Optimization, networking, and cybersecurity. To the power of 5.

Streamline-It

Remove dead code, unused libraries and bloat without requiring access to source code.

Simplify-It

Identify, disable, and remove unwanted and rarely-used legacy features of networking protocols.

Scale-It

Automate and scale network configuration functions with software- defined networking
(SDN) tools.

Switch-It

Seamlessly and automatically migrate applications between x86 and ARM architectures.

Safeguard-It

Reduce attack surfaces and common vulnerabilities and exposures while optimizing efficiencies.

Legacy applications, when not optimized, have become massive cost centers, depleting resources, power, and personnel.

Streamline-It

While AI, machine-learning, event-driven software architecture, iPaaS and other types of automation tools represent the latest trends in technology, the reality is not so glamorous. A significant number of organizations, from government agencies to large corporate enterprises, are still tied to legacy applications that play a critical role in their respective operations. Enter Streamline-It: the ultimate software optimization tool designed to address the issues that often plague legacy applications, costing organizations millions in terms of:

  • Higher Sustainment Costs
  • Security Vulnerabilities
  • Slow Execution
  • Lack of Scalability
  • Increased Power Consumption
  • Poor Interoperability with Modern Technology
  • Poor Customer Experience/Service
  • Negative Impact on Employee Morale

Java DeBloat Video

Java DeBloat Video

Reduce your legacy application’s footprint by an average of 50% without compromising features or functionality.

Streamline-It: removes dead code and features without needing to access source code or the original developers.

Streamline-It’s software re-engineering system using dynamic and static analysis to generate a call graph of the application, then applies slicing algorithms and cutting techniques to safely remove bloat and allow the user to selectively remove unwanted features from the compiled binaries. This results in smaller, simplified applications with less vulnerability.

Learn More

Communication protocols represent a critical component of your technology infrastructure – and left unchecked can result in significant issues for your organization.

Simplify-It

Just like software, communication protocols can suffer bloat from numerous sources, such as support for legacy features and rarely-used/unnecessary functionality.

This bloat can represent significant problems to any organization, from increased security vulnerabilities to unstable communications and slower networks.

Simplify-It was built from the ground-up to identify, disable, and remove unwanted features of protocols. PJR takes a multi-pronged approach in simplifying protocols and maximizing their optimization:

  • Protocol Feature Identification
  • Feature-to-Source Code Mapping
  • Automated Removal of Features From Source Code

Less complication. Fewer security issues.
More speed and stability.

Unlike other protocol optimization tools on the market, Simplify-It has the expanded ability to analyze the application source by including libraries and incorporating the capabilities of additional protocols.

Simplify-It can address protocol issues as they relate to mobile ad hoc networks,
heterogeneous wireless networks, adaptive routing, reliable network transport, decentralized service operation and discovery, network management and monitoring, and cognitive network technologies.

Learn More

Your network forms the backbone of your information and communications technology, from cloud computing, to AI, to edge computing – and an inefficient, unscalable network is extremely costly.

Scale-It

With the ever-increasing demands placed on datacenters and other large-scale computing environments with the arrival of IoT, AI, and mobile computing, the need to create frameworks that can support more data-intensive applications is significant.

Software-defined networking (SDN) provides a means to leverage and scale existing networks to meet these demands, and more.

Scale-It is the SDN solution network engineers have sought to handle the most critical networking tasks:

  • Network Scalability
  • Uptime
  • Centralized Network Provisioning
  • Holistic Enterprise Management
  • Centralized Security
  • Lower OpEx/CapEx
  • Unification of Cloud Resources
  • Data Traffic Control

The ultimate in network orchestration.

As network complexity increases, organizations can either increase the support staff to manage the network, or deploy tools that absorb the increased complexity without the need for additional resources.

By automating a range of network configuration functions, Scale-It accelerates the delivery of new services, scales them in concert with demand, and replaces manual tasks with automated, repeatable processes.

Learn More

Being limited to a single-processor architecture limits flexibility, locking an organization in to x86_64 processors and potentially being exposed to increased power/cooling requirements and additional security risks.

Switch-It

Enterprise-class software systems are comprised of millions of lines of code. As they undergo hardware refreshes in their current and emerging baselines, they are challenged with multiple degrees of complexity. This complexity results in significant and costly overhead to update/maintain; not to mention the security vulnerabilities exposed in such legacy systems.

The availability of ARM-based processors is exploding, and Switch-It, developed using Popcorn Linux, enables x86 applications to “switch” over to an ARM-based server (and vice versa) without execution interruption.

Save money. Save power. Save time.

This has numerous benefits across the technology landscape:

  • Developers can take advantage of the benefits offered by next-gen processors without rewriting applications from the ground up –potentially saving millions or even tens of millions of dollars.
  • Server density can be significantly increased as ARM processors require less power/cooling.
  • The security posture is improved dramatically.

Learn More

Breaches in cybersecurity represent a serious risk for every type of organization on the planet, from small businesses to global corporations to federal governments.

Safeguard-It

The cybersecurity statistics released recently are nothing less than astonishing:

  • 86% of breaches in 2020 were financially motivated
  • Global cybercrime is expected to inflict a total of $6 TRILLION USD in damages in 2021
  • 59% of buyers are likely to avoid companies that suffered from a cyberattack in the past year
  • Global ransomware damage costs are expected to reach $20 billion by 2021
  • 70% of consumers believe that businesses aren’t doing enough to secure their personal information
  • 93.6% of malware observed in 2019 was polymorphic

Networks remain especially vulnerable to attack. Modern networks often have multiple ingress/egress points, and network administrators rarely control all those points fully (e.g., rogue wireless access points, “BYOD” devices with cellular connections, etc.). This leaves the entire network at risk.

Confine Video

Confine Video

For every lock, there is someone out there trying to pick it.

Safeguard-It combats cyberattacks by significantly reducing the attack surfaces that often exist in legacy applications and in unused features that plague protocols. This approach robs would-be attackers of the ability to exploit vulnerabilities while, at the same time, optimizing critical applications and protocols.

Learn More

ABOUT PJR

PJR Corp is focused on providing tailored, innovative solutions to address real-world cybersecurity and legacy software issues for the U.S. Armed Forces, and corporations both large and small.

It’s about commitment…

It’s about excellence…

It’s about innovation…

It’s about time… to expect more.

Experience the difference
that only experience can deliver.

PJR Corp brings over a century of combined experience to every engagement, every project, and every deliverable. As a woman-owned business, our company is solely focused on providing innovative solutions to address real-world cybersecurity and legacy software and protocol issues.

Trusted by the U.S. Military, and with expertise sought after by both large corporations and small businesses, PJR Corp tailors its approach to each engagement, ensuring a level of personalization and commitment unparalleled in the industry.

PJR Senior Leadership Team

Peter Allen Robinson

Founder and President

Peter launched PJR Corporation with the vision of creating and growing a company that provides innovative, tailored solutions to real-world cyber security and legacy software performance problems. Peter brings over 20 years entrepreneurial experience growing successful software companies and is focused on building PJR to include great people and products to serve a high-growth market.

Sandra Leigh Robinson

CEO

Sandra brings over a decade of experience and spearheads PJR’s banking, finance, advisor, and investment relationships. Sandra is involved in the day-to-day activities supporting employees, customers and partners while ensuring that PJR has the resources it needs to grow. Sandra is the point person for the many Federal agencies and systems necessary for PJR to perform on its contracts with the Department of Defense.

Chris Shiflet

Lead Scientist/Software Dev

Chris has extensive experience in software transformation using both static and dynamic analysis techniques. His work with control-flow and data-flow analysis is directly integrated into the engine at the core of PJR’s S5 Power Suite. Chris’ further experience with tactical software and network engineering in challenging environments, such as high-pressure scenarios, e.g., network-dependent competitions with millions of dollars in prize money on the line.

Scott Harris

Lead Software Development

Leveraging his decade of experience with Qualcomm, Scott brings his expertise in leading our software development team. A compliance expert, Scott has developed and supported software applications with hundreds of thousands of users, as well as having transitioned complete software systems to be supported by a competitive software development team. He has a BS degree in Computer Science.

David Diepenbrock

Software Dev/Scientist

David’s deep understanding of, and experience with, C/C++, Ada and Java inform our S5 Power Suite product development. David also worked on PJR’s STTR for Stabilize-IT. David’s experiences also include C/C++ source code instrumentation, analysis and manipulation using libclang, as well as code optimization for the Longbow Apache Helicopter, reducing boot times by 25%.

Eric Ortega

Software Dev/Scientist

Eric has filled senior technical and management roles in the aerospace industry, being responsible for multi-site software development projects with deliverables to original equipment manufacturers like Boeing and Airbus. While conducting research for his doctorate and during his employment at a microscopy company, Eric wrote high-volume, heavily optimized graphics-processing algorithms that used probability models to perform data analysis.

Talent hits a target no one else can hit;
genius hits a target no one else can see.

“We have a belief in what we’re doing, and a cause for which we are called. We are driven by purpose, and inspired to action. Each of us at PJR, in our own way, has taken hold of the opportunity to create something larger than ourselves. To be part of a unit that, collectively, impacts our clients in ways they expected – and in ways they could never have imagined.”

Peter Robinson

In the vast sea of legacy applications and cybersecurity threats, clients depend on PJR to provide them safe harbor. We’re not just software developers, computer scientists, and compliance officers, we’re the architects of optimization and the shield of cybersecurity.

Like a Special Forces unit, we operate in specialized teams, giving us the ability to be agile and nimble in tailoring the execution of our services to the precise needs of our clients. We do this with the understanding that meeting our objectives isn’t just critical, it’s mission critical.

If you’re ready to be a part of a close-knit team that supports each other in getting the job done; where your talent is respected and professional growth is part of the job description – then reach out and let’s have a discussion.

OPEN JOBS

Apply Today

Get In Touch With Us

Thank you for your message. It has been sent.
There was an error trying to send your message. Please try again later.