Technology

We predominantly use Microsoft technology for building our solutions. However, we also make use of other technology providers where it makes sense and look to use Open Source software where that provides a market leading option.

We have also developed our own software framework, our "Abstract Infrastructure", that enables us to use our own "battle hardened" software for components that are generic across solutions. This enables us to build our software faster and to concentrate on the specific requirements of the software.

Common components that we use

.Net Framework

.Net Framework

.Net Core

.Net Core

ASP.Net Mvc

ASP.Net Mvc

Xamarin

Xamarin

Node.js

Node.js

Azure

Azure

AWS

Amazon Web Services

SQL Server

SQL Server

MySQL

MySQL

Oracle

Oracle Database

Redis

Redis

SignalR

SignalR

Accord .Net

Accord .Net

HTML5

Html5

CSS3

CSS3

jQuery

jQuery

React

React

Bootstrap

Bootstrap

Tailwind CSS

Tailwind CSS

Example integrations from previous clients

Sage Pay

Sage Pay

Stripe

Stripe

Flywire

Flywire

Google Ads

Google Ads

Office 365

Office 365

Facebook

Facebook

Gmail

Gmail

zendesk

zendesk

Twilio

Twilio

Mandrill

Mandrill

.Net Framework

SendGrid

Our approach

Business Led

Anyone can make software. The best engineers create great software by first understanding exactly what it needs to do and then building it in a maintainable manner.

Read more

Process

Agility in software development is based on the understanding that the priorities and requirements of a organisation change, often quite rapidly, and that software development should respond to those changes and, indeed, affect the changing priorities as well.

Read more

Technology

We predominantly use Microsoft technology for building our solutions. However, we also make use of other technology providers where it makes sense and look to use Open Source software where that provides a market leading option.

Read more

Information Security

Information Security is the practice of mitigating (and preferably eliminating) the possibility of unauthorised access to data. It goes alongside, and sometimes conflicts with, data protection which is the use of personal information and the privacy requirements thereof.

Read more

Want to find out more?

Ask us a question