010815 fitag news paper

Page 1

For Space Booking in

FITAG ITAG TIMES

www.fitag.in

01 08 2015

Vol. 2, Issu No. 12, Page 8

Saturday

Ahmedabad, Gujarat

Monthly Edition

ITAG

fitagtimes@fitag.in Dhaval: 9824066111

For Space Booking in

FITAG ITAG TIMES

fitagtimes@fitag.in Dhaval: 9824066111

FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

President’s Message

-Editorial Dear Fitagians, Greetings!!! Change is inevitable! Change is welcome! Change is destined! I strongly believe that change is must every where, may it be your own working method, environment or business to bring in positive and improved results in the ongoing. At certain intervals any organization needs fresh people with new ideas to come as the chair persons to put the organization at a different level. FITAG has undergone a positive change. New committee of FITAG has been formed keeping our tradition of selecting the appropriate person to sail the ship further and let the organization reach to new heights. A capable and successful president has taken retirement and another capable and expectant president has taken over. Mr. Gaurang Vyas from ACMA retired as president

Mr. Kaushik Pandya Editor

of FITAG after his tenure of two years and Mr. Amit Shah from BITA has taken over as president FITAG. Responsibilities are shifted to a new head to lead the organization to newer heights. FITAG has set an example to the entire India that such federation can be formed and operated successfully. Many larger goals have been visualised and some of them are achieved also by this broader body. We all know very well that leaving with the same idea few other state federations have been formed and now there has been a formation of country wide federation. I am glad to say that FITAG has played a very crucial role in forming FAIITA.

continued on page 3...

I

t is my immense pleasure to address all of you at FITAG Times, the strongest communicating tool of IT industry. Thanks to all associations of Gujarat & its’ representatives who has given me this opportunity. Thanks to team BITA who nominated my name to FITAG. We all are business men. We are doing white collored job. Our business has the highest ROI & the lowest cost of stock. IT is everywhere & present society cannot think to work without IT. On the other hand market is very slow, margins are very thin. We are doing service oriented business where customer is not ready to pay for services. But the biggest problem is we are losing patience from our business & that’s biggest worry. Now a days, Information Technology consist of IT, Telecom, Mobility, Presen-

tation – Home Theater, Digital Signage, Cloud, Software, Education, Training & more. So it’s not simply computing resources but comprehensive solutions. Also it consist of different business models like Retail, VAR, Solution Provider, Distributor, Regional Distributor, Service Provider, Training Institutes & more. Every segment need different environment to grow. So everyone has different challenges. There are 3 ways: TO MOVE – Right, Left & Up. No one here to move down! TO DO BUSINESS – at time of draught, sale water, at time of flood sale rain coat and at time of good crops sale prosperity. TO LIVE – Like Kamdar who works with Hands & legs; like Karigar who works with Hands, Legs & Mind and like Kalakar who works with Hands, Legs, Mind & Heart. TO FOLLOW RA-

MAYANA – Satya, Prem & Karuna And TO LIVE BHAGWAT GITA – Karma, Bhakti & Gyan. We are belongs to Gyan. We provide opportunity to share knowledge from one domain to another and to build the best planet. One day God come to us & ask have you built the best IT fraternity of the world at Gujarat, with the knowledge given to you? So, let’s come on a single platform & find out way to do so....things turn out to be better when everyone is on the same page (from book “Our Iceberg Is Melting”). The failure to give appropriate and timely feedback is the most extreme cruelty that we can inflict on any human being. Any feedback, even negative feedback, is better than no

feedback. Achievement requires continuous feedback. Let’s use www.fitag.in as an interactive platform for feedback and FITAG Times (editor@fitag.in) as an authentic communication tool. Let’s keep in touch at president@fitag.in. Thank you in advance for supporting team FITAG to build the best industry – Information Technology. <


ITAG Times

itag

Team

www.fitag.in Saturday

FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

01 08 2015

2

FITAG OFFICE BEARERS Amit Shah Desh Infotech Pvt. Ltd. (ab's infotel) GF Manubhai Tower Kalaghoda Station Rd., Sayajigunj Opp. Arts College, Baroda-390005 amit@absinfotel.com +91 9227527157 Vice President

Pranav Parikh

General Secretary

Vinod Patel

Desktop Creators G-4, Vaibhav Towers, V.V.Nagar Road, Anand-388001

Keval Infocom Pvt Ltd 101, Gayatri Complex Opp. P.P. Phulwala Nr. Jagnath Police Chowky

desktop_anand@yahoo.co.in Mo. +91 9825031617

Dr. Yagnik Road, Rajkot-360001

Joint Treasurer

Bhavesh Dave Shreeji Infotech. 6, Municipal Market Opp. Civil Hospital Near Police Line Station Road, Visnagar shreeji1978@gmail.com Mo. +91 9824018648

Kutch Coordinator

Mr. Nitesh Senghan Nice Infotech & Cafe. 38, Murlidhar Complex Near Dena Bank Bus Station Road, Mundra niceinfotech.cafe@gmail.com Mo. +91 9879159191

kevalinfocompl@yahoo.com Mo. +91 9099053504

Central Coordinator

Bharat Patadia M. B. Infoware Shop No. 2 Lohana Vadi Opp. Bala Hanuman Sardar Patel Road, Surendranagar mb_infoware@yahoo.co.in Mo. +91 9824285281

Advisory

Mr. Kaushik Pandya Kalp Systems Editor Fitag Times 302, Shreyash, Near Navrangpura Post Office, Navrangpura, Ahmedabad-380009

kalp@kalpsystems.com Mo. +91 9825031502

President FITAG

General Secretary

Joint Secretary

Treasurer

Gaurang Desai

Narendra Bhetaria

Dipal Shah

Blumax System 1st Floor, Parag Shopping Centre Near B.K. Cinema, Mehsana gdesai@bluemaxindia.com Mo. +91 982501591512345

Harsh Systems Pvt Ltd 2nd Floor, Jay Veer House, Near Naranpura CrossRoads, Naranpura, Ahd-380013 nnbhetaria@yahoo.co.in Mo. +91 9824077386

Dazzle Computer Media Plot No:346/2 Kapidhwaj Complex, 2 Nd Floor Nr.Gh-5, Sector-22, Gandhinagar-382 dazzle_computermedia@ yahoo.co.in M0.+91 9825068128

South Coordinator

Saurashtra Coordinator

Kutch Coordinator

Dharmesh Gandhi Purvi Distributors. Shop No 3-4, Bdca Shopping Center Stadium Road, Valsad-396001 info@purviinfotech.com Mo. +91 9825390712

Advisory

Kalpesh Rugani Divyang Info World. 25 New Jagnath N/R Astron Chowk,, Rajkot info@divyang.biz Mo. +91 9824068880

Uday Baxi Computech Services Bhavnagar 201, Atlanta, Atabhai-Sanskar Mandal Road, Bhavnagar-364002 uday@baxi.co.in Mo. +91 9426918448

Advisory

Yogesh Thhakar Rhythm Infocom Pvt Ltd. 201 monalisa complex sayajigunj, Baroda-390005 yogesh@rhythmindia.net Mo. +91 9824009359

Manish Patel Dynamic Infosys Shop # 13, Plot # 313, Ward 12/B, Square Apartment, Nr. Lic Office, Opp. Domino Pizza, Gandhidham - Kutch, Gandhidham-370201 manish@dynamicinfo.net Mo. +91 9099945499

Advisory

Mitesh Dave Apurva Computers Technologies Pvt. Ltd 2nd Floor, Manivir Complex Vitthalpress Road, Surendranagar-363001 mitesh.dave@smartstation.in Mo. +91 9824208215


ITAG Times

itag

Team

www.fitag.in Saturday

FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

01 082015

3

FITAG OFFICE BEARERS Advisory

Satish J. Awatramani Computex Informatics Shop No. 2, Ground Floor, Plot No. 287/12b Gogia Chamber, Near R. Morakhiya Hospital Opp Kids Care, Gandhidham-370201 computexgandhidham@yahoo.co.in

Mo. +91 9925125702

Executive Member

Vipul Chauhan X-Lent Services. Gayatri Complex , Nr Dr Rao Hospital Road, Bhuj-370001 xlentvipul@gmail.com Mo. +91 9909946618

Executive Member

Pradip Prajapati Hariom Computer Services 161, Maniratna Complex T.B. Hospital Road Mehsana , northgujarat 382870 north zone, Vijapur-382874 pradipdx@gmail.com Mo. +91 9825280390

FITAG in now on Facebook. Please like Fitag Page https://www.facebook.com/Fitag23

Immediate Past President

Spokes Person

Mr.Gaurang Vyas Compu Garage, Past President Shope No.13&14,Chinmay Tower, Subhash Chauk, Gurukul Road, Memnagar, Ahmedabad

cggaurang@gmail.com Mo. +91 9824066777

Executive Member

Malay Ghedia Vector Softwares B-6, Kishan Tenament Opp Indira School B-6, Kishan Tenament, Jamnagar-361001 vectorsoftware@gmail.com Mo. +91 9824330705

continued From page 1... I expect new president to keep the momentum by doing continues activities in the benefit of the members through out the year. If

Spokes Person

Varun Amin Amin Infotech (Tally) Sales Office : 299/B, Gidc, Makarpura Service Center:1, Vardhman Appt,Manjalpur, Baroda-390010 amininfotech@gmail.com Mo. +91 9824025015

Executive Member

Hidaytulla Parmar Space Computers. 15-First Floor,Aroma Arcade No.Cozy Tower Banaskantha, Palanpur spacecomputerspln@gmail.com Mo. +91 9898678378

activities are done keeping our five point agenda in reference, than I am sure it will produce very fruitful results for all of us. Wishing you a good business in the festive season. <

Executive Member

Executive Member

Kekin Ganatra

Yagnesh Somaiya Vipul Amrutiya

Ganatra Infotech. 1, Paavan Arcade, 80 Feet Road, Nr. Ultravision School, Surendranagar-363002 scmasnr@gmail.com Mo. +91 9824227560

Unitech Computer World. 1, St Floor Maruti Complex Shakti Plot Main Road Near Hdfc Bank, Morbi-363641 unitech.morbi@gmail.com Mo. +91 9898021906

Executive Member

Executive Member

Hitesh Patel

Kamleshsinh D Jadeja

Universal Computer. 12.Arihant Complex Near Dimpal Cinema Lion'S Holl Road, Deesa universal.disa@gmail.Com Mo. +91 9879226787

Zeel Infosys. Vora Super Market Zansi Ki Rani Road, Mandvi kdjadeja@yahoo.com Mo. +91 9925737900


ITAG Times

News CORNER

FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

SMEs CREATING HEALTHY DEMANDS FOR IT SERVICES ACCORDING TO IDC’S H2 2014 IT SERVICES TRACKER DATA, THE INDIAN IT SERVICES MARKET GREW 7.1 YEAR-ON-YEAR TO REACH INR 470708.13 MILLION (USD 7719 MILLION) IN CALENDAR YEAR 2014. INDIA IT OUTSOURCING SPEND BY SERVICE (2014)

Application Management

Management

Desktop Management

Hosted infrastucture services Hosted Application services Infrastucture Outsourcing

Small Businesses Want More Financial Expertise: Intuit Study According to the latest study by Intuit nearly all of India’s small businesses believe they could have been more successful with better financial management. In the study, titled “Financial Management -An Essential Tool for a Healthy Business,” 94 percent of the entrepreneurs surveyed said they could improve their financial skills. Given that India has the second largest number of small businesses in the world - a total of 48 million- the whitepaper sheds light on the important role that financial management plays in the life cycle of a small business. The start of the new financial year is an appropriate time for small businesses in the country to take stock of their business’s financial health. The whitepaper found that 33 percent of small business owners took over three years to realize that business sustainability relies on efficient financial planning. It is critical that small businesses establish the financial management processes in the first year, and fine tune by the time they hit the three -year mark.<

itag Times reaches to

21,000 retailers / dealers across Gujarat

Fitag thanks all member associations to support antipiracy drive & authorize FITAG to deal in this regard in future. FITAG exe. committee

www.fitag.in Saturday

01 08 2015

4


ITAG Times

Articals

www.fitag.in

5

MkkÞçkh ƒË÷kŒk ‚{Þ™e Œ‚ðehe Œðkhe¾MkVh FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

Saturday

01 08 2015

ûkýu ûkýu yk…ýe …]Úðe …h ƒÄwt s ƒË÷kŒwt hnu Au y™u òýu-yòýu yk…ýu ‚ki yk …rhðŒo™™u y‚tÏÞ Vkuxku„úkVT‚{kt õuÃ[h õheyu Aeyu. nðu yk …Âç÷õ Vkuxku„úkVT‚™u yuõXk õhðk™e hku{kt[õ õðkÞŒ þY ÚkE Au.

y

„kW …rhðkh{kt ÷„À«‚t„ nkuÞ Œku yuõ Vkuxku„úkVh hkuõðk{kt ykðu y™u yu yk¾k «‚t„™k Vkuxku„úkVT‚ ÷E™u su yk÷ƒ{ ŒiÞkh õhe™u yk…u, Œu{kt yk¾k «‚t„™e ÞkË„ehe ‚{uxkE™u hnuŒe. nðu? nðu ‚ki õkuE Vkuxku„úkVh ƒ™e þõu Au! nkUþe÷k {nu{k™ku …kuŒ…kuŒk™k yU„÷Úke Vkuxku„úkVe õhu y™u …Ae ðkuxT‚yu… õu Vu‚ƒwõ õu E-{uR÷ {khVŒ yu Œ{k{ Vkuxku„úkV su{™ku «‚t„ nkuÞ yu{™k M{kxoVku™ õu õBÃÞwxh{kt X÷ðkÞ. yk Z„÷ku yuðku {kuxku nkuÞ õu {kuxk ¼k„u Œu su{™ku Œu{ hnu, Þs{k™ Œu™wt ÞkuøÞ heŒu ‚kurxO„ õhðk™e Œ‚Ëe ÷u ™nª. nðu yk yk¾e ðkŒ shk swËe heŒu rð[khku. yk …]Úðe …h™e yk…ýe nkshe …ý õkuE «‚t„{kt W…ÂMÚkrŒ suðe Au. yk…ýu ‚ki - {kuxk ¼k„™k Ëwr™Þkðk‚eyku - …kuŒ …kuŒk™k õu{uhk, M{kxoVku™Úke rzrsx÷ Vkuxku„úkVe õhŒk hneyu Aeyu y™u …Ae yu Œ{k{ Vkuxku„úkV, ‚ki™k Þs{k™ ‚{k™ „q„÷™e r…õk‚k õu Þknq™e ÂVT÷õh suðe yV÷kŒq™ Vkuxku þu®h„ ‚kRxT‚ …h Xk÷ðŒk hneyu Aeyu. yk Œ{k{ Vkuxku„úkV{kt Ëwr™Þk™k rðrðÄ ¼k„™e õkuE

yuõ [ku¬‚ ûký õuÃ[h ÚkŒe nkuÞ Au. õkuEõ heŒu, yk Œ{k{ Vkuxku„úkVT‚™u y÷„ y÷„ MÚk¤ {wsƒ y÷„ y÷„ Œkhðe™u yuõ ‚kÚku òuE þõkÞ Œku? ƒeS heŒu òuEyu Œku …]Úðe Ëhuõ …¤u

yku„¤Œe sŒe ne{™Ëeyku òuE þõeyu õu ƒk¤õku™u Í…kxk¼uh {kuxkt ÚkŒkt òuE þõeyu! ykx÷wt ðkt[e™u, ‘‚kÞƒh‚Vh'™k sq™k ðk[õku™u ̓õkhku ÚkE s „Þku nþu õu ðkŒ xkR{-÷u r‚õðL‚eÍ ŒhV

ƒË÷kŒe hnu Au. õkuE þnuh™e ðkŒ õheyu Œku yu ð»kkuoð»ko [khu rËþk{kt rðMŒhŒwt òÞ Au. õkuEõ heŒu, yk…ýu þnuh …h ƒks™sh hk¾e þõŒk nkuEyu Œku Äe{e …ý {¬{ „rŒyu rðMŒhŒku þnuh™ku Vu÷kðku yk…ýu òuE þõeyu. yu™k ƒË÷u, Äkhku õu õkuE [{íõkhÚke yk…ýu …kt[-Ë‚ ð»ko™k „k¤k™u rƒ÷õw÷ ‚tõku[e™u, yíÞtŒ Œus „rŒyu òuE þõeyu Œku? Œku ƒu-…kt[ r{r™x{kt þnuh™ku Ë‚ ð»ko™ku rðõk‚ òuE þõeyu, rn{k÷Þ™e …ðoŒ{k¤k{kt

yk„¤ ðÄe hne Au! xkR{-÷u ðerzÞkuÍ{kt yk…ýu õkuE Vq÷™u Íz…Úke ¾e÷Œwt òuE þõeyu Aeyu õu {qðeÍ{kt Í…kxk¼uh ‚qÞo ykÚk{u, þnuh …h ytÄkhwt QŒhe ykðu y™u hMŒk …h™ku xÙkrVõ «õkþ™k r÷‚kuxk™e su{ yk{Œu{ ¼k„Œku nkuÞ yuðe r‚fðL‚eÍ …ý xkR{-÷u™ku yuõ «õkh Au. yíÞkh ‚wÄe ykðe r‚fðL‚ zuð÷… õhðk™ku yuõ s hMŒku nŒku. ¾e÷Œk Vq÷™e ðkŒ õheyu Œku zk¤e …h õ¤e ƒu‚u íÞkhÚke Œu™e ‚k{u õu{uhku ¾kuze™u ƒu‚e hnuðk™wt y™u õ¤e ¾e÷e™u Vq÷ ƒ™u íÞkt ‚wÄe™e yk¾e «ku‚u‚™ku ðerzÞku ÷uðk™ku. …Ae ðerzÞku{kt £uB‚ Vhðk™e Íz… yuõË{ ðÄkhe Ëuðk™e. xkR{-÷uÂ{kt xuf™ku÷kuS™ku ¾k‚ [{íõkh ™Úke y™u nðu M{kxoVku™{kt …ý yu þfâ ƒ™ðk ÷k„e Au, …ý yu{kt y¾qx Äehs òuEyu. y{urhõk™e Þwr™ðr‚oxe ykuV ðku®þøx™ y™u „q„÷™k r™»ýkŒku™u ÷køÞwt õu …]Úðe …h™kt …rhðŒo™ku™ku yÇÞk‚ õhðk{kt xkR{-÷u W…Þku„e ÚkE þõu. yu

{kxu Œu{ýu r…õk‚k, ÂVT÷õh suðe Vkuxku‚kRxT‚ …h ÷kuõkuyu {qõu÷k y‚tÏÞ Vkuxku„úkVT‚ VtVku‚ðk™wt þY õÞowt. rzrsx÷ Vkuxku„úkVe™e {ò yu Au õu Œu{kt R{us™e VkR÷{kt R{us W…hktŒ …ý ½ýe ƒÄe {krnŒe™ku ‚t„ún ÚkkÞ Au. õE õt…™e™k, õÞk {kuzu÷™k õu{uhkÚke Vkuxku ÷uðkÞku íÞktÚke ÷E™u Vkuxku„úkV ÷uðk™e Œkhe¾ y™u ÷kuõuþ™™k yûkktþ-hu¾ktþ™e {krnŒe …ý Œu{kt nkuÞ Au. r™»ýkŒkuyu ‘yuf[uLsuƒ÷ R{us VkR÷ Vku{uox (yurf‚V)' Œheõu yku¤¾kŒk yk R{us zuxk™e {ËËÚke, swËkt swËkt MÚk¤ku™k, swËk swËk ‚{Þu ÷uðkÞu÷k Vkuxku„úkV yuõXk õhðk™wt þY õÞOwt. yk «kusufx™u ‘xkR{÷u {kR®™„' (xkR{-÷u {kxu Vkuxku„úkVT‚™wt ¾kuËõk{) ™k{ yk…ðk{kt ykÔÞwt. yk¾e ðkŒ™u yk…ýu …ý xkR{÷u™e su{ xqtõkðe™u òuðe nkuÞ Œku yu{ õne þõkÞ õu yk r™»ýkŒkuyu yuõ MÚk¤™k Vkuxku„úkVT‚ ŒkhÔÞk, Œu{™u ð»ko {wsƒ „kuXÔÞk y™u …Ae yu Œ{k{ Vkuxku„úkV™k M÷kRzþku suðk ðerzÞku ŒiÞkh fÞkuo! ykx÷e xqtõe ðkŒ …kA¤ ¾hu¾h ƒnw ÷ktƒe {Úkk{ý Au. …kA÷kt Ë‚uõ ð»ko™e s ðkŒ õheyu Œku …ý Vkuxku‚kRxT‚ …h õhkuzku Vkuxku„úkVT‚ yuõXk ÚkÞk Au. r™»ýkŒkuyu y{wõ [ku¬‚ «õkh™k yÕ„kurhÄB‚ („q„÷™kt ‚[o yuÂLs™ RLxh™ux …h™e ‚kRxT‚ VtVku‚ðk su «ku„úkB‚™ku W…Þku„ õhu Au, ÷„¼„ yu «õkh™k «ku„úk{) rðf‚kÔÞk. su™e {ËËÚke, ‚kiÚke …nu÷kt RLxh™ux …h …Âç÷õ÷e yðu÷uƒ÷ VkuxkuÍ{ktÚke ‚kzk ykX õhkuz sux÷k Vkuxku„úkVT‚™ku zuxkƒuÍ ŒiÞkh õhkÞku. Œu{ktÚke 1,20,000 sux÷k MÚk¤™k VkuxkuÍ

Œkhððk{kt ykÔÞk. Œu{ktÚke 10,728 MÚk¤ku {kxu 300Úke ðÄw Vkuxku„úkVT‚ nŒk. Œu{ktÚke, yuõ nòhÚke ðÄw R{us nkuÞ Œuðkt MÚk¤ …‚tË õhðk{kt ykÔÞkt. õBÃÞwxh™k «ku„úkB‚™u yk yuõ nòh Vkuxku„úkVT‚ ‚qt½kzðk{kt ykðu, yux÷u Œu Œu{ktÚke yuõ s yU„÷ ÄhkðŒk Vkuxku„úkV y÷„ Œkhðu. yu{ktÞ …kAk ½ýk …zõkh nkuÞ. ðå[u {ký‚ õu ƒeò õkuE ykuçsux nkuÞ Œku Œu Vkuxku hesufx õhðk™k. ne{™Ëe™e ðkŒ nkuÞ Œku ƒÄk Vkuxku„úkV swËk swËk ytŒhuÚke ÷uðkÞu÷k nkuÞ. Œu{™u yuõ s ytŒhuÚke ÷uðkÞu÷k Vkuxku„úkV suðk ƒ™kððk {kxu Vkuxku„úkVT‚™u ¢ku… õhðk …zu (ðÄkhk™k ¼k„™e õk…õq… õhðe …zu). ðktõk-[qtõk yU„÷ðk¤k Vkuxku„úkV‚™u yu÷kR™ õhðk …zu. sYrhÞkŒ {wsƒ õ÷‚o y™u «õkþ{kt ðÄ-½x õhðe …zu, suÚke ƒÄk Vkuxku„úkVT‚ yuõ ‚kÚku òuðk{kt ykðu íÞkhu ÍkÍk ̓õkhk ™ ÚkkÞ. yu …Ae yu{™u ð»ko {wsƒ, ‚kiÚke sq™kÚke ÷E™u ‚kiÚke ™ðk yuðk ¢{{kt „kuXððk{kt ykðu. rƒ÷õw÷ ykuxku{urxõ ÚkŒe yk «r¢Þk õBÃÞwxh{kt A õ÷kõ sux÷ku ‚{Þ [k÷u Au y™u …Ae ŒiÞkh ÚkkÞ Au su Œu MÚk¤™ku …kt[Úke Ë‚ ð»ko™ku RrŒnk‚ õnuŒku yuõ xkR{-÷u ðerzÞku! yíÞkh ‚wÄe{kt ykðk 20,672 xkR{-÷u ðerzÞku ŒiÞkh õhðk{kt ykÔÞk Au. r™»ýkŒku õnu Au õu yíÞkh ‚wÄe yk…ýu õkuE MÚk¤ ¼qŒõk¤{kt õuðwt ÷k„Œwt nŒwt yu y{wõ Vkuxku„úkVT‚Úke ƒŒkðe þõŒk nŒk. nðu yu MÚk¤ ¼qŒõk¤Úke ðŒo{k™ ‚wÄe{kt õE heŒu ƒË÷kÞwt yu …ý ƒŒkðe þõeþwt. yk VfŒ ƒu ½ze™e {ò™e ðkŒ ™Úke, yk™kÚke ði¿kkr™õ yÇÞk‚ku y™u þkuÄku™k …kÞk …ý ™t¾kþu! <

yuõkWÂLxt„ ‚nu÷wt ƒ™e þõu yk heŒu...

‚rðo‚™ku W…Þku„ ƒnw ‚h¤ Au, yuõkWÂLxt„™e ¾k‚ ‚{s ™ nkuÞ Œku …ý Œ{u ‚nu÷kEÚke Œ{khk yuõkWÂLxt„ {kxu sYhe ‚{s õu¤ðe þõku Aku.

yk

s™k ÷u¾™ku rð»kÞ yuðku Au õu yu ƒÄk™u õk{™ku ™Úke, …ý sux÷k™u õk{™ku Au yu{™u sƒhsMŒ W…Þku„e ÚkE þõu Au! su{ ƒu‚Œk ð»kuo õu …nu÷e òLÞwykheyu yk…ý™u rVx™u‚ ‚tƒtrÄŒ ™ðe ™ðe xuð …kzðk™ku Wí‚kn ò„Œku nkuÞ Au Œu{ yur«÷ {rn™ku þ\ ÚkkÞ yu ‚kÚku ™ðk ™kýkõeÞ ð»ko{kt VkR™kL‚ ƒkƒŒu ƒÄwt yuõË{ «ku…h õhe ™k¾ðk™ku y™u ™ðk ð»ko{kt …hVufx yuõkWÂLxt„ õhðk™ku Wí‚kn ½ýk ÷kuõku™u ò„Œku nkuÞ Au, ¾k‚ õhe™u yuðk ÷kuõku™u, su{™ku …kuŒk™ku ™k™ku rƒÍ™u‚ Au yÚkðk suyku «kuVuþ™÷ Œheõu MðŒtºk ÔÞð‚kÞ õhu Au. …kuŒk™k rƒÍ™u‚{kt ‚V¤ Úkðwt nkuÞ Œku ƒeS ƒÄe ykðzŒ W…hktŒ rƒÍ™u‚™wt yuõkWÂLxt„ Œ{khk ytõwþ{kt nkuðwt sYhe Au.

rƒÍ™u‚™e þYykŒ{kt {kuxk ¼k„™k ÷kuõku yuf‚u÷™e M«uzþexÚke õk{ [÷kðu, shk yk„¤ ðÄu yux÷u õkuE òýeŒk yuõkWÂLxt„ ‚kuVTxðuh™e …kRhuxuz õku…e þkuÄe ÷kðu, su {kuxk ¼k„u «kuVuþ™÷ yuõkWLxLx {kxu s rzÍkE™ ÚkÞu÷k nkuÞ Au. …rhýk{u yk…ýu rƒÍ™u‚™u ‚ux õhðk™e {Úkk{ý W…hktŒ, yuõkWÂLxt„ ‚kuVTxðuh y™u yuõkWÂLxt„ …kuŒu ƒt™u þe¾ðk™e …¤kusý{kt …ý …zðwt …zu Au. rƒÍ™u‚™e þYykŒ{kt, ¾hu¾h ÞwÍh£uLz÷e yuõkWÂLxt„ ‚kuVTxðuh õu ‚rðo‚ ¾heËðkt h…ku‚kÞ ™nª yu …ý ‚{S þõkÞ. Œ{u òu ykðe ÂMÚkrŒ™ku ‚k{™ku õhe hÓkk nkuÞ y™u õkuE r‚B…÷, RÍe yuõkWÂLxt„ ‚kuVTxðuh™e Œ÷kþ{kt nku su{kt yuõkWÂLxt„ ™ ykðzŒwt nkuÞ Œku …ý Œ{u Œ{khe yt„Œ õu rƒÍ™u‚™e ykðõ-òðõ™ku rƒ÷õw÷ ‚nu÷kEÚke rn‚kƒ hk¾e þõku, Œ{khk f÷kÞLx™u Œ{khe sYrhÞkŒ y™w‚kh {kurzVkÞ õhu÷k y™u Œ{khe õt…™e™k ÷ku„kuÚke ‚òðu÷k R™ðkuR‚ VxkVx ƒ™kðe™u VxkVx {kuõ÷e þõku, õÞk f÷kÞLx™wt …u{uLx ykðe „Þwt y™u õku™wt, õux÷k ‚{ÞÚke ƒkõe Au yu™ku ‚nu÷kEÚke xÙuõ hk¾e þõku y™u yk ƒÄkÚke rðþu»k, yk ƒÄwt õkuE òŒ™ku ¾[o

õÞko rð™k þfâ ƒ™u yuðwt RåAŒk nku Œku Œ{khk {kxu õk{™e Au yk yku™÷kR™ ‚rðo‚ - https://www.waveapps.com ykx÷u ‚wÄe ðkt[e™u Œ{™u ðkŒ{kt h‚ … zâku nkuÞ y™u yk yku™÷kR™ ‚rðo‚{kt Ÿzk QŒhþku Œku [ku¬‚ ðÄw h‚ …zþu. ‚k{kLÞ heŒu {kuxk ¼k„™kt yku™÷kR™ ‚kuVTxðuh™kt ÷kRx õu xÙkÞ÷ ðÍo™ nkuÞ Au, su™ku yk…ýu …qhku W…Þku„ ™ s õhe þõeyu, …ý ðuð ¾hk yÚko{kt £e Au. Œu{kt rƒÍ™u‚ ðÄu Œu{ ðÄw

‚wrðÄkyku W{uhðe nkuÞ Œku Œu y÷„Úke ¾heËe þõkÞ Au, …ý MðŒtºk ÔÞð‚kÞ™e rƒ®÷„ y™u yuõkWÂLxt„™e «kÚkr{õ ƒÄe s sYrhÞkŒ £e ðÍo™Úke ‚tŒku»kkE þõu Au. yk ‚kuVTxðuh {q¤ Þwõu™e õt…™eyu zuð÷… õhu÷ Au, …ý Œu{kt ¼khŒeÞ [÷ý™ku W…Þku„ þfâ Au. Œ{u Äkhku Œku (y™u Œ{khk f÷kÞLx …ý yux÷k xuõ‚uðe nkuÞ Œku!)

Œ{khk E-{uR÷Úke {kuõ÷kŒk R™ðkuR‚{kt s …u ™kW™wt ƒx™ W{uhe þõku Aku y™u f÷kÞLx Œu™k …h rf÷õ õhe, VxkVx ¢urzx õkzoÚke RLMxLx …u{uLx …ý õhe þõþu (y÷ƒ¥k, yu {kxu Ëhuõ xÙkLÍufþ™ ËeX y{wõ [kso nkuÞ Au, …ý ykðk f÷kÞLx ‚ki™k ™‚eƒ{kt fâktÚke!). ‚rðo‚™ku W…Þku„ ƒnw ‚h¤ Au, yuõkWÂLxt„™e ¾k‚ ‚{s ™ nkuÞ Œku …ý Œ{u ‚nu÷kEÚke Œ{khk yuõkWÂLxt„ {kxu sYhe ‚{s õu¤ðe þõku Aku. ‚kRx …h yk…u÷k ‚…kuxo ykrxoõ÷ rƒ÷õw÷ ‚nu÷e ¼k»kk{kt ÷¾kÞu÷k Au y™u ÷„¼„ ƒÄe s {qtÍðý™ku Wõu÷ Œu{ktÚke {¤e hnu Œu{ Au. ‚rðo‚{kt þfâ yux÷e ykuAe {uLÞwy÷ yuLxÙe õhðe …zu yu heŒu Œu rzÍkR™ ÚkÞu÷ Au, ðuð{kt™k yk…ýk yuõkWLx™u 10,000Úke ðÄw ƒuLõ, ¢urzx õkzo (¼khŒ™e …ý ‚tÏÞkƒtÄ ƒuLõ ‚rnŒ) ð„uhu ‚kÚku õ™ufx õhe þõkÞ Au, suÚke yu ƒÄe yuLxÙe yk…ýu õhðe …zu ™nª! yk…ýu yuõkWLx õ™ufx õhðwt ™ nkuÞ Œku ƒuLõ™e ‚kRx …hÚke ‚eyu‚ðe Vku{uox{kt Mxux{uLx zkW™÷kuz õhe™u Œu™u ðuð{kt y…÷kuz õhe þõeyu Aeyu. yk ‚kuVTxðuh f÷kWz ƒuÍTz Au yux÷u õu

Œu{kt ƒÄku zuxk yk…ýk õBÃÞwxh{kt ™nª …ý õt…™e™k ‚ðoh{kt ‚[ðkÞ Au. zuxk™e r‚fâkurhxe™u {wÆu ƒnw ®[Œk õhðk suðwt ™Úke õu{ Œu{kt 256-rƒx yuÂL¢Ãþ™™ku W…Þku„ ÚkkÞ Au y™u ‚kRx™k Ëkðk {wsƒ Ëwr™Þk™k Ë‚uõ ÷k¾ ÷kuõku yk ‚rðo‚™ku W…Þku„ õhe hÓkk Au. Œ{u …k¬k rƒÍ™u‚{u™ nku Œku yk ƒÄwt s £e õuðe heŒu yk…e þõu Œuðku ‚ðk÷ [ku¬‚ ÚkkÞ. yk ‚rðo‚ õtEõ „q„÷ õu Þknq suðe Au, Œu yk…ý™u rðrðÄ ònuh¾ƒh ƒŒkðe™u Œu{ktÚke õ{kýe õhu Au, y÷ƒ¥k yk…ýku õkuE zuxk õkuE™u ðu[Œe ™ nkuðk™e Äh…Œ yk…u Au. yk„¤ õÓkwt Œu{ rƒÍ™u‚™k þYykŒ™k Œƒ¬u õu …‚o™÷ yuõkWÂLxt„ {kxu yk …hVufx õne þõkÞ yuðe ‚rðo‚ Au, Œu{kt õux÷eõ {ÞkoËkyku Au …ý yu ™zðk ÷k„u íÞkhu Œ{™u ƒÄwt {¤e hnu yuðku yuõkWÂLxt„ ‚kuVTxðuh ¾heËðk™wt …ku‚kþu …ý ¾Át! ‚kÞƒh‚Vh{kt «õkrþŒ ÷„¼„ Ëhuõ ‚rðo‚™e su{, yk ðuð yuõkWÂLxt„ …ý ÷ktƒku ‚{Þ W…Þku„{kt ÷eÄk …Ae s Œu™k rðþu ykx÷wt ÷ÏÞwt Au, xÙkÞ õhe òuðk suðe Au! <


ITAG Times

R

ight from the day of assuming power, Digital India and Make in India have been two big USPs of Prime Minister Narendra Modi. The first steps were taken with the launch of MyGov.in portal. Only a couple of weeks ago, Narendra Modi launched his mobile app to connect further with the netizens. Over the last one year, several initiatives have been taken for introduction of Information Technology to empower people in areas relating to health, education, labour and employment, commerce etc. Digital India Week has been launched with an aim to impart knowledge to people and to empower themselves through the Digital India Programme of Government of India.

Articals

FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

www.fitag.in Saturday

Everything you wanted to know about PM’s Digital India programme Vision of Digital India Digital India visionThe vision of Digital India programme aims at inclusive growth in areas of electronic

or ready to be launched as indicated below: 1. Digital Locker System aims to minimize the usage of physical documents and enable sharing of e-documents across agencies. The sharing of the e-documents will be done through registered repositories thereby ensuring the authenticity of the documents online. 2. MyGov.in has been implemented as a platform

quiring availability of blood online etc. 6. National Scholarships Portal is a one stop solu-

for citizen engagement in governance, through a “Discuss”, “Do” and “Disseminate” approach. The mobile App for MyGov would bring these features to users on a mobile phone. 3. Digital India e-servicesSwachh Bharat Mission (SBM) Mobile app would be used by people and Government organizations for achieving the goals of Swachh Bharat Mission. 4. eSign framework would allow citizens to digitally sign a document online using Aadhaar authentication. 5. The Online Registration System (ORS) under the eHospital application has been introduced. This application provides important services such as online registration, payment of fees and appointment, online diagnostic reports, en-

application, verification, sanction and disbursal to end beneficiary for all the scholarships provided by the Government of India. 7. DeitY has undertaken an initiative namely Digitize India Platform (DIP) for large scale dig-

tion for end to end scholarship process right from submission of student

The programme structure Digital India comprises of various initiatives under the single programme each targeted to prepare India for becoming a knowledge economy and for bringing good governance to citizens through synchronized and co-ordinated engagement of the entire Government.

This programme has been envisaged and coordinated by the Department of Electronics and Information Technology (DeitY) in collaboration with various Central Ministries/Departments and State Governments. The Prime Minister as the Chairman of Monitoring Committee on Digital India, activities under the Digital India initiative is being carefully monitored. All the existing and ongoing e-Governance initiatives have been revamped to align them with the principles of Digital India.

services, products, manufacturing and job opportunities etc. It is centred on three key areas – < Digital Infrastructure as a Utility to Every Citizen < Governance & Services on Demand and < Digital Empowerment of Citizens With the above vision, the Digital India programme aims to provide Broadband Highways, Universal Access to Mobile Connectivity, Public Internet Access Programme, EGovernance: Reforming Government through Technology, eKranti – Electronic Delivery of Services, Information for All, Electronics Manufacturing: Target Net Zero Imports, IT for Jobs and Early Harvest Programmes. Key Projects of Digital India programme Several projects/products have already launched

01 08 2015

6

itization of records in the country that would facilitate efficient delivery of services to the citizens. 8. The Government of India has undertaken an initiative namely Bharat Net, a high speed digital highway to connect all 2.5 lakh Gram Panchayats of country. This would be the world’s largest rural broadband connectivity project

using optical fibre. 9. BSNL has introduced Next Generation Network (NGN), to replace 30 year old exchanges, which is an IP based technology to manage all types of services like voice, data, multimedia/ video and other types of packet switched communication services. 10.BSNL has undertaken large scale deployment of Wi-Fi hotspots throughout the country. The user can latch on the BSNL Wi-Fi network through their mobile devices. 11.To deliver citizen services electronically and improve the way citizens and authorities transact

continued on page 7...


ITAG Times

FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

Continued from page 7... in e-Governance Sys-

with each other, it is imperative to have ubiquitous connectivity. The government also realises this need as reflected by including ‘broadband highways’ as one of the pillars of Digital India. While connectivity is one criterion, enabling and providing technologies to facilitate delivery of services to citizens forms the other. Policy initiatives Policy initiatives have also been undertaken (by DeitY) in the e- Gover-

Articals

tems, Policy on Open Application Programming Interfaces (APIs) for Government of India, E-mail Policy of Government of India, Policy on Use of IT Resources of Government of India, Policy on Collaborative Application Development by Opening the Source Code of Government Applications, Application Development & Re-Engineering Guidelines for Cloud Ready Applications. = BPO Policy has been approved to create BPO centres in different North Eastern states and also in

and to create a resource pool of IP within the country to create a self-sustaining eco-system of Venture Funds. = National Centre for Flexible Electronics (NCFlexE) is an initiative of Government of India to promote research and innovation in the emerging area of Flexible Electronics. = Centre of Excellence on Internet on Things (IoT) is a joint initiative of Department of Electronics & Information Technology (DeitY), ERNET and NASSCOM.

www.fitag.in Saturday

0108 2015

7

Association of Bhuj Computer Dealers We are doing a activity during a whole years like donate clothe,foods,shoes & many more they needed things etc. We have donation box each member on their own shop which fund we utilized in this type of activity. Last week we are donate a cloths,cricket bat & ball, school bag to orphan & blind student at ANDHSHALA bhuj-kutch. Here we send some photos of that, So, please find a attach file.Thanks.

Impact

nance domain like eKranti Framework, Policy on Adoption of Open Source Software for Government of India, Framework for Adoption of Open Source Software

smaller / mofussil towns of other states. = Electronics Development Fund (EDF) Policy aims to promote Innovation, R&D, and Product Development

The estimated impact of Digital India by 2019 would be cross cutting, ranging from broadband connectivity in all Panchayats, Wi-fi in schools and universities and Public Wi-Fihotspots. The programme will generate huge number of IT, Telecom and Electronics jobs, both directly and indirectly. Success of this programme will make India Digitally empowered and the leader in usage of IT in delivery of services related to various domains such as health, education, agriculture, banking, etc.

Continued from page 7...

to determine whether your security practices can be improved. This could include: Engaging a data security consultant, which will give you a fresh perspective on your existing practices, and help to reassure customers and others that you do business with. Promptly remedying any identified security flaws -changes should be reflected in data security policies and training documents (and if such documents don't exist, create them.) Rolling out training to relevant personnel to ensure

that everyone is up to speed on the latest practices. Reviewing arrangements with service providers to ensure that they are subject to appropriate data security obligations (and, if not already the case, make data security compliance a key criterion applied in the procurement process). Cheng Lim is a partner at global law firm King & Wood Mallesons. Cheng leads KWM's Cyber-Resilience initiative and has assisted clients over many years in dealing with privacy, data security and data breaches.

Other third parties may also need to be notified. For example, if financial information is compromised, you might notify relevant financial institutions so that they can watch for suspicious transactions. Step 5: Action to prevent future breaches Having addressed the immediate threat, prevention is the final step. While customers may understand an isolated failure, they are typically less forgiving of repeated mistakes. Carry out a thorough post-breach audit

Disclaimer: This Magazine is for private circulation only. The data published in this magazine is based on the inputs provided by various sources. The publisher, printer and the Editor do not guarantee the authenticity of correctness of the data published here in. Publisher : Gaurang Vyas, President, Fitag Editor: Kaushik Pandya Assistant Editor : Sejal Patel Designer : Hardik Pancholi Address : B/302, Rudra Arcade, Nr. Helmet Circle, Memnagar, Ahmedabad - 380015. All rights reserved. No part of this publication can be reproduced without the prior permission from the publisher.


ITAG Times

5

Articals

www.fitag.in Saturday

FLOURISH KNOWLEDGE NETWORKING POWER PROTECTION

01 082015

8

steps to respond to a security breach It's not a matter of if you are going to fall victim to a cyber attack, it's when. So what should you do to minimise the adverse consequences that can arise from a breach?

H

as your organisation established an incident management plan that covers data breaches? Recent evidence shows that organisations are ill-equipped to deal with an attack. Australian bulk deals website, Catch of the Day, suffered a security breach in 2011, with passwords and other user information stolen from the company's databases. It took until 2014 to notify customers, suggesting there was no response plan in place. The backlash was very severe for global retail giant, Target, which fell victim to the second largest credit card heist in history. Many customers were outraged about the retailer's inability to provide information after the breach, and its failure to assure customers that the issue was resolved. Consequences included settlement payouts of up to $10 million and the resignations of its CIO and CEO. Organisations should have established and tested incident management plans to respond to data security breaches sooner rather than later. A solid response plan and adherence to these steps can spare much unnecessary business and associated reputational harm. Here's a five step plan to ensure you give your organisation the best chance of minimising financial and reputational damage.

Step 1: Don't panic, assemble a task force Clear thinking and swift action is required to mitigate the damage. There is no time for blame-shifting. You need a clear, pre-determined response protocol in place to help people focus in what can be a high pressure situation and your incident management plan should follow this protocol. Having the right team on the job is critical. Bear these factors in mind when assembling your team: Appoint one leader who will have overall responsibility for responding to the breach. Obvious choices are your CIO or chief risk of-

ficer. This leader should have a direct reporting line into top level management so decisions can be made quickly. Include representatives from all relevant areas, in-

counts on which they use the same password. Disabling network access for computers known to be infected by viruses or other mal-

deliberate hacking, rather than an inadvertent breach of security, then the consequences for the relevant individuals or organisations could be much more significant. This should inform how you respond to the breach. Step 4: Notification

cluding IT, to trace and deal with any technical flaws that led to the breach; and corporate affairs, in case liaison with authorities is required, to manage media and customer communications. Don't forget privacy (you do have a chief privacy officer, don't you?) and legal, to deal with regulators and advise on potential exposure to liability). If you anticipate that litigation could result from the breach, then it may be appropriate for the detailed internal investigation of the breach to be managed by the legal team. If your organisation doesn't have these capabilities, seek assistance from third parties at an early stage. Step 2: Containment The taskforce should first identify the cause of the breach and ensure that it is contained. Steps may include: Read more:Government security breaches decrease: report Installing patches to resolve viruses and technology flaws. The 'Heartbleed' security bug identified in April 2014 at one time compromised 17 per cent of internet servers. Although a security patch was made available almost immediately once it was discovered, some administrators were slow to react, leaving servers exposed for longer than necessary Resetting passwords for user accounts that may have been compromised and advising users to change other ac-

ware (so they can be quarantined) and blocking the accounts of users that may have been involved in wrongdoing. Taking steps to recall or delete information such as recalling emails, asking unintended recipients to destroy copies or disabling links that have been mistakenly posted. Take care to ensure that steps taken to contain the breach don't inadvertently compromise the integrity of any investigation. Step 3: Assess the extent and severity of the breach Read more:Australia records 6 per cent of global ransomware detections The results will dictate the subsequent steps of your response. A thorough assessment involves: Identifying who and what has been affected. If it's not possible to tell exactly what data has been compromised, it may be wise to take a conservative approach to estimation. Assessing how the data could be used against the victims. If the data contains information that could be used for identity theft or other criminal activity (such as names, dates of birth and credit card numbers) or that could be sensitive (such as medical records), the breach should be treated as more severe. If the data has been encrypted or anonymised, there is a lower risk of harm. Considering the context of the breach. If there has been a

For serious data security breaches, proactive notification is generally the right strategy. A mandatory notification scheme has been proposed in Australia, with the government promising implementation by the end of 2015. In any case, there are good reasons to consider voluntary notifications, which include: Read more:Australian en-

terprises a popular target for ransomware attacks Victims may be able to protect themselves, for example by changing passwords, cancelling credit cards and monitoring bank statements. E-Bay was roundly criticised in 2014 for not acting quickly enough to notify users affected by a hacking attack, and only doing so by means of a website notice rather than by sending individual messages. Notices should be practical, suggesting steps that recipients can take to protect themselves. The Privacy Commissioner may also be involved, particularly if personal; information has been stolen. The Commissioner may take a more lenient approach to organisations that proactively address problems when they arise.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.