On the strength of the long standing and excellent relationship with our valued clients, associates, ecosystem partners and friends, Qadit Systems and group entities have grown both in terms of service offerings and service quality.
This has necessarily added to another dimension- the quantum of human resources in our fold.
With a view to constantly raising the bar as far as client deliverables go and as a concomitant, providing the right ambience for our human resources to serve you, we have moved to bigger premises supported by state–of- the- art infrastructure at :
1st Floor, Balammal Building (above Canara Bank)
33, Burkit Road, T.Nagar
Chennai 600 017
Phone: 044-42791150 to 52, 6547 7225
The US Government Accountability Office (GAO) did a study on the benefits and risks of moving federal information technology into the cloud and released a report titled ‘Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing’ summarizing it’s findings.
Continue reading “Benefits & Risks of moving Federal Information Tech into the Cloud: A GAO Report”
During the recent BWA auctions, the government has earned a lot of revenue to mitigate a part of its burgeoning fiscal deficit. But very few people know what this technology is and its superiority over the current technologies. So lets have a spot light on this technology. Continue reading “Tech Demystified – WiMAX”
You can connect to your work computer from your home computer and have access to all of your programs, files, and network resources as though you were in front of your computer at work. You can leave programs running at work and when you get home, you will see your work computer’s desktop displayed on your home computer, with the same programs running. You will need “Remote Desktop Connection” (RDC). Continue reading “How to connect to a remote PC over internet? – Part 1”
In a Windows XP workgroup environment there might be a need to password protect or restrict access to specific folders. Here is a tip on how to achieve this.
Continue reading “Password protect folders in Windows XP Workgroup environment”
I use the term “hacker attacks” to indicate hacker attacks that are not automated by programs such as viruses, worms, or trojan horse programs. There are various forms that exploit weakneses in security. Many of these may cause loss of service or system crashes.
Continue reading “Types of Hacker Attacks”