IndraStra Global – Group Portal https://www1.indrastra.com/ IndraStra Global - Group Portal Tue, 23 Jan 2024 03:48:43 +0000 en-US hourly 1 https://wordpress.org/?v=6.7 https://www1.indrastra.com/wp-content/uploads/2022/08/cropped-GP-32x32.png IndraStra Global – Group Portal https://www1.indrastra.com/ 32 32 Building a Knowledge Repository with MediaWiki https://www1.indrastra.com/2024/01/12/building-a-knowledge-repository-with-mediawiki/ Fri, 12 Jan 2024 13:14:03 +0000 https://www1.indrastra.com/?p=609 In the contemporary and rapidly evolving corporate landscape, effective distribution and control of information play a pivotal role in determining the success of an organization. MediaWiki, renowned as the software behind Wikipedia, emerges as a potent tool for consolidating and disseminating internal information within a company. By harnessing MediaWiki’s capabilities, organizations can create a centralized […]

The post Building a Knowledge Repository with MediaWiki appeared first on IndraStra Global - Group Portal.

]]>
In the contemporary and rapidly evolving corporate landscape, effective distribution and control of information play a pivotal role in determining the success of an organization. MediaWiki, renowned as the software behind Wikipedia, emerges as a potent tool for consolidating and disseminating internal information within a company. By harnessing MediaWiki’s capabilities, organizations can create a centralized knowledge repository that enhances collaboration, streamlines processes and fosters continuous learning among employees.

1. Planning and Preparation:

The foundation of a successful knowledge repository lies in meticulous planning and preparation. Begin by identifying the primary knowledge needs within your organization. What information do employees frequently seek? This initial assessment will guide the structuring of content within the wiki, enabling a logical hierarchy through categories, subcategories, and pages.

Determining user roles and permissions is equally critical. Defining who can access, edit, and manage content ensures data integrity and aligns with organizational policies. Additionally, choose a suitable hosting platform based on your preferences—whether it’s an in-house server installation or utilizing a cloud-based solution.

2. Setting Up MediaWiki:

The setup phase involves the installation and configuration of MediaWiki. The installation process is relatively straightforward and supported by comprehensive online guides. Moreover, enhancing functionality through extensions is pivotal. Incorporating features such as user forums, discussion pages, and document attachments enriches collaboration and knowledge sharing.

Customization is key to fostering user engagement. By leveraging themes and plugins, tailor the wiki’s appearance to reflect your brand identity while ensuring an intuitive and user-friendly interface.

3. Populating the Wiki:

Commence content population by prioritizing essential information—address frequently asked questions, standard operating procedures, and reference materials. Cultivate a culture of knowledge sharing by encouraging and incentivizing employee contributions. Implementing review processes maintains content quality, ensuring accuracy and consistency across the repository.

4. Making the Wiki Useful:

Proactive promotion is crucial to maximizing the utility of the wiki. Conduct training sessions and communicate the benefits of the repository to employees, encouraging widespread adoption. Seamlessly integrate the wiki with other internal systems and resources, facilitating easy access and enhancing its value.

Continuous improvement is imperative. Collect feedback from users and stakeholders to iterate and enhance the wiki’s functionality and content based on evolving needs.

Additional Tips for Optimizing MediaWiki:

Templates: Create standardized templates for content types to ensure consistency and efficiency.

Rich Media: Enhance content with multimedia elements like images, videos, and diagrams for better comprehension.

Cross-Referencing: Foster interconnectedness by linking related articles, facilitating seamless navigation.

Version Control: Leverage version control features to track changes and revert to previous versions if needed, ensuring data integrity.

By diligently following these steps and integrating best practices, MediaWiki can evolve into a valuable asset, serving as a hub for knowledge accumulation and dissemination. A well-structured and actively maintained knowledge repository empowers employees, augments organizational efficiency, and fosters a culture of continuous learning.

For further guidance and resources:

EXPERT’S NOTE: MediaWiki stands as a potent platform to transform information into a powerful asset, fostering innovation and efficiency within organizations. Embrace its capabilities, cultivate a collaborative culture, and witness the growth and evolution of your corporate knowledge repository.

The post Building a Knowledge Repository with MediaWiki appeared first on IndraStra Global - Group Portal.

]]>
Safeguarding Against Social Engineering Attacks: Real-life Examples and Prevention Strategies https://www1.indrastra.com/2024/01/12/safeguarding-against-social-engineering-attacks-real-life-examples-and-prevention-strategies/ Fri, 12 Jan 2024 12:41:43 +0000 https://www1.indrastra.com/?p=606 Amidst the dynamic realm of cybersecurity threats, social engineering remains a persistent and substantial peril, showcasing its enduring impact. Unlike conventional hacking techniques that exploit software vulnerabilities, social engineering relies on manipulating human psychology to gain unauthorized access to sensitive information. This article will explore various social engineering tactics, shedding light on real-life examples, and […]

The post Safeguarding Against Social Engineering Attacks: Real-life Examples and Prevention Strategies appeared first on IndraStra Global - Group Portal.

]]>
Amidst the dynamic realm of cybersecurity threats, social engineering remains a persistent and substantial peril, showcasing its enduring impact. Unlike conventional hacking techniques that exploit software vulnerabilities, social engineering relies on manipulating human psychology to gain unauthorized access to sensitive information. This article will explore various social engineering tactics, shedding light on real-life examples, and providing guidance on how to recognize and avoid falling victim to these deceptive schemes.

Unveiling the World of Social Engineering

Social engineering is a broad term that encompasses a range of techniques exploiting human behavior. Cybercriminals employ psychological manipulation to trick individuals into divulging confidential information, clicking on malicious links, or performing actions that compromise security. Here are some common social engineering tactics along with real-life examples and guidance:

  1. Phishing Attacks:
  • Real-life example: An employee receives an email seemingly from their company’s IT department, requesting login credentials for a system upgrade.
  • Guidance: Verify the legitimacy of such emails by contacting the IT department through official channels.
  1. Pretexting:
  • Real-life example: A scammer poses as a co-worker, claiming to need sensitive information urgently for a project.
  • Guidance: Always verify requests for sensitive information directly with the person involved using trusted communication channels.
  1. Baiting:
  • Real-life example: Malicious software disguised as a free software download is offered, enticing users to compromise their systems.
  • Guidance: Avoid downloading files or clicking on links from untrusted sources, and use reputable security software.
  1. Quizzes and Surveys:
  • Real-life example: Individuals are tricked into taking quizzes that ask for personal information, which is then used for malicious purposes.
  • Guidance: Be cautious about sharing personal details online, especially in response to unsolicited quizzes or surveys.
  1. Impersonation:
  • Real-life example: A fraudster poses as a tech support agent, convincing the victim to provide remote access to their computer.
  • Guidance: Verify the identity of anyone claiming to represent a legitimate organization, especially if unsolicited.

Identifying Social Engineering Attacks

Recognizing social engineering attacks is crucial for thwarting cyber threats. Here are key indicators that can help individuals identify potential scams:

  • Urgency and Pressure: Attackers often create a sense of urgency to prompt impulsive actions. Be skeptical of requests that demand immediate responses.
  • Unsolicited Communications: Be wary of unexpected emails, messages, or calls, especially if they request sensitive information or prompt you to click on links.
  • Unusual Requests: Any request for sensitive information should be treated with suspicion, especially if it deviates from normal procedures.
  • Mismatched URLs: Hover over links to reveal the actual destination. Verify that the URL matches the purported source, and look for subtle misspellings or variations.

Preventing Social Engineering Attacks

Protecting oneself from social engineering requires a combination of vigilance, skepticism, and proactive measures:

  • Employee Training Programs: Conduct regular training sessions to educate employees about social engineering tactics, emphasizing the importance of verifying requests for sensitive information.
  • Multi-factor Authentication (MFA): Implement MFA to add an extra layer of security, even if login credentials are compromised.
  • Security Awareness Campaigns: Launch awareness campaigns that showcase real-life examples of social engineering attacks and provide practical tips for recognizing and avoiding them.
  • Regular Security Audits: Conduct routine security audits to identify and address vulnerabilities, ensuring that employees remain vigilant against evolving threats.
  • Use Reliable Security Software: Employ reputable antivirus and anti-malware software to detect and block social engineering attempts.
  • Verify Suspicious Communications: If in doubt, independently verify requests for sensitive information by contacting the purported sender through official channels.

By staying informed, adopting a skeptical mindset, and implementing robust cybersecurity practices, individuals and organizations can significantly reduce the risk of falling victim to social engineering attacks. As cyber threats continue to evolve, maintaining a proactive and vigilant approach is paramount to safeguarding sensitive information and maintaining digital security. Remember, a well-informed and cautious user is the first line of defense against the ever-present threat of social engineering.

The post Safeguarding Against Social Engineering Attacks: Real-life Examples and Prevention Strategies appeared first on IndraStra Global - Group Portal.

]]>
IndraStra Global Launches SaaS Applications Store https://www1.indrastra.com/2023/10/04/indrastra-global-launches-saas-applications-store/ Thu, 05 Oct 2023 02:45:47 +0000 https://www1.indrastra.com/?p=611 Bringing Publishing Software to Your Fingertips IndraStra Global, a leading name in digital solutions and technology, is thrilled to announce the launch of its revolutionary SaaS Applications Store. This pioneering platform offers seamless access to a range of cutting-edge publishing software solutions, including Open Journal Systems, Open Monograph Press, Open Preprint Systems, MediaWiki, Omeka Classic, […]

The post IndraStra Global Launches SaaS Applications Store appeared first on IndraStra Global - Group Portal.

]]>
Bringing Publishing Software to Your Fingertips

IndraStra Global, a leading name in digital solutions and technology, is thrilled to announce the launch of its revolutionary SaaS Applications Store. This pioneering platform offers seamless access to a range of cutting-edge publishing software solutions, including Open Journal Systems, Open Monograph Press, Open Preprint Systems, MediaWiki, Omeka Classic, and Moodle Learning Management System (LMS).

In today’s fast-paced digital landscape, efficient publishing tools are essential for researchers, educators, and organizations. IndraStra Global’s SaaS Applications Store provides a one-stop destination for the latest plug-and-play publishing software, catering to the diverse needs of our global community.

Key Features and Benefits:

1. Affordable Subscriptions: IndraStra Global is committed to affordability. Our SaaS Applications Store offers cost-effective subscription plans, making these essential software tools accessible to a wider audience.

2. User-Friendly Experience: The store is designed for ease of use, ensuring a seamless experience for both novices and experienced users. Subscribing to your desired software has never been easier.

3. Multiple Platforms: You can find us on Google Shopping for global access. Additionally, for our valued customers in the United States, we are available on Facebook Shop and WhatsApp Shop, further enhancing accessibility and convenience.

4. Reliable Suppor: IndraStra Global is dedicated to customer satisfaction. Our support team is readily available to assist with any queries or technical issues, ensuring that you get the most out of your chosen software.

5. Continuous Updates: Stay at the forefront of technology with regular updates and improvements to the software applications in our store.

IndraStra Global invites you to explore our SaaS Applications Store and discover how these innovative publishing solutions can empower your research, education, or organization. Join us in embracing the future of publishing technology.

For more information and to access our SaaS Applications Store, please visit https://on.indrastra.com/saas

IndraStra Global Publishing Solutions Inc.
1309 Coffeen Avenue, STE 1200
Sheridan, WY 82801
Phone: (712) 581-0811
Fax: (917) 909-2571
Email: info@indrastra.com

About IndraStra Global

IndraStra Global is a “Strategic Information Services Company”, primarily focused on data-driven academic research which includes assessment and interpretation based on “O.O.D.A.” Framework. Also, we specialized in all-format publishing and licensing, 360-degree content management, online media intelligence & forecasting, digital asset management, digital content distribution, the design and implementation of the Integrated Library System (ILS) / Library Management System (LMS), and custom knowledge repositories (DSpace, Mediawiki, OJS-PKP, Omeka, and OMP-PKP).

The post IndraStra Global Launches SaaS Applications Store appeared first on IndraStra Global - Group Portal.

]]>
Introduction to Metadata 101 https://www1.indrastra.com/2023/01/30/introduction-to-metadata-101/ Mon, 30 Jan 2023 16:14:39 +0000 https://www1.indrastra.com/?p=474 Metadata is information that describes data. It is data about data, provides context, and helps make data more meaningful and valuable. It is often used to organize and categorize data, describe its characteristics and properties, and enable data to be searched and retrieved more easily. There are many different types of metadata, including descriptive metadata, […]

The post Introduction to Metadata 101 appeared first on IndraStra Global - Group Portal.

]]>
Metadata

Metadata is information that describes data. It is data about data, provides context, and helps make data more meaningful and valuable. It is often used to organize and categorize data, describe its characteristics and properties, and enable data to be searched and retrieved more easily.

There are many different types of metadata, including descriptive metadata, which provides information about the content and structure of data, such as its title, author, date of creation, and keywords. Structural metadata includes information about how data is organized and structured, such as the order of chapters in a book or the format of a video file. Technical metadata provides information about the technical aspects of data, such as its format, size, and resolution.

Metadata can be stored with the data it describes, or it can be stored in a separate location, such as a metadata repository or database. This can be useful in large organizations where data is stored in multiple locations, as it allows for a centralized location for metadata management and retrieval.

One of the key benefits of metadata is that it enables data to be searched and retrieved more easily. By providing context and information about data, metadata makes it easier for users to find what they are looking for. It can also be used to categorize data and organize it more meaningfully.

Another benefit of metadata is that it helps to ensure data quality and consistency. By providing information about the characteristics and properties of data, metadata can help to ensure that data is accurate, consistent, and up-to-date.

Metadata is also essential for data preservation and archiving. By providing information about the history and context of data, metadata can help ensure that data is preserved for future generations and remains accessible and usable over time.

In conclusion, metadata is a crucial aspect of data management and is essential for ensuring that data is organized, accessible, and meaningful. Whether it is stored with the data it describes or in a separate location, metadata provides context and information about data, and it helps to make data more useful and valuable.Regenerate

The post Introduction to Metadata 101 appeared first on IndraStra Global - Group Portal.

]]>
Defining the Possible Approaches to Optimum Metadata Management https://www1.indrastra.com/2022/03/17/defining-the-possible-approaches-to-optimum-metadata-management/ Thu, 17 Mar 2022 12:36:00 +0000 https://www1.indrastra.com/?p=444 In today’s data management world, metadata is essential for gaining confidence in your data, making smarter decisions based on it, and unlocking the full potential of your data. Metadata, in simple words, is information about the data itself. Metadata can indicate if a piece of data is confidential (such as an employee’s personal information), financial (such as […]

The post Defining the Possible Approaches to Optimum Metadata Management appeared first on IndraStra Global - Group Portal.

]]>

In today’s data management world, metadata is essential for gaining confidence in your data, making smarter decisions based on it, and unlocking the full potential of your data. Metadata, in simple words, is information about the data itself. Metadata can indicate if a piece of data is confidential (such as an employee’s personal information), financial (such as a credit card number, or bank account number), or should be protected (such as information about a customer’s identity).

Metadata has been the focus of a lot of recent work, both in academia and industry. As more and more electronic data is generated, stored, and managed, metadata generation, storage, and management promise to improve the utilization of that data. Data and metadata are intrinsically linked, hence the concept can be found in any possible application area and can take numerous forms depending on its application context.

However, it is found that metadata is often employed in scientific computations just for the initial data selection; at the most, metadata about query results are recovered after the query has been successfully executed and correlated. As a result, throughout the query processing procedure, a vast amount of information that may be useful for analyzing query results is not utilized. Thus, the data need “refinements”.

There are two distinct definitions of “refinements”. The first is the addition of qualifiers that clarify or enlarge an element’s meaning. While such modifications may be necessary or even necessary for a particular metadata application, for the sake of interoperability, the values of such elements can be regarded as subtypes of a broader element.

The second type of refinement entails the declaration of specific schemes or value sets that define the value range for a particular element. Thus, indicating that a metadata value was chosen from a defined vocabulary or produced using a specific technique may make it far more helpful, particularly for automated processing. By relying on a common value set, semantic compatibility between apps can be increased.

The use of restricted vocabularies is another critical refinement technique that increases the clarity of descriptions and leverages the enormous intellectual capital invested by many domains to improve subject access to resources. For example, the Dewey Decimal Classification System provides a multilingual classification system that has been widely utilized in traditional library settings and can be extended to electronic materials as well. Additionally, hundreds of domain-specific thesauri and classification systems can be incorporated into the Web metadata framework to facilitate subject descriptions. By specifying the language to be used in a particular collection of metadata, programs can provide more cohesive search and browsing capabilities. Even if an application is not specifically built to make use of a classification scheme or thesaurus, users may benefit from the inherent coherence provided by such a scheme.

Also, there is a strong tendency for metadata creators to “fill in all the blanks”. When an element is available, it is desired that it be used in a description. Applications should be developed in such a way that it is clear that not every accessible piece is necessary for every resource type. Similarly, applications with their dashboards should aid key-users/end-users in selecting a suitable value for a given element (wherever it is possible), and to the degree that content production should include capabilities of metadata creation and addition, then only, the application can more accurately identify values for particular elements than the user.

However, please keep in mind that no single set of metadata elements will satisfy the functional requirements of all applications, and as the internet dissolves “access barriers”, it becomes increasingly critical to be able to traverse “internet search and discovery barriers” as well. This will be facilitated by application profiles, which will enable data science researchers to “mix and match” schemas as necessary.

Metadata management (as a concept and as a tool) is always going to be a critical component in the creation of more valuable information warehouses. Undoubtedly, the geopolitical policies, organizational agendas, and market pressures will keep on giving new shapes and formats to current and future information repositories, and at the same time generating new opportunities and niches. To fulfill these opportunities, the convergence of encoding formats and uniform semantics is a must. 

About the Author

Rahul Guhathakurta (ORCID: 0000-0002-6400-6423) is a strategic management consultant and is currently affiliated with Anaha Innovations — an Ahmedabad-based technology business incubator and private equity firm. Also, he is a primary investor in IndraStra Global — a US-based publishing company.

The post Defining the Possible Approaches to Optimum Metadata Management appeared first on IndraStra Global - Group Portal.

]]>
RECRUITMENT CAUTION: Clarification in Public Interest https://www1.indrastra.com/2018/08/02/recruitment-caution-clarification-in-public-interest/ Thu, 02 Aug 2018 12:31:00 +0000 https://www1.indrastra.com/?p=441 RECRUITMENT CAUTION: CLARIFICATION IN PUBLIC INTEREST It has been brought to our attention that certain unscrupulous elements are posting “FALSE/FAKE/FRAUDULENT JOB POSTINGS” on “LINKEDIN JOB PORTAL” purporting to be from INDRASTRA GLOBAL (“IG/IGNY”). These “FALSE/FAKE/FRAUDULENT JOB POSTINGS” on “LINKEDIN JOB PORTAL” leads the applicant to the Russian edition of Adzuna.ru (a job portal) and further, […]

The post RECRUITMENT CAUTION: Clarification in Public Interest appeared first on IndraStra Global - Group Portal.

]]>
Image Attribute: Screenshot of “FALSE/FAKE/FRAUDULENT JOB POSTINGS” on “LINKEDIN JOB PORTAL” purporting to be from INDRASTRA GLOBAL (“IG/IGNY”).

RECRUITMENT CAUTION: CLARIFICATION IN PUBLIC INTEREST

It has been brought to our attention that certain unscrupulous elements are posting “FALSE/FAKE/FRAUDULENT JOB POSTINGS” on “LINKEDIN JOB PORTAL” purporting to be from INDRASTRA GLOBAL (“IG/IGNY”).

These “FALSE/FAKE/FRAUDULENT JOB POSTINGS” on “LINKEDIN JOB PORTAL” leads the applicant to the Russian edition of Adzuna.ru (a job portal) and further, it leads to multiple suspicious Russian websites.

Kindly note, as an organization WE DO NOT OPERATE any “LINKEDIN RECRUITER TOOL” for our recruitment purposes.

These communications carry the LINKEDIN COMPANY ID of INDRASTRA GLOBAL deceptively to make it look authentic. INDRASTRA GLOBAL is taking appropriate steps to tackle the issue.

We advise applicants not to respond to any “FALSE/FAKE/FRAUDULENT JOB POSTINGS” on “LINKEDIN JOB PORTAL” and not to follow the links mentioned in it.

In case of any doubt please contact INDRASTRA GLOBAL’s SUPPORT DESK: info@indrastra.com

_________________________________________

Total Number of “FALSE/FAKE/FRAUDULENT JOB POSTINGS”: 41

Origin Timeline: Populating for 3 weeks

Link of these aggregated “FALSE/FAKE/FRAUDULENT JOB POSTINGS”:https://lnkd.in/gjN8ib4

About IndraStra Global

IndraStra Global is a “Strategic Analysis & Information Services Provider”, primarily focused on data-driven academic research which includes assessment and interpretation, based on the “O.O.D.A.” (Observation – Orientation – Decision – Action) Framework. We engage ourselves in studying the short-term and long-term impacts of such information on public advocacy, media exposure, and societal influence over multiple broadcasting platforms. 

IndraStra Global Publishing Solutions Inc.
1309 Coffeen Avenue STE 1200
Sheridan, WY 82801
Phone: (712) 581-0811
Fax: (917) 909-2571
Email: info@indrastra.com

Press Contact: Rose McReid / rose.mcreid@indrastra.com

The post RECRUITMENT CAUTION: Clarification in Public Interest appeared first on IndraStra Global - Group Portal.

]]>
IndraStra Global launches IGOR, an Open Access Repository https://www1.indrastra.com/2018/07/17/indrastra-global-launches-igor-an-open-access-repository/ Tue, 17 Jul 2018 13:49:00 +0000 https://www1.indrastra.com/?p=429 NEW YORK, July 17, 2018 – IndraStra Global, a digital publishing company and a key provider of strategic brand solutions for academics, corporates, and other professionals has recently launched its open access repository called “IGOR – IndraStra Global Open Repository – Hosted over Zenodo”. This significant step forward helps to enhance a publication’s research impact […]

The post IndraStra Global launches IGOR, an Open Access Repository appeared first on IndraStra Global - Group Portal.

]]>

NEW YORK, July 17, 2018 – IndraStra Global, a digital publishing company and a key provider of strategic brand solutions for academics, corporates, and other professionals has recently launched its open access repository called “IGOR – IndraStra Global Open Repository – Hosted over Zenodo”. This significant step forward helps to enhance a publication’s research impact as well as visibility in a proactive manner.

Underlining the Open Access principles, IGOR allows contributing authors of IndraStra (anywhere in the world) to submit their pre-prints, post-prints, and other datasets over OAI-PMH enabled repository. The new open repository is based on Zenodo platform, created by OpenAIRE and CERN Geneva which accelerates time to indexing in the complex world of digital publishing.

Why Use Open Access?

By creating a free-to-use open access repository platform for research articles and datasets (published on IndraStra Global properties), the exorbitant expenses of library indexing in the form of article processing/submission charges disappear. “IGOR on a centralized repository platform like Zenodo, we remove all the extra administration and repository hosting fees of traditional indexing platforms,” says Rahul Guhathakurta, Publisher at IndrStra Global. He further clarifies that “With IGOR, nearly 100% of our effort goes to the authors and researchers. The only expense is the publication hosting charges over an HTML format to process the general search engine indexing which we would like to bear it by ourselves”.

Amrita Jash, who heads Indrastra Global’s editorial activities says that “a publication is validated and credited provided it has undergone the rigorous peer review process along with deep-level library indexing solutions”. She further adds, “IGOR is a way to reinforce our commitment to Open Access and also, it defines our integrity towards the field of scholarly publication by promptly and broadly disseminating the information in a transparent way”.

IGOR, as an Open Repository

IGOR provides 2-legged ORCID OAuth authorization during the login and at the same time, it allows multiple upload types as publications, posters, presentations, datasets, images, videos/audios, software, lessons, etc., and prepares it as search-engine friendly, especially the title, abstracts, keywords, and headings. Most researchers use specific terms which are only known by peers in their own fields. IGOR provides authors to choose the keywords commonly used and general to be optimized. Eventually, the submission could be picked up by the search engines from the world wide web.

During the upload, authors can also choose to mention the names of co-authors and collaborators along with the access rights of their works coupled with multiple copyright licensing options. Also, there is a provision to specify identifiers of related publications and datasets. Supported identifiers include DOI (with versioning option for Zenodo owned DOIs), Handle, ARK, PURL, ISSN, ISBN, PubMed ID, PubMed Central ID, ADS Bibliographic Code, arXiv, Life Science Identifiers (LSID), EAN-13, ISTC, URNs, and URLs.

About IndraStra Global

IndraStra Global is a New York-based digital publishing company, primarily focused on publishing and online media intelligence, based upon “O.O.D.A.” Framework. Company’s product portfolio, which combines data-driven analysis, assessment, and forecasting into multiple-publishing platforms, which in turn supports the nurturing of on-boarded legacy systems.

IndraStra Global
163 W, 71st Street
NY-10023, New York
Desk: +1-516-926-0755
Email: info@indrastra.com

Press Contact:
Rose McReid
Associate Partner
rose.mcreid@indrastra.com

The post IndraStra Global launches IGOR, an Open Access Repository appeared first on IndraStra Global - Group Portal.

]]>