Avysion offers a revolutionary alternative to the dilemma of choosing between a traditional Commercial Off The Shelf (COTS) software package and a “start from scratch” Custom Application Development effort. Our Customizable Commercial Off The Shelf (C-COTS) Software offerings are just that.

We use our proprietary “development in a box” programming toolkits and methodologies to create applications that have all of the positive attributes of both COTS and Custom software. Our core set of service offerings include, but are not limited to: case management, analytics, licensing, scheduling and time and expense reporting. By combining the advantages of custom developed software with those of COTS, Avysion can offer clients a ‘no compromise’ software solution.



Our years of experience in building custom applications for numerous Governmental clients have taught us that many applications actually share a large degree of commonality. In essence, clients were paying to develop the same code over and over again. Recognizing this trend, Avysion developed a reusable code library written in such a way that it would be widely extensible for many core business functions and architectural criteria with the end result being delivery of low-cost, customized applications built on a “box” of field-proven standard functional modules and XML-based data transactions. This can meet client requirements while reducing the implementation risks inherent with traditional waterfall software design and development.

ADAM™ – Avysion’s Dotnet Application Model

ADAM is a module-based master framework application model that is the cornerstone for our Agile development software. By separating all applications into respective program tiers of Presentation, Business and Data, changes may be made in one tier without affecting the others. An XML-based data-access and transport layer ensures data integrity with concurrency and incorporates standard stored procedures to facilitate fast and secure data management. All data is “strongly typed” to provide a high level of data-integrity and security.

Utilizing object-based coding that employs inheritance to provide “write once and reuse many” coding abilities, ADAM dictates standard ways of building controls, pages and objects ensuring code readability and maintainability. Object classes are well defined and segmented by function so that other “in a box” modules can be easily customized and integrated into the application.

ALEX™ - Avysion’s Library Express for File Management

From an early stage in our software development efforts, we recognized the importance of providing our clients with a method of referencing, indexing and attaching multiple document types to data base records without the use of expensive and complex document management systems.

When added to our ADAM framework, Avysion’s pre-configured ALEX module solves this issue for both back-office and constituent-facing applications by enabling the uploading of any file type, web form or scanned document to one or more data base records. With concurrent processing capabilities, documents can be viewed online and processed simultaneously while database information is being processed or queried.

MAX™ - Managed Access Exchange

Security is more than usernames and passwords. It is proactive prevention, activity identification and expedited reaction. Attacks come from many fronts and in designing an infrastructure, delineating them is necessary. However, security must be easy to implement and administer. To address this, we have developed our MAX module as part of our ADAM framework. It utilizes a closed security model with accumulative granted rights. All permissions are denied until specifically granted from the administrator on either an individual or group role.

Client administrators are able to update both individual permission rights (including those associated with document libraries created in ALEX) and group roles from a “user-friendly” screen which allows administrators to customize application security to meet their users unique needs.

Security needs are addressed by case-sensitive passwords, encrypted password storage, one-way password encryption, error message suppression on login and an anti-hacking verification process on account administration. These safeguards allow for harder-to-break passwords and deter hackers from being able to footprint the application or database, including circumvention of the infrastructure security. Security is implemented at both the login screen and every page of the application. To enable suspicious activity identification and reaction, MAX also employs customer-defined failed login attempts, and locks account access accordingly.

CRIS™ - Crystal Report Integration Service

When implemented into our ADAM framework, CRIS provides robust reporting capabilities utilizing PDF or Microsoft Office technologies for the creation, distribution and maintenance of reports that enable users to modify and print reports at the click of a button.

Many applications provide only pre-determined reports, requiring expensive and time-consuming programming to add and create new reports. With a CRIS enabled application, every field in the system is easily available for new report creation, viewing and sorting. Additionally, applications utilizing CRIS provide users with a unique, simple to use report maintenance page on which these changes can be made.

© Web Design::Tin Roof Designs