top of page

Solidity so that you be you...

...only better

Reassurance...we all want it

As a potential or even existing licensee you may be curious as to how Oyster is made and what makes it so good. Certainly we believe you would want to know that what will become the spine of your business is stable, secure and can be relied upon and that it won't let you down...

Important system information

MicrosoftGoldPartner.png

Some specs

  1. Our developers: are all Microsoft Gold Certified

  2. Technology used : CakePHP framework written in PHP.

  3. Databasing: MySQL

  4. UI designs: HTML5, Bootstrap, CSS3, JavaScript, JS plugins etc.

  5. Hosting and Server: AWS cloud servers.

aws_partner.png

Why Amazon?

By using AWS, Oyster is able to maintain the perfect scaleable, integrated, secure responsive web system to allow a seamless user experience no matter what device the user is working with. A spine of your business that travels with you and maintains its security and integrity regardless of where you are and whether you are on your mobile or at your PC.

They are also the chosen technological partner for such top government agencies as the CIA, GCHQ, MI5 and MI6 for the speed and capacity for large scale data analysis 

AWS.png

Robust performance with flexibility

There's no denying the speed of AWS. The Elastic Block Storage is nearly as fast as S3, but provides different features. EC2 Compute Units give Xeon-class performance on an hourly rate. The reliability is better than most private data centers in the world, and if there is a problem, you're usually still online , but with reduced capacity.


But the performance power of AWS is in the storage. The distributed nature of EBS and S3 yields millions of input/output operations per second to all instances. Think of it like having a raid array of SSDs attached to a particular computer. Add in incredible bandwidth, and you have a storage system that is capable of vast scaling, with the reliability of 99.999999999%. All the services work and communicate together with your application to automatically judge demand and handle it accordingly.  

Access to the AWS resources can be restricted using the IAM(Identity and Access Management), using the roles in IAM we can define the privileges for user actions which greatly reduces any malpractices.

bottom of page