Science Tools Corporation
Copyright © 1997 - 2023 Science Tools Corporation All rights reserved
About UsOur Value Our Value ProductsConsultingReferenceSupport
Feature of our product suite
Function it serves
and the
Benefit to you

March 31 , 2005 - living document - ALL feedback WELCOME, our Webmistress thanks you.

Heterogeneous support Does anything anywhere. No need to change your existing database, operating system, hardware, file systems, RDBMSes, etceteras.
Automation Processing daemons look for work to be done and automatically initiates processing Provides automated processing on a single computer, within a site, or across the world.
Restartable Processing Restarts processes and restores connections as configured by administrator. Restarts processes that may have failed, interrupted, or isn't really ready to run.
Defined Workflow Relationships between processes may be explicitly declared. Creates a work-flow through parent-child relationships and their processes.
Work-load Distribution Processes may be assigned to groups and daemons. Permits load balancing and configures particular work to particular systems.
Rugged Survivalism Detaches processes from the parent. Allows processing to continue when a daemon is shut down, or the originating object isn't found.
DemandEngine™ and EagerEngine™ Looks to common meta-data repositories to find work.

Allows the environment to be physically distributed and logically joined.

When resources are available the client looks for work rather than having a coordinator looking for a machine that is free.

Scientific Defensibility Tracks the generation history, or lineage, of your scientific objects.

Never again struggle to recall just how a particular result was obtained.

Exact details of how each object was created are preserved.

Enables easy repeatability of processing steps with single changes.

Illuminates and confirms findings.

Computational Unification Incorporate hardware, software, people, data and knowledge into one system. Users unify what hey already have.
Publisher™ Provides connectivity between instances of data and meta-data.

Sites collaborate to preserve data and meta-data permitting an uninterrupted flow from data source, through all intermediate processing steps to final use.

Permits you to share and track results automatically, or works-in-progress, with anyone (collaborators or the public) and provides controls and tracking so you know what is going on.

On demand, on a schedule, or as things are created.


Provides secure connection services between client applications and services resources by providing flexible connectivity capabilities on the target end.

Permits authorized piercing of firewalls and gateways, and provides further redirection of a connection to any destination within a private network.

May also be used in other applications which require secure transport between components that communicate using the TCP/IP port mechanism. Such applications are widespread and include uses such as video conferences.

Secure, encrypted, point-to-point, destination-end control and on-the-fly communications.

The target node does not have to be the final destination of the connection, though encryption will end at that point in the network connection.

Can be used to augment existing network security strategies such as VPN by filling a need where VPNs may be inappropriate or impossible to configure.

SQL Translation Services Provides users the ability to write applications once and have them operate against any modern RDBMS engine, despite the fact that all databases have their own unique dialects.

Permits migration of applications from one database vendor to another, or can enable write-once-run-anywhere applications.

Universal journaling services to all RDBMSes including logging and reloading.


As of this writing, certifications exist for Oracle, Postgres, Informix, Sybase and DB2. Others are pending, so contact us for current information.

Named Database Connections Named connections are described in the file system and are protected by file system access privileges.

Provides simplified database access and isolation of sensitive configuration data from unprivileged users.

Recognizes users TRUE identities based on privileges and permissions.

Java API
55,000 lines of Java including 1,100 public methods

A collection of Java classes and methods written to make the job of implementing applications easier.

Utilizes the very latest concepts in threat detection and avoidance, including using multiple, simultaneous methods of user identification and system identification to reduce risk.

Write commands, processes, or any form of an application that can speak to every implementation of the STDB database schema.

Distributed Processing Features enabling remote management of processes and daemons with digitally signed commands for security.

Interoperability support, enabling your code to run unchanged against nearly any Database.

System managers can setup required logging which cannot be turned off by users.

Avoids IP spoofing

Archivist™ Object archiving suite

Recognizes duplicate copies as distinct from named objects (object oriented) found scattered throughout an environment.

Configurable duplications allows administrators to choose how many copies of objects they want where and when.

Not intended to replace platform specific disk backup and recovery tools, but rather to augment them with a capability of managing individual objects through time.

Fully distributed, multi-site architecture: Source files may come from any network and may be stored on any network, with the meta-data about them being available on a third system.

STJC™ Secures the environment prior to calling C and Java applications

Prevents clever users from spoofing applications prior to execution including; desktop tools (excel), Java-based GUI interfaces, interactive command line access, batch processing and IDEs.

Secures known vulnerabilities in environment variables such as PATH, CLASSPATH, LD_LOAD_LIBRARY, and so on, and explicitly sets the variables before calling application level programs.

Both real and effective user-IDs are tracked

Calls application's process ID (not available in Java)

The BigSur System™ A comprehensive environment for science, research, grid-computing, high-performance computing and development enterprise management.

Distributed Processing System for "Grid" computing provides seamless application access via ANY supported database. Any component (e.g., processes, objects, data, meta-data, etceteras) may exist on any network-reachable node.

No Node Limitation

Heterogeneous Independence

Designed to learn about the holdings of other systems to manage their data and/or meta-data to automate collaborative access. Runs your processes so you won't be embarrassed when you lose your key staff (intern, grad student) and "forget" how.

Collects and teaches processing functions useful to your discipline so you can build a library of capabilities, accessible from anywhere and runable by anybody to whom you grant permissions.

Confirms to conventions and paradigms of the users (e.g., data-types, associative relationships, processes, etceteras)

Scalable, use as little capabilities as desired without being forced to use unnecessary components or incorporate inter/intra/multi-disciplinary environments/projects (virtual organizations).

Complete data lineage from source to use and vice versa!

ScienceMaster™ A system-management functional tool for The BigSur System™ in a Graphical User Interface form.

Great for those who aren't comfortable with command-line-interface.

Manages: Infrastructure (organizations, suites, people, computers), Processes (process definitions, input parameters, output results), Objects (individual or in sets, object data and/or meta-data), Relationships (object to object, object to process and process to process), Databases (DB access, logs, journaling), Security (individuals, objects, network, database).

Provides direct control of the Distributed Processing System (DPS).

Distributed Processing Distributes processing to the most appropriate host node(s).

Any network-reachable system can participate in performing work, even over un-trusted networks.

Cost-effective super-computing systems may be created using new computers, or any existing systems, including lower valued, fully depreciated (scrapped) nodes.

Joins together a heterogeneous collection of systems.

DaemonMaster™ Manages all the DPS daemons on a single system Provides the administrator a means to manage processing on all systems, no matter what node they are logged in on.


Contact Us

website contact: Webmistress

Science Tools > Top Level