×

Warning

Error loading component: com_user, Component not found.

Sujata Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Subscribe to this list via RSS Blog posts tagged in sujata computers

We Sujata Computers Pvt Ltd. are specialized partner for Microsoft developer’s tools.

As a developer tools specialized partner we have expertise in providing licensing and solution for below tools.

1. Visual Studio:- Microsoft Visual Studio is an integrated development environment (IDE) from Microsoft. It is used to develop computer programs for Microsoft Windows, as well as web sites, web applications and web services. Visual Studio uses Microsoft software development platforms such as Windows API, Windows Forms, Windows Presentation Foundation, Windows Store and Microsoft Silverlight. It can produce both native code and managed code.
Available Editions –
     a. On-Premise : Professional | Professional Test | Premium | Ultimate.
     b. Online – Basic | Professional | Advanced
2. MSDN:- Microsoft Developer Network is the portion of Microsoft responsible for managing the firm's relationship with developers and testers, such as hardware developers interested in the operating system (OS), and software developers developing on the various OS platforms or using the API and/or scripting languages of Microsoft's applications. The relationship management is situated in assorted media: web sites, newsletters, developer conferences, trade media, blogs and DVD distribution. The life cycle of the relationships ranges from legacy support through evangelizing potential offerings.
3. Azure:- Windows Azure is intended to simplify IT management and minimize up-front and on-going expenses. To this end, Azure was designed to facilitate the management of scalable Web applications over the Internet. The hosting and management environment is maintained at Microsoft data centres.
4. MS SQL:- SQL Server is a Microsoft product used to manage and store information. Technically, SQL Server is a “relational database management system” (RDMS). Broken apart, this term means two things. First, that data stored inside SQL Server will be housed in a “relational database”, and second, that SQL Server is an entire “management system”, not just a database. SQL itself stands for Structured Query Language. This is the language used to manage and administer the database server.
Available Editions –  Standard | Enterprise |Business intelligence edition
5. InfoPath: -An application in the Enterprise editions of Microsoft Office for creating and editing XML-based forms. Formerly known as "XDocs" and "NetDocs," it enables users to build forms that are true XML documents.
6. Biz Talk Server:- BizTalk Server is Microsoft's central platform for Enterprise Application Integration (EAI) and Business Process Management (BPM) and embodies the integration and automation capabilities of XML and Web Services technologies.
7. Team Foundation Server:- Team Foundation Server is a Microsoft product which provides source code management, reporting, requirements management, project management, automated builds, lab management, testing and release management capabilities.

Why You Should Consider Buying MSDN?
1) Get an access to all past and future versions of Visual Studio for free of cost. Free version upgrade and updates.
2) Get access to different Microsoft product licenses for free for the development and testing purpose without having to pay for any of the individual software. Download details here!
3) Full TFS license and TFS CAL is now included within all levels of MSDN Subscriptions.
4) Get access to eLearning portal – User gets approx. 20-40 Hours of online training per calendar year.
5) Tech Support Calls - Each MSDN includes 1-4 tech support incidents. Worth $500 each.
6) Get Free Azure Credits. MSDN includes a monthly allowance of Azure compute and storage.
7) Get training vouchers. Number of vouchers will depend on the number of licenses and type of licenses that you purchase.
8) Valid for 2 years. Renewal after that is optional.

More Resources for Microsoft Developers’ Tools:
1.Comparison between different editions of Visual Studio – http://www.visualstudio.com/en-us/products/compare-visual-studio-products-vs.aspx
2.MSDN Product offerings for testing and development purpose – please find attached sheet.
3.30-day Trial version of Visual Studio – http://www.visualstudio.com/downloads/download-visual-studio-vs
4.Trial for Microsoft Azure – http://azure.microsoft.com/en-us/offers/ms-azr-0044p/

Contact Sujata Computers Pvt Ltd for training and demo of any Microsoft developers’ tools.
                                               
Contact us :
Mr. Paresh Lodha | +91-7276000222 | [email protected]
Mr. Hemant Bhagwat | +91-9850362300 | [email protected]

Hits: 1777
0

MS

Hi!
We, Sujata Computers Pvt Ltd almost everyday get calls from our existing customers and new customers asking for a solution on what to be done when they receive a call from Microsoft's or Adobe's or Autodesk's license compliance team. There are variety of questions customers ask and I will try to address some of the common questions here -

We are naming some of these proprietary software makers just as example, you might receive calls from similar software makers and answers given below apply to them as well.

How come I received a call from Microsoft's compliance team?
It is simple. Either user has activated trial too many times or some users have installed the pirated applications without the permission of IT team.


How does Microsoft know that we have pirated software in our organization?
This is pretty straight forward and before this question comes to your mind, shouldn't you be thinking why to breach someone's Intellectual Property (IP) by using pirated software.
Anyway, chances are when you install pirated applications on your devices and connect them to the internet - it tries to connect with software vendors' servers and ask for updates. secondly, software vendors have all the details of licenses that you have bought in the past so when they 'realize' that you have more users or devices in your premise, it is easy to guess that you are using pirated software. When I say 'realize' that means when they visit your office or when they see your advertisements for recruitments or when they hear the number of users or devices from your security guard or from your receptionist - they come to know!


What are their Licensing Audits like ? What do they do exactly?
Companies can encounter different types of Microsoft audits. The Software Asset Management engagement, also known as SAM engagement, is a voluntary audit. During a SAM engagement, a Microsoft consulting partner like KPMG, E&Y, PwC etc. examines the client’s Microsoft software resources for any misuse. There is often confusion regarding how many licenses are currently installed on devices.  Sometimes the results of a SAM engagement will result in having the company pay for installed programming that is not currently used. They give you the reports of installed applications in your network and the details of breach of IP.

To avoid overpaying, companies should dispose off out-dated and unused software and workstations.
A significantly more serious and involuntary Microsoft audit is the Legal Contract and Compliance Audit, also known as the LCC Audit. An LCC Audit is only administered when Microsoft believes that a serious licensing infraction has taken place, as this type of audit is costly and time consuming. LCC Audits may be issued when a company has consistently refused to undergo a SAM engagement.

So we suggest all our customers to respond to Microsoft's queries and communication. You can take help of Sujata Computers Pvt Ltd to do that.

What to Expect In Audit And After Audit
Microsoft's audit partner will carry out an activity at customer's premise. They will lock down the systems in case customer refuses to co-operate or if customer is co-operating then they will simply use a device through which they can scan customer's network and find out what applications are being used in the organization.

In an audit, Microsoft will want to ensure that every piece of equipment with the capability of running a Microsoft product is appropriately licensed and paid for. Unintentional non-compliance is almost guaranteed due to the intricacy of Microsoft’s licensing structure and because Microsoft does not alert firms when software overuse has occurred. If companies have a highly advanced system allows IT to recognize when overuse is occurring, they may be able to avoid non-compliance.  However, even if a company actually possesses the appropriate licenses, if they cannot show an audit trail that is proof of purchase like supplier's invoices or authentic serial keys, Microsoft can still impose fines.
Companies must understand that they are completely responsible for ensuring that all of their devices are appropriately licensed regardless of the confusion that Microsoft’s licensing structure may present.

Indian Law For Anti-Piracy (As of Oct 2014). What is the punishment for pirated/illegal usage of software?
If customer is not co-operating and is not ready to purchase required licenses, Microsoft can take customer to Delhi High-Court and chances are that one of the below penalty will be applied to the customer -

  • Minimum imprisonment is six months, maximum imprisonment up to three years and minimum fine of fifty thousand rupees and maximum of two lakh rupees.
  • In case of second and subsequent convictions for copyright infringement and/or violation of any other right conferred by the Indian Copyright Act, punishment for the second and for every subsequent offence is minimum one year imprisonment and maximum 3 years and a minimum fine of one lakh rupees and maximum is two lakh rupees.
  • In case any person who knowingly makes use on a computer of an infringing copy of a computer program shall be punishable with imprisonment for a term which shall not be less than seven days but which may extend to three years and with fine which shall not be less than fifty thousand rupees but which may extend to two lakh rupees

Note - It has been brought to our notice by few customers that there are thugs in the market who come along with the police (mostly fake) usually at night (between 7-10 pm) and ask customers to pay up in cash for using pirated software. These people are not real representatives of any proprietary software makers and customers are robbed by them. We suggest you not to get panic in such situation because no reputed software maker does this kind of unprofessional raids or compliance.

Kindly contact Sujata Computers Pvt Ltd immediately if you come across such incident and we will try to help you out.

How To Avoid SAM or Audit or Compliance and To Prepare for the Audits

Plan Your SAM, and start building exceptional business results from the foundation up.
You can implement SAM in your organization by following four basic steps, Contact Sujata Computers Pvt Ltd for implementing and consulting the same :
Graphical representation of the four SAM steps: Take Inventory, Get Organized, Create Policies and Procedures, Maintain Your SAM Plan
1) Take Inventory
First, you need to know what you already have. Therefore the first step in your SAM program is to take inventory of your deployed software. If your business is small, you might be able to do this manually. If your organization is larger, you might try using any of the automated discovery tools that can easily and efficiently scan your entire network or reach out to a SAM partner.
2) Get Organized
The next step is to take an inventory of the licenses you have purchased. To optimize and manage your software assets, you'll need to find, record, and organize the licenses and documentation for each software title and version. You can easily manage your software license library in a number of ways. Begin by learning what types of documents you will need to keep, how best to keep them organized, Sujata Computers Pvt Ltd will help in the process.
3) Create Policies and Procedures
From software acquisition, use, and retirement, to storage and disaster protection, you can safeguard your software and hardware assets by establishing new standards and guidelines regarding all phases of the software life cycle. You can’t do it alone though, so Sujata Computers Pvt Ltd will give you suggestions on how to create a culture of SAM throughout your organization.
4) Maintain Your SAM Plan
Keep your SAM plan current through frequent spot checks, regularly scheduled software inventories, and ongoing employee training. Sujata Computers Pvt Ltd will help you with SAM Optimization Model in determining areas where you can further improve your return on investment (ROI) through SAM improvements.

Firms can take steps to guarantee that their licensing is in line with Microsoft’s expectations. In fact, Microsoft has made several suggestions to help firms more easily comply with the audit requirements.  Firms must be able to pair all software to their appropriate licenses, and keep to date versions of all software in the case of an audit.

Companies should consistently strive to achieve a culture of licensing compliance far before Microsoft requests an audit. As audits will only be increasing as time goes on, firms should establish an asset management process to stay on top of licensing requirements. This includes keeping all updated licensing information in one central location so that the information is easily accessible in the case of an audit. Companies can create a software and hardware map in the form of a database, spreadsheet, or diagram that details where software is installed on computers. This will ensure that companies stay knowledgeable about their software.

Companies should also adopt a regular inventory schedule to keep track of any new software and license acquisitions. Each time the company acquires new software, they should enter it into their software tracking system. Firms should also take care to regulate their software to ensure that all employees are using the same version.

Finally, firms might contemplate investing in Microsoft’s volume licensing programs. These programs are more reasonably priced, as well as allow for tailored purchasing options and enhanced software management. Microsoft’s Open Value Program enables companies to easily track and manage their licenses, which results in a lower compliance risk. The cost effective program also offers benefits such as companywide licenses, low upfront costs with a yearly subscription and ease of management.

There is a solution called 'LicenseWatch' that helps to gain visibility into your software compliance status, usage metering of applications and to build in one place a asset repository.
Its own database of 1.2Lakhs application will provide you application intelligence and will do the grouping and categorization of the applications.

Should you need more info on the same, kindly revert to us

For more details and preparation, use below tools and you may contact Sujata Computers Pvt Ltd:

Warmest regards
Paresh Lodha
+91-7276000222

Sujata Computers Pvt Ltd

Microsoft Cloud Accelarator Partner |
Microsoft Cloud Deployment Partner|
Microsoft Gold Volume Licensing Partner

Sujata Logo

Hits: 9062
0

Source of information: Office blogs

Written by: Microsoft office 365 team

We’ve all been there, you search for an email or calendar invite in Outlook only to find that it isn’t there anymore. Until now deleted items were moved into the Deleted Items folder, then they would disappear after being in that folder for 30 days. With this update, the length of time items remain in the Deleted Items folder is extended to indefinitely or according to the duration set by your administrator. So that email or calendar invite you were looking for is still there if you search for it later—even if you accidentally deleted it.

If you are an Office 365 administrator, this means we’ll be updating the Default MRM Policy for everyone using Exchange Online over the next month. As an administrator, you also have control over this behavior. If you want to keep the 30-day policy or set a custom retention period, that can be done as well and you don’t even need to wait for the change. Also, if you have already created a custom MRM policy, (as long as it has a name other than “Default MRM Policy”), you don’t need to do anything and the change will not impact you.

Create a custom retention policy

You can either edit the name of the Default MRM Policy or create a new policy to opt out of this change. To change the policy name in Office 365 navigate to Office 365 Admin >Exchange admin center > compliance management > retention policies. Next, select Default MRM Policy, click the edit icon and then change the name of the policy.

Extended-email-retention-1

Exchange admin center for compliance management and retention policies.

Extended-email-retention-2-edit

Editing experience for retention policies.

Now your policy will not be overwritten and will maintain the settings you’ve specified. Frequently asked questions

Q. Will this be only for new users or will this policy change for all my users who are already in Office 365?

A. This change will affect all existing and new users in your Office 365 tenant who have been assigned the Default MRM Policy.

Q. What if I customized the Default MRM Policy with other settings and properties, but did not rename it?

A. Modifying the properties in the Default MRM Policy alone will not exclude it from being overwritten by this change. If you have customized your Default MRM Policy and kept the original name, the change will still apply.

Q. Does this policy apply to the Recoverable Items folder?

A. No the change does not apply to the Recoverable Items folder. It is only for the visible Deleted Items folder.

Q. If I already have a custom retention policy, will it also be changed to this new default?

A. No, custom policies that you have created will not be modified. For example, if the admin has added extra tags, modified the retention period, modified retention enabled of an existing tag etc. the new behavior will not be enforced.

Q. Does this change affect “Move to Archive” actions on the Deleted Items folder?

A. No, this change will not affect any explicit tags set by the users on items in the Deleted Items folder.

Q. If there is a “Move to Archive” action on the Deleted Items folder will that be affected?

A. No, the change will not affect any “Move to Archive” actions on the Deleted Items folder.

Q. Will this change apply both to the primary and personal archive mailbox Deleted Items folders?

A. Yes, the change will apply for the Deleted Items folder in both the primary and archive mailbox.

Q. Will this change affect a Litigation Hold or In-Place Hold?

A. No, this will not an affect Ligation Hold or In-Place Hold.

Q. How is Microsoft implementing this change?

A. We are instructing the system to ignore the 30 day delete tag on the Deleted Items folder if the retention policy’s name is “Default MRM Policy.”This is why changing the policy name will ensure that the tag continues to work. We are not removing or disabling the tag.

Hits: 1486
0

UNIFIED THREAT MANAGEMENT (UTM)

In today’s increasingly mobile world, networks change constantly posing new challenges to IT team and to the administration on how to control security and protect the data. New services, access methods, and even devices continue to show up in networks at a frenetic pace.
For years, you must have been told that you need antivirus or some piece of software to protect your computer. These antivirus or software are usually reactive and alert you once they discover something unusual on a particular computer and not in the network. Of course, they are helpful but they do not provide full-proof security to your data and to your network.
 
Users are accessing an increasing number of applications with a wide range of device types, often times to get their job done, yet with little regard to the business or security risks. Meanwhile, datacenter expansion, network segmentation, virtualization and mobility initiatives are forcing you to re-think how to enable access to applications and data, yet protect your network from a new, more sophisticated class of advanced threats that are adept at evading traditional security mechanisms.
 
Below are some challenges that are now concerns for Mid-size and Enterprise Businesses -
 
Challenge #1 : Employees bringing their personal mobile and tablet at work creates data security a concern for IT team

Who could have foreseen the impact of WhatsApp, Twitter and Facebook,or iPads and Android smartphones and tablets, only a few years ago? Today, employees expect to use personal smartphones and mobile devices at work also known as Bring Your Own Device (BYOD), making data security a concern for IT teams.
 
Challenge #2 : New applications evade threat detection
Traditional or “first-generation” firewalls rely on scanning of port numbers or protocol that are used by applications to detect the  threat and to prevent any misbehavior or intrusion in the network.
Traditional firewalls cannot detect new applications that are accessed through web browser and do not use specific port number or prototype.
 
Challenge #3 : Multiple Devices or Tools Addressing Incoming Data Security Threats
With the new challenges and threats, there is a need to have multi-level security and to do so, we do not recommend customers to buy different brands of traditional firewall, Data Loss/Leak Prevention (DLP), Intrusion Prevention System (IPS), filtering of websites and data traffic, malware screening at the gateway level and patch management in the network. Different tools create problem of managing them effectively and there can be a problem of compatibility.

From a performance point of view also it is not recommended as each tool/device performs its own inspection of network data, which means that data is inspected multiple times by multiple devices and that create a time latency in data transfer.

In below image, you can see the flow of the data and the possible ways in which threat can enter into the network.

UTM


BOTTOM-LINE :

As a network’s complexity increases, so does the expense required to manage that network.
Every administrator should carefully consider the TCO of add-on security appliances versus an integrated solution like UTM or Next-Gen Firewall before making significant infrastructure solution commitments.
UTM should be flexible in terms of output, should be future-ready and should be powerful enough to support your requirement.

The application, content, and user—the elements that run your business—then become integral components of your enterprise security policy. The result is the ability to align security with key business initiatives.

  • Safely enable applications, users and content by classifying all traffic, determining the business use case and assigning policies to allow and protect the relevant applications.
  • Prevent threats by eliminating unwanted applications to reduce the threat footprint and applying targeted security polices to block known vulnerability exploits, viruses, spyware, botnets and unknown malware (APTs).
  • Embrace mobile computing by ensuring devices are properly configured and that they are protected from threats.
  • Protect your datacenters through validation of applications, isolation of data, control over rogue applications and high speed threat prevention.
  • Secure cloud-computing environments with increased visibility and control; deploy and maintain security policies at the same pace as your virtual machines.

UTM-Solution-Sujata Computers Pvt Ltd

As we write this, the best UTM solutions for networks include the following core security functions / policies in their arsenals:

  • Network firewalls perform stateful packet inspection.
  • IPS detects and blocks intrusions and certain attacks.
  • Application control provides visibility and control of application behavior and content.
  • VPN enables secure remote access to networks.
  • Content filtering halts access to malicious, inappropriate, or questionable websites and online content.
  • IPv6 support in all network security functions protects networks as they migrate from IPv4 to IPv6.
  • Support for virtualized environments, both virtual domains and virtual appliance.

They also include additional security technologies that organizations can choose to deploy, including

  • Data loss prevention that blocks accidental or intentional loss of confidential, proprietary, or regulated data.
  • Anti-virus/anti-spam protection that prevents malicious payloads or unwanted messages from entering networks.
  • Endpoint control that enforces corporate security policies with remote users and devices.
  • Integrated wireless LAN (WLAN) controller to consolidate all wired and wireless traffic through a single device, to simplify policy creation and enforcement while reducing network complexity.

SOLUTION TO CHALLENGES ABOVE :
UTM solution is integration of multiple security features like firewall, application control, intrusion prevention, VPN, reporting and other elements into a single product. There are multiple brands for which Sujata Computers Pvt Ltd has expertise in.  We can recommend you an appropriate brand and model from Fortinet, SonicWall, Check Point, Cyberoam, Juniper, Palo Alto, Sophos and Cisco depending on your use, industry, existing and future infrastructure, budget and skill-set available with your IT team.
In short, we recommend UTM that includes following features:

Firewall
Application Control
IPsec and SSL VPN
IPS
Web content filtering
Anti-spam
Data loss/leakage prevention
Anti-virus and anti-spyware protection
IPv6 native support
Traffic shaping and bandwidth control
Detailed reporting
and if you have no constrain on budget, you should opt for UTM that has independent processors for one-single activity (feature) i.e the more silicon is in UTM the better performance it will deliver.

We also take up responsibility of maintaining the UTM for its customers and help them implement it. We can sign an annual or long-term service and support contract for UTM and help our customers safeguard their infrastructure.

CONTACT SUJATA COMPUTERS PVT LTD (INDIA) FOR UTM

Dinesh Golecha | +91-8888165300 | [email protected]
Paresh Lodha | +91-7276000222 | [email protected]

Hits: 1606
0

Adobe

 

 

Hello Readers

Sujata Computers Pvt Ltd is providing Adobe Licensing and consultancy for below segment of Customers-

1.Commercial Customers.

2.Academic Customers.

3.Government Customers.

We are serving 1000+ customer from web designing and animation industry who are using Adobe software.
We are also serving 500+ school and colleges customers and more than 200+ Government Customers who are using adobe software.

Adobe Licenses which are available today as on 11 October 2014:

1.Creative Cloud for teams: All individual desktops apps are available in this suite.
2.Creative cloud for single apps: Single apps are available in this category. Acrobat is also   available as singe apps product.
3.PPBU Products like eLearning Suite, Adobe Technical Suite, Captivate, Cold fusion Builder, Contribute, Director, Technical Suite, RoboHelp Office, Robohelp Server, Lightroom, Pagemaker Plus, FrameMaker and Presenter License
4.Acrobat Standard and Professional XI

Top benefits Creative Cloud for teams

1.Get the world’s best tools – Access all the new Adobe Creative Suite 6 desktop applications you want, plus a host of additional tools and services—Adobe Muse,™ Acrobat® XI, Photoshop® Lightroom® 4, and Adobe Edge tools and services, and more. Creative Cloud gives your team the right creative tool the moment they need it. Use our expert support services to make team members even more successful.

2.Collaborate with your team - Share widely, collaborate privately. Share files with colleagues both inside and outside your organization. Use up to 100GB of cloud-based storage and device syncing capabilities to share projects anywhere, anytime.

3.Publish apps and website - Explore new outlets for your content with the publishing services included with Creative Cloud for teams. Create and host websites, deliver stunning digital apps to the iPad, and more.

4.Centralize administration - Easily manage and scale your team’s software with centralized purchasing and license management tools. You and your designated administrators can quickly add, assign, or transfer seats and track usage by team members.

5.Stay up to date - Get upgrades upon release, as well as new features and services as they become  available.

You can activate 30-days trials of different Adobe offerings from here -http://www.adobe.com/in/creativecloud/catalog/desktop.html
Creative Cloud for teams is sold through the value incentive Plan(VIP). Creative cloud for team is subscription based licensing program designed for all sizes of customers. Once VIP no. is generated you can immediately add your number of license. There is no minimum license purchase is required. It is very is easy to manage the Admin console of VIP. License are deploy immediately. Once seats is added in VIP console. Purchase order has to be placed in 30days. User can be added or removed. It’s very easy to manage it. Through Admin console companies can monitor for number of license they have purchase.
You can give me your feedback and comments for improving Adobe blog and let me know what do you want to know about Adobe.
You can contact me on 9822324300 or write to me on [email protected]

Warmest regards
Umesh Kumar
Certified Adobe Expert
Sujata Computers Pvt Ltd

Hits: 1984
0

Contact Us

Email: [email protected]

India: +91-20-40100300

US: +1-7323195103