Software Development
Applied Cryptography
Information Networks
Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.
Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.
We have been working for you for over 20 years on the following:
Although cryptography has its roots in abstract mathematics, its proper usage always comes with huge real-world impact on mitigating the risks of business operation problems and monetary damages.
Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.
Professional analysis and viable design and implementation of specialized software or secure server and network infrastructure are the key components for success of new and current services no matter the scale.
Written by Dominik Pantůček on 2025-10-23
Sometimes you need to build multiple interdependent artifacts in your CI/CD pipelines. And sometimes you can setup your workflow in a non-blocking way for many of these. Read on to see what we are using in our GitLab instance.
Written by Lucie Zdeňková on 2025-10-09
In this post, we'll take a detailed look at how to set up a React application using the Vite build tool. We'll also go through the installation of essential libraries that we typically use for developing frontend applications.
Written by Dominik Pantůček on 2025-09-25
Splitting projects into distinct packages is usually good - especially in Racket where that gives you local Scribble documentation search for free. But how to internally publish a website composed of multiple documentation sets of many packages?