Browse Definitions:

Rashi Peripherals

Rashi Peripherals is an India-based distributor of information technology (IT) products. Headquartered in Mumbai, Rashi Peripherals was founded in 1989 by chartered accountants Pansari S and Choudhary K. The company's initial business model was importing and trading of computer memory.

RP Tech India, a group company of Rashi, sells locally built computers to government departments and public sector enterprises. Rashi also has a services division that offers post-sales warranty and repair services. Its distribution portfolio includes computers, computer components and peripherals, networking gear, cameras and gaming devices. According to the company’s website, it has more than 8,300 channel partners covering 650 Indian towns. Some of the brands whose products it distributes are AMD, APC, ASUS, HP, LG, Lenovo, Sony and Toshiba.

This was last updated in September 2012

Continue Reading About Rashi Peripherals

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Shadow Technology is that the growing IT company providing Webs and different IT services in Gurgaon. we tend to square measure functioning from past five years within the trade with 100 percent client orientating services.Visit: 
As a clever we tend tobs and software system service supplier we square measure providing web site planning Service in Gurgaon with SEO , on-line promoting , 3d Animation and software system Development. At Shadow Technology, we tend to live the worth of technology by however it edges individuals.Call for more information at   9717755870


Extensiones de Documento y Formatos de Documento

Accionado por:


  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...




  • bad block

    A bad block is an area of storage media that is no longer reliable for storing and retrieving data because it has been physically...

  • all-flash array (AFA)

    An all-flash array (AFA), also known as a solid-state storage disk system, is an external storage array that uses only flash ...

  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.