Projects Accomplished

Successfully executed a wide range of software and hardware installations, supply of specialized equipment, and technical training programs for DGFI, CMH, and PGR — enhancing their digital, operational, and infrastructure capabilities.

  • Installation of Call Detail Records (CDR) Analysis software with hardware (DGFI).
  • Installation of Forensic Data Analysis software with hardware (DGFI).
  • Installation of Training Management software with hardware (DGFI).
  • Installation of Profile Management software with hardware (DGFI).
  • Supply of goods and services associated with Oblokon software and hardware (DGFI).
  • Supply of goods and services associated with Onneshon software and hardware (DGFI).
  • Supply of goods and services related to the Analysis System of Personal Information software and hardware (DGFI).
  • Supply of 2 x App-Based Personal Information Analysis Servers (Dell PowerEdge 760) (DGFI).
  • Supply of 2 x Web-Based Personal Information Analysis Server with NVIDIA Cards (Dell PowerEdge 760) (DGFI).
  • Supply of Web Server Hosts: Multiple Applications (Dell PowerEdge 760) (DGFI).
  • Supply of Micro Web Server & Data Centre Host: Multiple Web API & SQL Server Data (Dell PowerEdge 760) (DGFI).
  • Installation of OBOLOKON and ONNESHON software for app-based and web-based personal data analysis (DGFI).
  • Supply of Man-Pack Version Frequency Jammer (DGFI).
  • Supply of Vehicle Version Frequency Jammer (DGFI).
  • Supply of premium-quality patient attire (CMH).
  • Supply of high-quality bed sheets and pillow covers (CMH).
  • Provision of a variety of cleaning supplies (CMH)
  • Supply of Oxford shoes (President Guard Regiment).
  • Conducted the following Technical Capacity Building training for DGFI
  • Financial Crime: Prevention, Detection and Investigation
  • Drones and Robotics
  • Cyber Operations
  • Development Operations
  • Utility Equipment (AC, Lift, Generator)
  • Automation and Virtualization
  • Software Testing
  • The cooling System
  • Network and Network Security (2 Nos)
  • Ethical Hacking
  • Maintenance of Computer Hardware
  • Satellite Communications

Leave a Comment

Your email address will not be published. Required fields are marked *

*
*