Competence
Database Design
A computer system is not better than the ground on which it stand. With a good design of data storage, the project has great potential to be successful in both the long and short term. In some applications it is necessary to track changes in the data and possibly restoring data. For this we have, for instance, developed features that automatically logs changes. To become independent of changes in the applications we build the log functions in the database itself. We use technology such as CA-Open Ingres and Oracle. We have been using the following databases over the years: Ingres Enhanced Security, Ingres, Oracle 7, Oracle 8, Mimer, RDB, Sybase, Microsoft Access, Paradox, Image.
Software Development
Since Ergodata has been around for many years, we have an extensive knowledge in several different languages, technologies and tools – both old and new. Experience in everything from low-level to object-oriented languages. Our developers are accustomed to both programming Unix and Windows applications.
Security
Security is becoming synonymous with intrusion security. On Ergodata, we have a much broader approach. For us, safety is just as much operational safety, reliability and user safety. Intrusion Security is only a small, albeit important, part. As Ergodata has done assignments for FMV’s behalf, we have extensive skill in areas such as secure operating systems (Trusted Solaris) and secure databases (Ingres Enhanced Security).
Consultancy
Our aim is to offer our customers the broadest knowledge possible. We should not only be experts in the tools and the technology to be used, we set the whole Ergodatas collective experience and knowledge available to our customers. Since the early 1990s we have long relationships with, among others, AstraZeneca R & D Mölndal (former Astra Hassle) and numerous Ericsson companies.
Several Reasons to Choose Ergodata
EXTENSIVE BRANCH EXPERIENCE
Ergodata has over forty years experience in the design, programming, testing, documentation, installation and training.
SECURITY
We work with all types of security – not only intrusion security. For us, operational and user safety is just as important.
BROAD KNOWLEDGE
Solid knowledge in several different languages, technologies and tools, both old and new. Experience in everything from low-level to object-oriented languages. The developers are accustomed to both programming Unix and Windows applications.
ON YOUR TERMS
The sheet bend, which is used to join together ropes of different dimensions, stands as a symbol of our methodology. Often, our customers doesn’t need something brand new, but the best value is achieved by complementing what already exists. We work with both existing and new systems.