How we work

The development process in 9 steps

Here’s what it’s like to develop a project with us. The process is agile, flexible and always tailored to your needs.

Discovery stage

We elaborate, validate and verify requirements, adding more details if necessary. Starting a new project, the discovery stage is the first thing we do. The client describes the idea or problem in their words. We do not provide a standardized brief for filling. It is never a problem for us to spend 30-60 minutes listening to the client to immediately offer quick tips, development options, solutions or thoughts on improving the existing idea.

Discussion of the development process, technology, timing and cost

At the initial stage we provide an approximate development plan, timing and cost. In case of composing a detailed technical description for the development, the percentage of error is significantly reduced, which allows us to avoid possible misunderstandings in the future.

Building project road map, planning, technology and solutions stack, team

We usually use Agile/Scrum or Kanban methodologies in the project. In case of significant growth of the project size (the number of people working on the platform and applications), we can transition to SAFe.

Solution implementation

Each of our solutions requires careful treatment of sensitive data:

  • We work only with stable and secured servers like Amazon and Azure with the high standards implemented.
  • We interact with the third-parties' clients only through the HTTPS standard.
  • Systems that we use or where we store sensitive information are deployed separately (different AWS accounts) to reduce a surface of attack and makethe security audit easier.
  • Only the team developer under the NDA has access to the data storage and repository.
  • Storage access credentials are managed by dedicated team members.
  • Logs messages are checked to avoid leak of sensitive data. It’s done during review of pull requests as well as during testing in the development environment.
  • In case some part of data is needed to reproduce a bug - personally identifying information and sensitive information is removed.
  • We use the latest software and keep an eye out for any updates that can alter the effectiveness of the development process and data exposure.
  • We track all the data processing to keep it safe and secure.

Attraction and supervision of the work of additional specialized professionals

Testing of the final product happens in each development cycle (once every 1-3 weeks), consisting of external functional testing, working capacity check of the product under load and profiling the main modules. This process is critical, detail-oriented and instrumental to ensure that the entire testing effort is successful.

Full testing of the product

Testing of the final product happens in each development cycle (once every 1-3 weeks), consisting of external functional testing, working capacity check of the product under load and profiling the main modules. This process is critical, detail-oriented and instrumental to ensure that the entire testing effort is successful.

  • Create and maintain release/project cycle/component information.
  • Create and maintain the test artefacts specific to each release/ cycle for which we have - requirements, test cases, etc.
  • Establish traceability and coverage of the test assets.
  • Test execution support – test suite creation, test execution status capture, etc.
  • Metric reporcollection/t-graph generation for analysis.
  • Bug tracking/defect management.

Final documentation of the product

During each of the product development cycles, the client has full access to the source code, as well as instructions for installing the product for other developers. Therefore, the client can provide the code for verification by third parties at any time. We maintain complete documentation of the development plan, functions, and operating instructions, if necessary.

Production readiness

When the product is fully tested and the documentation is finally prepared, we will launch the product. This will be followed by our support and maintenance, when needed.

Further product support and maintenance

We provide the 2nd and 3rd levels of product support, the 1st level of support can be provided on demand. We never take shortcuts especially when it comes to security. Our management and staff are constantly examining GDPR laws to ensure the best practices possible. We are working in full compliance with European Union laws in every aspect, including personal data security.

FAQ

We use cookies on our website to enhance your experience. If you want to see the complete overview of the cookies used, please see our privacy policy. Read more