All our products are safe and they are not affected by the Apache Log4j 2 exploit CVE-2021-44228.Apache Log4j 2 is a very common Java logging library and its remote code execution vulnerability affects a huge number of systems and applications. We are not affected as we do not use Apache Log4j 2. Actually, we limit the use of external libraries to a minimum, because even though they speed up the development process, they add their problems to your product. In times like this, the extra effort required for the additional development pays off.
We are thrilled to announce that we have expanded our range of services to include comprehensive Quality Assurance (QA) services. As a software development company, we understand that the quality of the products we deliver is of utmost importance to our clients' success.
Data encryption plays a critical role in the security of IT systems and communications, but it also creates some new challenges like sorting, indexing, efficient querying etc. In order to address exactly these issues, we have developed and implemented successfully our own datastore independent order-preserving encryption (OPE).
A major challenge for any Web UI is how to render well on a variety of devices and screen sizes. One approach is to create a separate Web UI version for every type of device. The other approach is to develop only one Web UI that is adaptive and serves all devices. We build our own responsive GWT solution.