BlaboSoft

Containerization

I am pretty sure that you were in trouble at least once during a software release because the dev and production environments had differences. Packaging your apps into Docker containers can help you to eliminate these possible troubles. Using a microservices based architecticture not only helps but requires the usage of containers. We recommend to use the industrial standard orchestrators for your containers such as Amazon ECS or any Kubernetes solution.

Cloud computing

Passionately building cloud based applications. It doesn’t matter where to host (Azure, AWS, DigitalOcean or in your private cloud), we can build scalable softwares that can serve hundreds of millions users. We do our best for your users will never experience slow response times.

Processing massive amount of data

Can your business easily produce billion records of data every day? If the answer is yes then I am sure that this big data amount may hide treasures for you. We can help you to visualize, mine and use this data in real-time. ( We can do it in the cloud or in your data center)

Legacy code migration

You may have an awsome (monolith) software, but it is quite old, you can find nobody to modify a feature and deploy it without causing issues in production. It’s a classic story, but the show must go on. We can help you to migrate either small features or the entire applications to a fresh code base using state-of-the-art technology staying within reasonable costs. It requires understanding every aspects of the legacy code and we have great experience in it (for .NET, Python and frontend stacks). We can ensure your business could seamlessly run even for decades.

Incredibly fast text search

Free text searching one of the ways that users like to use finding some information in softwares (e.g. Google). We can build full text search functionalities to your (existing or new) application and it does not matter you want to search in some small tables in a database or in the contents of millions of .pdf documents. You can do it with milliseconds response time even with exactly controlling the which documents can be read by the users (authorization)

Security audits

A very common mistake during the software development when a method/service of an application (for example published on an URL) is accessible without authorization. In this case there is great chance for experienced users to discover this security holes threating your hard-built business. We can help you to identify this kind of deficiencies.


References

Proudly working together with great clients
UK Fuels
iCompario - Largest Fuel Card Comparison Site

Stack and skills

Our beloved tech stack includes, but not limited to:
.NET Core Python React Redux HTML CSS Javascript Typescript MS SQL Postgres ElasticSearch Azure Cosmos DB Apache AWS Azure DigitalOcean Docker Amazon ECS Kubernetes Microservices Performance optimization Scalability Azure DevOps Github Github Pages CI / CD VS Code Process optimization Automation