Corporate Profile

Technical Skills

Our consultants are qualified and certified software professionals with extensive experience in legacy and emerging technology areas.

We have a large pool of resources to provide solutions across various domains and platforms. The following table lists some current skills available with us:

  • IT Consulting

    IT Strategy, E-Commerce, Web Applications, Software Development and maintenance, ERP Implementation, Software Quality, Software Testing, Systems Database Administration, Systems Integration

  • IBM S/390, IBM 3090, OS/390, z/OS, MVS, FOCUS, DB2, COBOL, CICS, IDMS DB/DC, IMS DB/DC, JCL, ISPF, PL/I, Telon, MQSeries, Panvalet, Endeavor, Librarian

  • .NET, Visual Basic.NET, ASP.NET, Visual C++, SQL Server 2000, BizTalk Server, IIS, ADO.NET, XML

  • Java, EJB, JDO, JDBC, WebSphere, WebLogic, JBoss, Jbuilder, Struts Framework, Visual Age Java

  • Oracle9i Application Server, Oracle9i Designer, Oracle9i Forms, Orcale9i Reports

  • SAP, Oracle Applications, JD Edwards, PeopleSoft

  • Cognos, Informatica, SAS, Business Objects, Microsoft analysis server, Oracle Warehouse Builder, MicroStrategy

  • Oracle, Sybase, SQL Server, DB2 UDB, PostgreSQL, Informix

  • Rational Rose, Oracle Designer 6i / 9i , Visual Studio .Net

  • WinRunner, LoadRunner, QATest, SilkTest

  • Windows networks, Unix Networks, Cisco Routers, VPN, DNS, DHCP, LAN, WAN, ATM, Firewalls, Gateways

  • Microsoft BizTalk Server, Microsoft Commerce Server, Microsoft Exchange Server, Lotus Notes, Microsoft Message Queue Server, Microsoft Transaction Server/COM+, Microsoft Distributed Transaction Coordinator, Microsoft Certificate Server, JRun, WebLogic

  • Digitization, OCR, Data conversion, Transaction Processing for financial services; Accounting, Receivables and Payables; Financial analysis

  • Microcontroller Programming (8051, 68HC12, 8086, 68K, Z80), Digital Signal Processors (TMS320), FPGA , Peripheral Devices (RS-232, DMA, UART, USB), Data Acquisition Device Programming (ADC, DAC, DIO, PLC, GPIB etc.), OSEK/VDX for Automotive Applications, Bluetooth, Wireless (WAP), Real Time OS and Embedded Systems, Device Drivers, BIOS and Firmware

Information Security

We have established a comprehensive Information Security Process and Practice to protect our customer's information that is shared with us. Some features of our information security policy include:

Data Access Control

Computers with your sensitive information are isolated from the company's network. Your information is secured in separate file servers and the access is restricted to a specified group of people.

Physical Security

All our systems are protected from tampering, exposure to the elements and any other factors that might cause physical damage or failure.

Logical Security

By protecting our systems at the Operating System (OS) and Application Level we ensure that data is protected from hacking.

Monitoring System Access and Use

We ensure the safety of your information by monitoring every form of system access and usage.



Business Continuity Management

Trinity has evolved a proactive, comprehensive and actionable Business Continuity and Disaster Recovery Strategy to confidently manage and deliver time sensitive and critical projects and services to our customers who have demanding business needs. Our business continuity model enables us to continue our operations with minimal disruption or downtime in the advent of natural or intentional disasters. Our plan includes provisioning for redundancies at various levels including process, people, and infrastructure.

Trinity's Business Continuity Approach

Trinity follows a two-layer approach to its Business Continuity and Disaster Recovery Strategy.

  • Trinity considers every software development, as mission critical, by default, and applies the Standard Business Continuity and Disaster Recovery trategy for all these projects.
  • At the second layer, the Trinity customer can specify the business continuity and disaster recovery requirements for their project. For such projects, Trinity works out a Customer Driven Business Continuity to Planmeet the specified requirements.