Technology Consulting, Software Teams, Contract to Hire Staffing
We work with early stage startups, faster-growers and traditional large enterprises.
We consult not just to give advice but to take responsibility for results.
We accelerate staffing for software development, security and operations organizations on contract-to-hire terms; the fastest and least risky hiring method for a highly competitive labor marketing.
Above all: We aim to be the technology partner we would hire for ourselves.
What can we do for you?
Our latest Insights
This article: Explains how a small development organization can benefit from having a different team member perform as a Rotating Quality Assurance (QA) Lead for each sprint. The roles and responsibilities of a Rotating QA Lead. 434 words, estimated reading time 2...read more
A recent article in the NY Times takes Google to task for employing a “shadow” workforce of temps. It’s not a nuanced piece of business journalism and I take exception to many of its implied conclusions. Here are some of my criticisms and I encourage others in our...read more
This article is the second part of a two-part article. For lessons 1-4, see Part 1. A quick recap of Part 1’s key points follows. Fast growth is a great problem to have. You may be experiencing viral success, attracting new investment, or successfully pivoting to a...read more
Consistency and Timeliness of Data in Distributed Computing Introduction This story uses an example of dynamic pricing in the low-cost airlines ticketing industry to show how the consistency and timeliness of data is an essential component of a concurrent system. I’ll...read more
Fast growth is a great problem to have. You may be experiencing viral success, attracting new investment, or successfully pivoting to a broader business model. Or all of the above: Good for you! You will begin, no doubt, by recruiting the best developers you worked...read more
With the recent allegations of Russian election hacking, the Russian and Chinese government targeting private companies, and the use of such hacks for political, military and economic gain — internal and external, data security has become a major issue for all...read more