. The maintenance services will be provided on all working days from 0900 h to 1730 h(Monday to Friday). Provision of
 availability of service engineers on Saturdays, Sundays or other holidays should be made in case of exigency.
 4. The maintenance service agency shall provide maintenance services through five qualified experienced and competent resident
 engineers who shall stay at Freedom Infotech pvt. Ltd. as indicated in item (3) above. The role of these engineers shall be as
 follows:
 ������ Two support engineers for computer maintenance. The onsite engineer responsible for hardware maintenance should have
 expertise to cover all items of computers, printers, UPS, scanners, CD-writers and network components.
 ������    One support engineer for printer, UPS and networking trouble shooting, etc.������           One network and system/database
 administrator. The network and system/database administrator would also provide user software support services including virus
 cleaning/patch installation, software installation, etc. He should be well conversant with the latest trends in trouble shooting of
 computing equipment and networking monitoring tools.
 ������    One software designer/developer. The software designer/developer will be responsible for regular updating of Freedom
 Infotech pvt. Ltd.web site. He should be knowledgeable about various software tools and techniques for web designing and
 programming.




  (Note:-Pricing will be separately with quotation)
Our Customers –List


Automobile                                     Hotels & Restaurant

ASL Motors                                     Hotel Yashwee International
Reliable Industries, Dhanabad                  Hotel Dayal International
Gulf Ashley Motors Ltd.                        Hotel Wave International
Startrack Pvt. Ltd.                            Hotel The Blues
Sant Auto                                      Hotel Anand
Bebbco Toyota                                  Hotel Smita
Gaurav Earth Moving Equipments Pvt. Ltd.       Bhola Maharaj
Tatanagar Motor Services Pvt. Ltd.


Transportation & Logistics                     Distributors, Showrooms & Service Providers
Haulers India                                  Jutharam Ranglal Distributors Pvt. Ltd.
Shri Raj International Pvt. Ltd.               Jayesh Industrial Suppliers Pvt. Ltd.
Shree Roadlines                                J.J.Electrotech Pvt. Ltd.
R.R.Logistics                                  Arjunlal Banwarilal Co. Pvt. Ltd.
West Singhbhum Roadlines                       Elektrokraft
Shiva Ventures                                 Shreeleathers
Binod Singh Roadways Pvt. Ltd.                 National Electronics
                                               Jamshedpur Furnishers
Chartered Accountants, Legal and Consultancy   Veripro Sales & Services
                                               Trimurti Sales
R.Gopal & Associates                           Accord India Enterprises
A.Gupta & Associates                           Chagganlal Dayaljee
A.H.Bilimoria & Co.                            Kuldeep Sons Jewellers Pvt. Ltd.
S.K.Naredi & Co.                               Brahmanand Narayana Hrudyalaya
S.Sharma & Co.
Agarwal Ramesh K & Co.

Construction                                   Schools & Colleges

Gauri Gautam Construction Co. Pvt. Ltd.        Narbheram Hansraj English School
Samay Construction Pvt. Ltd.                   DBMS Career Academy
Sahara Constructions                           Kendriya Vidyalaya, Surda
Shree Housing Developers Pvt. Ltd.             Kendriya Vidyalaya, Jamshedpur
Vaastu Vihar                                   Jamshedpur Womens College
Chandra Awas Pvt. Ltd.                         Vivek Vidyalaya, Govindpur
Yashkamal Developers Pvt. Ltd.                 Gulmohar School, Telco
                                               Valley View School, Telco
                                               Convent School, Mosabani
                                               Tarapore School, Agrico
Our Customers –List


Banks, Public Utilities & Public Undertaking         Tata Motors Ancillaries
  •Adityapur Industrial Area Development Authority      •ASL Industries Pvt. Ltd.
  •Uranium Corporation of India Ltd.                    •Cordoba Engg. Co. Pvt. Ltd.
  •Atomic Mineral Development, Khasmahal                •Accropoly Metal Industries Pvt. Ltd.
  •District Planning Office, Saraikela-Kharsawan        •Caparo Engg. India Pvt. Ltd.
  •D.C.Office, , Saraikela-Kharsawan                    •Soni Auto & Allied Industries Ltd.
  •Govt. Polytechnic, Adityapur                         •Auro Plastic Injection Moulding Co. Pvt. Ltd.
  •Govt. Womens Polytechnic, Gamharia                   •Nalin Rubber Pvt. Ltd.
  •Govt. Polytechnic, Kharsawan                         •Banco Products (India) Ltd.
  •Union Bank of India, Bistupur                        •BMC Metal Cast Pvt. Ltd.
  •Jamshedpur Dairy                                     •Steel City Metal Products Pvt. Ltd.
  •IRCTC                                                •Newco Auto Pvt. Ltd.
  •Jamshedpur Blood Bank                                •Sumit Entrprises
  •Durdarshan,Barbil                                    •Garg Engineers Ltd.
                                                        •Auto Feed (India) Pvt. Ltd.
 Corporates
                                                        •Viks Gears (India) Ltd.
                                                        •Automat Engineers
   Lafarge India Ltd., Chapa, Chhattisgarh
   •Tata Cummins Ltd., Jamshedpur
   •Shyam DRI, Jharsuguda
                                                     Manufacturing
   •SMS Demag, Jamshedpur
   •Steel Strip Wheels Ltd., Jamshedpur                 •Ami Enterprises Pvt. Ltd.
   •Adhunik Group, Jamshedpur                           •Prem Foods Pvt. Ltd.
   •Sarla Technologies, Mumbai                          •Union Enterprises
   •Bhutan Centennial Distillery, Bhutan                •Sachdev Engg. Pvt. Ltd.
   •India Infoline Ltd.                                 •Spoxy Gas Products Pvt. Ltd.
   •Wabco TVS India Ltd.                                •Sudisha Foundry Pvt. Ltd.
   •Nilanchal Iron & Power Ltd.                         •Spectra Super Alloys Ltd.
   •Accropoly Metal Industries Pvt. Ltd.                •Fusion Engineering Product Ltd.
                                                        •Universal Industrial Paints Pvt. Ltd.
                                                        •Usha Lubes
 Mining, Iron & Steel and Other Metals                  •Synergy Power Equipments Pvt. Ltd.
                                                        •My Home Industries Ltd.
   •India Resources Ltd., Mosabani                      •Flexible Foam Products Pvt. Ltd.
   •Dhansar Engg. Co. Pvt. Ltd., Dhanbad                •Gajanan Ores Pvt. Ltd.
   •EMS India Ltd.                                      •Bharat Engg. & Body Building Co. Pvt. Ltd.
   •Danauli Engg. & Mining Co. Pvt. Ltd.                •Hitech Chemicals Pvt. Ltd.
   •Orissa Manganese & Minerals Pvt. Ltd.
   •ASL Enterprises Ltd.                             Engineering and Allied Industries
   •PPG Steel Pvt. Ltd.
   •Babu Ram & Co.                                      •Jupiter Hi-Tech Systems, Agrico
   •Shiv Sambhu Iron & Steel Pvt. Ltd.                  •Shiva Project & Marketing Pvt. Ltd.
   •Zoom Vallabh Steel Ltd.                             •Bihar Engg. & Manufacturing Co. Pvt. Ltd.
   •Nilachal Iron & Power Ltd.                          •Paradigm Engg. & Consultants Pvt. Ltd.
   •Bimaldeep Steel Pvt. Ltd.                           •Aastha Developers Pvt. Ltd.
   •Kohinoor Steel Pvt. Ltd.
   •Narsingh Ispat Ltd.
Contact Us


Freedom Infotech Pvt Ltd

Corporate Office
Basement, Aditya Tower, Opp Police Station,
Bistupur, Jamshedpur,-831001, Jharkhand,
India
Phone- +91- 657- 2249258, 2249259,
3242520

Registered Office
1st Floor, Punwari Chambers,
7B, Kiran Shankar Roy Road, Kolkata-
700001, West Bengal, India

Branch Office
Swastik Sadan
Shastri Nagar (East), Dhobatand, Dhanbad-
826001, Jharkhand, India
Phone -+91- 326-2307033

Business Inquiry:

Sales Team:     sales@freedominfotech.com
Technical Team: support@freedominfotech.com

More Related Content

What's hot

KNOWLEDGE KONSULTANTS PROFILE
KNOWLEDGE KONSULTANTS PROFILEKNOWLEDGE KONSULTANTS PROFILE
KNOWLEDGE KONSULTANTS PROFILE
INDRAJIT BHATTACHARJEE
 
P2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the EnterpriseP2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the Enterprise
Mead Eblan
 
MediaNet Rights Administration
MediaNet Rights AdministrationMediaNet Rights Administration
MediaNet Rights Administration
Laurie Jakobsen
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
lfilliat
 
Skytron company profile
Skytron company profileSkytron company profile
Skytron company profile
Pasi Ankit
 
IRIS Hosted Solutions
IRIS Hosted SolutionsIRIS Hosted Solutions
IRIS Hosted Solutions
Lucy Sofiano
 
Fosec2011 keynote address
Fosec2011 keynote addressFosec2011 keynote address
Fosec2011 keynote address
threesixty
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
BIOVIA
 
Mexoteq Soluions-Profile
Mexoteq Soluions-ProfileMexoteq Soluions-Profile
Mexoteq Soluions-Profile
mexoteq solutions
 
Mobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama AbushabanMobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama Abushaban
Osama Abushaban
 
Portfolio Presentation Ashraf information Technologies 2020
Portfolio Presentation   Ashraf information Technologies  2020 Portfolio Presentation   Ashraf information Technologies  2020
Portfolio Presentation Ashraf information Technologies 2020
Ashraf - AIT (Ashraf Information Technologies)
 
iEmbed product_service_portfolio_2016
iEmbed product_service_portfolio_2016iEmbed product_service_portfolio_2016
iEmbed product_service_portfolio_2016
Hemant Shah
 
Nfc Overview
Nfc OverviewNfc Overview
Nfc Overview
mehdibs
 
Crexendo Services
Crexendo ServicesCrexendo Services
Crexendo Services
douggaylor
 
IPenable Website Template
IPenable Website TemplateIPenable Website Template
IPenable Website Template
Annie Kaiser
 
Winn Solutions Digital Brochure 2010
Winn Solutions Digital Brochure 2010Winn Solutions Digital Brochure 2010
Winn Solutions Digital Brochure 2010
winnsolutions
 
Ronny haraldsvik new managed services
Ronny haraldsvik new managed servicesRonny haraldsvik new managed services
Ronny haraldsvik new managed services
Pranowo Budi Sulistyo
 
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
Szymon Dowgwillowicz-Nowicki
 
Data Center Efficiency and Security - Access, Control and Remote Management M...
Data Center Efficiency and Security - Access, Control and Remote Management M...Data Center Efficiency and Security - Access, Control and Remote Management M...
Data Center Efficiency and Security - Access, Control and Remote Management M...
tsilber
 
Paxcel Snapshot
Paxcel SnapshotPaxcel Snapshot
Paxcel Snapshot
Paxcel Technologies
 

What's hot (20)

KNOWLEDGE KONSULTANTS PROFILE
KNOWLEDGE KONSULTANTS PROFILEKNOWLEDGE KONSULTANTS PROFILE
KNOWLEDGE KONSULTANTS PROFILE
 
P2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the EnterpriseP2P - Real Time Communications in the Enterprise
P2P - Real Time Communications in the Enterprise
 
MediaNet Rights Administration
MediaNet Rights AdministrationMediaNet Rights Administration
MediaNet Rights Administration
 
Cidway Banking 02 2011
Cidway Banking 02 2011Cidway Banking 02 2011
Cidway Banking 02 2011
 
Skytron company profile
Skytron company profileSkytron company profile
Skytron company profile
 
IRIS Hosted Solutions
IRIS Hosted SolutionsIRIS Hosted Solutions
IRIS Hosted Solutions
 
Fosec2011 keynote address
Fosec2011 keynote addressFosec2011 keynote address
Fosec2011 keynote address
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 
Mexoteq Soluions-Profile
Mexoteq Soluions-ProfileMexoteq Soluions-Profile
Mexoteq Soluions-Profile
 
Mobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama AbushabanMobile Services & E-Services Case Study By Osama Abushaban
Mobile Services & E-Services Case Study By Osama Abushaban
 
Portfolio Presentation Ashraf information Technologies 2020
Portfolio Presentation   Ashraf information Technologies  2020 Portfolio Presentation   Ashraf information Technologies  2020
Portfolio Presentation Ashraf information Technologies 2020
 
iEmbed product_service_portfolio_2016
iEmbed product_service_portfolio_2016iEmbed product_service_portfolio_2016
iEmbed product_service_portfolio_2016
 
Nfc Overview
Nfc OverviewNfc Overview
Nfc Overview
 
Crexendo Services
Crexendo ServicesCrexendo Services
Crexendo Services
 
IPenable Website Template
IPenable Website TemplateIPenable Website Template
IPenable Website Template
 
Winn Solutions Digital Brochure 2010
Winn Solutions Digital Brochure 2010Winn Solutions Digital Brochure 2010
Winn Solutions Digital Brochure 2010
 
Ronny haraldsvik new managed services
Ronny haraldsvik new managed servicesRonny haraldsvik new managed services
Ronny haraldsvik new managed services
 
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
 
Data Center Efficiency and Security - Access, Control and Remote Management M...
Data Center Efficiency and Security - Access, Control and Remote Management M...Data Center Efficiency and Security - Access, Control and Remote Management M...
Data Center Efficiency and Security - Access, Control and Remote Management M...
 
Paxcel Snapshot
Paxcel SnapshotPaxcel Snapshot
Paxcel Snapshot
 

Similar to Freedom infotech pvt. ltd. company profile

2012 DBIR
2012 DBIR2012 DBIR
2012 DBIR
martyburks
 
Microtracking in Australia
Microtracking in AustraliaMicrotracking in Australia
Microtracking in Australia
markramenterprises
 
Strativia Overview
Strativia OverviewStrativia Overview
Strativia Overview
strativia01
 
Profile quick-2
Profile quick-2Profile quick-2
Profile quick-2
Edge Ict
 
Weidenhammer overview
Weidenhammer overviewWeidenhammer overview
Weidenhammer overview
Gene Ferro
 
Sod Profile
Sod ProfileSod Profile
Sod Profile
findfaizal
 
Xor Overview
Xor   OverviewXor   Overview
Xor Overview
martinfox
 
Xor Overview
Xor   OverviewXor   Overview
Xor Overview
martinfox
 
Xor Overview
Xor   OverviewXor   Overview
Xor Overview
martinfox
 
Xor Overview
Xor   OverviewXor   Overview
Xor Overview
martinfox
 
WebXpress Warehouse Management System
WebXpress Warehouse Management SystemWebXpress Warehouse Management System
WebXpress Warehouse Management System
Sagar Untawale
 
ServSolid - An Overview
ServSolid - An OverviewServSolid - An Overview
ServSolid - An Overview
jmathur
 
Raddhantita
RaddhantitaRaddhantita
Raddhantita
Rakesh Purohit
 
Telecoms in the Clouds Issue 1
Telecoms in the Clouds Issue 1Telecoms in the Clouds Issue 1
Telecoms in the Clouds Issue 1
Alan Quayle
 
Webinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoTWebinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoT
Harbinger Systems - HRTech Builder of Choice
 
Reed Technology Melbourne
Reed Technology MelbourneReed Technology Melbourne
Reed Technology Melbourne
ReedTechnology
 
Reed Technology
Reed TechnologyReed Technology
Reed Technology
davidsteven01
 
Reed technology
Reed technologyReed technology
Reed technology
michaelcutting
 
Reed Technology
Reed TechnologyReed Technology
Reed Technology
dolph82
 
Reed Technology
Reed TechnologyReed Technology
Reed Technology
cormacmcaleenan
 

Similar to Freedom infotech pvt. ltd. company profile (20)

2012 DBIR
2012 DBIR2012 DBIR
2012 DBIR
 
Microtracking in Australia
Microtracking in AustraliaMicrotracking in Australia
Microtracking in Australia
 
Strativia Overview
Strativia OverviewStrativia Overview
Strativia Overview
 
Profile quick-2
Profile quick-2Profile quick-2
Profile quick-2
 
Weidenhammer overview
Weidenhammer overviewWeidenhammer overview
Weidenhammer overview
 
Sod Profile
Sod ProfileSod Profile
Sod Profile
 
Xor Overview
Xor   OverviewXor   Overview
Xor Overview
 
Xor Overview
Xor   OverviewXor   Overview
Xor Overview
 
Xor Overview
Xor   OverviewXor   Overview
Xor Overview
 
Xor Overview
Xor   OverviewXor   Overview
Xor Overview
 
WebXpress Warehouse Management System
WebXpress Warehouse Management SystemWebXpress Warehouse Management System
WebXpress Warehouse Management System
 
ServSolid - An Overview
ServSolid - An OverviewServSolid - An Overview
ServSolid - An Overview
 
Raddhantita
RaddhantitaRaddhantita
Raddhantita
 
Telecoms in the Clouds Issue 1
Telecoms in the Clouds Issue 1Telecoms in the Clouds Issue 1
Telecoms in the Clouds Issue 1
 
Webinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoTWebinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoT
 
Reed Technology Melbourne
Reed Technology MelbourneReed Technology Melbourne
Reed Technology Melbourne
 
Reed Technology
Reed TechnologyReed Technology
Reed Technology
 
Reed technology
Reed technologyReed technology
Reed technology
 
Reed Technology
Reed TechnologyReed Technology
Reed Technology
 
Reed Technology
Reed TechnologyReed Technology
Reed Technology
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Freedom infotech pvt. ltd. company profile

  • 1. ABSOLUTELY NEW APPRAOCH for YOUR BUSINESS About Us Freedom Infotech Pvt Ltd offers a wide spectrum of IT infrastructure solutions, networking services and security solutions. Freedom Infotech focuses its energies beyond. Freedom Infotech is the only company that can provide comprehensive understanding of IT infrastructure performance built already or the ones getting built. We take pride in qualifying ourselves as a IT infrastructure company. Discipline and ethics form the core of our business. Freedom Infotech works in a collaborative environment to provide its customers' with a single point of contact for all their requirements. We work on all back end collaborations to deliver end-to-end services to our customers. This ensures that our customers are able to concentrate on their core business and leave their IT infrastructure to the experts. Our door is always open and we want to assure you that we will listen to you, as communication is the key to better business success. Remember the door is never closed, so let us unlock the full potential of your business. We are here to serve you …. Technology We explore how technology and services can help people and companies address their problems and challenges, and realize their possibilities, aspirations and dreams. We apply new thinking and ideas to create more simple, valuable and trusted experiences with technology, continuously improving the way our customers live and work. We offer a complete technology product portfolio. We provide infrastructure and offerings that span from a desktop computer to some of the world's most advanced technologies. We offer consumers a wide range of products and services from home computing and printing to high-end enterprise computing and printing to integrated solutions on Networks, Internet Connectivity, Web Services, System Security, Biometric, Bar Code Solutions, GPS Solutions, RFID Solutions and Homeland Security & Surveillance. This comprehensive portfolio helps us match the right products, services and solutions to our customers' specific needs.
  • 2. Our Products We are authorized to sale any product in Govt. sector under DGSND rates: (Pc, Laptop, Server, Think lined, Kiosk, Printer, Copier, Duplo, Projector, Smart board, EPBX etc. Products Perimeter & Building Security Systems •Computers and Work Stations •CCTV Surveillance •Laptops – Notebooks and Netbooks •Electrified Fence System •Servers and Storage Devices •Unattended Ground Sensors •Networking Devices and Equipments •Radio Frequency Based Intrusion Detection •Printers, Scanners, Copiers and Plotters •Explosives Detector •Photo Copy Machines •Fire and Smoke Detection & Control System •Peripherals and Consumables •Mobile Jammers Internet & Communications Personnel & Baggage Scanning System •Broadband Internet •Identity & Access Management •Virtual Private Network •X-Ray Baggage / Container Scanner •Direct Leased Line •Metal Detectors •MPLS •VOIP – Voice Over Internet Protocol •PBX / EPBX / IP-PBX Emerging Technologies •Video Conferencing •RFID Solutions •Bar Code Solutions Managed Network Services •GPS Solutions •Wired, Wireless & Optic Fibre Solutions •POS Solutions •Design & Implementation Services •Audit & Consultation Services Cloud Services •Remote Network Management & Monitoring •Domains, Web Hosting & Designing •Web Applications & e-Commerce Managed Network Services •Anti Virus, Anti Spyware, Firewalls & UTMs •Data Leakage Protection Gate Security Systems •Intrusion Detection System •Automatic Swing / Slide Gate & Boom Barriers •Bollard, Tyre Killers & Road Blockers Homeland Security & Electronic Systems
  • 3. Software Enterprises Solutions •Packaged Third Party Software's •Tally •Customized Third Party Software's •SAP •In-House Developed Software's •Oracle •Microsoft Navision •Sage Software as a Service •Pronto •Customer Relationship Management •Human Resource Management Open Source Solutions •Service Oriented Architecture •Supply Chain Management •Server Virtualizations •Dealer Management •Enterprise Portals & Content •Financial Management Management •Desktop Productivity Tools •Business Intelligence •Web Conferencing •Web & Batch Applications •Enterprise Solutions •Development Architecture & •E-Learning Management Infrastructure Outsourcing Freedom Infotech delivers a complete and integrated set of managed infrastructure services, encompassing all infrastructure functions—from network access to desktop management to remote technology support. Drawing upon technology solutions that are free of proprietary bias, Freedom Infotech helps clients reduce their technology footprint while creating a measurably more cost- effective, secure and responsive infrastructure that scales and adapts to business needs. Infrastructure Outsourcing Business Process Outsourcing •Workplace Services •Customer Contact •Network & Security Services •Finance & Accounting •Storage Services •Human Resource •Service Desk •Learning •Data Centre Services •Procurement •IT Spend Management •Supply Chain •Health Administration Application Outsourcing •Insurance •Management, Development & Testing • Utilities •Capacity & Captive Services •Legacy Modernisation •Contractor Consolidation
  • 4. Freedom InfoTech Consulting Who are we? Changing demands of increasingly complex market scenarios force businesses to act swiftly and continuously reinvent themselves to meet and exceed their customers‘ expectations. Innovative business models have become the key to sustainable competitive advantage and profitability. Freedom Infotech‘ depth and breadth of technical knowledge and expertise can provide a sound strategy to create such a model, one that is tailored specifically to your organization, and that allows it to keep pace with the latest business trends and technology advances. Let us transform the way you do business by optimizing processes, aligning IT with business needs, supporting IT operations, and designing effective risk management strategies. Freedom Infotech partners with you to define and address your organization's unique transformation imperative. We work in transparent consultation with our clients to define your business goals, devise a strategy, decide on a course of action, develop a solution, deploy it across your organization, and deliver improved business results. Our integrated consulting and IT services capabilities bring continuity and consistency to your strategic programs. Offshore Development Center setup IT Services companies or any organization that wishes to setup an Off Shore Development Center (ODC) in Jamshedpur, faces the following challenges •Identifying suitable Real Estate •Planning Interior Decoration & Furnishing •Planning IT & other Infrastructure •Hiring Resources •Administration •Day to Day operations With the decades of experience in entrepreneurship, we can Help, Guide, Hand Hold or Partner with you depending on your requirements & preferences.
  • 5. Our Consulting Focus Strategy Functional IT Consulting Consulting Consulting •What does my optimal • How do I improve the •Which product market supply chain network effectiveness of my IT should we enter ? look like? organization? • Should we undertake an • How do I deliver better • What should the M&A program? customer service? components of my Ent. Architecture be? • How do we compete with • How do I drive out cost Y in direct channels? from the back office? • How can I reduce the cost of BI platforms? • What should my brand • How do I manage strategy be? organizational change? • Which governance •model should I adopt for •outsourcing?
  • 6. Our Global Alliances Business Value for OUR Clients •Reduced risks and costs associated with the technology procurement process and technology ownership • Competitive advantage by leveraging Freedom Infotech‘ industry, product and service expertise and the partner‘s technology products and services •Reduced IT costs with cost-effective solutions at scale •Reduced risks through end-to-end solutions •Ability to leverage training resources to help you plan and build solutions using Partner products •Seamless solutions Our Alliances Freedom Infotech has developed a powerful network of alliances with a core objective of helping our clients become high-performance businesses while getting the most value out of technology investments. Our alignment with market leaders and emerging players enables us to deliver a more complete solution to our clients. The following are some of our esteemed alliances:  HP  Quick Heal  HCL  Compaq  Bradma  Hitachi  Lenovo  Symbol  Toshiba  Dell  Zebra  Sony • Intermec  D-Link • Bio-enable  Canon • Matrix  Microsoft • Sparsh  Tally • Tatanet  Shoper • Sify IDS • NEC • Bitdefender • Panasonic
  • 7. V-Sat V-Sat Networks Developing a Private Network Terrestrial Network When an organization has complex connectivity & communication need in an environment where fiber & ADSL are not readily available & site are to far away from each other for wire links ; VSAT networks can solve local telecommunication issue, enabling organization to focus on their core activities without becoming constrained by Infrastructure. Management must decide whether they can operate key applications over a Public network with: •Shared Products •Best Endeavour's rather than guaranteed performance Or if their needs demand a: Private network with : •Control over quality of service(QoS) •Better data security •Fixed bandwidth cost
  • 8. Tally and it‘s customization Extending Tally.ERP 9 using TDL This training program is meant for programmers who intend to develop and deploy Tally extensions .The objective of this program is to provide the participants with a comprehensive knowledge on the development language of Tally.ERP 9 ie TDL(Tally definition Language).They will also be oriented with the development environment of TDL ie Tally Developer. Training Methodology Instructor led classroom training, along with hands on practice. The participants will be taken through the concepts and usage syntax of each of the topics using PPT‘s and Demo codes. They will be given time to go through the Demo TDL‘s and do some Hands On Exercises during the session. The Training Book and comprehensive set of Demo TDL‘s provided will enable them to learn, practice and apply the concepts taught during the session. Program Highlights • Introduction to TDL and its Components –Definitions, Attributes & Modifiers,Actions,DataTypes,Operators,Special Symbols and Functions • Special Symbols & Prefixes •Variables, Buttons and Keys o Usage of @ and @@ o Attributes & Scope of a Variable o Usage of # and ## o Adding a Button & Key o Usage of $ and $$ o Introduction to Actions o Special symbols for Code Readability- ;, ;; • Objects & Collections o Special Symbols as Definition Modifiers-#,!,* o Object Structure, Types and Context • Dimensions & Formatting o Object association o Dimensional Attributes o Collection-Types & Sources o Alignment Attributes o Methods & Accessing Methods using Method Formula Syntax o Formatting Attributes o Basic Collection Capabilities-Filtering,Sorting,Searching •Actions in TDL o Overview of Advanced Collection Capabilities- Extraction,Aggregation,Intergration using XML Collection etc o Categories of Actions o Detailed Object Structure for various Internal objects of Tally- o Action Association and Execution In Appendix
  • 9. CCTV CCTV International adopts AMD platform in new media operation system Closed-circuit television (CCTV) system operators would need exceptional justification for recording sound as well as video, the Information Commissioner's Office (ICO) has warned. In a newly revised CCTV code of practice (pdf) the ICO said that sound recording is intrusive and unnecessary in most circumstances, and that the use of sound recording could undermine any public support there is for CCTV. The UK has more CCTV cameras than any other country in the world according to the ICO. There are an estimated 4.5 million cameras in the country, recording the average person 300 times a day, according to some estimates. The ICO has raised concerns about a trend for attaching microphones and sound recording equipment to cameras. Cameras take many shapes and forms The most common form factors for cctv cameras are dome, bullet, and standard c-mountbodies. Pan-Tilt-Zoom, Low Light, Infrared No-Light and License Plate technologies can be built into any of these form factors. Fears CCTV cameras used as ‗cheap alternative‘ to policing The number of publicly owned CCTV cameras has reached unprecedented levels – with parts of Scotland the most watched in the UK. Smart software linked to CCTV can spot dubious behavior It could be the dawn of a new era in surveillance. For the first time, smart software will help CCTV operators spot any abnormal behavior. If the trial due to go live in two London Underground stations this week is a success, it could accelerate the adoption of the technology around the world. The software, which analyses CCTV footage, could help spot suicide attempts, overcrowding, suspect packages and trespassers. The hope is that by automating the prediction or detection of such events security staff, who often have as many as 60 cameras to monitor simultaneously, can reach the scene in time to prevent a potential tragedy. If the technology takes off it could put an end to a long-standing problem that has dogged CCTV almost from the beginning. It is simple: there are too many cameras and too few pairs of eyes to keep track of them. With more than a million CCTV cameras in the UK alone, they are becoming increasingly difficult to manage. And besides being a tedious task, watching TV monitors also demands a higher level of concentration than many people can manage. The new software, called the Intelligent Pedestrian Surveillance system (IPS), could change all that, says London Underground's Peter Tolling ton, who is overseeing the installation at the stations. "CCTV itself is fantastic, but this puts it on another plane. It means that you don't have to look at a screen all of the time," he says. Indeed it seems likely this is just the beginning. Other companies are working on similar technologies.
  • 10. fire stingiest and security alarm and beam detector systems Fire stingiest A fire extinguisher or extinguisher, flame extinguisher is an active fire protection device used to extinguish or control small fires, often in emergency situations. It is not intended for use on an out-of-control fire, such as one which has reached the ceiling, endangers the user (i.e., no escape route, smoke, explosion hazard, etc.), or otherwise requires the expertise of a fire department. Typically, a fire extinguisher consists of a hand-held cylindrical pressure vessel containing an agent which can be discharged to extinguish a fire. In the United States, fire extinguishers, in all buildings other than houses, are generally required to be serviced and inspected by a Fire Protection service company at least annually. Some jurisdictions require more frequent service for fire extinguishers. The servicer places a tag on the extinguisher to indicate the type of service performed (annual inspection, recharge, new fire extinguisher) and when. Using A Fire Extinguisher Pull the Pin at the top of the extinguisher. The pin releases a locking mechanism and will allow you to discharge the extinguisher. Aim at the base of the fire, not the flames. This is important - in order to put out the fire, you must extinguish the fuel. Squeeze the lever slowly. This will release the extinguishing agent in the extinguisher. If the handle is released, the discharge will stop. Sweep from side to side. Using a sweeping motion, move the fire extinguisher back and forth until the fire is completely out. Operate the extinguisher from a safe distance, several feet away, and then move towards the fire once it starts to diminish. Be sure to read the instructions on your fire extinguisher - different fire extinguishers recommend operating them from different distances. Remember: Aim at the base of the fire, not at the flames!!!! Security alarm A modern security system, with its array of electronic components, is designed to sense, decide, and act. The security system senses events such as motion in a room, decides if the event poses a threat, and then acts on that decision. While a security system for your business isn't a do-it-yourself affair, you should understand the language of security in order to communicate your needs to a security professional, understand any proposals you may receive, and make the most of your security system after it is installed. In this introduction to security systems, I will take the sense-decide-act process as an outline and describe the electronic hardware that performs each function. beam detector systems Beam detection has become commonplace within large open warehouses. Beam Detectors are cost effective when compared with using point detection and suitable for heights way above the operating limits of conventional smoke detection. It all sounds too good to be true however, there are important factors to consider when selecting and installing beam detectors. Beam detectors spanning 100m are prone to movement. Steel framed buildings move. This is a normal occurrence, but when trying to hit a target approximately 100mm x 100mm from 100m away even a few degrees of movement can cause problems. Correct initial alignment is critical as is a solid & secure fixing to structural steel or brickwork. In many cases bracing and special bracketary may be required. Wiring is also critical particularly with loop driven devices where a clean earth is of paramount importance. This should be one of the first things checked when problems are evident.
  • 11. Software Development & Website Design Software development Software development (also known as application development, software design, designing software, software application development, enterprise application development, or platform development[1]) is the development of a software product. The term "software development" may be used to refer to the activity of computer programming, which is the process of writing and maintaining the source code, but in a broader sense of the term it includes all that is involved between the conception of the desired software through to the final manifestation of the software, ideally in a planned and structured process.[2] Therefore, software development may include research, new development, prototyping, modification, reuse, re- engineering, maintenance, or any other activities that result in software products. There are several different approaches to software development. •Market research •Gathering requirements for the proposed business solution •Analyzing the problem •Devising a plan or design for the software-based solution •Implementation (coding) of the software •Testing the software •Deployment •Maintenance and bug fixing Web site A Web site is a related collection of World Wide Web (WWW) files that includes a beginning file called a home page. A company or an individual tells you how to get to their Web site by giving you the address of their home page. From the home page, you can get to all the other pages on their site. For example, the Web site for IBM has the home page address of http://www.ibm.com. (The home page address actually includes a specific file name like index.html but, as in IBM's case, when a standard default name is set up, users don't have to enter the file name.) IBM's home page address leads to thousands of pages. (But a Web site can also be just a few pages.) Since site implies a geographic place, a Web site can be confused with a Web server. A server is a computer that holds the files for one or more sites. A very large Web site may be spread over a number of servers in different geographic locations. IBM is a good example; its Web site consists of thousands of files spread out over many servers in world-wide locations. But a more typical example is probably the site you are looking at, whatis.com. We reside on a commercial space provider's server with a number of other sites that have nothing to do with Internet glossaries. Related glossary terms: mail server (mail transfer/transport agent, MTA, mail router, Internet mailer), Semantic Web, bot (robot), link checker, XIPC, URL-minder, Service Integration Maturity Model (SIMM)
  • 12. NCS Products IT INFRUSTRUCTURE WELCOME TO THE WORLD OF MANAGED IT INFRASTRUCTURE Gone are the days when people used to sit on their sofa cozily leaving it to the hi-tech gadgets to take care of the rest ! Ours is a different time altogether. Tiny, small, large irrespective of size every IT Infrastructure today requires a robust and reliable protection ---- a subject matter of IT Infrastructure Management. Build a shield around your IT Infrastructure against the formidable hacking attacks along with the threatening virus, malware, root kit in multiples. Rely on us to fortify your set up with knowledge, expertise and guaranteed satisfaction ! A complete IT Infrastructure Management Solution Simplifying the IT Infrastructure management is the dream of every System Manager. With Own IT, System Managers can achieve this goal. Own IT is a complete system that encompasses components to Monitor, Manage and Trend Desktops, Servers and Network Devices. Own IT Advanced Predictive Trending components empower System Managers to implement and then monitor the performance, reduce the cost of ownership of the IT infrastructure. Unauthorized Information Access / Sharing. Unauthorized / Unlicensed Software / Freeware Installations which have negative impact on the network. Bandwidth / Network clogging by a single node or Process. Unauthorized hardware changes / thefts. Unauthorized/ restricted applications usage like IE/games. Virus handling. Remote machine administration / control. Hardware and Software Audit Trails. Software deployment. Network / lease line monitoring.
  • 13. Biometric Attendance systems and time management software Time management software Savior 7202 Smartcard Reader The favorite of Indian Corporate Houses – The most preferred Smart Card Reader In India. Suitable for Attendance, Access and a variety of other applications such as Canteen, Car parking, Vending, Library etc. Very secure and unduplicatable cards. Already more than 3000 users within a short span of its launching . Allows both Read & Write functions from the same Reader. 16 Characters x 2 rows alphanumeric LCD display. Many user oriented features are packed up within the Card / Reader. Savior Industrial Version Fingerprint Reader Savior 85-MB/MX series Industrial Version of Fingerprint Reader with metallic enclosure for rugged industrial environment Technology uses Worlds Best Biometric Sensor Savior 7202 Smartcard Reader The favorite of Indian Corporate Houses – The most preferred Smart Card Reader In India. Suitable for Attendance, Access and a variety of other applications such as Canteen, Car parking, Vending, Library etc. Very secure and unduplicatable cards. Already more than 3000 users within a short span of its launching . Allows both Read & Write functions from the same Reader. 16 Characters x 2 rows alphanumeric LCD display. Many user oriented features are packed up within the Card / Reader.
  • 14. Networking,wi-fi,optical fiber Communications Design Features Software techniques harden against hacking: Pt. 2—Sandbox solutions we need a system architecture in which multimedia operating systems and their applications can peacefully coexist with real- time, high assurance applications, hosted on a real-time, safety-rated operating system. Wireless LAN: what’s new and the impact on design and test The first popular standards for wireless LAN (IEEE 802.11a and b), and later 802.11g, were designed primarily to connect a laptop PC in the home and office, and later to allow connectivity ―on the road‖ in airports, hotels, Internet cafes, and shopping malls. Their main function was to provide a link to a wired broadband connection for Web browsing and email. Wi-Fi at the Speed of Light A wireless network that uses reflected infrared light instead of radio waves has transmitted data through the air at a speed of one gigabit per second--six to 14 times faster than the fastest Wi-Fi network. Such optical networks could provide faster, more secure communications and would be especially suitable for use in hospitals, aircraft, and factories, where radio-frequency transmission can interfere with navigation equipment, medical devices, or control systems.
  • 15. GPRS systems GPRS: General Packet Radio Service Introduction The introduction of second generation cellular mobile systems witnessed an impressive growth in the number of mobile subscribers. The most popular second generation systems are GSM andIS-95. The GSM system is based on FDMA-TDMA technology and is widely used in Europe, many parts of Asia and Africa. The IS-95 system is based on CDMA technology and is used in North America. With the increasing popularity of these systems there was an increasing demand for the data services over the wireless. These systems were designed for supporting circuit switched voice data and supported packet data on limited basis, but could not meet of today's trace requirements. In future it is expected that the wireless systems would be able to provide various kind of services like Internet access over wireless, streaming audio and video, text and multimedia messaging services. GSM System Architecture In GSM system the mobile handset is called Mobile Station (MS). A cell is formed by the coverage area of a Base Transceiver Station (BTS) which serves the MS in its coverage area. Several BT together are controlled by one Base Station Controller (BSC). The BTS and BSC together form Base Station Subsystem (BSS). The combined trace of the mobile stations in their respective cells is routed through a switch called Mobile Switching Center (MSC). Connection originating or terminating from external telephone (PSTN) are handled by a dedicated gateway Mobile Switching Center (GMSC). The architecture of a GSM system is shown in the below.
  • 16. Matrix EPABX Matrix EPABX - Proton Introducing Matrix EPABX PROTON range, a compact PBX loaded with value added features, which reduces cost and enhances productivity. Make the best out of your single trunk line, the ultra-compact micro PBX. This EPABX System supports microcontroller based design and state-of-the-art Surface Mount Technology (SMT) ensuring high reliability and low maintenance cost. Matrix EPABX vision range is packed with unique features, powered by Microcontroller-based design. SLIC used on extensions ensures robust, reliable and maintenance free performance. Its SMT hardware design ensures a very compact design and makes it more power efficient. Matrix EPABX - Eternity Matrix ETERNITY Series EPABX provides true mobility to its users by allowing them to use their mobile phones as PBX extensions. Not only users can make and receive calls, they can also use most of the PBX functions like Transfer, Forward, Voice Mail, Directory and Conference using their mobile phones from within and outside office. This seamless mobility means complete freedom from being tied to your desk for internal or external communication.
  • 17. AMC Annual Maintenance Contract (AMC) of Computer/Server/Scanner/ Laptop/Copier/Printer(In printer – Office jet.deskjet, leaser jet, Dmp, Line printer)/server/plotter Description of the Work 1. The maintenance services will consist of a) Attending to complaints raised by various departments/individuals of BIS (details provided by Freedom Infotech pvt. Ltd.) on daily basis. b) Onsite preventive and corrective maintenance of computers connected in LAN and peripherals at Freedom Infotech pvt. Ltd. where the above equipment is installed as indicated from time to time. c) The maintenance contract will include necessary repairs to the installed systems and replacement of defective/damaged parts, components and other accessories free of cost. d) The maintenance contract also includes removal of virus, software patch updation,HDD crash recovery, system administration, network administration, software support /troubleshooting to keep the system fully operational and web site updated. The agency will be responsible for providing virus free computing environment at Freedom Infotech pvt. Ltd. e) The maintenance contract also includes repair, maintenance and troubleshooting of all LAN components except the switches (for which separate AMC with the Original equipment supplier exists) to keep LAN fully operational. 2. The contract will be initially for one year. The contract may be renewed for a further two years, one year at a time, at the discretion of Freedom Infotech pvt. Ltd. and based on satisfactory services provided by the agency. 3. The maintenance services will be provided on all working days from 0900 h to 1730 h(Monday to Friday). Provision of availability of service engineers on Saturdays, Sundays or other holidays should be made in case of exigency. 4. The maintenance service agency shall provide maintenance services through five qualified experienced and competent resident engineers who shall stay at Freedom Infotech pvt. Ltd. as indicated in item (3) above. The role of these engineers shall be as follows: ������ Two support engineers for computer maintenance. The onsite engineer responsible for hardware maintenance should have expertise to cover all items of computers, printers, UPS, scanners, CD-writers and network components. ������ One support engineer for printer, UPS and networking trouble shooting, etc.������ One network and system/database administrator. The network and system/database administrator would also provide user software support services including virus cleaning/patch installation, software installation, etc. He should be well conversant with the latest trends in trouble shooting of computing equipment and networking monitoring tools. ������ One software designer/developer. The software designer/developer will be responsible for regular updating of Freedom Infotech pvt. Ltd.web site. He should be knowledgeable about various software tools and techniques for web designing and programming. (Note:-Pricing will be separately with quotation)
  • 18. Our Customers –List Automobile Hotels & Restaurant ASL Motors Hotel Yashwee International Reliable Industries, Dhanabad Hotel Dayal International Gulf Ashley Motors Ltd. Hotel Wave International Startrack Pvt. Ltd. Hotel The Blues Sant Auto Hotel Anand Bebbco Toyota Hotel Smita Gaurav Earth Moving Equipments Pvt. Ltd. Bhola Maharaj Tatanagar Motor Services Pvt. Ltd. Transportation & Logistics Distributors, Showrooms & Service Providers Haulers India Jutharam Ranglal Distributors Pvt. Ltd. Shri Raj International Pvt. Ltd. Jayesh Industrial Suppliers Pvt. Ltd. Shree Roadlines J.J.Electrotech Pvt. Ltd. R.R.Logistics Arjunlal Banwarilal Co. Pvt. Ltd. West Singhbhum Roadlines Elektrokraft Shiva Ventures Shreeleathers Binod Singh Roadways Pvt. Ltd. National Electronics Jamshedpur Furnishers Chartered Accountants, Legal and Consultancy Veripro Sales & Services Trimurti Sales R.Gopal & Associates Accord India Enterprises A.Gupta & Associates Chagganlal Dayaljee A.H.Bilimoria & Co. Kuldeep Sons Jewellers Pvt. Ltd. S.K.Naredi & Co. Brahmanand Narayana Hrudyalaya S.Sharma & Co. Agarwal Ramesh K & Co. Construction Schools & Colleges Gauri Gautam Construction Co. Pvt. Ltd. Narbheram Hansraj English School Samay Construction Pvt. Ltd. DBMS Career Academy Sahara Constructions Kendriya Vidyalaya, Surda Shree Housing Developers Pvt. Ltd. Kendriya Vidyalaya, Jamshedpur Vaastu Vihar Jamshedpur Womens College Chandra Awas Pvt. Ltd. Vivek Vidyalaya, Govindpur Yashkamal Developers Pvt. Ltd. Gulmohar School, Telco Valley View School, Telco Convent School, Mosabani Tarapore School, Agrico
  • 19. Our Customers –List Banks, Public Utilities & Public Undertaking Tata Motors Ancillaries •Adityapur Industrial Area Development Authority •ASL Industries Pvt. Ltd. •Uranium Corporation of India Ltd. •Cordoba Engg. Co. Pvt. Ltd. •Atomic Mineral Development, Khasmahal •Accropoly Metal Industries Pvt. Ltd. •District Planning Office, Saraikela-Kharsawan •Caparo Engg. India Pvt. Ltd. •D.C.Office, , Saraikela-Kharsawan •Soni Auto & Allied Industries Ltd. •Govt. Polytechnic, Adityapur •Auro Plastic Injection Moulding Co. Pvt. Ltd. •Govt. Womens Polytechnic, Gamharia •Nalin Rubber Pvt. Ltd. •Govt. Polytechnic, Kharsawan •Banco Products (India) Ltd. •Union Bank of India, Bistupur •BMC Metal Cast Pvt. Ltd. •Jamshedpur Dairy •Steel City Metal Products Pvt. Ltd. •IRCTC •Newco Auto Pvt. Ltd. •Jamshedpur Blood Bank •Sumit Entrprises •Durdarshan,Barbil •Garg Engineers Ltd. •Auto Feed (India) Pvt. Ltd. Corporates •Viks Gears (India) Ltd. •Automat Engineers Lafarge India Ltd., Chapa, Chhattisgarh •Tata Cummins Ltd., Jamshedpur •Shyam DRI, Jharsuguda Manufacturing •SMS Demag, Jamshedpur •Steel Strip Wheels Ltd., Jamshedpur •Ami Enterprises Pvt. Ltd. •Adhunik Group, Jamshedpur •Prem Foods Pvt. Ltd. •Sarla Technologies, Mumbai •Union Enterprises •Bhutan Centennial Distillery, Bhutan •Sachdev Engg. Pvt. Ltd. •India Infoline Ltd. •Spoxy Gas Products Pvt. Ltd. •Wabco TVS India Ltd. •Sudisha Foundry Pvt. Ltd. •Nilanchal Iron & Power Ltd. •Spectra Super Alloys Ltd. •Accropoly Metal Industries Pvt. Ltd. •Fusion Engineering Product Ltd. •Universal Industrial Paints Pvt. Ltd. •Usha Lubes Mining, Iron & Steel and Other Metals •Synergy Power Equipments Pvt. Ltd. •My Home Industries Ltd. •India Resources Ltd., Mosabani •Flexible Foam Products Pvt. Ltd. •Dhansar Engg. Co. Pvt. Ltd., Dhanbad •Gajanan Ores Pvt. Ltd. •EMS India Ltd. •Bharat Engg. & Body Building Co. Pvt. Ltd. •Danauli Engg. & Mining Co. Pvt. Ltd. •Hitech Chemicals Pvt. Ltd. •Orissa Manganese & Minerals Pvt. Ltd. •ASL Enterprises Ltd. Engineering and Allied Industries •PPG Steel Pvt. Ltd. •Babu Ram & Co. •Jupiter Hi-Tech Systems, Agrico •Shiv Sambhu Iron & Steel Pvt. Ltd. •Shiva Project & Marketing Pvt. Ltd. •Zoom Vallabh Steel Ltd. •Bihar Engg. & Manufacturing Co. Pvt. Ltd. •Nilachal Iron & Power Ltd. •Paradigm Engg. & Consultants Pvt. Ltd. •Bimaldeep Steel Pvt. Ltd. •Aastha Developers Pvt. Ltd. •Kohinoor Steel Pvt. Ltd. •Narsingh Ispat Ltd.
  • 20. Contact Us Freedom Infotech Pvt Ltd Corporate Office Basement, Aditya Tower, Opp Police Station, Bistupur, Jamshedpur,-831001, Jharkhand, India Phone- +91- 657- 2249258, 2249259, 3242520 Registered Office 1st Floor, Punwari Chambers, 7B, Kiran Shankar Roy Road, Kolkata- 700001, West Bengal, India Branch Office Swastik Sadan Shastri Nagar (East), Dhobatand, Dhanbad- 826001, Jharkhand, India Phone -+91- 326-2307033 Business Inquiry: Sales Team: sales@freedominfotech.com Technical Team: support@freedominfotech.com