Professional Services

Jarus is a leading provider of innovative technology solutions that help companies optimize and improve the quality of their operations. Backed by a highly skilled services team with several years of domain and technology experience, we are able to architect and implement projects for our customers resulting in increased agility, flexibility and increased competitiveness at a lower cost.

Application Development

Application Development and Management (ADM) Services help our customers reduce the total cost of ownership (TCO) of existing systems, allowing IT organizations to focus more time and resources on long term, strategic business initiatives. We help our customers do more with less by applying our SEI CMMI processes, domain expertise, experience in insurance packages and applications, and our global delivery model to meet their long-term ADM needs.

Increased competition, demand for new products, and ever-changing consumer demands have created new IT challenges for companies requiring them to leverage advanced technologies to improve operational efficiencies and at the same time reduce the total cost of ownership of their existing applications. In other words, they have to strike a delicate balance between maintaining legacy applications and quickly adopting new technologies in order to meet the business needs of the company

We help corporations address these challenges by delivering highly efficient, customized Application Development and Management services that incorporate the client’s processes and methodologies into our processes. Our services help companies:

  • Reduce application maintenance and production support costs, and improve system reliability
  • Reduce cost of routine application development and enhancement activities
  • Enable IT staff to focus on advanced technologies and strategic initiatives
  • Accelerate time-to-market for new features

Platform Migration

Using our multi-shore teams we offer platform migration services that is both cost effective and unmatched in quality. We have assisted corporations in many types of platform migrations:

  • Legacy to multi-tier architecture (both J2EE and Microsoft .NET)
  • Client server (VB, PowerBuilder, etc.) to multi-tier architecture
  • Package migration from legacy packages to modern packages

Our multi-shore model comprises a small onsite team with deep technology and domain expertise who assist the customer in selecting the right target platform and architecture, determine the conversion stages, create detailed requirements and specification and perform on-site coordination. Our off-site or off-shore team does the migration activity thus saving the customer on-site costs for all developers. We employ agile methodologies and deliver predictable results every month. The local presence and the formal methodologies provide the customer full visibility and control over the project and yet able to execute the projects optimally in terms of quality, time to execute and cost of migration.


Performance and Security

Success or failure of a project is determined by the ability of the software system to scale well and satisfy adequately the transaction volume without unacceptable delay. With companies moving towards component based Service Oriented Architectures and the many layers that the transaction has to go through, performance has become a key aspect of all software projects. Given the complexities of modern architecture, CPU power and memory capacity alone does not ensure high performance. The architecture, design, implementation has to be sound to ensure that application is scalable. Our performance improvements services takes a total look at the architecture, design, implementation and deployment of an application to ensure that the users don’t experience unacceptable delays. We help corporations set performance goals and work with them to reach the goals. We have methodologies and best practices to look at the performance issue in a methodical way and eliminate performance bottlenecks. We also employ performance testing tools such as Mercury Load Runner to simulate the target load. We use our performance tracking and analysis components and third party software such as Wily, Team Quest, IBM Heap Analysis Tool, etc. to gather details, tabulate results to recognize resource usage trends and to predict and address failure points.

performance_schematic

In the interconnected electronic world one key aspect of every software system is security. Every software system must ensure that the user is authenticated and authorized to perform the requested transaction. Research shows that even a medium sized corporation has over 100 applications and over 10 different languages in use. As a result it is a major challenge for corporations to ensure a uniform way to enforce security policies and enable single sign-on. Jarus has helped many organizations in enabling the following:

  • Single sign-on. Irrespective of whether the application is J2EE or Microsoft .NET or legacy, enable single sign-on to authenticate user once and permit access uniformly to all applications that the user is entitled to access
  • Role based security. Centralize security policies by defining user roles. Each role permits or denies access to network resources (web applications, URLs, etc.) and each user or group is assigned roles based what they are entitled to. Using role based security, we are able to centralize very fine access control by the use of security filters. This not only improves security, centralizing security ensures simplifies application development
  • User or Partner self-administration. Depending on the customer situation we help our customers in providing self-administration for users and business partners. Using these features users are able to change password periodically, reset password, or perform other routine administration functions without increasing the load on customer service
  • Audit and Reporting. Centralized security modules track each transaction and records who is doing what and when. Using this information it becomes possible to audit for unusual activities and report any issues