- Mobile applications on Android / iOS platform / Windows Mobile
- App & Software UPnP / vnc base
- Platform DVBS ( Fusion , MHDK ) – DVBT Platform ( MHP )
- Roku platform – Smart TV platform
- Multithreaded (management data in real time ) – application development based on HTML 5 , Java , C # , C ++ , C , Python , Perl
- Based database
- Content Management System – Software architecture and implementation .
- Web Application / Server
- Daemon Software for automatic resource monitoring
Netcom Group, the subsidiary Core Informatica, is a certified provisioner of IT-related products and supplies, from all the necessary equipment to build a Data Center, at various levels of complexity.
The company can provide rack servers or blade servers, from the HPE catalogue, depending on the need for the reduction of space or power consumption, to be destined to fault-tolerant server architectures, ensuring Distaster Recovery and Business Continuity.
Netcom Group, the subsidiary Core Informatica, provides technical assistance and support to its customers and end users to solve issues for IT-related products, such as personal computers, servers, network devices, etc. Some professional technicians are available come on site and solve such issues on their own.
Netcom designs, develops, and maintains IT infrastructures, according to IT compliancy standards, and focuses on security by helping its customers through the definition of Business Continuity plans and Disaster Recovery procedures.
Netcom Group, the subsidiary Core Informatica, designs, develops, and maintains IT infrastructures, according to IT compliancy standards, and focuses on security by helping its customers through the definition of Business Continuity plans and Disaster Recovery procedures.
Netcom designs and develops high-performance telecommunications networks, and ensures security, reliability and economic efficiency; ICT networks that are destined to small or big companies.
Netcom performs risk analyisis, through the identification and definition of threads/hazards and vulnerabilities for each asset, in order to adopt mechanisms of prevention and protection from cyber attacks that might affect confidentiality, integrity and availability (CIA) of information.