SERVICES AND DEVELOPMENT WITH WEB 2.0 TECHNOLOGY FROM
|ISO 9001 ISO 14001 Quality and Environment Policy ENG ESP|
We develop web 2.0 secure apps using Oracle Application Express 5 that runs inside an Oracle 11g R2 or Oracle 12c R2 database.
We select Oracle 18c Express Edition, entry level database from Oracle and with free license, to develop basic apps and even for business that do not need more capacity inside their database.
A team focused in agile development delivering projects in time.
We apply methods certificated in ISO 9001.
We can make releases to your apps without stopping your users in their daily work.
We develop projects worldwide on premise or using remote control by vpn.
In our apps we include advanced functionality as mail from database, customer reporting, scheduler jobs.
Also we add drag and drop technology to easily upload documents in applications. Users can subscribe to folders content to receive a mail when new documents are uploaded.
We build the infraestructure that your business needs to run your apps in a secure manner and during 24 hours per day.
We use Lenovo, Dell, HP, Supermicro servers and virtualization technology from VMWare and Oracle.
We select Open Source software you can trust to reduce your licensing costs.
We trust on Oracle Linux as secure operating system to host all your information.
We optimize your system using Cloud technology from Amazon and Oracle. That reduce to maximum energy costs and serve your apps to your partners and customers.
We manage your communications with main providers and drive custom projects when your requisites are very high in terms of accesibility and guarantee. Our experience managing communicaciones make us we can solve them in less time even driving tecnicias from providers to solve on premise.
We create security infraestructure following a 3 layers model which would protect critical information from your organization.Learn more »
We secure remote access to your data using Firewalls based on Linux as SmoothWall and Zentyal.
We protect your network enabling internet filtering and avoiding a bad use of mail and social networks.
We use PC Virtualization to control access to USB devices which are source of malware, viruses, and even information vulnerability.
We audit your network to confirm that all security rules and running properly and that not exist malware running without being detected by standard antivirus tools.
Home | Services | Support | Contact | Technology | Portal | Portfolio | Licensing Information |
Presentation | Solutions Portfolio | TECNICA24 Aplications | Total cost of ownership study | Lenovo Computers | TECNICA24 Computers | TECNICA24 Systems | POS Solution | TECNICA24 Support Service | IT Management Service | Security Blog ENG ESP