Chat with us, powered by LiveChat

By continuing to browse the site, you agree to our use of cookies. Check its details of the Privacy Policy and Cookies.

Accept arrow

How we work

We accurately recognise your expectations

If you know the services we provide and what they include – great! Our cooperation will be even smoother. If not – no worries. Together, we will thoroughly review your needs and problems, set goals, and help you choose the service that best fits your needs.

The first stage of our cooperation is the time when we learn each other. We will ask you the questions necessary to understand the goals you want to achieve. We will listen and analyse your answers to provide you with exactly the solutions you need.

If at any stage you have any doubts – tell us about them, and we will immediately try to dispel them by justifying the use of the specific solutions.

In short:

  • We talk about the project objectives.

  • You fill out a project brief.

  • We introduce initial solution proposals.

image

We prepare tailor-made solutions

If the initial solutions we propose match your expectations and point us in the right direction, the next step is to sign a non-disclosure agreement (NDA) that will guarantee each party full confidentiality. We will then ask you to indicate more detailed technical guidelines, such as Proof of Concept (PoC) schemes, and if we work in an existing environment, to provide access to it so that we can thoroughly explore the subject and specify the issues we will need to address.

Then, during a conference call, we will ask your team representatives about all the issues that raised our doubts during the audit. With complete information, we will start developing detailed solutions. The best specialists from our DevOps, SysOps, and Solutions Architects departments as well as security experts (if needed) are involved in this process.

In short:

  • After establishing the right direction for our work, we sign the NDA ensuring the confidentiality of both parties.
  • We audit the current environment or verify the Proof of Concept.
  • We prepare a concrete solution proposal, present it and address any doubts on your part (if they appear).
  • We amend the project, if necessary.
image

We complete the necessary formalities

the next stage, which is signing the contract precisely regulating all the terms of cooperation and describing the scope of the work to be carried out. Having completed the formalities, we start implementing the project.

At the beginning of the process, we will ask you to share the necessary resources, which can include various types of access, data, schemes or documentation. We will also need the contact details of your team members who will be involved in the work, along with the information on the scope and extent of responsibilities of each person.

Next, we set specific deadlines for the implementation of the subsequent project stages and determine the expected effects. At the end we determine the extent of your involvement in the project.

In short:

  • We prepare and sign a contract regulating the scope and terms of our cooperation.
  • We divide the work into stages and specify the expected results for each stage.
  • Each party designates persons for the project team.
  • We configure tools supporting project communication and management (Jira, Redmine, Slack) and move specific project stages to them.
image

We carry out the subsequent stages of the project

We will work closely with you on each stage of the project and regularly inform you about our progress. At the end of each stage, you will participate in tests whose results we will take into account in the subsequent stages of our work.

As far as the technologies we use, we make the choice based primarily on your best interest, project objectives and global trends in the field. We always rely on state-of-the-art technology.

Each of our projects starts with the creation of the necessary cloud computing environment, which we then complement with appropriate support technologies and subject to internal verification as well as to the verification of the client. If it is accepted, the client migrates the necessary data. If the environment requires corrections, we introduce them and return it to the client for reverification.

We then perform staging tests. If they are successful, we switch the environment. We thoroughly monitor the performance of all resources and adjust the environment to the current web traffic.

The final step is the preparation of complete design documentation and signing of the appropriate protocols. Depending on the scope of the provided services, we either take over the environment to maintain or pass it on to the client.

In short:

  • We prepare a suitable cloud computing environment and complement it with necessary support technologies.
  • We transfer it to the client for verification.
  • We make corrections, if necessary.
  • We request that the client migrate the data.
  • We run tests and switch to the target environment.
  • We monitor resources performance and adjust the environment to the web traffic
  • We prepare project documentation and sign the appropriate protocol.
  • We transfer the environment to the client or take over it to maintain it.
image

We thoroughly test the implemented solutions

The work on the project does not end when all the necessary solutions are implemented. The ultimate success depends largely on the proper testing of all elements, which is why we pay so much attention to this stage.

As stated above, we ask the client to participate in the environment tests at a very early stage to ensure that the environment meets all expectations. Every subsequent stage of the project also ends with a series of tests. At the end, we also perform performance and security tests to ensure that the environment is able to handle incoming traffic and is adequately protected against all sorts of external attacks. We use tools like JMeter and New Relic for this purpose.

We also run the so-called application and infrastructure performance threshold tests which allow us to capture potentially inefficient components and prepare modifications recommendations. The tests also allow us to pinpoint critical system points that negatively impact the final performance of the application. With this information we are able to improve our solutions accordingly.

The last step in the testing process is automatic verification of the auto scaling process, which allows us to assess whether the environment can cope with dynamically changing traffic and will properly match the resources used.

In short:

  • We ask the client to participate in the environment tests at a very early stage of project implementation.
  • After implementation we run performance and security tests.
  • We test the performance threshold of the infrastructure and application.
  • We automatically verify the auto scaling processes.
image

What do our development and maintenance services entail?

If you decide to entrust us with development and maintenance well after the implementation process, we will jointly determine who, when and in what form will receive the notifications of the state of the environment and about all the processes occurring in it.

Based on the so-called good practices, we have developed a recommended list of resources and processes that should be monitored as well as an effective escalation path in case of emerging alerts. It is the starting point for developing a dedicated monitoring policy, which we will prepare together.

The service also includes the constant concern for the full security of all resources. We use state-of-the-art security technologies to prevent unauthorised access. We also develop a full system for responding to security breach attempts (e.g. DDoS attacks).

In short:

  • We verify the standard monitoring checklist and add to it a list of parameters appropriate for your environment.
  • We develop effective escalation paths and test the so-called “call tree” to be used in case of alerts.
  • We provide monthly monitoring with information on all occurring incidents.
  • We ensure full security of all resources and the effective development of your application.
image

Learn about the day-to-day work of our team

We work remotely

All the members of our team work from the place that suits them most at a given moment. We do not have to spend all day in one office to efficiently execute projects. Having established high standards of procedure and gained experience in distributed systems work, we are able to deliver services at the highest level and efficiently deliver projects. We stay in touch with each other and our clients located in the most distant corners of the world using modern communication tools, such as: Slack, Jira and Redmine as well as video conferencing tools, e.g.: Hangout, Skype and Webex.

We regularly meet at the office

We focus on successful communication and partner relationships both inside the team and in relation to our clients. That is why we regularly meet at our office in Warsaw not only to discuss current projects, but also to simply spend some time together. As a result, we have a great, understanding and friendly team, which is the basis of effective cooperation. We are also always at the disposal of our clients, so if need be, we can schedule an appointment and discuss the necessary issues at any time.

 

recruitment

Do you have experience in computing cloud projects or interest in this field?

Below you will find information on current open positions. If you find any of the offers interesting, please send us your application. After a thorough verification of the application, we will arrange a short phone call to assess if you are the person we are looking for.

If you join our team, you will be introduced to our team with the help one of the mentors and then we will develop a detailed training and certification plan, and your career path. Would you like to give it a try?

We are currently looking for: