"Great company to work with on projects. The project team worked extremely hard on my project, and added features beyond the scope of work. Exceeded expectations. Will definitely hire again on future projects. Very professional and kind on all levels.
They were prompt to answer questions, and offered information when I lacked knowledge on the project. They are a well educated team that create beautiful projects.
I would highly recommend Solaris!
- Julia Eve G.
Solaris Technologies always welcomes entrepreneurs & innovators to partner up with our highly experienced team to implement their ideas into reality. Whether you need a website or apps developed or even Digital Marketing campaigns executed, we are at your disposal. Our best practices include considering all options available towards getting your idea live. We leave no stone unturned to deliver nothing less than the best!
- Back-End Development: PHP /Ruby /Java /Python /Rails /.NET /Node.js
- Full Stack PHP Backend Framework: Laravel /Yii /CodeIgniter /CakePHP /Zend
- SAAS: CRM / Invoice Application / Marketing Annotation / Analytics
- Content Management System: Wordpress / Joomla / Drupal/
- Ecommerce Content Management System: Magento / Opencart /Prestashop /zencart / Shopify
- Mobile App Development: iOS /Windows /Android
- Game Development: Unity 2D /Unity 3D /Unreal Engine
Thank you for considering us :)
Has been great experience, again, working with Solaris Technologies. Smooth communication, swift support and they went the extra mile to make thing work. Reliable partner to work with, even from across the ocean ,-) Till next time.
Organizing the IT Security Project
Developing the IT Security Project Team
Planning the IT Security Project
Managing the IT PM
Building Quality into IT Security Projects
Closing Out the IT PM
Defining a Corporate IT Project Plan
General IT Security Plan
IT Operational Security Plan
Business Value-Oriented Project Management
Dec 2005 - Present
Being a Business Value-Oriented Project Management (BVOPM), I manage a set of activities and a style of project management with a focus on adding business value to the project management processes and practices, general productivity, outcomes, and waste reduction.
Information Security Manager - HIPAA
Oct 2005 - Present
HIPAA compliance is adherence to the physical, administrative, and technical safeguards outlined in HIPAA, which covered entities and business associates must uphold to protect the integrity of Protected Health Information (PHI)
Masters of Business - MBA, Business Management
London Business School, United Kingdom 2010 - 2012
Master of Arts - MA, Management Information Systems, General
Middlesex University, United Kingdom 2008 - 2009
Bachelors of Science - BS, Computer Sciences
Texas A&M University, United States 2004 - 2008
Certificate number 2016-006i
Web Content Accessibility Guidelines (WCAG)
WCAG 2.0 builds on WCAG 1.0 [WCAG10] and is designed to apply broadly to different Web technologies now and in the future, and to be testable with a combination of automated testing and human evaluation.
Microsoft Certified Solutions Expert (MCSE)
Cloud Platform and Infrastructure (Microsoft)
How Social Media can contribute to data theft
How safe is your data once it’s online? Be cautious of how much you share.
Why should you choose Python and Django for ecommerce
Python and Django is the best framework for your E-Commerce site and this is why.
How much of your company’s databerg is submerged?
Whether businesses are storing their data on-premises or in cloud, they need this visibility so they can operate and innovate with confidence.
Assessing the performance of modern business PCs
Although, there are many aspects to consider when ranking a PC, performance has to be on top of the list
How are Artificial Intelligence tools are transforming health care
AI is poised to become a transformational force in health care.
Which smart phone improvements are worth your investment?
With so many updates hitting the market, it’s important to know which updates are worth your investment.
How to improve the Cyber security of your Business
A lack of focus on cyber security can be greatly damaging to a business.
Useful Algorithms for Business ManagementUseful Algorithms for Business Management
For making numerous business estimations, businesses today are turning more to algorithms, which accomplish step-by-step analytical procedures at amazing speed and level.
PHP Memory: How do Objects and References work?
The topic on how objects and variable references are controlled in memory is met with different opinions when it comes to PHP. A popular question is whether by default objects are passed by reference or by copy in PHP.