Black Belt in Technology!
We are specialized in the design and development of digital systems. We have two main focus area: our own software products and tailor-made solutions for our customers.
Improve productivity of human being.
All of our solutions must be in line with our mission. We don’t work on projects that don’t serve our vision.
Build digital solutions that enables easy creation of data, easy access to data, easy share data, better collaboration, better process.
Our projects helps:
Fundamental beliefs upon which our business and behaviors are based.
Create knowledge, be a maker
Share gain, share pain
Measure results not hours, focus on efficiency
Stick to process, improve whenever possible
Being right is not important, finishing is important
Care each other, care customers, care partners, care products, care company
Make everybody happy, don’t have to do things that make you unhappy
Put yourself in others’ shoes, use your own product
Treat others the way you would like to be treated.
We're an all-remote company that allows people to work from almost anywhere in the world.
We think “how might it work?” is more interesting than “why will it fail?”
We are sharing every information with our team without violating the security policy.
No more no less
We don't celebrate working long hours or overwork. We just expect each other to fulfill our promises.
THOMAS B. GLAZER
INFORMATION SECURITY POLICY
Our company provides SOFTWARE, TRAINING AND CONSULTING SERVICES. Our company is committed to protecting confidentiality, integrity and all physical and electronic information assets. Information and information security requirements will be in line with our corporate goals. The management of our company will employ personnel who are open to change, well-trained, competent in their fields, provide the financing that will ensure competition with our competitors in the sector, and have sufficient equipment and infrastructure. Necessary financing will be provided along with this infrastructure and personnel. Business continuity and contingency plans, data backup procedure, avoidance of viruses and hackers, access control systems and information security breach notification will form the cornerstones of our core activities. The vulnerabilities and threats obtained as a result of the risk assessments will be eliminated, and secure access to the information of our customers and personnel will be ensured.
In addition, as a result of risk assessments, our objectives will be determined and the necessary resources and conditions will be provided to achieve these objectives.
We expect them to make management system requirements a way of working. It will be ensured that all personnel receive appropriate training on the Information Security Management System of certain third parties.
The applicable conditions regarding information security and the opportunities and requirements brought by these conditions will be fulfilled, the opportunities and requirements brought by these conditions will be fulfilled and these conditions will be continuously improved. In addition, the requirements of our company will be fulfilled and these conditions will be constantly improved. In addition, it will ensure the adaptation of our company, our personnel and all relevant parties to this system.
Our information security policy is reviewed once a year or in case of significant changes regarding our company, with the participation of management and unit responsibles, to ensure its suitability, accuracy and effectiveness, and is updated.