Faronics
   HOME
*





Faronics
Faronics Corporation is a privately held software company with offices in Vancouver, British Columbia, Canada, Pleasanton, California, United States, Singapore and Bracknell, UK. Faronics develops computer software for multi-user IT environments. Faronics products are predominantly used in educational institutions, libraries, healthcare facilities, and government agencies. History Faronics was founded in 1993 by Farid Ali, the company's present CEO, and was incorporated in 1996. Faronics first sold computer hardware and shifted to software in 1999 with the advent of Deep Freeze, a kernel-level software utility that instantly restores a computer back to its original configuration with every reboot. Deep Freeze has since-garnered a strong presence in K-12 education and is now part of Faronics "Layered Security" suite of products. Products Faronics develops nine software products which run on Windows and Mac OS X operating systems: Deep Freeze A software utility, releas ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Green Computing
Green computing, green IT, or ICT sustainability, is the study and practice of environmentally sustainable computing or IT. The goals of green computing are similar to green chemistry: reduce the use of hazardous materials, maximize energy efficiency during the product's lifetime, the recyclability or biodegradability of defunct products and factory waste. Green computing is important for all classes of systems, ranging from handheld systems to large-scale data centers. Many corporate IT departments have green computing initiatives to reduce the environmental effect of their IT operations. Yet it is also clear that the environmental footprint of the sector is significant, estimated at 5-9% of the world's total electricity use and more than 2% of all emissions. Data centres and telecommunications will need to become more energy efficient, reuse waste energy, and use more renewable energy sources. They can and should become climate neutral by 2030. Origins In 1992, the U.S. Enviro ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


PC Power Management
PC power management refers to software-based mechanisms for controlling the power use of Personal computer hardware. This is typically achieved through software that puts the hardware into the lowest power demand state available, making it an aspect of Green computing. A typical office PC uses about 90 watts when active (approximately 50 watts for the base unit, and 40 watts for a typical LCD screen); and three to four watts when ‘asleep’. Up to 10% of a modern office’s electricity demand can be due to PCs and monitors.Sleepless of Seattle; Why Windows Power Management Doesn't Always Work, Mark Blackburn, Strategy Analyst, 1E, January 2009. While most PCs allow low power settings, there are frequently situations, especially in a networked environment, where processes running on the computer will prevent the low power settings from taking effect. This can have a dramatic effect on energy use that is invisible to the user. Operational testing has shown that on any given day ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Private Company
A privately held company (or simply a private company) is a company whose shares and related rights or obligations are not offered for public subscription or publicly negotiated in the respective listed markets, but rather the company's stock is offered, owned, traded, exchanged privately, or Over-the-counter (finance), over-the-counter. In the case of a closed corporation, there are a relatively small number of shareholders or company members. Related terms are closely-held corporation, unquoted company, and unlisted company. Though less visible than their public company, publicly traded counterparts, private companies have major importance in the world's economy. In 2008, the 441 list of largest private non-governmental companies by revenue, largest private companies in the United States accounted for ($1.8 trillion) in revenues and employed 6.2 million people, according to ''Forbes''. In 2005, using a substantially smaller pool size (22.7%) for comparison, the 339 companies on ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

BIOS
In computing, BIOS (, ; Basic Input/Output System, also known as the System BIOS, ROM BIOS, BIOS ROM or PC BIOS) is firmware used to provide runtime services for operating systems and programs and to perform hardware initialization during the booting process (power-on startup). The BIOS firmware comes pre-installed on an IBM PC or IBM PC compatible's system board and exists in some UEFI-based systems to maintain compatibility with operating systems that do not support UEFI native operation. The name originates from the Basic Input/Output System used in the CP/M operating system in 1975. The BIOS originally proprietary to the IBM PC has been reverse engineered by some companies (such as Phoenix Technologies) looking to create compatible systems. The interface of that original system serves as a ''de facto'' standard. The BIOS in modern PCs initializes and tests the system hardware components (Power-on self-test), and loads a boot loader from a mass storage device which then i ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Climate Savers Computing Initiative
The Climate Savers Computing Initiative was a nonprofit group of consumers, businesses and conservation organizations dedicated to promoting smart technologies that improve power efficiency and reduce energy consumption of computers. Formed in 2007, it was based in Portland, Oregon. In July 2012, Climate Savers Computing Initiative combined with The Green Grid and its programs continue within that organization. Participating manufacturers committed to producing products that meet specified power-efficiency targets, and members committed to purchasing power-efficient computing products. By 2010, the initiative sought to reduce energy consumption by computers by 50 percent and reduce global emissions from the operation of computers by 54 million tons a year. Goal The goal of the new environmental effort was to save energy and reduce greenhouse gas emissions by setting targets for energy-efficient computers and components, and promoting the adoption of energy-efficient computers ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Energy Star
Energy Star (trademarked ''ENERGY STAR'') is a program run by the U.S. Environmental Protection Agency (EPA) and U.S. Department of Energy (DOE) that promotes energy efficiency. The program provides information on the energy consumption of products and devices using different standardized methods. The Energy Star label is found on more than 75 different certified product categories, homes, commercial buildings, and industrial plants. In the United States, the Energy Star label is also shown on the Energy Guide appliance label of qualifying products. Elements of the Energy Star Program are being implemented in Japan, Taiwan, and Switzerland, as well as by Energy Star Canada. In 2018, a 15-year long agreement with the European Union expired. A previous agreement with the European Free Trade Association has expired. History The Energy Star program was established by the Environmental Protection Agency in 1992 and operates under the authority of the Clean Air Act, section 103( ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

IT Asset Management
Data center management is the collection of tasks performed by those responsible for managing ongoing operation of a data center This includes ''Business service management'' and planning for the future. Historically, ''data center management'' was seen as something performed by employees, with the help of tools collectively called Data Center Infrastructure Management (DCIM) tools. Both for in-house operation and outsourcing, Service-level agreements must be managed to ensure data-availability. Competition Data center management is a growing major topic for a growing list of large companies who both compete and cooperate, including: Dell, Google, HP, IBM, Intel and Yahoo. Hardware/software vendors who are willing to live with coopetition are working on projects such as "The Distributed Management Task Force" (DMTF) with a goal of learning to "more effectively manage mixed Linux, Windows and cloud environments." With the ''DMTF'' a decade old, the list of companies is growing, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




User Environment Management
User environment management (also abbreviated to UEM) is the management of a computer user's experience within their desktop environment. The user environment In a modern workplace an organisation grants each user access to an operating system and the applications required for their role, applying corporate policy to ensure the user has appropriate access levels. This typically includes items such as the filesystems, printers and applications they should and shouldn't have access to. Within this framework, each user has a preferred way of operating and they make a number of changes to enable them to work most efficiently. Common user changes are email signatures, language settings and the environment ‘look and feel’. The combination of the corporate policy and user preference is described as the ‘user personality’. Users form an attachment to their PCs, but “their attachment is not to the device itself, but to the way in which they do their jobs today”. Managing user pe ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Rootkit
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software. The term ''rootkit'' is a compound of "root" (the traditional name of the privileged account on Unix-like operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware. Rootkit installation can be automated, or an attacker can install it after having obtained root or administrator access. Obtaining this access is a result of direct attack on a system, i.e. exploiting a vulnerability (such as privilege escalation) or a password (obtained by cracking or social engineering tactics like "phishing"). Once installed, it becomes possible to hide the intrusion as well as to maintain privileged acc ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Spyware
Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privacy or endangering their device's security. This behaviour may be present in malware as well as in legitimate software. Websites may engage in spyware behaviours like web tracking. Hardware devices may also be affected. Spyware is frequently associated with advertising and involves many of the same issues. Because these behaviors are so common, and can have non-harmful uses, providing a precise definition of spyware is a difficult task.FTC Report (2005)." History The first recorded use of the term :wikt:spyware, spyware occurred on October 16, 1995 in a Usenet post that poked fun at Microsoft's business model.Vossen, Roland (attributed); October 21, 1995Win 95 Source code in c!!posted to rec..programmer; retrieved from groups.google.co ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Anti-virus Software
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other malware, antivirus software started to protect from other computer threats. In particular, modern antivirus software can protect users from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraud tools, adware, and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT), and botnet DDoS attacks. History 1949–1980 period (pre-antivirus days) Although the roots of the computer viru ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Whitelist
A whitelist, allowlist, or passlist is a mechanism which explicitly allows some identified entities to access a particular privilege, service, mobility, or recognition i.e. it is a list of things allowed when everything is denied by default. It is the opposite of a blacklist, which is a list of things denied when everything is allowed by default. Email whitelists Spam filters often include the ability to "whitelist" certain sender IP addresses, email addresses or domain names to protect their email from being rejected or sent to a junk mail folder. These can be manually maintained by the user or system administrator - but can also refer to externally maintained whitelist services. Non-commercial whitelists Non-commercial whitelists are operated by various non-profit organisations, ISPs, and others interested in blocking spam. Rather than paying fees, the sender must pass a series of tests; for example, their email server must not be an open relay and have a static IP address. The ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]