Project Information
In recent days, contact tracing, notification, and follow-up is a process used to identify, educate and monitor individuals who have had COVID or close contact with someone infected with the virus that causes COVID-19. These individuals are at a higher risk of becoming infected and sharing the virus with others. In order to provide additional support to public health units for following up with individuals who have been identified as high-risk contacts of a COVID-19 case. We have brainstormed our ideas to develop a “COVID WATCH” mobile app where a close contact/ confirmed case can do all this process through this app without making/ getting any calls from public health. Further, this app provides the following features:
- Complete the initial Interview process by getting the User's symptoms experienced, Calculating the monitoring period.
- Collecting close contact, Location visited information to keep track of contacts that have been exposed to the virus.
- Getting the Resource request information in order to avail of any help/ Resources provided by public health
- Notification will be sent to complete the daily health assessment check throughout the monitoring period.
Project Information
The lately homemade food application-based company “Homestyle Delicacies” joined hands with AlphaNet to build their network design in accordance with their business requirements. To enhance their current infrastructure, they have hired us to construct a more sophisticated network and services. To subsidize their new infrastructure for the Information Technology solutions, they’ll need the latest software as well as hardware. Moreover, they’ll require to change their configurations to add up speed, scalability, and security. Currently, there are 85 chefs registered with the application in Scarborough. Homestyle Delicacies wanted to expand their firm throughout the Greater Toronto Area and expecting more employees to get in touch with them and wants to establish their head office in Toronto.
Project Information
AON Cloud is a cloud service provider offering data storage services to its clients. They have as of late moved into another structure due to the unexpected growth of their customers, they require to make a medium-sized exchanged LAN and overhaul their essential LAN at the existing building. Each building will incorporate various end clients from different divisions, as well as other systems administration assets.
All the users at their primary building are connected to the LAN. The employees have access to the network with dedicated switch ports and with Wi-Fi. They likewise have a Network File System administration running on ten UNIX servers inside the office. The backbone layer will be handling the traffic and every server will be given a 10GBps interfaces.
The new building is panned to occupy 50 server-type devices which will be connected to the primary building through the core layer (5 – 6 GBps connection). The servers will be connected by dedicated 1GBps connections to the core layer.
Project Information
Senior management has a vision to expand the company to more locations across Canada within the scope of the next five years to accommodate the trending growth of clientele. Since each location operates independently and has antiquated equipment, management prefers to centralize IT operations so that the company network can operate more efficiently and provide cost savings in terms of work effort and total cost of ownership (TCO).
Currently, there is no direct connection between sites and employees cannot transfer files securely which contradicts the confidentiality, integrity, and availability (CIA) triad, since they currently transfer files over secure file transfer protocol (SFTP) or email. While it is enough to get the work done, it is still susceptible to man-in-the-middle (MITM) attacks, and management wishes to minimize security risks or attacks. As remote work is now larger than ever and weighing a critical factor in the workforce, the company needs to allow secure connections for administrators and authorized employees to access site resources as needed and the current infrastructure does not allow such.
Project Information
The bank’s outdated network infrastructure and security resulted in complications and inconveniences in the bank’s internal operations, such as a lack of access control and encryption in the network. This main problem forced the bank to reach out to us in order to refurbish the current network infrastructure. So, they came to us Network Enterprise Inc. to handle the project.
We designed a Network infrastructure that accomplished the following; fast, efficient, and secure communication, using Cisco technology network devices and Microsoft software on server and client machines, implemented virtual technology using VMware software to streamline the amount of Network hardware and reduce the cost and complexity of managing network hardware and software through centralized control.
Project Information
Computer Networks are the backbone of computing and communication technology, they support integration and interconnectivity as the world moves through a phase of digital transformation.
Computer networks form a critical infrastructure for most everyday modern products and services. The ""Internet"" is the interconnection of networks, as such, there is no internet without computer networking.
Our project, aims to engineer a resilient, redundant, scalable, secure and modern enterprise network infrastructure and architecture for the organization to provide quality service, ensure operational efficiency, recognize savings and propel the entity towards its goal of digital transformation.
Project Information
In this project, we are developing one of the most widely used image processing applications for generating different image effects from photographs. A photo is given as an input, and with the click of a button this photo will be turned into user chosen filters such as grayscale pencil sketch, color sketch, different tones, and cartoonish representation.
PicSketcher, as the name implies is a Platform that applies filters such as greyscale, color sketch, tone filter, AI filters, and other image enhancing tools to improvise the image and bring life to the memories of the users.
Successful Criteria:
The Success criteria of the product is measured in various perspectives User friendliness:
- Application should provide a smooth and hurdle free interface.
- Provide an easy onboarding process with simple steps
- Clear and easy to understand manual to handle the application
- Low latency with millisecond level response to apply filters for the images
- 99% uptime which makes the application always available to the users
- Maintain 100% data privacy and follow sophisticated security measures to protect sensitive images of users
- Achieve 95% user satisfaction and have 80% returning users to the application
Project Information
Electronic Medical Records (EMR) system will be a cost effective and robust quality software system to capture and maintain patient data electronically on digital devices such as computers, tablets, and smartphones.
EMR system will provide the following key features:
- Allow patients to register online with a family doctor, provide details for his profile, add social and medical history, and book an appointment with his family doctor
- Allow healthcare professionals to register online with a clinic.
- Manage patient health data electronically in a secured and efficient manner.
- Allow data retrieval from anywhere, anytime.
- Facilitate fast and accurate diagnosis and treatment of patients to help speedy recovery.
- Provide a cost-effective Solution (available for a reasonable subscription price) hosted on a cloud server.
- Help eliminate duplicate lab tests and procedures, thus saving time and money.
Rationale:
Patient health records captured on paper forms result in an inefficient management of health records which are hard to maintain and use. A patient’s data may not be available in a timely manner to support proper diagnosis and treatment.
Project Information
Traditional networks were built for connecting basic services such as local clients to local servers, always within the same network infrastructure, i.e., they were designed to function within the same Local Area Network (LAN) or exchanging data from LAN to LAN within the same organization. However, in today’s pacing digital world with emerging technologies and big trends such as social, mobile, cloud, and internet of things, traditional networks cannot keep up with the rapid acceleration and huge demand by consumers or market. This project demonstrates a DDoS attack over SDN using virtualization tools, Mininet network emulator for SDN, and Floodlight SDN Controller for monitoring and orchestration of the network.
Project Information
Currently, hackers can target any server that is connected to the Internet. Penetration testing is essential in the preparation process for countering security attacks and reducing security problems. In short, penetration testing involves simulating a security attack in a controlled environment by ethical hackers in order to assess the potential risks of servers. Organizations may use penetration testing to identify system vulnerabilities and take appropriate action to reduce any risks. With an ever-increasing need for a larger cybersecurity workforce, it is essential that companies recruit additional cybersecurity specialists. We must also guarantee that they are prepared for a career in cybersecurity. This involves giving students the required materials as well as hands-on exercises to prepare them for possible threats. The research project has accomplished some activities: researched about penetration testing; set up a penetration testing lab with Kali Linux and Metasploitable 2; performed penetration testing step-by-step using Metasploit. The goal of this project is to establish a hands-on lab for students or those who want to learn penetration testing techniques using Metasploit in Kali Linux.