We put at our customers' disposal our deep knowledge and hands-on experience in a wide range of advanced IT technologies, in particular:

Project documentation and management
  • Rational Unified Process;
  • UML 2.0;
  • UML CASE tools (Rose, MagicDraw, TogetherControlCenter, Power Designer, VisualParadigm, etc.).
diagram

Web and Enterprise applications
  • J2EE and related technologies - JSP, Struts, Hibernate, Swing;
  • .NET technology;
  • middleware and message queues (IBM MQSeries, JMS, etc.);
  • application servers: Weblogic, JBoss, WebSphere.
Mobile telecommunications
  • WAP 2.0 gateway;
  • user interfaces in WAP, XHTML;
  • SIM Toolkit applications, OTA;
  • integration with BSCS.
diagram

Mobile devices and portable computers
  • J2ME technology;
  • mobile devices operating systems: PalmOS, Symbian, PocketPC, Windows Mobile.
Cryptography and network security
  • network and mobile cryptographic standards and protocols (IPSec, SSL, TLS, X.509, SSH, PGP, S/MIME, etc.);
  • symmetric cryptography, asymmetric cryptography, PKI standards and technologies, digital signatures, zero-knowledge protocols, threshold cryptosystems, elliptic curve cryptosystems, unconditional security;
  • custom cryptographic protocol design;
  • token-based solutions, smartcard-based solutions (GemPlus, Axalto/Schlumberger, Setec, JavaCard, etc.).
diagram

Wireless communications
  • Bluetooth;
  • wireless LANs (IEEE 802.11);
  • controlling GSM/GPRS/UMTS modems.
Other
  • Programming languages:
    • C, C++, Objective C, Java, Perl, Python, SQL, Java Script, WML Script, Pascal, Delphi, Modula 2, Modula 3, Common Lisp, Standard ML, Objective Caml, Haskell, Scheme, Prolog, Forth, Occam, Smalltalk.
  • Databases:
    • Oracle, DB2, PostgreSQL, MySQL, ODBC, JDBC.
  • Operating systems:
    • most popular variants of Unix: Solaris, AT&T SVR3 i SVR4, SCO;
    • Linux, BSD;
    • VMS;
    • MS Windows NT/2K/98/M/2000/XP/2003.
  • Internet and distributed technologies:
    • network security, Check Point firewalls, other firewalls, intrusion detection;
    • network management;
    • network and mobile cryptographic standards and protocols (IPSec, SSL, TLS, X.509, SSH, PGP, S/MIME, stc.);
    • distributed technologies: CORBA, COM/DCOM, Sun RPC, etc.;
    • cluster and high-availability solutions;
    • Web technologies: CGI, Fast CGI, PHP, Java Script, Java Applets;
    • XML-based solutions.



Back to top

Copyright TLS-Technologie sp. z o.o., 2001-2009, all rights reserved. webmaster