In addition to our proficiency in Accounting and Database Implementations, we have expanded our field of studies to cover wide range of security systems and hadware interfacing solutions for PCs and networking components.
On This Page
Distributed Databases
A distributed database is a collection of data which are logically related to the same data model but physically located over the communication network.
A Distributed Database Management System is a software system that permits the management of distributed data, making the distribution transparent to the user. True implementations of general purpose distributed systems are only now beginning to emerge in the marketplace. Their implementations with respect to the issues of distributed database technology markedly differ.
A distributed database can be designed in either top-down or bottom-up strategies. The top-down approach designs the complete database and distributes the data over the network based on the user-request. On the other hand, the bottom-up approach integrates the existing subsystems into a new database system.
Our distributed database system architecture and data synchronization strategy, developed with PHP and powered by MySQL, helped our clients in:
• |
Enhanced client satisfaction attributable to minimized turnaround for clients to access critical information and clients' increased control and protection of their data. |
• |
New distributed architecture expected to dramatically increase their clients' roster and company revenues. |
• |
Reduced computing requirements and associated costs due to elimination of client reliance for database and application hosting. |
• |
Professional Services involvement dramatically accelerated the design and implementation of the new solution. |
<< Back to top
Secure Accounting Transactions
From contract to closing, Accounting Transaction Manager organizes and manages your work flow to ensure all activities are completed in a timely and secure manner.
Fully integrated transaction processing and accounting including commission calculations & distributions, agent billing and a complete general ledger with a user definable chart of accounts, accounts receivable and accounts payable are just some of the functions included in Accounting Transaction Manager.
ATM automatically calculates all commissions for any transaction and can handle virtually any style of commission based compensation pay plan including incremental, retroactive and rolling average for an unlimited number of agents.
Extensive financial, sales, production and management reports can be previewed and printed on demand. Manages multiple escrow, trust, commission trust & bank accounts for the largest multioffice enterprise or the smaller multi and single office brokerage.
Accounting Transaction Manager offers much more features designed specifically to meet the particular needs of a busy real estate brokerage or large malls. It is fully integrated at the database level to provide one-write, one-time data entry.
<< Back to top
128-bits Encryption Algorithms
To Prevent any non-authorized party from reading or changing your data. The level of protection provided by encryption is determined by an encryption algorithm. In a brute-force attack, the strength is measured by the number of possible keys and the key size. Business to Business VPNs (Extranets) share sensitive data with multiple organizations, so demand the highest level of security. This requires public key encryption and/or secure key exchange, both of which are designed to eliminate the risk of the key becoming known to an unauthorized party.
A 128-bit key size has 2128 or around 3.4 x 1038 possible combination. Even if you have the world best super computer, ASCI White, SP Power3 375 MHz manufactured by IBM as of November 2000, it would take 8.77 x 1017years to test all combinations.
Assuming your have the super computer, ASCI White, SP Power3 375 MHz has 8192 processors which totals a capability of 12.3 teraflops (trillions of operations/second), available to you. Also it just needs one computer operation to test a possible combination (which is already faster than what it can do). To use brute force attack (checking all combinations) on this encryption algorithm. It would take
3.4 x 1038
-------------- seconds ~ 2.76 x 1025sec
12.3 x 1012
i.e. 876530835323573935 years or 8.77 x 1017 years
to successfully try all combinations. Let alone ASCI White cannot process as fast as what described here. You can be sure that such algorithms are 100% secured.
<< Back to top
Anti-Virus & Firewalls Components
It's very important to understand that in security, one simply cannot say "what's the best firewall?" There are two extremes: absolute security and absolute access. The closest we can get to an absolutely secure machine is one unplugged from the network, power supply, locked in a safe, and thrown at the bottom of the ocean. Unfortunately, it isn't terribly useful in this state. A machine with absolute access is extremely convenient to use: it's simply there, and will do whatever you tell it, without questions, authorization, passwords, or any other mechanism. Unfortunately, this isn't terribly practical, either: the Internet is a bad neighborhood now, and it isn't long before some bonehead will tell the computer to do something like self-destruct, after which, it isn't terribly useful to you.
Thus, connecting an organization to the Internet provides a two-way flow of traffic. This is clearly undesirable in many organizations, as proprietary information is often displayed freely within a corporate intranet.
In order to provide some level of separation between an organization's intranet and the Internet, we are providing the following solutions:
• |
Bastion Hosts: A general-purpose computer used to control access between the internal (private) network (intranet) and the Internet (or any other untrusted network). |
• |
Routers and Access Control List (ACL): A special purpose computer for connecting networks together. Routers also handle certain functions, such as routing, or managing the traffic on the networks they connect. |
• |
Demilitarized Zones (DMZ): The DMZ is a critical part of a firewall: it is a network that is neither part of the untrusted network, nor part of the trusted network. But, this is a network that connects the untrusted to the trusted. The importance of a DMZ is tremendous: someone who breaks into your network from the Internet should have to get through several layers in order to successfully do so. Those layers are provided by various components within the DMZ. |
• |
Proxies: This is the process of having one host act in behalf of another. A host that has the ability to fetch documents from the Internet might be configured as a proxy server, and host on the intranet might be configured to be proxy clients. The proxy server will fetch the document, and return the result to the client. In this way, all hosts on the intranet are able to access resources on the Internet without having the ability to direct talk to the Internet. |
<< Back to top