Advanced Search
Search Results
90 total results found
User Groups – Domain AB (10.12.14.100)
In the AB domain, user accounts are organized into security groups to control access to resources and specific functionalities. Each group has a defined role and provides users with the necessary permissions based on their job requirements. This structure ens...
Audion System for GrandHall
The audio system installed throughout the shopping center provides background music, announcements, and event audio distribution. It is designed to create a pleasant atmosphere for visitors, improve customer experience, and support communication across all are...
Barcode Scanners
Datalogic Scanner Setup (Updated)
1. <---------------------------------------Prefix ($) setup----------------------------------------> <-------------------------------------------------------------------------------------------------> 2. <---------------------------------convert 12 c...
Wireless Scanner Setup
Old Wiki "Scaner DATALOGIC"
Программирование знака $ 1 2 3 4 5 6
Old Wiki "Scaner HONEYWELL"
Настройка сканера HONEYWELL Youjie 3300 1 2 ==== Настройка для стикеров в SPORTLANDIA ==== ==== Настройка для касс магазинов розницы ==...
Fiscal Terminals
Fiscal terminals are specialized devices used at the company’s points of sale (POS) to register sales and issue fiscal receipts in compliance with national tax regulations. They ensure that every transaction is properly recorded, reported, and securely transmi...
Old Wiki Fiscal Terminals
Установка софта для работы терминала
1. Сначала устанавливаете .Net Core https://dotnet.microsoft.com/download/dotnet/thank-you/sdk-2.1.202-windows-x64-installer 2. Сначала устанавливаете https://mesha-install.s3.amazonaws.com/bomba/MSoftRestartService%20v.1.0.1.exe 3. Устанавливаете https://me...
Настроить Киоск мод для терминала
1. Проверяем если Брандмауэр отключен либо создаем правило 2. В службах отключаем обновления 3. Перезапускаем MSoftHardware Web 4. полная перезагрузка терминала, отключение с розетки в том случае если ничего не помогло 5. Записываем в свойствах ярл...
Решение проблем с терминалом
1. Проверяем если брандмауер отключен 2. Перезапускаем 2 службы MSoftHardware Web service и MSoftRestartService (Останавливаем службу MSoftRestartService , после останавливаем службу MSoftHardware Web service. И потом запускаем тольк...
Windows Endpoints
Windows endpoints refer to all company devices running Microsoft Windows, including desktops, laptops, and workstations. These endpoints serve as the primary interface for employees to access business applications, data, and network resources while ensuring se...
Old Wiki Windows Endpoints
Установка и настройка WINDOWS
1. При установке WINDOWS создаем изначально пользователя Admin с правами администратора и стандартным паролем. НЕ ДОПУСКАЕТСЯ использование других паролей , создание пользователя User и дальнейшее его переименование в Admin. Так должна выглядеть учетн...
IT Audit
An IT Audit is a systematic evaluation of the company’s information technology infrastructure, policies, and operations. Its purpose is to ensure that IT systems are secure, reliable, and compliant with internal standards and external regulations. The audit he...
UpNet IT Audit
Raportul de audit a infrastructurii locale: Raport de audit Infrastructura IT Bomba.pdf Rezumat Raport Audit – Infrastructura IT Technotrade SRL Constatări principale Lipsa politicilor și procedurilor de securitate:– Nu există politici de securitate inf...
Plan de actiuni pentru remedierea problemelor din reteaua locala a Bomba
Infrastructura IT a companiei tale este funcțională, dar construită și operată fără aplicarea standardelor de securitate și reziliență. Practic: Procesele lipsesc sau sunt incomplete → nu există politici, proceduri și responsabilități clar definite. ...
Inventariere
Lista de inventariere facuta de IT directorul Igor Caraian : инв караян (3).xls
Infrastructure in Cloud
This chapter provides a comprehensive overview of cloud infrastructure — the foundation that enables cloud computing services to operate efficiently, securely, and at scale. It explores the key components, architectures, and management principles that form the...