|
Corporate Profile
Technical Skills
Our consultants are qualified and certified software professionals with extensive experience in legacy and emerging technology areas.
We have a large pool of resources to provide solutions across various domains and platforms. The following table lists some current skills available with us: |
|
|
IT Consulting |
IT Strategy, E-Commerce, Web Applications, Software Development and maintenance, ERP Implementation, Software Quality, Software Testing, Systems Database Administration, Systems Integration |
IBM Mainframe |
IBM S/390, IBM 3090, OS/390, z/OS, MVS, FOCUS, DB2, COBOL, CICS, IDMS DB/DC, IMS DB/DC, JCL, ISPF, PL/I, Telon, MQSeries, Panvalet, Endeavor, Librarian |
Microsoft Technologies |
.NET, Visual Basic.NET, ASP.NET, Visual C++, SQL Server 2000, BizTalk Server, IIS, ADO.NET, XML |
Java Technologies |
Java, EJB, JDO, JDBC, WebSphere, WebLogic, JBoss, Jbuilder, Struts Framework, Visual Age Java |
Oracle Technologies |
Oracle9i Application Server, Oracle9i Designer, Oracle9i Forms, Orcale9i Reports |
ERP |
SAP, Oracle Applications, JD Edwards, PeopleSoft |
Data warehousing |
Cognos, Informatica, SAS, Business Objects, Microsoft analysis server, Oracle Warehouse Builder, MicroStrategy |
Relational Databases |
Oracle, Sybase, SQL Server, DB2 UDB, PostgreSQL, Informix |
Design Tools |
Rational Rose, Oracle Designer 6i / 9i , Visual Studio .Net |
Testing Tools |
WinRunner, LoadRunner, QATest, SilkTest |
Networking & Security |
Windows networks, Unix Networks, Cisco Routers, VPN, DNS, DHCP, LAN, WAN, ATM, Firewalls, Gateways |
Application Servers/Middleware/EAI |
Microsoft BizTalk Server, Microsoft Commerce Server, Microsoft Exchange Server, Lotus Notes, Microsoft Message Queue Server, Microsoft Transaction Server/COM+, Microsoft Distributed Transaction Coordinator, Microsoft Certificate Server, JRun, WebLogic |
BPO |
Digitization, OCR, Data conversion, Transaction Processing for financial services; Accounting, Receivables and Payables; Financial analysis |
Embedded Systems Offerings and Experience |
Microcontroller Programming (8051, 68HC12, 8086, 68K, Z80), Digital Signal Processors (TMS320), FPGA , Peripheral Devices (RS-232, DMA, UART, USB), Data Acquisition Device Programming (ADC, DAC, DIO, PLC, GPIB etc.), OSEK/VDX for Automotive Applications, Bluetooth, Wireless (WAP), Real Time OS and Embedded Systems, Device Drivers, BIOS and Firmware |
|
|
|
Information Security
We have established a comprehensive Information Security Process and Practice to protect our customer's information that is shared with us. Some features of our information security policy include:
Data Access Control
Computers with your sensitive information are isolated from the company's network. Your information is secured in separate file servers and the access is restricted to a specified group of people.
Physical Security
All our systems are protected from tampering, exposure to the elements and any other factors that might cause physical damage or failure.
Logical Security
By protecting our systems at the Operating System (OS) and Application Level we ensure that data is protected from hacking.
Monitoring System Access and Use
We ensure the safety of your information by monitoring every form of system access and usage.
Business Continuity Management
Trinity has evolved a proactive, comprehensive and actionable Business Continuity and Disaster Recovery Strategy to confidently manage and deliver time sensitive and critical projects and services to our customers who have demanding business needs. Our business continuity model enables us to continue our operations with minimal disruption or downtime in the advent of natural or intentional disasters. Our plan includes provisioning for redundancies at various levels including process, people, and infrastructure.
Trinity's Business Continuity Approach
Trinity follows a two-layer approach to its Business Continuity and Disaster Recovery Strategy.
|
|
|
» |
Trinity considers every software development, as mission critical, by default, and applies the Standard Business Continuity and Disaster Recovery trategy for all these projects. |
|
|
» |
At the second layer, the Trinity customer can specify the business continuity and disaster recovery requirements for their project. For such projects, Trinity works out a Customer Driven Business Continuity to Planmeet the specified requirements. |
|
|
|
|
|
|
|
|
|