We provide commercial support for Clarona Intel RDSEED & RDRAND instructions based Random Number Generator. We have open sourced a character device driver implementation for Linux at >> GitHub.
Clarona passes all statistical tests in >> NIST Statistical Test Suite. The test report is available upon request.
Clarona passes all statistical tests in Dieharder: A Random Number Test Suite. The test report is available upon request.
Firefly JVM Agent records all calls during the execution and then its output is used to generate the call graph. It then can be used to generate a sequence diagram or it can be navigated on the browser.
Because Firefly is an at-runtime instrument, there is no ambiguity in the call graph as it can happen with source code tracers.
Use Firefly to gain insight into an unknown system. It is useful for onboarding too.
Authentication is an important security aspect of any IT system. We help our clients to implement and realize the latest advances such as:
Multi Factor/Strong Authentication (e.g. OATH, FIDO): to improve Web, Mobile, Desktop and Network/VPN authentication.
E-mail Authentication (SPF, DKIM and DMARC): to prevent spam and prove authenticity of the e-mails you are sending.
DNS Authentication (DNSSEC): to prevent DNS record theft.
Having a consistent internal training program for technology, software development, devops and engineering teams is a must. However, it is harder than it sound to plan, get prepared and give such trainings during the busy days of business as usual. Moreover, It is known that such trainings are one of the most important reasons for developers to not change jobs.
We provide turnkey Internal Training Program, from planning, preparation, to implementation and evaluation.
In three meetings, we learn your needs and prepare a draft plan (1), discuss and revise the plan (2) and present the annual training plan (3) to you.
We deliver the planned trainings, in English, on your premises, during the 12-months period.
Annually or semi-annually, we present you the aggregated evaluation reports collected from the attendees.
Training topics can almost be anything related to Computer Engineering, Computer Science and Software Development, but no commercial vendor specific topics, such as anything related to commercial products.