Error loading component: com_user, Component not found.

Sujata Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Subscribe to this list via RSS Blog posts tagged in buy laptop in pune

Next year Microsoft is releasing its new operating system and its next Windows iteration will not be Windows 9 or Windows 8.2. Instead it has skipping straight to 10. A lot of people are making fun of this. People like order, and skipping numbers bothers the kindergartner in all of us.

According to me some plausible reasons for skipping directly to 10 might be:-

  1. Christening new windows OS as windows 9 will send the message that it is merely upgrade of windows 8.1 and there is nothing new in it
  2. In June 2015 Apple is going to launch IOS 9 and MS just to prove its superiority, jumped to number 10.
  3. The Japanese consider 9 to be an unlucky number because it sounds similar to the Japanese word for pain. What's Mr. T's prediction for Windows 9?

Anyways let’s see some salient features of windows 10.After using Windows 10 for almost a week, I’ve discovered some neat little changes and features that Microsoft hasn’t yet discussed — smart tweaks that, if you’re a mouse-and-keyboard user looking for a reason to upgrade from Windows 7/8.1, you will be very pleased with. Let’s dive straight in with my favorite secret/hidden features of Windows 10.

Explorer now has a “Home” tab

In the last few versions of Windows, opening My Computer or a new Explorer window would
show you your computer’s various storage locations and shortcuts to default folders like
Documents and My Pictures. In Windows 10, you now end up in a new view called Home, which
shows Favorites, Frequent Folders, and Recent Files.

You can finally put the Recycle Bin on the taskbar Rather than having to poke around Explorer or minimize everything and find the Recycle Bin icon on the Desktop, in Windows 10 you can now add the Recycle Bin to both the taskbar and the Start menu. Yes, that is the sound of many brains exploding as they catastrophically realize the enormity of this change

The Windows 10 Start menu is resizable

This one is a bit odd: You can make the Windows 10 Start menu as tall or as wide as you like. If
you want to have a Start menu that takes up the entire left side of your screen, or a narrow strip
across the taskbar, then that’s now possible. The taskbar itself is also resizable, which means you can do weird stuffs. I am not sure if this is second bit is intentional or not. A resizable Start menu is quite cool, though! Cortana is almost definitely coming to Windows 10

After a little bit of poking around (searching for “Cortana” in Explorer) I found a lot of references to Cortana in Windows 10 Technical Preview; there’s even aWindows.Cortana.dll, just sitting there in the System32 directory. You also get a bunch of Cortana-related hits if you search for “Cortana” within the Registry Editor.None of this is to say that Cortana is definitely coming to Windows 10 — there are lots of other reasons for those files/registry entries being there, such as the ghost of an early internal test — but I’d say it’s pretty likely. We should hopefully see Cortana in the next beta of Windows 10.

Notifications and toasts in Windows 10
While Windows 10′s rumored Notification Tray isn’t yet in the Technical Preview, there are some new pretty toasts/notifications that pop up in the top right corner of the screen. These notifications appear to replace the speech bubbles that used to pop out of the system tray (the bottom right corner of the taskbar, unless you’re one of those heathens who has moved the taskbar to a non-standard location).

The Command Prompt is getting so much more than just Ctrl-V
Somewhat unbelievably, despite the Windows 10 unveil event being only 40 minutes long, Microsoft actually dedicated a couple of minutes to Windows 10′s Command Prompt (cmd). At the time, Joe Belfiore told that Command Prompt is finally gaining the ability to paste with Ctrl-V (previously, you had to right click > paste). It turns out, there’s a lot more, too. If you right click Command Prompt’s title bar and head to Properties then Experimental, you get a bunch of new options (see above). In fact, you have to turn on the experimental options before you can use Ctrl-V to paste. With experimental options turned on, you can also use Shift-arrow keys to mark text (for copying and pasting with Ctrl-C/Ctrl-V). The other options are mostly self-explanatory, though I am still trying to discover what the “extended edit keys” are (let me know in the comments if you’ve found some!)

Windows 10 keyboard shortcuts for virtual desktops, improved snapping, task view
One of Windows 10′s bigger new features is virtual desktops — additional instances of the Desktop that you can use to better organize your workspace. There’s also improved snapping, and a new view called Task View that’s kind of like Alt-Tab, but it incorporates your virtual desktops as well. All of these new features have associated keyboard shortcuts to make using them a cinch.
Task View is opened up with Windows Key-Tab. It looks very like the new Alt-Tab interface, but it stays open after you let go of the keys. You can also add, remove, and manage virtual desktops from this interface.
Windows Key-Ctrl-Arrow (left or right) switches you to the next virtual desktop on the left or right.
Windows Key-Ctrl-D creates a new virtual desktop. Windows Key-Ctrl-F4 closes the current virtual desktop.
Windows Key-Up arrow and Windows Key-Down arrow can now be used to snap the current app to the top or bottom of the screen (this is in addition to Win-Left and Win-Right for snapping to the left and right of the screen). Tapping these shortcuts multiple times creates different effects: Tapping Win-Up once maximizes an app; twice snaps it to the top. Win-Down once snaps to the bottom; twice minimizes it. You can also use Win-Left/Right to move apps incrementally across a multi-monitor setup.

or +919850712300

Pushkar Nath

Hits: 2123

Visual Studio is a complete set of development tools for building ASP.NET Web applications, XML Web Services, desktop applications, and mobile applications. Visual Basic, Visual C#, and Visual C++ all use the same integrated development environment (IDE), which enables tool sharing and eases the creation of mixed-language solutions. In addition, these languages use the functionality of the .NET Framework, which provides access to key technologies that simplify the development of ASP Web applications and XML Web Services Application Migration, like fire fox to asp.net.

It is used to develop console and graphical user interface applications along with Windows Forms or WPF applications, web sites, web applications, and web services in both native code together with managed code for all platforms supported by Microsoft Windows, Windows Mobile, Windows CE, .NET Framework, .NET Compact Framework and Microsoft Silverlight.

Microsoft Visual Studio Available in four different flavours as mention below:-

  • VS Ultimate with MSDN    
  • VS Premium with MSDN
  • VS Professional with MSDN

VS Test Pro with MSDN
Microsoft Visual Studio Capabilities:-
What can you really do with Visual Studio? Following are some of the various applications that can be built using Visual Studio.

Console applications: These applications run from the command line and do not include a graphical interface, but are great for small tools or anything that will be run by another application.
Windows forms applications: These are Windows desktop applications written using the .NET framework; since they are .NET applications, they require that the .NET framework be on any computer that will run the application.
Windows services: Services are applications that run in the background while your computer is running. These are usually applications that will have to perform scheduled tasks or handle continuous network requests.
ASP.NET applications: ASP.NET is a powerful technology that is used to create dynamic web applications, often driven by a database. Many popular websites are written using ASP.NET, including those of e-commerce giants like Dell.

ASP.NET web services: ASP.NET provides a complete web services model that allows you to quickly and easily create web services.
Windows Mobile applications: Windows Mobile applications can run on devices that include the Compact framework; these include Pocket PC devices, as well as cell phones running the Microsoft Smartphone platform.
MFC/ATL/Win32 applications: You can also still create traditional MFC, ATL, or Win32 applications using C++. These applications do not need the .NET runtime to run, but also don't include many of the benefits of working with the .NET framework.
Visual Studio add-ins: That's right, you can use Visual Studio to write new functionality to be added into Visual Studio.
And more: Visual Studio also includes projects to deploy your application, work with databases, create reports, and more.

Visual Studio provides an extensible model for adding new projects to Visual Studio; many other Microsoft applications now integrate directly into the IDE. Some of the most common include SQL Server Reporting Services and Visual Studio Tools for Office.
Microsoft Visual Studio Features:-
All of the above applications could be written using another IDE or some combination of freely available SDKs and your favourite text editor, so why would you pay for Visual Studio? Visual Studio is dedicated to making your development life easier through time-saving and convenient features; here are some of the most compelling of those features.

IntelliSense: IntelliSense is the trademark feature of Visual Studio. IntelliSense simply helps you while programming by showing you the available classes and the methods and properties available on those classes. Can't remember what the name of that class, method, or property is? No worries, IntelliSense will help out.

Designers: Visual Studio includes visual WSYIWYG designers for Windows applications, ASP.NET applications, and Windows Mobile applications. These designers make it much easier to get your application looking just right.

Debugging: One of the most important features of Visual Studio is the ability to step through your application line by line as it is executing. Not sure why you are getting an error? Simply walk through and see exactly what is going wrong.

Organization: Visual Studio is built for developing applications, so it provides intuitive methods for organizing your various code files into projects and your various projects into solutions.

Visual Studio includes way too many features to be listed here; even most seasoned developers don't make use of all of the various features available in Visual Studio.
FOR ANY QUERIES PLEASE CONTACT ME ON [email protected] or +919850362300

Hemant Bhagwat
Sujata Computers Pvt Ltd

Hits: 2128

UTM (Unified Threat Management)

UTM represents a significant shift in the evolution of network security technology and equipment. UTM generally refers to a security appliance that consolidates a wide range of essential network security functions into a single device, including next-generation firewall technologies like application control.
As network threats evolve and new threats emerge, network security must change and adapt to protect against such threats. This adaptability can make UTM difficult to define because the technologies included can vary from vendor to vendor. Over time, however, the collection of capabilities associated with UTM has consistently expanded, and this trend shows no sign of tapering off.
As we write this, the best UTM solutions for networks include the following core security functions in their arsenals.

  • Network firewalls perform state full packet inspection.
  • IPS detects and blocks intrusions and certain attacks.
  • Application control provides visibility and control of application behavior and content.
  • VPN enables secure remote access to networks.
  • Content filtering halts access to malicious, inappropriate, or questionable websites and online content.
  • IPv6 support in all network security functions protects networks as they migrate from IPv4 to IPv6.
  • Support for virtualized environments, both virtual domains and virtual appliances.

indexThey also include additional security technologies that organizations can choose to deploy, including

  • Data loss prevention that blocks accidental or intentional loss of confidential, proprietary, or regulated data.
  • Anti-virus/anti-spam protection that prevents malicious payloads or unwanted messages from entering networks
  • Endpoint control that enforces corporate security policies with remote users and devices.
  • Integrated wireless LAN (WLAN) controller to consolidate all wired and wireless traffic through a single device, to simplify policy creation and enforcement while reducing network complexity.
  • Gartner has once again positioned Fortinet as a leader in the Unified Threat Management (UTM) Magic Quadrant for 2014.
  • According to Gartner, “The Leaders quadrant contains vendors at the forefront of making and selling UTM products” and “Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens.”
  • Of course, the FortiGate Connected UTM platform supports the comprehensive set of security features you would expect from a market leading UTM solution: Firewall, VPN, IPS, Anti-malware, URL and Application control. But Fortinet’s relentless commitment to innovation takes the FortiGate Connected UTM to the next level. Integrated High-Density Switching (including PoE) and Wireless LAN eliminates the need to deploy standalone switches or wireless controllers, further simplifying your network deployment and reducing management costs
  • Sujata Computers Pvt. Ltd is the Value added Distributor for the Fortinet.
  • I would be glad to answer your queries, you can leave your comments or write to me at [email protected]
  • Warm regards


Sujata Computers Pvt Ltd
Fortinet Partner & Sub-Distributor

Hits: 1954

Dear Customers

Sujata Computers Pvt Ltd as a Autodesk Reseller is happy to bring you great discounts for freelancers. Avail them now. Offer is valid only till October 2014.Autodesk-freelancer-Offer-October2014

Warm Regards
Sujata Computers Pvt Ltd - Autodesk Team
Autodesk Reseller

Hits: 1356


This is Pushkar Nath, Sujata's Data Security Specialist. This blog is for CXOs in Manufacturing Industry to understand what data security threats are around us and how to keep the data safe from the threats.

In today’s tech savvy world, where systems are getting automated, it is leaving vulnerable points which render an organization prone to data leak. We will do critical analysis sector wise to pinpoint the leak points and ways to plug them. Today I am picking up manufacturing sector for critical analysis

End Users – It can be anyone designing team, people from R&D department, data entry executive, receptionist etc. There is possibility of malware infection through internet and spreading it in local area network and crashing down the entire network. Apart from that it might be possible that they might try to send documents or critical organization data through USB, mails or web. This can be prevented by using Antiviruses, data loss prevention, web and Messaging gateway protection. Hard disc, file and folder and removable USB level Encryption

Accounts/Finance Department – This department handles one of the most critical assignments of an organization and that is to manage the entire financial dealing and transactions. Any leakage of financial details might prove detrimental to the organization. This department is prone to phishing attack. . Antiviruses, data loss prevention, web and messaging gateway protection, Hard disc, file and folder and removable USB level Encryption  endpoint to endpoint encryption with two factor authentication will provide adequate security to this department.

Human Resource department – Human resource department has under its possession entire record of the employees. As manufacturing sector is labour intensive sector so every company has long list of labours doing blue collar and white collar jobs.  Companies doling out financial services are always on prowl for these type of database.  Security becomes necessary. Antiviruses, data loss prevention, messaging gateway protection, hard disc, file and folder and removable USB level Encryption becomes critical necessity of this department.

Sales and marketing Dept. – This department generates revenue for an organization. They have data of their clients and their requirements. As personals from this department remains mobile. So BYOD is gaining currency among them. . Antiviruses, data loss prevention, web and messaging gateway protection, Hard disc, file and folder and removable USB level Encryption  , gateway to end point mail  encryption , mobile device management, mobile application management coupled with two factor authentication will provide adequate protection to the devices, application and data.

IT Department – This department manages the entire IT infrastructure of an organization. It has to manage server infrastructure, networking, end points of the users.  Its role becomes critical in the sense that if it gets down then functioning of the entire organization will come down to notch. The first product which is of extreme importance for them is back up software for end points and servers. Second is archiving and third is solution for hardware and software inventory management.

Top Management – This level of management is privy to secrets of all the above mentioned departments. Any IT admin can’t stop them from accessing there date/mails etc from their own device or from home. Security becomes critical as any intentional or unintentional loss of data, documents can have a devastating effect on the entire organization. Antiviruses, data loss prevention, web and messaging gateway protection, Hard disc, file and folder and removable USB level Encryption  endpoint  to end point  mail  encryption , mobile device management, mobile application management coupled with two factor authentication will provide adequate protection to the devices, applications and data.

Let me know if you have any concerns around the data security or you can get a free check up of your IT infrastructure and processes set for accessing the critical data within your organization from me and my team in Sujata.

Pushkar Nath

Hits: 1446


A lot has happened in last one week for Sujata - We started our operations in Singapore which is our second overseas operations after Dubai. Secondly, we have been appointed as a distributor by Tally for Maharashtra State. And lastly, we organized two wonderful events for our customers in Pune and in Kolhapur fully sponsored by Fortinet, thanks to Fortinet team for that.

Today is a pleasant day here in Pune and as I write, India has managed to bat against South Africa as per the plan to put up a decent score in the Cricket WC 2015. That makes my day better. Question comes to my mind if BCCI uses Microsoft Project to manage Indian Cricket Team's plan for the match, This blog is about Microsoft Project licensing and the training that you can opt for.

Training will be done by Sujata's team if you are not buying Software Assurance services along with the licenses.

Sujata Computers Pvt Ltd is a 14 years old Microsoft Gold Partner and a Microsoft Cloud Accelarator Partner headquartered in Pune, India.

Sujata-ms project logo

What are the editions and version available in Microsoft Project?

Currently, Microsoft offer Project 2013 as a subscription license that is cloud and as a perpetual license.

If you are buying Microsoft Project for less than five users, I recommend you to buy retail pack license as it will be cheaper as compared to Volume License.

Microsoft offers three different editions under on-premise perpetual licenses for Project Portfolio Management (PPM) and everyday work, enabling you to effectively execute and achieve strategic priorities.

Perpetual licenses editions are  -

  • Project Professional - This license type is recommended to a 'Project Manager'. Someone who wants to allocate resources to the project, prioritize work, define timeline etc.
  • Project Standard - This license type is recommended to a 'Team Member' or someone who's managing project as an 'individual' and there is no team. Someone who is working on a project and updating the status of the tasks that have been assigned to him/her. Someone who manages only tasks and not a team or not a whole project.
  • Project Server-CALs - Like any other Microsoft server product licensing, Project server is recommended to be bought along with the CALs (Client Access License) equal to either number of users or device accessing the Project Server.

Important Note - Pre-requsite for Microsoft Project Server license deployment is - 1) Microsoft SharePoint Enteprise Server-CALs licenses 2) Microsoft SQL Server-CALs licenses. Without these two licenses, Microsoft Project Server licensing does not get complete.  

This license type is recommended in a scenario where there are multiple projects need to be collaborated with each other and there is information being shared between different projects.

So in this case apart from pre-requisite licenses, client would need to buy 1 Project Server license for 1 server deployment each, 1 CAL for either device or user each, 1 Project Professional license for each of the project manager, 1 Project Standard license for each of the team member. Note - Project Professional license do come in bundle offering with CAL license so client does not need to buy CAL separately for Professional license assuming you are buying under Microsoft Volume Licensing.

Cloud editions of Microsoft Project 2013 are -

  • Project Online - Usage wise this one is very much equivalent to Project Server on-premise but it is hosted out of Microsoft Cloud/Data-center so one does not have to deploy or manage. One also does not need to procure pre-requisite licenses which can save lot of cost to the client. All this means is that client does not have access to the hardware of Project and hence the direct access to the database. This is recommended to the client who does not mind having data stored at Microsoft's data center and does not want to invest into Project Server licensing but wants to use functionality of it. Also, does not mind logging into browser to use Project. I have elaborated technical difference between Project Server and Project Online later in this blog.
  • Project Pro for Office 365 - Client can add Project Professional license to Office 365. Functionality remains same as Project Pro on-premise as mentioned above. It is meant for 'Project Manager'. It has to be used through a web-browser.
  • Project Online with Project Pro for Office 365 - As the name itself suggests, this one is a license that gives you functionality of both Project Online and Professional. This is recommended for a 'Project Manager' using Project under Project Online subscription. That means organization has subscribed for Project Online and the user is a manager who will be creating and managing the project in it so he also needs Project Professional functionality.

Whether to buy Cloud/subscription license or on-premise/perpetual license -

Cloud is recommended for customers who are looking for -

  • yearly or monthly payment options
  • always wants to use latest version released by Microsoft

Perpetual licenses are recommended to the customers who want to do one-time investment and do not necessarily want to use the latest version of Project always. They can still opt for Software Assurance (SA) if they want to take the version upgrade at a later point of time after the purchase of the licenses.

Project Online vs. Project On-Premises. Which should I choose?

If you are looking for an environment where you do not have to worry about technical maintenance then consider a Project Online environment.

If you are looking for an environment where you can have SQL query access to the databases and where you have full control over the content then consider an On-Premises Solution.

The chart below shows some additional differentiators between Project 2013 On–Line and Project 2013 On – Premises environments.

Key differentiators between Project Server 2013 On Line and Project Server 2013 On Premises


On Line

On Premises

Administrative backup and restore for Projects (used to restore a slightly older version of a project without pulling a tape and impacting an entire organization)



Archival Environments to retain data



Multi-Dimensional Olap Cubes



Direct access to SQL Server Databases and OLAP Databases



Direct SQL Query Access to Project Server and SharePoint Databases



Team Foundation Server Connectivity (including 2012) (Note: The version of Project used must have the Team Foundation Server extensions installed. These extensions are not present, out of the box, in the online version.)



Standard Windows Installation (MSI)



Event Handlers can use both full trust event handlers and remote event receivers



Full access to PSI and CSOM



Access to ULS Logs
By default ULS Logs are located at  C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\15\LOGS directory



As a result of full access to the databases, PSI and CSOM there is more flexibility for Business Intelligence, Dashboards, and Reports



Recycling Bin for documents, projects, and sites
       Note: –Caution should be exercised when emptying the recycle bin. Once a project or a site is deleted from the recycle bin. It is deleted (gone) and cannot be recovered.



Project Web Applications (Add applications to PWA)



SharePoint Permission Mode or Project Server Permission Mode



Monitoring Enhancements



SharePoint Designer for workflows



No database administration



Security handled by Microsoft



Latest and greatest service packs and cumulative updates



Click-to-run installation



No direct access to SQL Server and OLAP Databases (Reporting is done via OData)



Access using CSOM (Note: PSI interfaces do not support O- Authentication)



Event Handlers require remote event receivers



Extensibility is accomplished via the use of the SharePoint Extensibility Model – (as a result there is no full-trust code)



Download Training Options Available with Us -


More Resources :

1) Project Licensing Microsoft Home Page - https://products.office.com/en-us/project/microsoft-project-licensing
2) Project Top Features - https://products.office.com/en-us/Project/project-top-features
3) Videos and demos of Microsoft Project 2013 - https://technet.microsoft.com/en-us/library/ff628958.aspx
4) Feature and Function comparison between Project Online and Project Server - https://technet.microsoft.com/en-us/library/dn268595.aspx
Hope this has given you a decent idea about Microsoft Project licensing and how to choose the correct edition for yourself. Still, if you have any doubt, please feel free to call me or write to me. I will be happy to provide you free guidance -

Paresh Lodha
[email protected]

Hits: 1619

Contact Us

Email: [email protected]

India: +91-20-40100300

US: +1-7323195103