THiNC. launches Validu Mobile Compliance Platform

Validu Biometric Compliance App

THiNC.technology is happy to announce the launch of Validu, a compliance application that uses biometric data to authenticate attendance. The company, who calls the system we developed “Your first line of security for expense reporting compliance,” came to us to develop not only the mobile application (iOS and Android), but the entire back-end as well.

 

We developed the mobile application to authenticate someone based on the phone’s innate abilities such as GPS, time & date stamp, etc. and adds multiple levels of bio-metric “keys” that help to ensure that when someone says they’re somewhere, they really are. For pharmaceutical companies, medical institutions, security systems, and logistical tracking industries are impacted by this innovative software.

 

THiNC.technology’s developers created a unique and proprietary system for Validu, that involves mobile applications, web portals, and custom software integration.

 

Matt Kavanaugh, our partner and CEO came to us to build the system. You can take a look at the website at www.validu.net and check out the app in the store.

THiNC. creates E-Commerce site for Manufacturer Huntkey

Chinese manufacturer Huntkey was looking for a new, responsive website for their US operations. We were hired to develop this website for a multi-national company with over 15,000 employees who is primarily in the business of Power Strips, Charging Stations and battery backups.

We built this website to include integration to aid them in selling to the US market and Amazon integration. Their exciting new platform is perfect for reaching the US market, which is key to their growth strategies.

THiNC.technology built the site for SOMOS Marketing.

Malware Defense Part 2: 5 Ways to Wipe out Malware

Five Ways to Wipe out Malware is a part of the THiNC.technology blog series. THiNC.technology is located in East Lansing, MI and develops custom software including mobile apps and websites. Today’s topic specifically covers Malicious Software and how to defeat it.

 

In our last blog, we discussed the different types of hacks that can make life a living hell for any webmaster, developer, or CTO. In this guide, we’ll work through some of the tips for finding malicious code, and some possible ways for resolving it. It’s an arms race, and it’s an ongoing process. This list is not exhaustive, but should give you a pretty good guide as to what is hacking the web world today.