Project Management

Project Management

Facility Management

NMSIPL has the team of technocrats, proficient in various domains of the IT sector. It will be updating the latest technological revolutions. The entire team is capable and confident of tuning the clients’ IT requirements to latest paradigm in the most economical way using the best possible combinations of the facilities available. Once the study of client’s requirements is done, the plan, with the list of available resources be its infrastructure, hardware and software, man power, technical expertise of the users etc. is made ready, simultaneously understanding the existing system. The solution is then proposed making use of the available resources and man power at the client’s premises. The responsibility starts from the study and ends at the effective implementation and maintenance.

The solutions may vary from simple supply of hardware to setting up WAN, LAN, E-Business infrastructure, maintenance of Client/Server Systems (Windows), Database Administration, ERP, Development and Implementation / Maintenance of Web applications, Mail Services etc. The client will be updated from time to time regarding the latest technological innovations by the technical team and its implementation for client’s best usage. This gives client an edge on the latest technology available in their Organization. The information and regular meetings give further improvement on the implication. Special Value Added Service attention will be always given to the client in terms of time and expertise available. Also, an exclusive dedicated team can be provided to the client at times of need.

Through our Total Facilities Management Solution, we offer a range of service options, customized to the specific requirements of yours. These include:

  • 365x24x7 Support for mission critical sites
  • Value added Support Services
  • System Administration
  • Helpdesk Services
  • Network Consulting
  • Network Implementation and Management
  • Asset Management etc.

All this helps customer in deriving maximum value from the investment in IT hardware and software.

Asset Management

Software asset management (SAM) is a business practice that involves managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of software applications within an organization. According to the Information Technology Infrastructure Library (ITIL), SAM is defined as “…all of the infrastructure and processes necessary for the effective management, control and protection of the software assets…throughout all stages of their lifecycle. Fundamentally intended to be part of an organization’s information technology business strategy, the goals of SAM are to reduce information technology (IT) costs and limit business and legal risk related to the ownership and use of software, while maximizing IT responsiveness and end-user productivity.[2] SAM is particularly important for large corporations in regards to redistribution of licenses and managing legal risks associated with software ownership and expiration. SAM technologies track license expiration, thus allowing the company to function ethically and within software compliance regulations. This can be important for both eliminating legal costs associated with license agreement violations and as part of a company's reputation management strategy. Both are important forms of risk management and are critical for large corporations' long-term business strategies.

SAM is one facet of a broader business discipline known as IT asset management, which includes overseeing both software and hardware that comprise an organiza tion’s computers and network.

A number of technologies are available to support key SAM processes:

Other levels of support are available:

  • Software inventory tools intelligently “discover” software installed across the  computer  network, and collect software file information such as title, product ID, size, date, path, and version.
  • License managersolutions provide an intelligent repository for license entitlements which can then be reconciled against data provided by Software inventory tools to provide the organization with an 'Effective License Position' or view of where the organization is under-licensed (at risk of a compliance audit) or over-licensed (wasting money on unnecessary software purchases).
  • Software metering tools monitor the utilization of software applications across a network. They can also provide real-time enforcement of compliance for applications licensed based on usage.
  • Application control tools restrict what and by whom particular software can be run on a computer as a means of avoiding security and other risks.
  • Software deployment tools automate and regulate the deployment of new software.
  •  Patch management tools automate the deployment of software patches to ensure that computers are up-to-date and meet applicable security and efficiency standards.

Backup Management


Keeping reliable backups is an integral part of data management. Your personal computer, external hard drives, departmental or university servers are examples of tools used for backing up data. CDs or DVDs are not recommended because they fail so frequently.

Backup Your Data
  • Make 3 copies (e.g. original + external/local + external/remote)
  • Have them geographically distributed (local vs. remote depends on recovery time needed)

Data Backup Options
  • Hard drive (examples: via Vista backup, Mac Timeline, UNIX rsync)
  • Tape backup system
  • MIT’s  TSM service (Basic is free, up to 15 Gb; Enterprise has a fee, and provides up to 10Tb, includes an off-site copy)
  • Cloud Storage - some examples of private sector storage resources include:
    1. Amazon S3 -Requires client software, no encryption support (
    2. S3-based Remote Hard Drive Services such as Elephant Drive ( and Jungle Disk (
    3. Mozy (from EMC) Free client software, 448-bit Blowfish encryption or AES key (http://
    4. Carbonite Free client software, 1024Free 1024-bit Blowfish encryption (

Secure Your Data
  • Unencrypted is ideal for storing your data because it will make it most easily read by you and others in the future. But if you do need to encrypt your data because its sensitivity:
    1. Keep passwords and keys on paper (2 copies), and in a PGP (pretty good privacy) encrypted digital file
    2. Don’t rely on 3rd party encryption alone
  • Uncompressed is also ideal for storage, but if you need to do so to conserve space, limit compression to your 3rd backup copy

Test your backup system

In order to make sure that your backup system is working properly, try to retrieve your data files and make sure that you can read them. You should do this upon initial setup of the system and on a regular schedule thereafter.