Our consultants are qualified and certified software professionals with extensive experience in legacy and emerging technology areas.
We have a large pool of resources to provide solutions across various domains and platforms. The following table lists some current skills available with us:
IT Strategy, E-Commerce, Web Applications, Software Development and maintenance, ERP Implementation, Software Quality, Software Testing, Systems Database Administration, Systems Integration
IBM S/390, IBM 3090, OS/390, z/OS, MVS, FOCUS, DB2, COBOL, CICS, IDMS DB/DC, IMS DB/DC, JCL, ISPF, PL/I, Telon, MQSeries, Panvalet, Endeavor, Librarian
.NET, Visual Basic.NET, ASP.NET, Visual C++, SQL Server 2000, BizTalk Server, IIS, ADO.NET, XML
Java, EJB, JDO, JDBC, WebSphere, WebLogic, JBoss, Jbuilder, Struts Framework, Visual Age Java
Oracle9i Application Server, Oracle9i Designer, Oracle9i Forms, Orcale9i Reports
SAP, Oracle Applications, JD Edwards, PeopleSoft
Cognos, Informatica, SAS, Business Objects, Microsoft analysis server, Oracle Warehouse Builder, MicroStrategy
Oracle, Sybase, SQL Server, DB2 UDB, PostgreSQL, Informix
Rational Rose, Oracle Designer 6i / 9i , Visual Studio .Net
WinRunner, LoadRunner, QATest, SilkTest
Networking & Security
Windows networks, Unix Networks, Cisco Routers, VPN, DNS, DHCP, LAN, WAN, ATM, Firewalls, Gateways
Microsoft BizTalk Server, Microsoft Commerce Server, Microsoft Exchange Server, Lotus Notes, Microsoft Message Queue Server, Microsoft Transaction Server/COM+, Microsoft Distributed Transaction Coordinator, Microsoft Certificate Server, JRun, WebLogic
Digitization, OCR, Data conversion, Transaction Processing for financial services; Accounting, Receivables and Payables; Financial analysis
Embedded Systems Offerings and Experience
Microcontroller Programming (8051, 68HC12, 8086, 68K, Z80), Digital Signal Processors (TMS320), FPGA , Peripheral Devices (RS-232, DMA, UART, USB), Data Acquisition Device Programming (ADC, DAC, DIO, PLC, GPIB etc.), OSEK/VDX for Automotive Applications, Bluetooth, Wireless (WAP), Real Time OS and Embedded Systems, Device Drivers, BIOS and Firmware
We have established a comprehensive Information Security Process and Practice to protect our customer's information that is shared with us. Some features of our information security policy include:
Computers with your sensitive information are isolated from the company's network. Your information is secured in separate file servers and the access is restricted to a specified group of people.
All our systems are protected from tampering, exposure to the elements and any other factors that might cause physical damage or failure.
By protecting our systems at the Operating System (OS) and Application Level we ensure that data is protected from hacking.
We ensure the safety of your information by monitoring every form of system access and usage.
Business Continuity Management
Trinity has evolved a proactive, comprehensive and actionable Business Continuity and Disaster Recovery Strategy to confidently manage and deliver time sensitive and critical projects and services to our customers who have demanding business needs. Our business continuity model enables us to continue our operations with minimal disruption or downtime in the advent of natural or intentional disasters. Our plan includes provisioning for redundancies at various levels including process, people, and infrastructure.
Trinity follows a two-layer approach to its Business Continuity and Disaster Recovery Strategy.
- Trinity considers every software development, as mission critical, by default, and applies the Standard Business Continuity and Disaster Recovery trategy for all these projects.
- At the second layer, the Trinity customer can specify the business continuity and disaster recovery requirements for their project. For such projects, Trinity works out a Customer Driven Business Continuity to Planmeet the specified requirements.