Protect your Lenovo Server
Search Results – Bison Knowledgebase

🔍 Results for “compounding rule”

Understanding the Rule of 72 & Rule of 144 (Simple Investing Guide)

When people invest money in stocks, mutual funds, or savings plans, one common question is:? “How long will it take for my money to grow?”The Rule of 72 and Rule of 144 are simple …

How to Restrict Email Communication to Approved Domains and Limit Attachment Size in Microsoft 365

Email remains one of the most common channels for data exchange—and also one of the most exploited attack vectors. Organizations handling financial, legal, or confidential informat…

How to Allow Specific Domains and Block All Other Emails in Microsoft 365 Using Mail Flow Rules (Step-by-Step Guide)

his detailed technical guide explains how to allow email communication only with specific domains and block all other domains in Microsoft 365 Business Basic, using Mail Flow (Tran…

How to Enable RDP Port (3389) Access in Sophos Firewall

RDP (Remote Desktop Protocol) allows remote access to Windows systems using port 3389. To enable secure RDP access through Sophos Firewall (SFOS), you must create a firewall rule a…

Restricting Windows Server Access to India IP Addresses Only (Geo-IP Blocking)

Unauthorized access attempts on Windows Servers—especially via Remote Desktop Protocol (RDP)—are a common security risk. Servers exposed to the public internet are continuously sca…

How to Allow Specific Website (like http://xxx.xxxxxxxx.xxx ) in Sophos Firewall

Sophos Firewall provides powerful web filtering and security features, but sometimes it may block legitimate websites due to category filtering or SSL inspection. If you are unable…

Mughal Dynasty: Era, Founder, and List of All Badshah / Shanshah / Rulers

The Mughal Dynasty was one of the most important ruling dynasties in Indian history. This easy Knowledge Base article explains what the Mughal dynasty was, who started it, its era…

Google Workspace Compliance Features: Detailed Technical Overview with Practical Examples

Modern organizations must comply with data protection laws, industry regulations, internal governance policies, and audit requirements. Google Workspace provides a comprehensive se…

Sikh Dynasty (Sikh Empire): Era, Rulers, and Founder

The Sikh Dynasty, commonly known as the Sikh Empire, was a powerful Sikh-ruled state in North India during the late 18th and early 19th centuries. This simple knowledge-base artic…

Rum (Rûm) Dynasty: Era, Founder, and List of All Sultans

The Rum Dynasty—also called the Sultanate of Rûm—was a Turkic Muslim kingdom that ruled large parts of Anatolia (modern Turkey). This easy knowledge-base article explains what the…

Horoscope Software Systems: Origin, Evolution, Major Platforms, and Technical Overview

Horoscope software systems are specialized applications designed to calculate, analyze, and present astrological charts and predictions based on astronomical data and established a…

Fix: “Tally is not running. Error no: 10061” While Exporting Data from TICK Production ERP to Tally Prime

When exporting accounting or inventory data from TICK Production ERP to Tally Prime, users may encounter the error: “Tally is not running. Error no: 10061” This error typically a…

Blocking Emails Containing PAN or Aadhaar Numbers in Google Workspace (Inbound & Outbound)

Indian organizations handling financial, identity, HR, or compliance-sensitive data must prevent accidental or unauthorized sharing of PAN (Permanent Account Number) and Aadhaar Nu…

Ping Fails After Updating A Record – Technical Diagnosis and Network-Level Analysis

This article provides a technical explanation and troubleshooting framework for scenarios where: DNS A records resolve correctly But ICMP ping fails (e.g., Destination Host…

Rome (Roman) Dynasty: Era, Founder, and Rulers

The Rome Dynasty, more correctly called the Roman Empire, was one of the most powerful civilizations in world history. This simple knowledge-base article explains what the Rome dy…

Microsoft Outlook Features and Shortcut Commands for Everyday Productivity

Microsoft Outlook is a core productivity application used daily for email communication, calendar management, contacts, and task tracking. When used beyond basic email reading—by l…

Disable Snipping Tool & Screen Capture Features in Windows (Technical Guide)

This Knowledge Base article provides a technical, administrator-focused guide for disabling the Snipping Tool and Windows screen capture mechanisms across Windows environments.It c…

Rulers of Delhi, India: Eras, Kings, Badshahs, and the Names of Delhi

Delhi is one of the oldest continuously inhabited cities in the world. Over thousands of years, it was ruled by Rajas, Maharajas, Sultans, Badshahs, and Emperors. This Knowledge B…

Why Are Most Country Flags Rectangular? Myths, Facts, and Countries with Different Flag Shapes

When we look at country flags, most of them are rectangular. But you may have noticed a few square flags and even one triangular flag in the world.This article explains, in simple…

Cygnet FACE – GST Compliance, Reconciliation & Automation Platform | Technical Knowledge Base

Cygnet FACE is an enterprise-grade GST compliance and reconciliation platform developed by Cygnet Infotech Private Limited. FACE (Fully Automated Compliance Engine) is designed to …

Real Estate in India (Commercial & Premium): Key Market Players, Registration Norms, Due Diligence, and Tax/Compliance “Claim” Process

Commercial and premium real estate in India typically includes: Commercial: office spaces, IT parks, retail malls, warehouses, industrial units, co-working assets Premium: …

Correct Domain Address Formats in Google Workspace Gmail Compliance & Email Restriction Policies

In Google Workspace (Gmail) Admin settings, address lists are commonly used to control allowlisting, blocklisting, and authentication requirements for inbound and outbound email.A …

How to Secure Office Computers – A Practical IT Security Guide

Office computers store sensitive business data such as customer information, financial records, emails, credentials, and intellectual property. A single compromised system can lead…

CCTV Cameras in India: Types, Brands, Lenses, Vision, Quality Metrics, and How to Choose the Right System

CCTV systems range from simple home Wi-Fi cameras to enterprise-grade IP surveillance with AI analytics, centralized recording, and cybersecurity controls. Choosing the right camer…

Health Effects of Long Hours on Laptops and Computer Screens (10–12 Hours): Risks, Posture Issues, and Practical Remedies

Extended computer use—10 to 12 hours per day on laptops or desktop screens—has become common among IT professionals, accountants, designers, developers, and remote workers. While p…

IT Trending Topics: Strategic Insights for IT Leaders

Staying current with IT trending topics is essential for IT leaders responsible for strategy, resilience, and long-term competitiveness. Rapid advances in cloud platforms, artifici…

History of the United States of America (USA)

The United States (USA) is one of the most influential countries in the world. Many people learn about it for:• Education• General knowledge• Travel• Exams• CuriosityThis guide exp…

How to Insert Quick Horizontal Lines in Microsoft Word

Horizontal lines are useful for:✔ Separating sections ✔ Improving document layout ✔ Creating visual structureMicrosoft Word allows you to create lines very quickly using simple k…

Ottoman Sultanate: Era, Founder, and List of All Sultans

The Ottoman Sultanate was a long-lasting Muslim rule that shaped the history of Asia, Europe, and Africa for more than 600 years. This easy knowledge-base article explains what th…

Usman (Osman I): Son of Ertugrul Ghazi and Founder of the Ottoman State

This knowledge-base article explains the life of Osman I (also written as Usman), the son of Ertugrul Ghazi. It covers his family, achievements, predecessors, and the Sultans of h…

Historical Places of Delhi. A simple guide to Delhi’s rich past

Delhi is one of the oldest continuously lived-in cities in the world. Over thousands of years, many kings, empires, and cultures ruled here—and each left behind historical buildin…

Google AdSense ads.txt Configuration for Subdomains on Same Hosting

This knowledge base article explains how ads.txt works with subdomains in Google AdSense, specifically when the subdomain is hosted on the same server and mapped to a folder (custo…

Google Workspace SMTP Relay (IP-Based) — Architecture, Configuration, EHLO / Envelope-From Errors & Fixes

This Knowledge Base article provides a technical deep dive into Google Workspace Gmail SMTP Relay (IP-based), covering:SMTP Relay architecture and behaviorCorrect configuration for…

Internet Bandwidth Capacity Planning: Evaluating 39,600 GB Monthly Data for a 40-System Office

This article explains how to analyze, calculate, and validate whether 39,600 GB (≈39.6 TB) of monthly internet data is sufficient for an office with 40 systems. It focuses on prac…

Correct DNS Architecture When Using Cloudflare with Hostinger Hosting and Email Services (Hostinger / Google Workspace / Zoho / None)

This Knowledge Base article explains the correct DNS architecture, configuration, and operational best practices when: A domain is delegated to Cloudflare for DNS and security …

DNS TXT Record Save Failure Due to Mismatched TTL Values

DNS management interfaces may reject changes to TXT records with an error stating that records of the same name and type must have the same TTL value. This issue commonly surfaces …

How to Share SMTP Email Details Safely for a requirement of App Password for Web Applications or Whitelisting Requirements (Google Workspace Users)

When a travel portal sends booking confirmations, invoices, or alerts, it needs an email system to send those messages automatically. This is done using something called SMTP.If n…

RSI, MACD & Volume Explained with Suzlon Energy – A Practical Trading Guide for Indian Stocks

Technical indicators are tools that interpret price, momentum, and participation in the stock market. Among them, RSI (Relative Strength Index), MACD (Moving Average Convergence Di…

Independent Director Exam Preparation Notes (India)

The Independent Director Online Proficiency Self-Assessment Test is a mandatory qualifying examination for individuals registered in the Independent Director Databank maintained by…

Website Downloaders (Offline Website Makers): Complete Technical Guide

Website downloaders, also known as offline website makers, are tools that copy web content (HTML, CSS, JavaScript, images, media, and sometimes server-rendered pages) from a live w…

CaptainBiz GST Accounting & Compliance Software – Technical Knowledge Base Guide

CaptainBiz is a GST-focused accounting, invoicing, and compliance software developed by IRIS Business Services Limited. It is designed primarily for small and medium businesses (SM…

Cyber Security Explained: Purpose, Implementation, Key Companies, and How It Differs from Antivirus Software

Cyber security is the practice of protecting systems, networks, applications, and data from digital attacks. These attacks are no longer limited to simple viruses. Modern threats i…

File Sharing Software and Online Platforms: Secure Design, Implementation, and Best Practices

File sharing software and online platforms allow users to store, sync, and exchange files across devices and locations. These tools are now foundational in Information Technology e…

Information Technology Data Security: Implementing a Defense-in-Depth Strategy to Protect Enterprise Systems

Data security is a core responsibility of modern Information Technology teams. With increasing cloud adoption, remote work, and regulatory pressure, organizations must protect sens…

Branches of Artificial Intelligence (AI) – Fields, Benefits, Use Cases, Future in India & Learning Path (Technical Guide)

Artificial Intelligence (AI) is not a single technology but a collection of interrelated fields that enable machines to perform tasks requiring human intelligence—such as learning,…

How to Create a Professional Company Presentation in PowerPoint (Complete Practical Guide)

A company presentation in PowerPoint is one of the most important communication assets for any organization. It is commonly used for client meetings, sales pitches, investor discus…

Comprehensive Annual Maintenance Contract (AMC) for IT Infrastructure

An Annual Maintenance Contract (AMC) is a formal service agreement between an organization and an IT service provider to ensure continuous operational support, preventive maintenan…

E-Commerce Tools in India: Payment Gateways & Aggregators — Operating Players, Registration Norms, Procurement Grounds, and GST/Compliance Claim Process

For any e-commerce setup (website, app, marketplace seller, subscription SaaS), the payment layer is the most regulated and security-sensitive component. In India, payments usually…

Digital Marketing in India: Tools & Agencies — Operating Landscape, Registration Norms, Procurement, Compliance, and Claim Guide

Digital marketing has become a core function of modern business strategy, leveraging tools and agencies to drive visibility, leads, conversions, and analytics. This Knowledge Base …

Loans & Credit Cards in India: RBI-Regulated Providers, Registration Norms, Eligibility Grounds, and Dispute/“Claim” Workflows

Loans and credit cards in India are regulated primarily by the Reserve Bank of India (RBI). In practice, a safe and compliant borrowing/card experience depends on: Choosing only…