Software Development

Applied Cryptography

Information Networks

Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.

We have been working for you for over 20 years on the following:

cat illustration

Owl - icon

Applied Cryptography

Although cryptography has its roots in abstract mathematics, its proper usage always comes with huge real-world impact on mitigating the risks of business operation problems and monetary damages.

...

Wasp - icon

Penetration Testing

Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.

...

Ammonite - icon

Systems Architecture

Professional analysis and viable design and implementation of specialized software or secure server and network infrastructure are the key components for success of new and current services no matter the scale.

...

Latest posts

Deforestation Progress

Written by Dominik Pantůček on 2026-03-26

Although it has been more than a year since Qi 5 was released, the work on deforastation in qi/list has steadily progressed forward finally yielding an (almost) unified interface for defining new deforestable operations.

...

On Querying Bibliography

Written by Dominik Pantůček on 2026-03-12

Sometimes you are working on a research and you need to manage BibTeX bibliography. However as the number of entries grows it becomes harder to manage. There has to be a better way.

...

Dynamic Mutable Bit Slices

Written by Dominik Pantůček on 2026-02-26

Designing a brand new CPU is not only about opcodes, it is also about its internal workings. One such internal thing is how certain multi-bit values can be split into different single and multi-bit slices.

...