## BIO
**Pristine Information System **has come into being to provide solutions through Information Technology tools for significantly enhanced decision-making ability at a much reduced cost and time to a wide variety of user segments using the best technology blends.
We plans to achieve this through a continuous process of development of Intelligent Technology in the area of Knowledge Management. The vision is reflected in both what is already achieved and what is proposed to be achieved.
**Our** mission is to serve worldwide clients in selected areas of technology, create products and services of high quality and reliability, and develop original technologies.
**1. Multilingual Data Management & Data Retrieval**tools are the key focused areas at **Pristine Zone**. **Pristine Zone**has developed in-house, Multilingual Full-text Search and Retrieval mechanism.
2. Securing Your Information: Coming up with a strategy to cope with the next Nimda/ hacking is a challenge and requires skilled planning. This activity can be outsourced, with Information Security Experts trained in these security processes brought in to assess the network and server environment, allowing informed and cost-effective decisions to be made. Even if the plan is drawn up in-house, it makes sense to review it with Information Security Experts. 3. Forensics Information Collection:We communicate via email, chat, even voice and video communication use computers. We maintain financial records, schedule appointments, and store significant amounts of business records all electronically. It should come as no surprise that with this newfound productivity comes a class of individuals who exploit these benefits to commit crimes and civil wrongs. Almost any type of investigation and litigation today may rely on evidence obtained from computer systems. Digital evidence can often make or break a case.
**4. Biometric solutions**: utilise the unique characteristics of fingerprints, voice, facial and iris patterns to establish a person’s identity. Biometric-derived identities cannot be transferred to another person, stolen, written down, copied or compromised in any way. Application of biometric technology reduces, if not eliminates, the possibility of your organization’s critical information and electronic security systems being compromised.
**5. Embedded Solutions :** Handhelds, Palmtop devices, Smartphones - once expensive personal toys, these devices are now becoming an integral part of enterprise application architectures delivering mobile solutions for increased productivity. Driving this trend are technology innovations, particularly in the area of embedded systems that enable sophisticated functionality to be delivered on increasingly smaller hardware and software designs.
From information about orders, to learning about products and services, to database access, customers are increasinglydemanding access to information and services from mobile devices.
**Our Developed Applicaitons :
Judgement Explorer :** A law database containing 1GB+ data with our powerfull search Engine. This tool allows to get the case laws retrived in seconds from this massive data.
Legal Case Diary : for Lawyers to Manage their cases and histroy
MView : TextViwer for Palm/WinCE
ThoughtEngine : Powerfull tool developed to create searchable database in hours.
DMatrix : De-Dupelicaion Tool for Corporate/Banks etc.. to clean and manage contacts.
## Area of Expertise
Development Tools : C,C++,VC,VB,Perl, Java,CodeWarrior,Embeded Visual Tools, .NET
Database : Access,MS-SQL,Oracle
Server : IIS, Apache,Webshare, SharePoint,BizTalk,MTS
Platform : Windows,Linux,Solaris,Palm Os, WinCE, PocketPC,Symbian