SERVICES AND DEVELOPMENT WITH WEB 2.0 TECHNOLOGY FROM
ISO-9001ISO 9001 ISO-14001ISO 14001 Quality and Environment Policy ENG ESP SSL Rating

Applications

Web 2.0 development that interacts with your actual applications.
Oracle Technology & Oracle APEX 5 used.

We develop web 2.0 secure apps using Oracle Application Express 5 that runs inside an Oracle 11g R2 or Oracle 12c R1 database.

We select Oracle 11g R2 Express Edition, entry level database from Oracle and with free license, to develop basic apps and even for business that do not need more capacity inside their database.

A team focused in agile development delivering projects in time. We apply methods certificated in ISO 9001. We can make releases to your apps without stopping your users in their daily work.
We develop projects worldwide on premise or using remote control by vpn.

In our apps we include advanced functionality as mail from database, customer reporting, scheduler jobs.


Learn more »

Infraestructure

Hardware & Software to run business applications we develop.
Cloud Services to host your applications.

We build the infraestructure that your business needs to run your apps in a secure manner and during 24 hours per day.

We use Lenovo, Dell, HP, Supermicro servers and virtualization technology from VMWare and Oracle.

We select Open Source software you can trust to reduce your licensing costs.

We trust on Oracle Linux as secure operating system to host all your information.

We optimize your system using Cloud technology from Amazon and Oracle. That reduce to maximum energy costs and serve your apps to your partners and customers.


Learn more »

Security

We protect information inside your applications.
Internet used only for business.

We create security infraestructure following a 3 layers model which would protect critical information from your organization.

Learn more »

We secure remote access to your data using Firewalls based on Linux as SmoothWall and Zentyal.

We protect your network enabling internet filtering and avoiding a bad use of mail and social networks.

We use PC Virtualization to control access to USB devices which are source of malware, viruses, and even information vulnerability.

We audit your network to confirm that all security rules and running properly and that not exist malware running without being detected by standard antivirus tools.


Learn more »


Home |  Services |  Support |  Contact |  Technology |  Portal |  Portfolio |  Licensing Information | 
Presentation | Solutions Portfolio | TECNICA24 Aplications | Total cost of ownership study | Lenovo Computers | TECNICA24 Computers | TECNICA24 Systems | TECNICA24 Support Service | IT Management Service | Security Blog ENG ESP

© tecnica24.es 2013. All rights reserved. Cookies Policy.  Legal Notices.