Based in Orlando, Florida, our cadre of IT professionals provide experience and proven best practices for design and implementation of the full enterprise stack.
- In this case, past performance is an indicator of future performance!
Advances in network capacity and security have enabled continually greater levels of sharing, integrating and distributing information.
Viper delivers a level of network infrastructure that enables an information system to integrate data between subsystem applications hosted on servers located at distinct, geographically distributed locations. Our network solutions enable collaborative data exchange and interoperability with distinctly different information systems. They comport with Information Assurance standards and make wide ranges of system functionality available to different types and levels of system users.
Viper designs, configures and deploys secure networks that have enabled this level of capability for premier weapons systems.
We develop rule sets and documented procedures for secure transmission of traffic between networks, Servers databases and enterprise applications. We prototype, install, configure, test and administer the network security appliances that enable all types and levels of system users to conduct privileged secure operations. We configure, prototype and deploy Layer-2n&3 Switches, Blade Servers, Fiber Channel switches, Tape Library devices, Storages Area Network devices (SAN) and High Assurance Firewalls at Information Assurance Level 4 (IAL4+).
Conventional information systems incorporate a range of subsystem applications dedicated to distinct individual functions. Although the initial selection or design and development of individual applications can be a challenge, the greater challenge is to horizontally and/or vertically integrate message transactions between the applications.
Viper meets the integration challenge by designing a custom coded “Broker” that serves as a common point between applications. The “Broker” enables the destination of a message to be determined during transfer of the message rather than during creation of the message. The “Broker” solution implements message translation, transformation and filtering that renders a methodology known as “dynamic routing”. Viper did not invent this methodology, but we have enjoyed success in developing and delivering highly successful implementations of it.
Viper delivers a standard of database quality that improves system availability and renders a robust recovery system that withstands adversity. Our database implementations alert Administrators to problems more effectively, provide graceful recovery and repair, and enable developers to more efficiently test their data-driven applications. Our standard of database quality has served our customers by reducing overhead costs, preventing critical data loss and improving system sustainability.
We configure our customer databases with a consistently reliable and effective Disaster Recovery System that reflects standards prescribed by the Defense Information Systems Agency (DISA). Our database disaster recovery approach proactively enhances database reliability by building engineering critical redundancy into the system itself. Control Files, Online Redo Logs, Archived Redo Logs, etc. are all mirrored or multiplexed and matched to the I/O performance of the physical drives they reside on. All critical system files follow a documented Optimal Flexible Architecture (OFA), maintaining consistency across servers while simultaneously enhancing continuity and easing training time & orientation for on-site administrators. The quality added value is marked by the minimal licensing costs realized through the application of Oracle’s bundled technologies.
We apply a database compression technique that reduces disk usage necessary for backups by 80%. Through this, our customers achieve a cost saving by reducing their system’s hardware footprint and extending the system’s online recovery capabilities.
Viper applies industry best-practice database configurations provide efficient, consistent, reliable, and versatile backup & restore capabilities.
Our database configurations provide a capability through which Oracle tools automatically check a database for logical and physical corruption upon each occasion of its usage. Without this capability, information system environments only detect corruption at the point of failure. Resolution to the failure is made complicated by the fact that, by the time that the failure had been encountered, weeks to months of existing database backups were likely to contain the corruption that caused the failure. The amount of development manhours lost, restoring to a clean backup, if available, can be catastrophic.
We use Oracle Recovery Manager (RMAN) to clone databases in order to optimize developmental efforts. Through this method critical database backup & restore functions can proceed in parallel with developmental efforts rather than interrupting them. At the live operation level, this method works to allow system update processes that improve both system availability and system accuracy.
Our database configurations enable application developers to perform testing without fear of unforeseen effects on the developmental data stores. Should testing damage the data stores, the databases can be rolled to a known time, or specific transaction within minutes. This method of protection prevents excessive database snapshot and system shutdown events that devour valuable time and progress.
Our database configurations reduce the system downtime required to perform database backups that lock engineers out of their development environments and result in excessive waiting and rework.
Viper has worked closely with its customers to help develop information system solutions critical to operation and lifecycle cost control of vehicular fleets. Successfully sustaining a fleet of vehicles throughout its lifecycle requires effective tracking and recording of each vehicle’s maintenance history, component traceability, configuration management, and detailed maintenance actions to include all component repairs, reconditioning, conversion, modification or modernization at the organization level and the depot level. The maintenance history also includes data defining operational usage for all items that fall into the “part, assembly components and configurations” category.
In partnership with our customers, Viper custom codes an equipment log that meets all requirements for capturing, tracking, and archiving operational and maintenance history for each vehicle in the customer’s fleet. The solution enables an information system to provide critical history of each individual vehicle throughout its operational life span.