ela technologies company profile. about elatech digital signature certificate networking computing...

35
ELA TECHNOLOGIES Company Profile

Upload: karen-anderson

Post on 17-Dec-2015

222 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

ELA TECHNOLOGIES

Company Profile

Page 2: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

About ELATECH Digital Signature Certificate Networking

Computing

Professional Services

Page 3: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

ELA TECHNOLOGIES• ELA TECHNOLOGIES is a privately held IT professional and Management services

organization. The company has been providing Digital Signature Certificates (DSC), Comprehensive Network & computing solutions across all industry segments.

• ELA TECHNOLOGIES is authorized LRAA (LOCAL REGISTRATION AUTHORITY ADMINISTRATOR) for SIFY Safescript. (DSC Issuing authority). ELA has presence physically as well as virtually across the country which enables us to serve our customer at the best.

• ELA TECHNOLOGIES consults management of your complex IT infrastructure. Our processes are defined to manage your IT infrastructure efficiently and effectively, ensuring you complete peace of mind and enabling you process your strategic business continuity effectively. We provide technology solutions partnering with the best brands in IT Infrastructure. We also provide strategic consulting designed to deliver value enhancing your company’s bottom line.

• Our business goal is to develop creative, cost-effective solution, from the design phase, through supply, installation, and provide maintenance and more importantly, excellence in support.

Page 4: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

LOCAL REGISTRATION AUTHORITY

ADMINISTRATORLRAA• Trusted Third Party

• An organization which collect application form.

• Dose Primary Verification of Document.

• Forward application form and document to – CA.

• Forward DSC Token to applicant once it approved by – CA.

Page 5: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

NETWORKINGA computer network or data network is a telecommunications network that

allows computers to exchange data. In computer networks, networked computing devices pass data to each other along data connections.

A computer network is a telecommunications network that allows computers to exchange data.

The physical connection between networked computing devices is established using either cable media or wireless media.

The best-known computer network is the internet. Computer network A collection of computing devices that

are connected in various ways in order to communicate and share resources.

Usually, the connections between computers in a network are made using physical wires or cables.

However, some connections are wireless, using radio waves or infrared signals.

Types of Network Based on the size and the coverage

area, networks are categorized into the following types: Personal Area Networks (PANs) Local Area Networks (LANs) Metropolitan Area Networks

(MANs) Wide Area Networks (WANs)

Page 6: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

PERSONAL AREA NETWORKS (PANs)

A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person.

Is a small network established for communication between different devices, such as laptops, computers, mobiles, and PDAs.

A pan may include wired and wireless devices.

The reach of a pan typically extends to 10 meters.

Page 7: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

Local Area Network(LANs)

A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office building, or closely positioned group of buildings.

Each computer or device on the network is a node.

Wired LANs are most likely based on Ethernet technology.

Page 8: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

Metropolitan Area Network (MAN) It is relatively larger than LAN and extends across a city or

a metropolitan.

It is created by connecting two or more LANs located at different locations in a city.

Page 9: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

Wide Area Network(WANs) A wide area network (WAN) is a computer network that

covers a large geographic area such as a city, country, or spans even intercontinental distances.

A WAN uses a communications channel that combines many types of media such as telephone lines, cables, and air waves.

A WAN often makes use of transmission facilities provided by common carriers, such as telephone companies.

One of the most prominent examples of the existing wans is the Internet.

Page 10: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

ROUTING

Routing is the process of selecting best paths in a network. In the past, the term routing was also used to mean forwarding network traffic among networks. However this latter function is much better described as simply forwarding. Routing is performed for many kinds of networks, including the telephone network (circuit switching), electronic data networks (such as the Internet), and transportation networks.

Page 11: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

SWITCHINGSwitches can be a valuable asset to networking. Overall, they can increase the capacity and speed of your network. However, switching should not be seen as a cure-all for network issues. Before incorporating network switching, you must first ask yourself two important questions: First, how can you tell if your network will benefit from switching? Second, how do you add switches to your network design to provide the most benefit?

Page 12: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

SECURITY

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.

Page 13: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

WIRELESSA wireless network is any type of computer network that uses wireless data connections for connecting network nodes.Wireless networking is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model network structure.

Page 14: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

COMPUTINGComputing is any goal-oriented activity requiring, benefiting from, or creating algorithmic process- e.g. through computers. Computing includes designing, developing and building hardware and software systems; processing, structuring, and managing various info. 

A machine capable of following instruction to alter data in a desirable way and to perform at least some of these operations without human intervention.

A computer is a programmable machine that receives input, stores and manipulates data, and provides output in a useful format.

Computer was used as an electronic device that allows inputting data and having it stored, processed, or otherwise manipulated quickly and efficiently.

Page 15: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

SERVERA server is a system (software and suitable

computer hardware) that responds to requests across a computer network to provide, or help to provide, a network service. Servers can be run on a dedicated computer, which is also often referred to as "the server", but many networked computers are capable of hosting servers. In many cases, a computer can provide several services and have several servers running.The term server is used quite broadly in information technology. Despite the many server-branded products available (such as server versions of hardware, software or operating systems), in theory any computerized process that shares a resource to one or more client processes is a server. To illustrate this, take the common example of file sharing. While the existence of files on a machine does not classify it as a server, the mechanism which shares these files to clients by the operating system is the server.

Page 16: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

TYPES OF SERVERApplication server a server dedicated to running certain software applicationsCatalog server a central search point for information across a distributed networkCommunications server carrier-grade computing platform for communications networksCompute server, a server intended for intensive (esp. scientific) computationsDatabase server provides database services to other computer programs or computersFax server provides fax services for clientsFile server provides remote access to filesGame server a server that video game clients connect to in order to play online togetherHome server a server for the homeMail server handles transport of and access to emailMobile Server or Server on the Go is an Intel Xeon processor based server class laptop form factor computer.Name server or DNSPrint server provides printer servicesProxy server acts as an intermediary for requests from clients seeking resources from other serversSound server provides multimedia broadcasting, streaming.

Page 17: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

What Is STORAGE And What Problems Does It Solve?Computer data storage, often called storage or memory, is a technology consisting of computer components and recording media used to retain digital data. It is a core function and fundamental component of computers. The central processing unit (CPU) of a computer is what manipulates data by performing computations.

Page 18: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

THE WORLD HAS CHANGEDNew

Applications

Massive storage demand, unpredictable future

Compressed Planning Horizon

Planning cycle – a thing of the past

105

52

IT-as-a-Service

Massive consolidation, unpredictable workloads

89%of workloads virtualized

by 2015

Page 19: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

Virtualization

Virtualization is a term used across the IT field to refer to a number of different technologies. Different types of virtualization include storage virtualization, data virtualization, server virtualization (a type of hardware virtualization), application virtualization, network virtualization, operating system virtualization, and paravirtualization.Virtualization is primarily about organization and efficiency. It can mean separating something large (the “real” environment, whether that be an individual operating system or an actual physical server) into component parts (the “virtual” environments), which allows a number of different instances of the technology to run simultaneously and with reduced or nonexistent interference. It can also mean forming a larger, composite virtual environment composed of a number of smaller systems.

Page 20: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

Storage VirtualizationThis type of virtualization allows numerous

hard drives or other storage devices to be combined into one virtual environment (VE) for storage. Administrators for a business’s network are then able to manage everything from one centralized location, which obviously greatly simplifies administration. It’s easier to know the amount of available resources at a quick glance, back up the system more efficiently, etc.Additionally, migrating data and storage expansion can be accomplished more smoothly using this type of virtualization. Data can be transferred between one device and another with no disruption to operability. Plus, if a device’s storage maxes out, it is easy to allot additional room within the overall storage threshold.

Page 21: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

Virtualizing data means that a user can access the same information from multiple physical locations. Data virtualization moves the data to a server, maps it to its original location, and allows you to view it. This allows you to scroll through the data as if looking at a webpage, without having to bring it directly onto your computer or another server.Lieutenant Commander Data from Star Trek should, however, never be virtualized. He should instead remain in our hearts, where he belongs. Beam him up, sure – but only beam him to a different location. Never just beam him.

Data Virtualization

Page 22: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

Server Virtualization or Hardware VirtualizationVirtualizing hardware such as a server is

perhaps the most common sense of virtualization for hosting customers. A virtual private server (VPS), also called a virtual dedicated server (VDS), allows a server the ability to use multiple operating systems and multiple applications which might otherwise conflict or perform the same essential function.Bringing the functionalities of multiple servers into one server means that servers can be consolidated, reducing hardware expenses and decreasing administrative costs.Upgrading, patching, and disaster recovery planning (DRP) all become vastly simplified. The network additionally becomes more energy-efficient (also another cost-saving benefit) and utilizes resources more effectively.

Page 23: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

Application VirtualizationEssentially, virtualizing an application

separates the operating system from the application. The application then runs on the server or another remote computer rather than on the computer where it is being used. One major benefit of application virtualization is that you can run incompatible applications at the same time. You can also run an application that is not designed for the operating system of the computer from which you are accessing it.Finally, virtualizing applications means that they do not have to be downloaded to the end-user’s computer. This allows for easier management of these applications if they’re on one of your network’s servers. If they are not on your network’s servers, you have less worries about a poorly coded application interfering with computer operations.

Page 24: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

Network VirtualizationCombining all of the resources within your

network, allowing the administrator of the network to share those resources across all users, is called network virtualization. The network is divided into a number of different channels, each of which contains a portion of the bandwidth of the network. This makes it easier for the administrator to assign resources as users need them.Access to the network as a whole from an individual computer means that it is easier for individual employees of the business to work on the same file – there is no need to transfer or download it. In fact, it is the same file… similar to working on a file within Google Drive. It also means that the entire network can be accessed from any computer within the network. This practice makes it simpler to perform business operations without having to be working on a particular computer.

Page 25: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

Operating System Virtualization

This type of virtualization, also called container-based virtualization, uses the same operating system on a server but chops it up into component parts. Each virtual environment has its own sets of rules and access – is its own virtual server – with the one exception that it all must be compatible with the same operating system.Open VPN is an example of an open source version of OS virtualization. Another example is Oracle Solaris.

Page 26: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

PROFESSIONAL SERVICESRegardless of your size, ELA Technologies can customize a solution to fit your

needs. We work on a collaborative process wherein we consult with your team to determine what solutions will work best for your business. Our unbiased and no-nonsense approach allows us to find the most cost effective solution, enabling your business to better manage growth into the future. 

Our suite of Professional Services include :

Consulting Designing Integration Implementation Maintenance Facilities Management

Page 27: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

ConsultingInformation technology consulting (also called IT consulting, computer

consultancy, computing consultancy, technology consulting, business and technology services or IT advisory) Here we focuses on advising businesses on how best to use information technology to meet Customer business objectives. In addition to providing advice, IT consultancies often estimate, manage, implement, deploy, and administer IT systems on businesses.

As IT consultant we possess the following skills:

Advisory skills Technical skills Business skills Communication skills Management skills Advisory language skills Business and management language skills Technical language skills

Page 28: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

DesigningA traditional network planning methodology involves

five layers of planning, namely:• business planning• long-term and medium-term network planning• short-term network planning• IT asset sourcing• operations and maintenance.Each of these layers incorporates plans for different time horizons, i.e. the business planning layer determines the planning that the operator must perform to ensure that the network will perform as required for its intended life-span. The Operations and Maintenance layer, however, examines how the network will run on a day-to-day basis.The network planning process begins with the acquisition of external information. This includes:• forecasts of how the new network/service will

operate;• the economic information concerning costs; and• the technical details of the network’s capabilities.

Page 29: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

IntegrationWe use or combine data from multiple sources while maintaining the integrity and

reliability of the data. 

In today’s dynamic environment, businesses rely on communication networks as a key element of success. While applications or devices may be the focus of a new IT initiative, your network is the vehicle by which your customers and employees are able to take advantage of new functions. Your network also enables collection of real-time data from applications—and increasingly, from sensors—that you depend on to make decisions about your business. Now, more than ever, your network must be high performance, continuously available and secure in order to achieve your business objectives.

Network integration services from ELATECH can help you create a network that enables your IT infrastructure to adapt to rapidly changing business needs and emerging technologies. These services—planning, design, deployment and ongoing monitoring and management—help you provide the ubiquitous access to applications and data necessary to meet today’s business requirements.We consultative approach to help you navigate the available options and deliver a network that contributes optimally to meeting your business goals. Our skilled professionals are focused on helping you to smooth transitions and improve service delivery. By using an approach that facilitates collaboration between your business units and IT and networking organizations, ELATECH can help you derive more business value from your network.

Page 30: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

Implementation

ELATECH Implementation expertise include Design, Supply, Installation, Test & Certification Activities.

Principle Certify Technical Experts team enable ELATECH to meet customers business support logical requirements.

Our proven activity's are as below.

Understanding requirement.Time Management.Signal point of contact. Timely update.Skilled, responsive team.Positive attitude.

Page 31: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

MaintenanceIt is obvious and understood the value of

IT equipment's.

Maintenance support can be provided by to way. 1) Physical & 2) Remotely.

It depends on IT infrastructure & requirement of up-time what type of support one organization go for.

We support.Remotely.7x58x824x7Residence Engineer.

Page 32: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

Facilities ManagementAt ELATECH Our goal is to deliver tangible business benefits to our customers. To

achieve this, we offer a range of unrivalled end-to-end IT infrastructure management services:

We take over your overall management of varied IT assets across vendors. We capture all the service requests logged via mail, telephone or the Web. These include call management, asset and inventory management, client recovery services and vendor management. We boost the performance of your data center by proactively monitoring, forecasting and realigning IT resources. We undertake network, server, security and database administration; data backup; and application support. We also support your end-users with services such as desktop / laptop operations, LAN management, peripherals support, mail management, antivirus system management, and installation and configuration of client desktop applications. 

Providing Maintenance for IT Infrastructure.Hardware Redundancy.Providing on-site support engineer.Call log with principal behalf of customer.Temporary hardware arrangement on rental.Training to customer IT staff.

Page 33: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

Few of Our Clients.Bharat Serrum India Ltd.

MumbaiDaman Hospitality Pvt. Ltd.

Daman (UT)Shawman Software Pvt. Ltd.

MumbaiJubilant Group Of Companies.

MumbaiEastern Cargo Pvt. Ltd.

MumbaiWaaree Industries Ltd.

MumbaiMahagenco

MumbaiECIL

HydrabadGraphiti Multimedia Pvt. Ltd.

MumbaiAkash Entertainment Pvt. Ltd.

MumbaiCorromandal General Insurance Company Ltd.

MumbaiCorromandal Fertilizers Ltd.

MumbaiMafatlal Cypherspace Pvt. Ltd

MumbaiWaterfront Show Pvt. Ltd.

LawasaEureka Forbs Ltd.

PuneJP Scientific Instruments

Vadodara

Page 34: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

www.elatech.net

Few of Our Clients.Hindustan Rubbers Silvassa

SilvassaOxford Rubbers Pvt Ltd

BangaloreBMW Steels ltd

HathrasArtech communications

MumbaiIshah International

MumbaiSreevari Engineers Private limited

TiruchirapaliAnatech Instruments

MumbaiQuality Manufacturing Company

MumbaiBengal Tools Ltd

KolkataPall India Pvt Ltd

MumbaiMartin Engineering Company India Pvt Ltd

PuneAmco Industries

HaridwarOmega Engineering Works

HaridwarDFW Envirotech India Pvt Ltd

NagpurAEROTRONIX

TrichyEnvirotech Online Equipements Pvt Ltd

Hydrabad

Page 35: ELA TECHNOLOGIES Company Profile.  About ELATECH Digital Signature Certificate Networking Computing Professional Services

THANK YOU