Call for a ballpark estimate for your project in 1 business day

Deep Dive and Design

We can analyze any thorny process and business function flow. We have the right tools and expertise to help you do a deep dive and clarify your requirements that will help your business move and grow with your custom software.


We specialize in large and complex software development projects. We have over 50 years of joint professional software development experience. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future.

Support and Validation

Supporting a complex software platform requires the effective use of both preventative measures as well as rapid critical incident response to resolve problems quickly. Whether it’s an occasional problem or a fully managed support offering we have a support service to suit your needs.


Docker filled with Graboid Cryptomining Worm

According to researchers at Unit 42, the initial malicious Docker image has been downloaded more than 10,000 times. Administrators can spot infections by looking for the presence of an image called gakeaws/nginx in the image build history. The hackers gained a foothold through unsecured Docker daemons, where a Docker image containing a Docker client tool used to communicate with other Docker hosts. This allowed the hackers access without any authentication or authorization. ...

SmarterASP.NET Recovering From Ransomware Attack

SmarterASP.NET offers shared web hosting services which allow many websites to reside on one web server connected to the internet. Many SmarterASP.NET customers specifically are looking to host ASP.NET sites. ASP.NET is an open source web framework, created by Microsoft, for building web apps and services with .NET. ...

Nvidia Fixes Two Flaws

The driver has three high-severity flaws which all stem from the kernel mode layer handler component of the driver. Kernel mode is generally reserved for the lowest-level, most trusted functions of the operating system. In this case, the layer handler ( nvlddmkm.sys ) for the DxgkDdiEscape interface within the kernel mode has a number of glitches. These issues include the handler not validating the size of an input buffer, de-referencing a NULL pointer and using untrusted input when c ...