Category Archives: Internet

Using SaaS to Improve Efficiency, Accountability and Trust: The Green Impact


How to Get into the Cloud

Founders Technology Group Blog

google vs officeSo… you want to go to the cloud.  You need to work there so that means picking some software… and the best options are either Google Apps or Microsoft Office 360.

When comparing these two, it is important to consider all expenses, including time and money related to training.  If you and your employees are comfortable with the Microsoft interface, then the switch to Microsoft Office 360 will be easier.  It may take a only few seconds more to complete a task in an unfamiliar setting but there are hundreds of tasks in an eight hour workday and those few seconds can mean one or two hours of lost productivity.  At two hours, that’s 20%!  Not a reassuring number in a “do more with less” world.

Most people agree that, if you want spreadsheet capabilities and formulas, Microsoft Excel is much better than its competitor is.  And that brings…

View original post 421 more words

Set up a web server and enable https connection.

Sukanya Anoop

HTTPS is a secure communications channel that is used to exchange information between a client computer and a server. It uses Secure Sockets Layer (SSL). A SSL certificate is a way to encrypt a site’s information and create a more secure connection.

We need to do the following steps to setup a secure web server- apache using SSL

  • Install apache2 web server
    sudo apt-get install apache2
  • The next step is to enable SSL on the droplet.
    sudo a2enmod ssl
  • Restarting Apache.
    sudo service apache2 restart
  • We need to create a new directory where we will store the server key and certificate
    sudo mkdir /etc/apache2/ssl
  • Create a self-signed certificate : We nee to specify how long the certificate should remain valid by changing the 365 to the number of days we prefer. As it stands this certificate will expire after one year.
      sudo openssl req -x509 -nodes -days 365 -newkey…

View original post 162 more words

Microsoft joins list of recently hacked companies

The software giant said it was hit with a similar hack to that used against Facebook and Apple

Microsoft has disclosed that it recently fell victim to the same type of cyberattack that targeted Apple and Facebook.

“During our investigation, we found a small number of computers, including some in our Mac business unit, that were infected by malicious software using techniques similar to those documented by other organizations,” the company said on its Security Response Center website Friday.

“We have no evidence of customer data being affected and our investigation is ongoing,” it said.

Microsoft joins a list of companies that’ve recently reported being hacked, including Facebook, Apple, Twitter, The New York Times and The Wall Street Journal.

Apple and Facebook were both targeted via a vulnerability in Oracle’s Java platform, and Microsoft said Friday it was hit by a similar attack.

“This type of cyberattack is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries,” it said.

The Times, the Journal and Apple each pointed at China as the source of the attacks. Twitter didn’t say where it thought the attacks originated but urged 250,000 of its users to change their passwords.

China has denied involvement in the attacks.

For Network security products and services visit Vyom Consultants.


Data Centre Virtualisation and VDI

data centre virtualisation

Server / Virtualisation

Business Transformation

Data centre virtualization improves the efficiency of resources and availability of applications in your organization, addressing the issue of underutilized resources in a traditional model of single applications housed on dedicated servers. Effort in managing environments is redirected towards innovation.

A virtualized datacentre, lets you respond to business change faster and more efficiently than ever before; consolidation of resource pools delivers substantial savings, improved returns on investment whilst maintaining high-availability for mission critical services.

Key benefits

Run multiple operating systems on a single computer; improved utilization rates

Reduce capital costs by increasing energy efficiency provisioning less hardware and increasing your server to admin ratio

Enterpriseapplication performance to the highest levels of availability and reliance.

Develop business continuity with improved, seamless, disaster recovery solutions and shorter recovery times

Improved change management & desktop control

Faster deployment of desktops and new services; fewer application conflicts – reduced Service Desk and Support calls.

Capacity Planning

Migrating to a Virtual infrastructure, whether a partial or full consolidation project, is a significant undertaking.

Large scale changes to environments, such as virtualization, go far beyond conventional change management situations and require a detailed systematic approach obtaining information about the current physical infrastructure, the overall objectives and goals of the project, in depth analysis of both technical and business constraints.

Small virtualization projects are normally carried out to either replace a failing or ageing hardware or to create a development environment, the successful deployment often the required result.

In larger scale virtualisation projects the goals are quite different, the objectives behind the projects often include consolidation of resources, rationalisation of business processes, centralisation of data, increased reliability and resilience and reduced cost.

Amicus ITS understands your need to plan, effectively, for the future and takes a rigorous approach to ensure that it is done in a way that mitigates risk, maximizes the reliability of the affected business services and provides a clear path to the lowest possible total cost of ownership.

Virtual Desktop Infrastructure (VDI)

Virtual desktop infrastructure (VDI) is similar to server virtualization, which virtualizes users’ desktops. Unlike servers however, virtualized desktops need a broader collection of tools to interact directly with end users, as well as to create, host and manage virtual machines.

Benefits of VDI include

  • Lower costs by centralizing management and resources; less administration.
  • Increased security by moving data fromthe desktop and into the datacentre
  • Business agility through faster deployment and flexible, universal, user-access

Thin Clients and Provisioning

VDI is a broader technology and when desktops are centrally hosted, users often access them through a ‘thin’ client and can include, optionally, a connection broker that authenticates connections and assigns users to Virtual Machines (VM). This enables companies to provision VMs and managing resources for peak demand rather than total usage.

VM provisioning can be helpful in call and contact centre environments, where employees work in shifts.

Visit Vyom Consultants for Data center Virtualisation and Support.

Cloud computing in Pune from Vyom consultants

cloud computing pune

Cloud Computing


We believe that IT is a strategic asset and an opportunity for delivering competitive advantage.  Through implementation of Cloud Computing, we can drive further value and performance improvement for all businesses both large and small.  Through our Cloud Integration Services, we can help you uncover more ICT efficiencies and business value.

Our Chief Technology Officer at VYOM, understands the value which cloud computing can provide to business.  VYOM’s “technology for business” background experience means  we are well placed to advise on how cloud solutions can eliminate unnecessary costs and improve your business performance.

”There is much discussion around the benefits and simplicity of ‘the Cloud’ – but how do you know if your business  can avail of these new services and ensure they will deliver the promised advantages? At VYOM, we understand the complexities of moving to the cloud and can develop a cloud-ready plan for your business and implement your move.  And if you are a start-up business, we have the solutions to get you up-and-running swiftly.

With our experience as a provider of Cloud Integration services, we can provide you with expert guidance and a migration path for your business where appropriate.

Cloud Computing is an emerging technology which should be examined strategically for a business. It is not just about selecting the appropriate cloud solutions but how IT will inter-operate across the business.”


No capital costs

Match computing requirements to actual need

IT is accessible fromanywhere

Reduce carbon footprint and energy bills

New servers can be provided in as little as 30 minutes

Availability of temporary computing power when required

Lower administration costs

Improve IT resilience

Resources can be scaled to suit demand


Design skillsets to help clients choose most appropriate solutions

Experience in client migrations

Managed Services team to provide full visibility, monitoring and  support

Service management of users and desktops available through VYOM Service Centre


Hosted Applications

Software as a Service (SAAS)

Infrastructure as a Service (IAAS)

Microsoft Software including Office 365

Multi-tenanted solutions including VDi

Further information:

We’d be delighted to talk through our approach to Cloud Services, so why not contact us and we’ll talk with you straight away.

Visit Vyom consultants for more details

Network management services from VYOM consultants

network management services


Vyom offers network management services. Network management is a service that makes use of a variety of tools, devices and applications to assist network managers in the maintenance and monitoring of large-scale computer and telecommunications networks.

The network management tools assist you in simplification, automation, and integration of the network to reduce the over all operational costs and improving productivity.

Network management is execution of a set of functions required for controlling, planning, allocating, deploying, coordinating, and monitoring network resources, including performing functions such as:

Gathering network elements

Data Storage

Analysis and Prediction

Configuration and control of network elements

Performance and system planning management

Initial Network Planning

Frequency Allocation

Cryptographic Key Distribution Authorization

Configuration Management

Fault Management

Security Management

Performance Management

Bandwidth Management

Accounting Management

Key Features of Network Management:

> A cost-effective, open source solution integrating with other leading open source tools.

> Visibility into the availability and performance of entire infrastructure

> Easy and cost-efficient to deploy and maintain

> A single point of access for consolidated information frommonitoring systems

> Helps network administrators track machine uptime, outage and usage information so they can keep their   operations healthy

Interfaces supported:

Network elements such as interfaces on switches and routers

Services which network resources provide such as web pages, database access, DNS, DHCP, etc.


Protocols Supported:

Citrix                                    LDAP                                             SMTP

DHCP                                   Microsoft Exchange                   SNMP

DNS                                     Notes HTTP                                  TCP

Domino IIOP                     POP3                                              ICMP

FTP                                       SMB                                                IMAP

HTTP                                    HTTPS



Monitoring of network services (SMTP, POP3, HTTP, NNTP,PING, etc.)

Monitoring of host resources (processor load, disk and memory usage, running processes, log files, etc.)

Monitoring of environmental factors such as temperature.

Ability to define network host hierarchy, allowing detection of and distinction between hosts that are down and those that are unreachable

Contact notifications when service or host problems occur and get resolved (via email, pager, or other user-defined method)

Optional escalation of host and service notifications to different contact groups

Ability to define event handlers to be run during service or host events for proactive problem resolution

Support for implementing redundant and distributed monitoring servers

External command interface that allows on-the-fly modifications to be made to the monitoring and notification behavior through the use of event handlers, the web interface, and third-party applications

Retention of host and service status across program restarts

Scheduled downtime for suppressing host and service notifications during periods of planned outages

Ability to acknowledge problems via the web interface

Web interface for viewing current network status, notification and problem history, log file, etc.

Simple authorization scheme that allows you restrict what users can see and do fromthe web interface

Contact VYOM consultants for more details