Super User

Super User

Managed service refers to IT service  outsourcing to reduce cost and increase efficiency.


Managed IT service is a common practice in small and large organization and works well with companies that have a fixed and or limited budget. Managed IT service also works well with small IT department that is maintained in house.



Managed IT service provides service in the following eight segments

 1,0  Onsite Support

2.0   Remote Support

3.0  Help Desk

4.0 Change Management

5.0 Hardware Procurement

6.0 Business Continuity and Recovery

7.0 System Security

8.0 Cloud Storage

9.0 Managed  Backup

10  System Monitoring

11.0 Systems Management

12 AI Based Dashboard and Reporting

13 Coordination with Local IT Department


The objective of Above steps are to streamline the operational efficiency of the organization while keeping the IT operational cost  down to a minimum.  This means maximum uptime of critical infra structure like mail server, webserver and wan router without having to incur extra cost.


 Please contact one of the Application engineer to discuss how Managed service can increase operational efficiency of your organization.

Full Stack JAVA Web Application Development

Many organizations need  web application development for business reasons. The technical requirement requires some one with full stack development expertise. However such expertise is difficult to get and if available costs are prohibitive. In  North  America  there is a shortage of full stack java development expertise.


 keencomputer Solutions provide full stack java development for small and large organization to fill the  skill gap. We provide  contract software development at an attractive price point.


Full stack Java development   relates to web application development that is hosted on  cloud platforms such and google cloud and or DigitalOcean[3]. Development of such web application requires understanding of complex technology stack and this is where main problem arises[4].

 Much of the technology stack is not taught at University courses and developer has to learn it on the job and or through specialized courses that is taught online.


Most web application is three  tire; front end- middle tire and back end

The front tier call for  knowledge of the following technology:

1.0 HTML/CSS and libraries such as twitter bootstrap

2.0 JavaScript and Libraries such as Angular and Reduce and Redux and View[1]


 The middle tire needs the following


1.0 Business Logic and framework such as spring boot and spring  MVC[2] frameworks

 Typically languages like java, php and ruby on rails MVC is used in middle tire


 Some times in memory database such as memcache[3] is used here to improve performance


In the end tire, We need the following:

RDBMS such as Postgres and Oracle
Many times NOSQL Database are used such as MONGODB
is used for BIG Data applications. NO SQL Database are used in Conjunction with Data mining and Predicative Artificial Intelligence and Machine Learning.[3]

Operational Management of the web Application is managed by devops[4]. The Agile Design and specification capture is
generally managed using Behavioral Driven design process.[5]


Distributed Applications


Most Full tack Java applications are Distrusted in Nature. REST API  is used to communicate such Services. The above mentioned three  tier application is also made distributed  some times using Docker Micro Service Architecture[6]. 




 1.0  Pro Angular -  ISBN 1484240596

2.0  Spring Boot in Action- ISBN 1617292540

3.0  Designing Data Intensive Applications - ISBN 1449373321

4.0 The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win- ISBN 1942788290

5.0 BDD- in Action- ISBN 161729165X

6.0 Docker  in Action  -ISBN 1633430235





Password Manager for Business and Personal Use


You are constantly  forgetting your id password and url for xillions of sites and accounts.

Many account will lock you out after 3-5 unsuccessful trials, and worst yet the tech support is only available  certain days of the week,

when you are busy and working.


No More!


Various paid and free password manager are available for just this reason. Our recommendations are the following


1.0 KeePass- Opensource and free

2.0 Keeper Security


The article below helps you with your choice. For enterprise wide security and password database- please contact us.


References :


1.0 Ten Best Password Manager- Url Link


2.0 Password Manager- Wikipedia 


Please note this is a working article Mr. Peter Litchford Is actively doing research on this very topic and we will post the findings.


Mobile Application Development




1.0  Murach’s Android Programming (2nd Edition)

When implemented effectively, Continuous Delivery (CD) embraces the DevOps philosophy of collaboration between traditionally separate teams: development and operations. CD is the automated implementation of the build, deploy, test, and release process. With CD, software is always in a releasable state. With every change to any part of the software system — infrastructure, application code, configuration, or data — a release candidate goes through a delivery pipeline where the software is created, environments are built, databases are constructed, tests are run, and software is deployed. Many tools make up a platform capable of moving the software system along this pipeline.


 In this paper we will talk about,   How a multi tenant  Java  enterprise web application is built using AWS  and Elastic Beanstack



1.0 IBM Continuous Delivery

2.0 Practical Devops- ISBN

3.0 D-Zone Multitenant Architecture

4.0 AWS In Action- ISBN

5.0 Practical Github- ISBN

6.0 Jenkins

7.0 Chef puppet.

Efficient Software Development


Many small and medium sized companies need software development done inhouse. However, there are couple of problems.


1.0 Fresh Community College and University graduates are not well prepared to apply the knowledge of academic learning to software development.

2.0 The academic and industrial gap of software development is generally learnt on the job and on one’s own initiative. The training takes about 3-5 years.

3.0 Many small and medium business unknowingly becomes the training ground for fresh graduates. The fresh graduates learn the trade at your expanse and after some time they go to a better paying company, leaving you cold


So what is the solution?


1.0 Keen computer was established to exactly solve this problem. We are well trained in contract software development. We bring our expertise to be productive in first hour- not first year. And we are economical. You can expect to pay 50% of the cost of in-house development cost.


2.0 We achieve this level of efficiency by using process and methods that is industry standard and proven to be effective in software development. Software architecture using industry standard UML- 2.0 is an example of this process. Many small business lacks the knowledge of best practice of software development and in the process wastes time and money unnecessarily.


3.0 We continuously communicate the project and progress with your in-house employees and management using continues delivery method. DEVOPS is one such popular method.


How we bring value to your company. Here are some salient points:


Technical Value & Advantage:


1.0 Solve difficulty in Finding Experienced Software Developer.

2.0 Our large industrial experience and expertise brings values by choosing right methods and architecture.

3.0 No need to train employees that leave you in the middle of the project.

4.0 You can engage us for short term and long term projects

5.0 High level of accountability.

6.0 Our cost advantage


Operational Value & Advantage:


1.0 We have our own cloud facility for hosting and Virtual server based development

2.0 Complete Software life cycle management

3.0 Devops and continuous Delivery

4.0 We have corroboration server/GIT and Scrum server for distributed development

5.0 CMMI Compliance and standardized process and tools

6.0 Cross platform development LAMP/JAVA/ASP.NET/MEAN

7.0 Software Architecture and lifecycle and maintenance using UML - a well documented system can be expanded with minimal problems.



Financial Value & Advantage:


1.0 Canada has low dollar value and universal health care makes us competitive

2.0 No time zone problems

3.0 No cultural and language barrier


Proven Values & Results:


1.0 We have been engaged in Software Development for 40 years

2.0 We have ample customers and project experience

3.0 we are familiar with small business work environment and work culture


Strategic & Cultural Fit:


1.00 We understand your financial strategy in our development process

2.0 We understand your operational strategy into our development process

3.0 We understand your Competitive strategy into our development process



We have seen your advertisement that you are looking for engineering gradates in software development.

We are a software development company located in Canada with three decades of experience .

We engage in contract software development assignment.


We engage in small and large projects and are competitive in price and performance.

We can work at your premises if that is necessary continuously or periodically.

 We have cloud based collaboration server and scrum facility for Devops and continues delivery We comply with CMMI maturity models.


Please give us a call or email for free initial consultation to explore possibilities.We trust we will be positive assistance in your endeavor.



Analysis and Design of Management Information System of an Organization




1.0 Management Information Systems: Managing the Digital Firm- ISBN-13: 978-0133898163

Snort Network intrusion Detection System

Snort is a free and open source network intrusion prevention system (NIPS)[citation needed] and network intrusion detection system (NIDS)

Snort's open source network-based intrusion detection system (NIDS) has the ability to perform real-time traffic analysis and packet logging on Internet Protocol (IP) networks. Snort performs protocol analysis, content searching and matching. These basic services have many purposes including application-aware triggered quality of service, to de-prioritize bulk traffic when latency-sensitive applications are in use.

The program can also be used to detect probes or attacks, including, but not limited to, operating system fingerprinting attempts, common gateway interface, buffer overflows, server message block probes, and stealth port scans.[10]

Snort can be configured in three main modes: sniffer, packet logger, and network intrusion detection.[11] In sniffer mode, the program will read network packets and display them on the console. In packet logger mode, the program will log packets to the disk. In intrusion detection mode, the program will monitor network traffic and analyze it against a rule set defined by the user. The program will then perform a specific action based on what has been identified.


 Please contact us to learn how SNORT can help your network Management  and security solutions.




 2.0  Applied Security  Monitoring- ISBN -978-0-12-417208-1

Open Source Security Solutions and Network Management


Network Managent Solutions integrated with Open Source security solutions  make a powerful Solutions for large and small enterprise. Network management solutions like OpenNMS and Nagios provide the basic framework for the Monitoring and  logging Network Events and SNMP traps for the devices connected to network.

Network security and intrusion detection is critical component of business network. Open source intrusion detection software like OPENSEC and Snort provide bulk of the intrusion detection facility.

OSSEC is a free, open-source host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting, and active response. It provides intrusion detection for most operating systems, including Linux, OpenBSD, FreeBSD, OS X, Solaris and Windows. OSSEC has a centralized, cross-platform architecture allowing multiple systems to be easily monitored and managed.


 OPSEC integrates with your Cloud and Network Infrastructure to provide enterprise security.  We work with OSSEC, Snort, Nagios, OpenNMS and Openstack cloud to provide an integrated solutions. Please contact us for details.




1.0  Network  Security - Stallings

2.0  Network Management- Mani Subramanium

3.0 Nagios-


5.0 Open Source security- OSSEC-

6.0 Intrusion Detection - SNORT-

7.0 Network Management- Georgia Tech


Page 1 of 22
Go to top