Slide background

Software Development

Some of the world’s largest and most complex command and control programs have leveraged our expertise to build, enhance, sustain and support the software products and applications required for mission success. We have developed solutions for C2 systems, cross-domain data dissemination, network and application monitoring & recovery, secure communications, highly resilient architectures, and security.

Our software technology proficiency encompasses all major software development platforms for application and systems development including Java/J2EE/JavaScript, C/C++, XML, SOAP, LDAP, Enterprise Message Bus (ESB), Internet Communications Engine (Ice), QT, as well as major development platforms for web based deployment,  mobile, cloud, business intelligence, and test automation solutions.

CMMI Level 2

Braxton processes are certified at a Capability Maturity Model Integration (CMMI) Level 2 rating. CMMI is a framework for business process improvement that a company may apply to its standards, processes and procedures to implement practices that have proven successful worldwide. Braxton has implemented a continuous improvement model for our software development processes and looks forward to continuing to enhance our software development processes and systems.

Open Source

Braxton developers have expertise developing open source based C2, Common Operating Picture (COP), and Communications software.  Our expertise includes Linux, Ice, QT, Apache middleware (Camel, ServiceMix, ActiveMQ) and other open source products and libraries.

Secure Coding Standards

Braxton’s CMMI Level 2 processes include secure coding standards in compliance with Defense Information Systems Agency (DISA) Application Security and Development Secure Technical Implementation Guide (STIG) Version 3 Release 1.  These standards encourage programmers to follow a uniform set of rules and guidelines determined by the requirements of the project and organization, rather than by the programmer’s familiarity or preference. Developers and software designers apply these coding standards during software development to create secure systems. The use of secure coding standards defines a set of rules and recommendations against which the source code can be evaluated for conformance using static and dynamic security analysis tools such as Fortify and Lint. Secure coding standards provide a metric for evaluating and contrasting software security, safety, reliability, and related properties.