Software Development
Applied Cryptography
Information Networks
Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.
Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.
We have been working for you for over 20 years on the following:
Although cryptography has its roots in abstract mathematics, its proper usage always comes with huge real-world impact on mitigating the risks of business operation problems and monetary damages.
Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.
Professional analysis and viable design and implementation of specialized software or secure server and network infrastructure are the key components for success of new and current services no matter the scale.
Written by Lucie Zdeňková on 2025-03-27
A few weeks ago, we published implementation of darkmode for static website without any javascript part 1, and part 2. This week, we would like to show you, how this useful feature can be implemented in any React application. Good news is, that coding such feature in React is way easier and requires less code!
Written by Dominik Pantůček on 2025-03-13
Gracefully handling non-existent pages in any web presentation is usually a desired course of action. A bare-bones default "404 Not Found" page tells the user enough, but - frankly - does not look that exciting. But is it possible to have a nice multilingual error page while keeping everything tidy in a Puppet configuration like we use?
Written by Dominik Pantůček on 2025-02-27
As a part of our work on new Key Management System (KMS) for rclone, it was more than appropriate to look for prior art. There are well-tested cryptosystems providing file encryption for file systems built on top of block devices. However it has turned out that these systems offer little to no inspiration for an object storage systems encryption.