Information and Communications Technology

ICT is often considered an extended synonym for Information Technology (IT), however, its scope is broader.
Information and Communications Technology refers to all the technology used to handle telecommunications, broadcast media, intelligent building management systems, audiovisual processing, transmission systems, network-based control and monitoring functions.
ICT has more recently been used to describe the convergence of several technologies and the use of transmission lines carrying very diverse data and communication types and formats – what we have come to know as Managed Services.

What is RequestICT?

 

An online IT procurement marketplace

A community of IT Solution Providers

A platform for RFT building

 

RequestICT empowers the End User by enabling it to submit an anonymous RFT, which is in turn received by numerous IT Solution Providers (or Vendors) with no more than the required information to put a proposal together and privately get it to the End User for review.

This way, the End User can calmly evaluate proposals and choose the best Vendor to work with. Once the project is completed, the End User will be able to rate said Vendor for their business strengths and ability to deliver, for other End Users to consider.

This model opens new lines of communication in a private manner, making it secure for both parties to conduct business.

As such, our Business Tech Marketplace focuses on 12 main ICT Categories:

NETWORK COMMUNICATIONS
Network infrastructure refers to the hardware and software resources of an entire network that enable network connectivity, communication, operations and management of an enterprise network.

Network infrastructure provides the communication path and services between users, processes, applications, services and external networks/the Internet.

What you can Request:

– Routers
– Switches
– Load Balancers
– Services

NETWORK AND CYBER SECURITY
Network security is an over-arching term that describes that the policies and procedures implemented by a network administrator to avoid and keep track of unauthorized access, exploitation, modification, or denial of the network and network resources.

This means that a well-implemented network security blocks viruses, malware, hackers, etc. from accessing or altering secure information.

What you can Request:

– Physical and Virtual Firewalls
– Antivirus, Antispyware, Email protection, etc.
– NOC services
– SOC services

WIRELESS NETWORKS
Wireless networks are computer networks that are not connected by cables of any kind. The use of a wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. The basis of wireless systems is radio waves, an implementation that takes place at the physical level of network structure.

What you can Request:

– Interior/Exterior Wi-Fi networks
– Wireless Mesh networks
– Point-to-Point connectivity
– Point-to-Multipoint connectivity
– Services

IP TELEPHONY
Voice over Internet Protocol (VoIP) is a technology used for delivering different kinds of data from a source to a destination using IP (Internet Protocol). The data may be in many forms, including files, voice communication, pictures, fax or multimedia messages. VoIP is most often used for telephone calls, which are almost free of charge.

What you can Request:

– IP Phones
– IP Phone Systems
– VoIP Connectivity
– Unified Communications
– Services

SERVERS
A server is a computer, a device or a program that is dedicated to managing network resources. Servers are often referred to as dedicated because they carry out hardly any other tasks apart from their server tasks.

There are a number of categories of servers, including print servers, file servers, network servers and database servers.

A server often has special characteristics and capabilities, including:

The ability to update hardware and software without a restart or reboot.
Advanced backup capability for frequent backup of critical data.
Advanced networking performance.
Automatic (invisible to the user) data transfer between devices.
High security for resources, data and memory protection.

What you can Request:

– Tower Servers
– Rack Servers
– Blade Servers
– Services

STORAGE
Storage primarily refers to the devices, equipment and software technologies that enable data and application storage within a data center room or facility. This includes:

Hard disk drives, tape drives and other forms of internal and external storage
Storage and backup management software utilities
External storage facilities/solutions such as cloud or remote storage
Storage networking technologies such as storage area networks (SAN), network attached storage (NAS), RAID and more
It also includes data center storage policy and procedures that govern the entire process of data storage and retrieval. Moreover, Storage may also incorporate data center storage security and access control procedures and methodologies.

What you can Request:

– Flash Array Storage
– Network-Attached Storage (NAS)
– Cloud-based Storage
– Hybrid-based Storage
– Services

DATA CENTER SOLUTIONS
A data center (or datacenter) is a facility composed of networked computers and storage that businesses or other organizations use to organize, process, store and disseminate large amounts of data.

Data center hosting is the process of deploying and hosting a data center on a third-party or external service provider’s infrastructure. It enables the use of the same services, features and capabilities of a data center but from a hosted platform external to the on-premises data center or IT infrastructure.

Data center tier levels refer to a data center’s ability to maintain functionality during various kinds of failures, such as power outages. Higher tier levels indicate more sustainability for data center operations and fault-tolerant systems that will allow for uninterrupted use during certain kinds of emergencies or crises.

What you can Request:

– Build/Modify Site on Premises
– Colocation
– Relocation
– Cloud Connectivity
– Consulting Services
– Connectivity Services
– Moving Services
– Security Services

CLOUD AND MANAGED SERVICES
A managed service provider (MSP) is a type of IT service company that provides server, network, and specialized applications to end users and organizations. These applications are hosted and managed by the service provider.

Managed service providers tend to be Web hosting or application service providers that allow users to outsource their network and application resource procedures under a delivery agreement. In most cases, MSPs own the entire physical back-end infrastructure and provide resources to end users remotely over the Internet on a self-service, on-demand basis.

MSPs manage basic communication services, like frame relays and leased line wide area networks (WAN), while integrating and managing a variety of enterprise services.

What you can Request:

Cloud
– Public and Private Cloud Solutions
– Software as a Service (SaaS)
– Infrastructure as a Service (IaaS)
– Platform as a Services (PaaS)
– Migration and Development Services
– Cloud Management
– Consulting Services

Managed Services
– Network
– Voice
– Security
– Computing
– Backup Services
– Disaster Recovery
– Consulting Services

VIRTUALIZATION
Virtualization refers to the creation of a virtual resource such as a server, desktop, operating system, file, storage or network.

The main goal of virtualization is to manage workloads by radically transforming traditional computing to make it more scalable. Virtualization has been a part of the IT landscape for decades now, and today it can be applied to a wide range of system layers, including operating system-level virtualization, hardware-level virtualization and server virtualization.

What you can Request:

– Desktop Virtualization
– Server
– Software
– Storage
– Network
– Consulting Services

BACKUP AND RECOVERY
Definition – What does Backup and Recovery mean?

Backup and Recovery refers to the process of backing up data in case of a loss and setting up systems that allow that data recovery due to data loss. Backing up data requires copying and archiving computer data so that it is accessible in case of data deletion or corruption. Data from an earlier time may only be recovered if it has been backed up.

Data backup is a form of disaster recovery and should be part of any disaster recovery plan.

What you can Request:

– Disaster Recovery Solutions
– Business Continuity Solutions
– Offsite/Remote Solutions
– Consulting Services

ACCESS CONTROL & VIDEO SECURITY
The main difference between a digital video surveillance system and an analog video surveillance system is that the former is capable of capturing and storing the video signal in a digital format, which eliminates the need for any conversion. Most digital video surveillance solutions are capable of being managed from anywhere and provide interoperability since the cameras are connected to a Network.

Biometric security is mainly implemented in environments with critical physical security requirements or that are highly prone to identity theft. Biometric security-based systems or engines store human body characteristics that do not change over an individual’s lifetime. These include fingerprints, eye texture, voice, hand patterns and facial recognition.

What you can Request:

– Digital Video Surveillance Systems
– Digital Video Surveillance Cameras
– Analog to Digital Encoders
– IP/Network Video Management (NVR)
– Video Analytics Solutions
– Physical Security Systems
– Biometric Security Systems
– Complete Security Management
– Acess Control + Video Integrated Solutions
– Design Consulting
– Services

APPLICATION DEVELOPMENT
development is a process by which standalone or individual software is created using a specific programming language. It involves writing a series of interrelated programming code and includes processes such as initial research, data flow design, process flow design, flow charts, technical documentation, software testing, debugging and other software architecture techniques. which provides the functionality of the developed software.

What you can Request:

– Application Suite development
– Enterprise Software development
– Enterprise Infrastructure Software development
– Information Worker Software
– Content Access platforms
– Education Software
– Media Development
– Mobile App Development