Call for a ballpark estimate for your project in 1 business day

Deep Dive and Design

We can analyze any thorny process and business function flow. We have the right tools and expertise to help you do a deep dive and clarify your requirements that will help your business move and grow with your custom software.


We specialize in large and complex software development projects. We have over 50 years of joint professional software development experience. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future.

Support and Validation

Supporting a complex software platform requires the effective use of both preventative measures as well as rapid critical incident response to resolve problems quickly. Whether it’s an occasional problem or a fully managed support offering we have a support service to suit your needs.

The 80 / 20 Rule

Perfection favors the designer not the user. When designers add features without thought, they are inadvertently shooting themselves in the foot. Designers who strive for perfectionism can harm their team. This can have a potentially negative effect on the user. A user is not looking for perfection as much as something functional that helps them achieve their intended goals. When UX designers are blind by perfection, there is no room to look at the critical 20% that has the more significant ...

Malware Hidden In .WAV Files

The loaders come in three different varieties. One uses Least Significant Bit, or LSB, steganography to decode and execute a PE file. Another that employ a rand() based decoding algorithm to decode and execute a PE file. The third employ rand() based decoding algorithm to decode and execute shellcode. These methods shows that executable content could be hidden within any file type, provided that the hacker does not corrupt the structure of the container format. This strategy ...

Parkinson's Law

This law says that any task is prolonged until the time available for doing it is completely exhausted. It is also a law of productivity. We think that the more hours we dedicate to something, the better it is. But practice shows that it is not like that. When we know we have more time, our brain relaxes. On the other hand, when we feel the pressure of the deadline, we focus on doing what is important and that we must finish on time. What does this mean at the User Experience level? The user ...

Flaw in Sudo Gives Root Access

Red Hat explained in a posting that a flaw was found in the way Sudo implemented running commands with arbitrary user ID. If a Sudoers entry allow a user to run a command as any user except root, the flaw allows a hacker to bypass that restriction. Joe Vennix of Apple Information Security, found that the flaw can be exploited by specifying the user ID of the person executing commands to be -1 or 4294967295. The bug resolves the ids to the value 0, which is the user ID fo ...