Business Process Reengineering

Business Process Reengineering

  •   Vertualization on Win7  and  Server


    Virtualization: Running VirtualBox on a Windows 7 laptop – Windows 2008 R2 Server guest

    Filed under: HW, Network, Virtual — rasor @ 6:46 pm

    Using VirtualBox as hypervisor on a laptop eases usage of WLAN and USB on the guest OS.

    This post is based on using VirtualBox 3.1.6 on Windows 7 (64 bit) with Windows 2008 R2 server, 64 bit, Standard edition.

    Out of the box Windows 7 installed drivers for the WLAN in my laptop (with CPU i7 720) and for the full HD resolution video card. Nice.


     Alfresco Collaboration Server



    Alfresco Collaboration Server


    Alfresco is a free/libre enterprise content management system for Microsoft Windows and Unix-like operating systems. Alfresco comes in three flavors:

    • Alfresco Community Edition is free software, LGPL licensed open source and open standards. It has some important limitations in terms of scalability and availability, since the clustering feature has been removed from the community repository and is only available in the enterprise edition.
    • Alfresco Enterprise Edition is commercially & proprietary licensed open source, open standards and enterprisescale. Its design is geared towards users who require a high degree of modularity and scalable performance.
    • Alfresco Cloud Edition (Alfresco in the cloud) is the SaaS version of Alfresco.

    Alfresco includes a content repository, an out-of-the-box, web-based user interface for managing and using standard portal content, a CIFS interface that provides file system compatibility on Microsoft Windows and Unix-like operating systems, Lucene and Solr indexing, and Activiti workflow. The Alfresco system is developed using Javatechnology.

    Alfresco is capable of the following:


    Document management

    Records management, including 5015.2 certification

    Image management

    Learning content management support for learning management systems (e.g. Moodle)

    LOR Learning Object Repository (edu-sharing)

    Integrated publishing

    Repository access via CIFS/SMB, FTP, WebDAV, NFS and CMIS

    Automating business processes with the embedded Activiti workflow engine

    Lucene search

    Federated servers

    Multi-language support

    Portable application packaging

    Multi-platform support (officially Windows, GNU/Linux and Solaris)

    Browser-based GUI (official support for Internet Explorer and Firefox)

    Desktop integration with Microsoft Office, and LibreOffice.

    Online integration with Google Docs

    Clustering support

    Pluggable authentication: NTLM, LDAP, Kerberos, CAS

    Multiple database support: MySQL, PostgreSQL, Oracle Database (Enterprise Edition), IBM DB2, Microsoft SQL Server (Enterprise Edition).

    We deploy alfresco on REDHAT  Enterprise Virtual server. The cloud mode of deployment has the benefit that people can collaborate using tablet, PC, Desktop and Mobile Phone system. Afresco in this fashion can be ideal for system elevel project collaboration involving multiple people and complex operational process.  Task assignment and report generation is also included in Afresco Enterprise solutions.

    We provide complete Alfresco solutions, In case your are interested In collaboration server, please contact us. one of our engineers will be happy to discuss your requirements.


  •  Balanced Scorecard and Information Technology

     Balanced Scorecard and Information Technology

    Balanced Scorecard Basics

    The balanced scorecard is a strategic planning and management systemthat is used extensively in business and industry, government, and nonprofit organizations worldwide to align business activities to the vision and strategy of the organization, improve internal and external communications, and monitor organization performance against strategic goals. It was originated by Drs. Robert Kaplan (Harvard Business School) and David Norton as aperformance measurement framework that added strategic non-financial performance measures to traditional financial metrics to give managers and executives a more 'balanced' view of organizational performance. While the phrase balanced scorecard was coined in the early 1990s, the roots of the this type of approach are deep, and include the pioneering work of General Electric on performance measurement reporting in the 1950’s and the work of French process engineers (who created the Tableau de Bord – literally, a "dashboard" of performance measures) in the early part of the 20th century.

    Gartner Group suggests that over 50% of large US firms have adopted the BSC. More than half of major companies in the US, Europe and Asia are using balanced scorecard approaches, with use growing in those areas as well as in the Middle East and Africa. A recent global study by Bain & Co listed balanced scorecard fifth on its top ten most widely used management tools around the world, a list that includes closely-related strategic planning at number one. Balanced scorecard has also been selected by the editors of Harvard Business Review as one of the most influential business ideas of the past 75 years. 

    The balanced scorecard has evolved from its early use as a simple performance measurement framework to a full strategic planning and management system. The “new” balanced scorecard transforms an organization’s strategic plan from an attractive but passive document into the "marching orders" for the organization on a daily basis. It provides a framework that not only provides performance measurements, but helps planners identify what should be done and measured. It enables executives to truly execute their strategies.

    This new approach to strategic management was first detailed in a series of articles and books by Drs. Kaplan and Norton. Recognizing some of the weaknesses and vagueness of previous management approaches, the balanced scorecard approach provides a clear prescription as to what companies should measure in order to 'balance' the financial perspective. The balanced scorecard is a management system (not only a measurement system) that enables organizations to clarify their vision and strategy and translate them into action. It provides feedback around both the internal business processes and external outcomes in order to continuously improve strategic performance and results. When fully deployed, the balanced scorecard transforms strategic planning from an academic exercise into the nerve center of an enterprise.

    Kaplan and Norton describe the innovation of the balanced scorecard as follows:

    "The balanced scorecard retains traditional financial measures. But financial measures tell the story of past events, an adequate story for industrial age companies for which investments in long-term capabilities and customer relationships were not critical for success. These financial measures are inadequate, however, for guiding and evaluating the journey that information age companies must make to create future value through investment in customers, suppliers, employees, processes, technology, and innovation."
    Please contact one of our Engineers to explore how Balanced Score Card can help  integrate business strategy and IT deployment.
     1.0 Dreailed Article of Balanced Score Card
     2.0 The Balanced Scorecard: Translating Strategy into Action- ISBN 978-0875846514
  •  Business Process Reengineering

    Business Process Re-engineering (BPR) Definition

    Business process re-engineering (BPR) is the "fundamental rethinking and radical redesign of business processes aimed at achieving radical improvements in essential contemporary measures of performance, such as cost, quality, service and speed" (Hammer and Champy, 1993).




     References :

    1.0  Reengineering the Corporation: Hammar and Champy

    2.0 Competitive Advantage- Porter

    3.0 Competitive Strategy- Porter

    4.0 Business Process Modeling- Article Link

    5.0 Business value of Managed Service- Article Link


    Backup Solutions


    Cloud Based Backup solutions


    A remote, online, or managed backup service, sometimes marketed as cloud backup or backup-as-a-service, is a service that provides users with a system for the backup, storage, and recovery of computer files. Online backup providers are companies that provide this type of service to end users (or clients). Such backup services are considered a form of cloud computing.

    Online backup systems are typically built around a client software program that runs on a schedule, typically once a day, and usually at night while computers aren't in use. This program typically collects, compresses, encrypts, and transfers the data to the remote backup service provider's servers or off-site hardware.



    Cloud based backup solutions are effective for small business. Such solutions do not require any hardware to backup the data. Such backup systems , however may have slow response when you are faced with the problem of main harddrive replacement and recovery of all you data. A time duration of 15 days to one month is not uncommon to backup 500MB of Data. Such recovery are however not acceptable to medium to large companies.



    Please contact us if you need cloud based online backup solutions for your bsuiness. One of Our engineers  will be Happy to discuss your problems with you.


    Customer Stories- Kerio Mail  Server Improves Customer Satisfaction


    Customer Stories- Kerio Mail  Server Improves Customer Satisfaction


    A   large municipal organization was in Email crisis. Its taxpayers were demanding immediate answer to questions they were asking  using smart phone  email.  In many instances, the conversation started over multiple years ago. Answering these questions required looking at the emails over multiple years and in particular searching the email database over multiple user computers.


    To make the matter worse- many times emails were dispersed over 50 different computer mailboxes in multiple buildings.

  • Designing a  Website That Deliver Results

    Key Performance Indicator (KPI) as a Strategy for Business Development Websites and E-commerce



    Measuring business performance on the basis of finance alone is flawed. Business performance should include other aspects of the business like:

    1.0  Utilization of Assets and Working Capital

    2.0 Research and Development and Continuous Learning

    3.0 Customer Satisfaction and Customer Development

    4.0  Environment and Community- Protection and  Development

    5.0 Internal Discipline and Order- Delivery on Time and being Effective

    6.0 Employee Satisfaction-  Retention and Skill Based Training



     Devops and Continous Integration


    Devops and Continous Integration

    DevOps is a software development method that emphasizes communication, collaboration, integration, automation.[1][2] The method acknowledges the interdependence of software development, quality assurance (QA), and IT operations, and aims to help an organization rapidly produce software products and services and to improve operations performance.[2][3][4][5][6]

    In traditional, functionally separated organizations there is rarely cross-departmental integration of these functions with IT operations. DevOps promotes a set of processes and methods for thinking about communication and collaboration between development, QA, and IT operations.[7]




    1.0 Jenkins- The Definitive Guide  -ISBN13-978-1449305352

     Note: This is a draft article- Expect Revisions 

  • Digital Singnage Solutions




    Digital Signage Solutions


    Digital signs are a sub segment of signage. Large installation digital signage systems are often designed byEnvironmental Graphic Designers who often design both the installation and the content to be viewed via the digital signage.

    Digital Signs are used in wayfindingplacemakingexhibitionspublic installationsmarketing and outdoor advertising.

    Digital signs use technologies such as LCDLED and Projection to display content such as digital imagesvideo,streaming media, and information and can be found in public spaces, transportation systems, museums, stadiums, retail stores, hotels, restaurants, and corporate buildings etc.

    Digital sign running theFirefox Web browser (identifiable by its connection failure message)

    Digital signage displays use content management systems and digital media distribution systems which can either be run from personal computers and servers or regional/national media hosting providers.

    Since digital signage content may be frequently and easily updated, and also because of the interactive abilities available through the accompanying employment of real-world interfaces such as embedded touch screens, movement detection and image capture devices which enable these forms of signage to understand who and how users are interacting with them, they are gaining acceptance as an alternative to static signage.

    One specific use of digital signage is for out-of-home advertising in which video content, advertisements, and/or messages are displayed on digital signs with the goal of delivering targeted messages, to specific locations and/or consumers, at specific times. This is often called "digital out of home" or abbreviated as DOOH.

    The Digital Signage Federation, the Digital Screenmedia Association, the Digital Place-based Advertising Association and OVAB Europe are some of the non-profit industry trade groups representing firms and professionals in the digital signage market.


    Digital signs are used for many different purposes and there is no definitive list. However, below are some of the most common applications of digital sign:


    Public information – news, weather, traffic and local (location specific) information, such as building directory with map, fire exits and traveler information.

    Internal information - corporate messages, such as health & safety items, news, and so forth.

    Menu information – pricing, photos, ingredients, and other information about the food(s) being offered, including nutritional facts.

    Advertising – usually either related to the location of the sign or using the audience reach of the screens for general advertising.

    Brand building – in-store digital sign to promote the brand and build a brand identity.

    Influencing customer behavior – directing customers to different areas, increasing the "dwell time" on the store premises, and a wide range of other uses in service of such influence.

    Enhancing customer experience – applications include the reduction of perceived wait time in the waiting areas of restaurants and other retail operations, bank queues, and similar circumstances, as well as demonstrations, such as those of recipes in food stores, among other examples.

    Enhancing the environment – with interactive screens (in the floor, for example, as with "informational footsteps" found in some tourist attractions, museums, and the like) or with other means of "dynamic wayfinding".


    We provide intrusion detection solutions based on opensource and proprietary software. Please contact our Applications engineer for details.

  • Distributed Computing and Microservice Architecture


    Distributed Computing and Microservice Architecture

    Microservices are small, autonomous services that work together. Let’s break that definition down a bit and consider the characteristics that make microservices different.

    The benefits of microservices are many and varied. Many of these benefits can be laid at the door of any distributed system. Microservices, however, tend to achieve these benefits to a greater degree primarily due to how far they take the concepts behind distributed systems and service-oriented architecture.

    Docker- An opensource implementaion of Microservice - implements a high-level API to provide lightweight containers that run processes in isolation.[12]

    Building on top of facilities provided by the Linux kernel (primarily cgroups and namespaces), a Docker container, unlike a virtual machine, does not require or include a separate operating system.[11] Instead, it relies on the kernel's functionality and uses resource isolation (CPU, memory, block I/O, network, etc.) and separate namespaces to isolate the application's view of the operating system. Docker accesses the Linux kernel's virtualization features either directly using the libcontainer library, which is available since Docker 0.9, or indirectly via libvirt, LXC (Linux Containers) or systemd-nspawn.[10][13]

    By using containers, resources can be isolated, services restricted, and processes provisioned to have an almost completely private view of the operating system with their own process ID space, file system structure, and network interfaces. Multiple containers share the same kernel, but each container can be constrained to only use a defined amount of resources such as CPU, memory and I/O.

    Using Docker to create and manage containers may simplify the creation of highly distributed systems, by allowing multiple applications, worker tasks and other processes to run autonomously on a single physical machine or across multiple virtual machines. This allows the deployment of nodes to be performed as the resources become available or when more nodes are needed, allowing a platform as a service (PaaS)-style of deployment and scaling for systems like Apache Cassandra, MongoDB or Riak. Docker also simplifies the creation and operation of task or workload queues and other distributed systems.





    1.0 Principles of Distributed Database Systems- ISBN-13: 978-1441988331

    2.0 Building Microservice- ISBN-13: 978-1491950357


     Note: This is a draft article- expect revisions.

  • Document Management Solutions

    Document Management Systems


    A document management system (DMS) is a system (based on computer programs in the case of the management of digital documents) used to track, manage and store documents. Most are capable of keeping a record of the various versions created and modified by different users (history tracking). The term has some overlap with the concepts of content management systems. It is often viewed as a component of enterprise content management (ECM) systems and related to digital asset management, document imaging, workflow systems and records management systems.



    Document management systems commonly provide storage, versioning, metadata, security, as well as indexing and retrieval capabilities. Here is a description of these components:





    Metadata is typically stored for each document. Metadata may, for example, include the date the document will be stored and the identity of the user storing it. The DMS may also extract metadata from the document automatically or prompt the user to add metadata. Some systems also use optical character recognition on scanned images, or perform text extraction on electronic documents. The resulting extracted text can be used to assist users in locating documents by identifying probable keywords or providing for full text search capability, or can be used on its own. Extracted text can also be stored as a component of metadata, stored with the image, or separately as a source for searching document collections.


    Many document management systems attempt to integrate document management directly into other applications, so that users may retrieve existing documents directly from the document management system repository, make changes, and save the changed document back to the repository as a new version, all without leaving the application. Such integration is commonly available for office suites and e-mail or collaboration/groupware software. Integration often uses open standards such as ODMALDAPWebDAV and SOAP to allow integration with other software and compliance with internal controls.[citation needed]


    Capture primarily involves accepting and processing images of paper documents from scanners or multifunction printersOptical character recognition (OCR) software is often used, whether integrated into the hardware or as stand-alone software, in order to convert digital images into machine readable text. Optical mark recognition (OMR) software is sometimes used to extract values of check-boxes or bubbles. Capture may also involve accepting electronic documents and other computer-based files.


    Visual validation registration system and important data. E.g. document failures, lack of bells,[clarification needed] missing signatures, misspelled names, this can be printed on paper documents or images on paper.


    Indexing tracks electronic documents. Indexing may be as simple as keeping track of unique document identifiers; but often it takes a more complex form, providing classification through the documents' metadata or even through word indexes extracted from the documents' contents. Indexing exists mainly to support retrieval. One area of critical importance for rapid retrieval is the creation of an index topology.


    Store electronic documents. Storage of the documents often includes management of those same documents; where they are stored, for how long, migration of the documents from one storage media to another (hierarchical storage management) and eventual document destruction.


    Retrieve the electronic documents from the storage. Although the notion of retrieving a particular document is simple, retrieval in the electronic context can be quite complex and powerful. Simple retrieval of individual documents can be supported by allowing the user to specify the unique document identifier, and having the system use the basic index (or a non-indexed query on its data store) to retrieve the document. More flexible retrieval allows the user to specify partial search terms involving the document identifier and/or parts of the expected metadata. This would typically return a list of documents which match the user's search terms. Some systems provide the capability to specify a Boolean expressioncontaining multiple keywords or example phrases expected to exist within the documents' contents. The retrieval for this kind of query may be supported by previously built indexes, or may perform more time-consuming searches through the documents' contents to return a list of the potentially relevant documents. See also Document retrieval.


    A published document for distribution has to be in a format that can not be easily altered. As a common practice in law regulated industries, an original master copy of the document is usually never used for distribution other than archiving. If a document is to be distributed electronically in a regulatory environment, then the equipment tasking the job has to be quality endorsed AND validated. Similarly quality endorsed electronic distribution carriers have to be used. This approach applies to both of the systems by which the document is to be inter-exchanged, if the integrity of the document is highly in demand.


    Document security is vital in many document management applications. Compliance requirements for certain documents can be quite complex depending on the type of documents. For instance, in the United States, the Health Insurance Portability and Accountability Act (HIPAA) requirements dictate that medical documents have certain security requirements. Some document management systems have a rights management module that allows an administrator to give access to documents based on type to only certain people or groups of people. Document marking at the time of printing or PDF-creation is an essential element to preclude alteration or unintended use.


    Workflow is a complex process and some document management systems have a built-in workflow module. There are different types of workflow. Usage depends on the environment to which the electronic document management system (EDMS) is applied. Manual workflow requires a user to view the document and decide whom to send it to. Rules-based workflow allows an administrator to create a rule that dictates the flow of the document through an organization: for instance, an invoice passes through an approval process and then is routed to the accounts-payable department. Dynamic rules allow for branches to be created in a workflow process. A simple example would be to enter an invoice amount and if the amount is lower than a certain set amount, it follows different routes through the organization. Advanced workflow mechanisms can manipulate content or signal external processes while these rules are in effect.


    Collaboration should be inherent in an EDMS. In its basic form, collaborative EDMS should allow documents to be retrieved and worked on by an authorized user. Access should be blocked to other users while work is being performed on the document. Other advanced forms of collaboration act in real time, allowing multiple users to view and modify (or markup) documents at the same time. The resulting document is comprehensive, including all users additions. Collaboration within Document Management Systems stores the various markups by each individual user during the collaboration session, allowing document history to be monitored.


    Versioning is a process by which documents are checked in or out of the document management system, allowing users to retrieve previous versions and to continue work from a selected point. Versioning is useful for documents that change over time and require updating, but it may be necessary to go back to or reference a previous copy.


    Searching finds documents and folders using template attributes or full text search. Documents can be searched using various attributes and document content.


    Publishing a document involves the procedures of proofreadingpeer or public reviewing, authorizing, printing and approving etc. Those steps ensure prudence and logical thinking. Any careless handling may result in the inaccuracy of the document and therefore mislead or upset its users and readers. In law regulated industries, some of the procedures have to be completed as evidenced by their corresponding signatures and the date(s) on which the document was signed. Refer to the ISO divisions of ICS 01.140.40 and 35.240.30 for further information.[3][4]

    The published document should be in a format that is not easily altered without a specific knowledge or tools, and yet it is read-only or portable.[5]


    Document/image reproduction is key when thinking about implementing a system. It's great to be able to put things in, but how are you going to get them out? An example of this is building plans. How will plans be scanned and scale be retained when printed?



    Please contact us for details. One of our engineers will be happy to discuss your requirements.

  • Forbs- Tom Post

  •  IT Solutions Delivery Process and Procedure


    IT Solutions Delivery Process and Procedure


    Disciplined agile delivery (DAD) is a process decision framework that enables simplified process decisions around incremental and iterative solution delivery. DAD builds on the many practices espoused by advocates of agile software development, including Scrumagile modelinglean software development, and others.

    The primary reference for disciplined agile delivery is the book[1] of same name, written by Scott Ambler and Mark Lines.

    In particular, DAD has been identified as a means of moving beyond Scrum.[2] According to Cutter Senior Consultant Bhuvan Unhelkar, "The DAD framework provides a carefully constructed mechanism that not only streamlines IT work, but more importantly, enables scaling.".[3] Paul Gorans and Philippe Kruchten call for more discipline in implementation of agile approaches and indicate that DAD, as an example framework, is "a hybrid agile approach to enterprise IT solution delivery that provides a solid foundation from which to scale."


    Key Aspects




    The Disciplined Agile Delivery framework identifies that "People, and the way they interact with each other, are the primary determinant of success for a solution delivery project."


    DAD specifies a robust set of primary and secondary roles, outlined in the 'Roles' section below.



    The DAD process framework promotes the ideas that team members should collaborate closely and learn from each other, that the team should invest effort to learn from their experiences and evolve their approach, and that individuals should do so as well.[11]



    DAD adopts and tailors proven strategies from existing methods such as Scrum, Extreme Programming (XP), Agile Modeling (AM), Unified Process (UP), Kanban, Outside-in software development, and Agile Data (AD). Rather than taking the time to adapt one of these existing frameworks, with DAD all of the effort of combining relevant pieces of each technique has already been done.


    Full delivery lifecycle

    Unlike first generation agile methods that typically focus on the construction aspects of the lifecycle, the DAD lifecycle addresses the entire project from the point of initiation all the way to production and post-delivery production activities.


    Process goal driven

    The DAD framework approach is goal-driven rather than prescriptive. Compared to Scrum, which prescribes that all work is managed via a product backlog queue, DAD suggests choosing a work-prioritization strategy based on whatever factors are most important to project stakeholders.


    In a DAD approach, strategies could be driven by several factors: business value, risk, due date, dependencies, or any combination thereof. DAD describes the tradeoffs associated with each strategy and discusses the viability of each.


    Solution focused

    Disciplined Agile Development matures focus from simply producing software to providing consumable solutions that provide real business value to stakeholders. While software is clearly an important part of the deliverable, being solution focused means taking a holistic view of the overall problem. This can lead to suggested updates in hardware, business/organizational processes, and overall organizational structures.


    Risk-value lifecycle

    The DAD lifecycle is risk and value driven. It extends Scrum's value-driven lifecycle which produces potentially shippable software each sprint/iteration so that it explicitly includes light-weight milestones such as ensuring stakeholder consensus as to the scope of the project early in the lifecycle, proving the architecture with working code early in the lifecycle, ensuring sufficient functionality exists before transition, and ensuring production readiness before actual release of the solution.


    Enterprise aware

    Enterprise awareness is a crucial philosophy of the DAD framework. DAD teams work within an organization's enterprise ecosystem just like any other team. Ideally a DAD team will leverage existing resources in order to reduce overall delivery time and cost, and can work in parallel to other teams in the organization. An important aspect of enterprise awareness is that DAD has explicit DevOps [12] practices and strategies built right into the framework.



    Please contact us for details. One of our engineers will be happy to discuss your requirements.

  •  Nagios Network Management Solutions


    Nagios is an open source computer system monitoringnetwork monitoring and infrastructure monitoringsoftware application. Nagios offers monitoring and alerting services for servers, switches, applications, and services. It alerts the users when things go wrong and alerts them a second time when the problem has been resolved.


  • Professional  Quality of Service Delivery 

     Professional  Quality of Service Delivery

    As a professional  Engineering  Company it is our duty to protect customers against  any form abuse and miscommunication. Any service and solutions that we render must adhere to this statutory standard. Professional Engineers are bound by legal ethics  in execution of their duties. As an Engineer we must guard against selling product and service that may not bring clear and tangible benefits.



    We provide complex technology and solutions- this means our customers rely on trust to do business with us. It is our implicit and explicit duty  to make sure at any  point in business transaction we do not breach that trust. Omissions, shortcoming, delay, breakages must be communicated to the customer in writing so that the customer must understand the risk and reward at every time. As complex technology brings risks and rewards, it is  our duty to clearly explain such risk and rewards to the customer. In each and every project, we provide written risk and reward analysis.



      Our liabilities are limited to the extent of law of the land. This means we ensure against shortages against second and third parties. Losses resulting to parties not directly related project and service may not be covered. In case you have question regarding liabilities- please contact us regarding what is covered and what is not. In plan and simple English we cover your interest, while most of the other vendors will not provide such coverage.



    We sell, service and provide solutions that we think bring value in short term and long term. In case such values rendered is not clear, you can always contact us to demonstrate values in written terms. Please note the person on the ground executing the service many not have the system level picture and comprehension of the entire project. Because of this reason, the person on the ground may not be able to explain the risk and rewards that the project will bring you - the customer. Please direct all such inquiries to us.



  • Keen Computer Seasons Greetings



    Seasons Greetings 

    We at keen computer solutions & Keendirect ( website and    would like to extend  our seasons greetings to everyone in your organization. It has been a trying year economically for Canadian business. We have portfolio of technology solutions that could lower the cost and improve business operations. You can talk to us for free  to explore the possibilities.


    We also take this opportunity to request you to  include keencomputer and keendirect as a potential   supplier of  IT Products and Services. We respond to all RFP and Tenders . We trust we will be positive assistance in your endeavor.


    With Regards

    Keencomputer & Keendirect


     Unified Threat Management Solutions  at a Food Industry

    Internet Security  and Threat Mitigation at a Food  Industry

     Customer Profile

      A commercial food processing company in Canada with various ware houses is in the business of frozen food storage and delivery. The company has been in operation for 30 years. Quality of service and reliability to incoming and outgoing customers are  of paramount importance. The company had built the business on quality of service and reliability. The very existence of the company was at stake at one day.


  • Defining the Problem:

     Computerization and digital transformation of workplace is common in Canadian & US workplaces.  This means more and more computers, servers and cloud computing is injected in our dally life. Yet the basic questions remains to be asked, have we paid attention to the issue of maintenance and repair of modern computer infrastructure. The manual mode of IT support is not feasible and economically constraining to be the least.


     As the digital transformation affects every part of business operation, IT maintenance and trouble shooting has remained stuck in  1990s. Typical IT person can handle 10 computers and server and network, yet organization now has 200-500 PCs, Cloud and Servers. Does this means we must have an IT department of 50 people to handle 500 computers.   A strategic analysis of the maintainability  and scalability of Information technology is necessary [10].


    In a small and medium organization IT support is at best in a chaotic-fire fighting mode. No one knows what is going on with the computer system till  everything comes to a grinding halt. Quite often to get the system up and running  a hurry, we  often reject healthy parts, since we do not have time to accurately diagnose and replace only the faulty system. With new and Improved Network Management system, that is possible. In IT industry about 40% of hardware replacement  can be avoided if accurate  monitoring can be performed  and  implemented properly.


Go to top