top of page

What we can do for you.

Gruppe 440.png
hexagonwithshadow.png
hexagonwithshadow.png

Cloud Development

The future of software engineering.

hexagonwithshadow.png
Gruppe 448.png

User-Centric Environment

User experience (UX) in user-centric software is determined by the degree of acceptance among users. A high level of acceptance indicates a positive UX, while a lack of usage or improper usage suggests a negative UX.

Why?

A lack of good user experience (UX) in educational software can negatively impact the learning process, such as requiring teachers to spend excessive time troubleshooting the software rather than teaching. To ensure the software benefits the learning process, it is important to design it with seamless integration and minimal overhead.

How?

Software developers should maintain close communication with users during development to understand their requirements. This eliminates the need for extensive feedback cycles, by incorporating user needs directly into the development process.

What?

We adhere to this principle by conducting on-site visits to schools and institutions where students utilize our software, observing them while they learn. Additionally, we provide specialized training for our employees to develop their ability to empathize with the user's perspective, and to identify any issues while using the software. Additionally we also monitor standard KPIs including Core Web Vitals like LCP, FID and CLS.

hexagonwithshadow.png
hexagonwithshadow.png
Gruppe 449.png

Robust outcomes

Users today expect to have access to software from any location, regardless of internet connectivity or device battery levels. They desire ease of use and do not want to be concerned with potential technical failures.

Why?

The infrastructure in German schools is not yet optimal, and this must be taken into consideration. The reality is that internet connectivity is often poor, and students may be using different devices such as tablets or laptops at home, often with outdated web browsers, which means that standard consumer software is often unsuitable for a classroom.

How?

Addressing these issues can be achieved through various solution-based approaches. It is crucial to take them into consideration during the software development process. While this may be an inconvenience for developers, it is a necessary step to ensure a successful outcome and to make learners satisfied. When this practice is integrated into the company culture and strictly enforced within the team, the results are outstanding.

What?

In order to ensure the functionality of our software, we employ end-to-end testing with manually configured low and breaking bandwidth. Additionally, during the development process, we conduct testing across multiple device types, with every developer equipped with a laptop, tablet, and mobile phone. To enhance performance, we employ pre-rendering techniques such as static generation and server-side rendering.

security.png

Compliance & Security

Compliance means strict adherence to established rules and regulations, ensuring that all processes and practices are in line with these standards. IT security, on the other hand, encompasses a comprehensive approach to safeguarding data, including measures to prevent unauthorized access, and to mitigate any potential risks related to data security, thus ensuring the protection of confidential information.

Why?

In the field of education, data privacy is of great importance, owing to the often sensitive nature of student and teacher data. This significance is further accentuated by the fact that there is a trade-off between ease of use and IT security. Therefore, it is imperative that software used in educational settings reach the appropriate balance between user-friendliness and data security.

How?

In the process of software development, compliance is always a key consideration when designing the architecture. This often means reducing the data storage to the necessary minimum. Established processes ensure the confidentiality, integrity, and availability of our software, and our policies are aligned with these objectives.

What?

We employ state-of-the-art security measures to safeguard our clients' information, including encryption and multi-factor authentication. We implement strict access controls through role-based access and utilize data masking, Row-Level Security, Column-Level Security, and Transparent Data Encryption to ensure the protection of sensitive information.

integration-2.png

Seamless integration

In the realm of software development, it is a common occurrence for new software to have dependencies and the requirement for integration with existing systems. If this integration process is not executed effectively, it can result in a poor user experience, characterized by the need for repetitive actions or limitations in the usability of the software.

Why?

In educational institutions, it is not uncommon for external identity providers to be utilized for a variety of purposes. However, when creating a separate user management system, it not only results in additional effort for the development team, but also creates additional burden on the users as they are required to manage and maintain their accounts in multiple locations.

How?

It is imperative to consider the potential integration challenges at the beginning of the development process. This includes identifying which components must be developed in-house and which are already available or will be utilized by the customer. This research should be conducted prior to initiating any coding efforts, as retroactive integration is inherently more complex and time-consuming than an initial implementation.

What?

We integrate with external user management systems, ERP systems, and other types of software. Additionally, we utilize external libraries where others have already developed solutions. This allows us to increase our efficiency, ensuring that we always have a state-of-the-art solution in every area. We carefully consider our areas of expertise, and focus on perfecting the components that fall within that domain.

Our system works - customers are convinced

docuware.jpg

Project description

In collaboration with the DocuWare GmbH, Titanom Technologies GmbH worked on an AI-based solution for sorting documents. Here, an artificial intelligence was developed, which converted documents into high-dimensional vectors on the basis of abstract layout as well as text. These could then be sorted and indexed. Through the resulting data structures, it is possible to highly efficiently select semantically similar documents for new and unknown documents on large data sets and use them to extract the index data of a new document.

DoKiva - Intelligent indexing of documents

"In collaboration with the DocuWare GmbH, Titanom Technologies GmbH worked on an AI-based solution for sorting documents. Here, an artificial intelligence was developed, which converted documents into high-dimensional vectors on the basis of abstract layout as well as text. These could then be sorted and indexed. Through the resulting data structures, it is possible to highly efficiently select semantically similar documents for new and unknown documents on large data sets and use them to extract the index data of a new document."

~Dr. Michael Berger, CEO of DocuWare GmbH

hexagonwithshadow.png
hexagonwithshadow.png
Gruppe 128.png
hexagonwithshadow.png

Get in touch

Bildschirmfoto 2022-11-20 um 18.40.04.png

Andrija Vuksanovic

CEO (Project Management, Finance)

Mikhail Berkov

CTO (Software Architecture)

bottom of page