Upload
markmod
View
536
Download
3
Embed Size (px)
DESCRIPTION
Enterprise Professional Services
Citation preview
Slide 1Property of Strictly Confidential
“ We believe, as scientists have proven, that no human is any further away
than 6 steps (or 6 degrees of separation) .
The 6° Group- Enterprise Services
Slide 2Property of Strictly Confidential
Services Portfolio:
Full Service SLA Based Delivery Capability, Professional Services & Solutions: End to End
Hardware Integration, Software, Hosted Services (Cloud Computing), Integration and Implementations.
Application Development & Support.
Short term or life cycle rollouts, projects and implementations.
Onshore engineers and project management, development offshore to reduce development and implementation costs.
Reduce your costs by fluid engagement of very specialized and experienced resources for very detailed & technically challenging hardware, software and service implementations.
Slide 3Property of Strictly Confidential
The 6° Group- Enterprise Professional Services
Security & Compliance/ Identity Management:Identity Management & Security AssessmentsCompliance Assessments, SOX, HIPPA, PCIIdentity Management : Architecture to ImplementationUser ProvisioningDirectory Services
Database Architecture, Business IntelligenceDatabase ServicesArchitecture; Design to BuildTuningMigration and UpgradesLogistics/ManagementMetadata Management & Quality ControlStatistical Modeling & Simulations
Virtualization and Systems Management:Server Design to Consolidation and Implementation servicesPatch Management and Automation ServicesOperating System Performance Tuning
Messaging Email and Calendar Services:Messaging ExpertsAssessment , Performance, Tuning, Migration, Architecture to ImplementationSun Java Communications Experts.
Web & Network Infrastructure:Performance AssessmentsArchitecture and ImplementationsRun book DeliveryWeb Application Design- Implementations
Slide 4Property of Strictly Confidential
The 6° Group- Enterprise Professional Services (Cont)
Other Professional Services:Application Design & DevelopmentFull life cycle development using offshore-onsite
modelApplication Maintenance and SupportApplication Server Migration ServicesSystem/Regression Testing Post Implementation/Production SupportBusiness Analysis Application Architecture Design Analysis Enterprise Application Integration Packaged Solution Implementation Legacy system (Mainframe) application migration
and integrationProvisioning Support/Expertise:
Over The Air, DSL & Broadband, Wireless and Traditional Wireline
Self Provisioning & Single Sign-on
Project/Program Management:Full life cycle development on T&M modelHelp desk OutsourcingSix Sigma ConsultingInfrastructure ManagementProduct/process EngineeringTechnology AssessmentsSite SurveysTesting and Turn-up servicesFunctionality Assessments
Integration:TestingIndependent Verification & Validation (IV&V)Integration of various applications through EAI technologiesEAI strategies, design and implementation servicesCertification & Compliance
Performance Management:VPN Performance ManagementAutomated Report GenerationCustomized Application DevelopmentInteractive Voice Response System (IVRS) TestingRevenue Assurance
Slide 5Property of Strictly Confidential
Strategic Staff Augmentation Contractual Staff Augmentation:
Local and Global locations Meeting short term requirements quickly Ability to quickly ramp up or ramp down project teams No long term obligations No administrative overheads for staffing Availability of very highly skilled IT & Telecommunications resources
Areas of Expertise: Telecom –– NMS, Wireless, Wireline, Embedded, Unified Messaging, Databases, VoIP, Handsets,
Operations & Business Support System Professional Services – Field Engineers, Installers, RF Engineers, System Integrators, Testers etc. Microsoft .Net J2EE, J2ME, Web development, Websphere, Weblogics, Mainframe etc. SAP, Oracle & PeopleSoft Identity Management – Sun certified professionals Infrastructure Management Consultants Business Intelligence & Date Warehousing
Slide 6Property of Strictly Confidential
Enterprise Service Support Enterprise applications:
Implementation and maintenance of: Mobile and Web Based Applications
- SAP- Oracle Applications- PeopleSoft- Business Intelligence solutions including SAS, Business Objects
Portal Solutions & Custom Application development: For service providers to offer various portal services to their subscribers
- Customer self service• single sign-on• online subscription to new services• online access to billing & usage data• online customer complaints• online payments, etc
- Single Sign On- Online/e-Shop facilities- Online application system for refund and offers
Web based monitoring and reporting framework for the IT infrastructure Customized Business Reports Identity Management Infrastructure Management Business Intelligence Support
Slide 7Property of Strictly Confidential
Identity Management /Directory Expertise
Synchronization of data in directories SSO/RSO implementations SAML implementations for cross domain and federated services Delegated administration
User provisioning Agents for access controlled systems Delegated administration Role based authentication and authorization
Design of directory DIT (Directory Information Tree) and schema Implementation of LDAP services Migration of Directory services Directory Synchronization services Migration of NIS and NIS+ to LDAP Architecture to support load balancing, replication and high availability
Directory Directory
Enterprise application architectureEnterprise application architecture
Messaging and communication
Messaging and communication
Web services infrastructure
Web services infrastructure
Application development and maintenanceApplication development and maintenance
Identity and access management
Identity and access management
Identity Identity
Access Management
Access Management
Slide 8Property of Strictly Confidential
PortalsPortals Design of portal systems Implementation of intranet/extranet portals Integration of Content Management Systems
(CMS) Integration of back-end systems (SAP, Oracle)
SOA/Web services
SOA/Web services
Design of Service Oriented Architectures (SOA) Develop web services based on existing applications Implement SOA infrastructure
Web Services Infrastructure Expertise
ServersServers Implementation of web servers Application servers Proxy servers
Enterprise application architectureEnterprise application architecture
Messaging and
communication
Messaging and
communication
Web services
infrastructure
Web services
infrastructure
Application development andmaintenance
Application development andmaintenance
Identity and
access management
Identity and
access management
Slide 9Property of Strictly Confidential
Technology Specialties
Other: Citrix S/W, SUN XVW Virtualbox, Sun VDI, Sun Ray Thin Clients, Sun XVMOPS Center, VMWARE S/WCitrix Netscaler, WANSCALER, Glassfish Enterprise Server, Sun Java Web and proxy server, Oracle Web-Logic Suite.
Slide 10Property of Strictly Confidential
WHO ARE WE ?
We have a World Class Pool of Intellectual Experience and Engineering Knowledge to offer.
Our value is the ability to see opportunities, delivery instant credibility with best in class partners and resources and delivery REAL VALUE to your projects on time and on budget.
Headquartered in Chicago- Global partners and talent. Ex- Senior Ericsson, Bell Labs, Lucent, MGL (Mascon Global Limited), Motorola, P&G,
Coca-Cola, General Dynamics , AT&T & GE Team Leadership. A generation of intellectual knowledge and connections in the IT, Communications & Marketing Industries.
Slide 11Property of Strictly Confidential
Thank You !
Mark Modricker-
President
The 6° Group
(Cell): 847 347 1820