Have any questions?  +380 44 390 7457 (UA)

Case Studies

Case Studies

We do some researches from time to time. We struck with unusual problems from time to time.
This is life, we live in the real world. Dealing with complex problems make us stronger.

Here we want to share our knowledge where, we believe, this could help to you to solve your problem.
And you would better understand who we are and how we work.

CASE STUDY: HOW TO DEVELOP AND CERTIFY A MEDICAL DEVICE

We at Hitech Service have successful software development experience in various projects, and this year we are proud to add developing software as a medical device to our portfolio.

ICO Live Support Services

We have recently finished the contract on 24/7 ICO event support that lasted for 6 weeks, Here you will find the detailed information about the services provided during the previous ICO.

Read More >

Making a company GDPR compliant: how does it look like

Having a considerable pool of companies, we are helping with GDPR compliance, we have gathered a decisive amount of experience that we want to share with you in this case study.

Read More >

WordPress Site Security

This case study describes how to set up high security for the most popular content management system – WordPress. From basic recommendation to must have settings.

Read More >

Complying Security Standards and Processes

If a company decides to go international, its working process and data security should comply with international standards. Here is how we helped one of our clients to meet all the necessary requirements.

Read More >

Load Test Systems Overview

In this study we will compare two different approaches to load testing, judging from our own experience – traditional and web-based solutions. Here is what we think about this.

Read More >

Reporting Systems Review & Evaluation

This is a working copy of a review of reporting systems existed in 2012 targeted to assist to management to choose a proper software. The case study is provided “as is” and should not be treated as a comprehensive reference.

Read More >

Preventing Data Breach Through Leaked Accounts

Leaked private account of your employees can result in a data breach and your corporate security,/ breach. We can protect you from this side.

Read More >

DDoS Attack Protection

This is how well–prepared professional network administrator could beat DDoS attacker.

Read More >

Test Automation Frameworks Review

An excerpts of a research that was created for one of our clients when they needed to choose a tool for automating their tests.

Read More >

Migrating Data Center to Rackspace

One of our clients, a large multinational company, decided to move production server infrastructure from a datacenter, which had been maintained by another large multinational company, to a cloud hosting, Rackspace.

Read More >