Software Development
Applied Cryptography
Information Networks
Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.
Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.
We have been working for you for over 20 years on the following:
Although cryptography has its roots in abstract mathematics, its proper usage always comes with huge real-world impact on mitigating the risks of business operation problems and monetary damages.
Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.
Professional analysis and viable design and implementation of specialized software or secure server and network infrastructure are the key components for success of new and current services no matter the scale.
Written by Dominik Pantůček on 2026-02-26
Designing a brand new CPU is not only about opcodes, it is also about its internal workings. One such internal thing is how certain multi-bit values can be split into different single and multi-bit slices.
Written by Dominik Pantůček on 2026-02-12
In previous post we have introduced a nice way to encode machine opcodes and their arguments as a bit mask. What about visualizing such opcodes? There surely is a way to include nice pictures to aid with reading the bit masks.
Written by Dominik Pantůček on 2026-01-29
Language-oriented programming has many nice features but some of them seem to be more versatile than others upon detailed inspection. This time we look into retrieving values from transformer bindings in syntax phase to create custom reserved identifiers.