A captive center is a dedicated professional team, solely engaged in developing, testing and deploying software solutions and applications for a single client. This stability leads to continuously improving process and productivity as the team accumulates domain knowledge and experience. In addition, we have an US-based office to maximize communication effectiveness.
Minimal upfront investment
Retain team knowledge
Stable and scalable resources
Open to clients to acquire the whole team (Build-Operate-Transfer)
We will work with our clients to design project plans base on requirement documents.
It is flexible to modify the requirement if needed and the project plan will be adjusted accordingly with the modification.
The project can be either time based or resource based.
The customer is billed based on the estimated project plan.
US-based office to maximize communication effectiveness.
We are open to other customized delivery models. We love to hear your ideas and can work with you to design customized model to accommodate your special requests. For any questions and suggestions, please contact us at firstname.lastname@example.org.
Project management (PM) is the core of our outsourcing services. We have established a systematic approach to PM to ensure reliability, transparency and superior customer experience.
For small projects, we base our process on Agile Methodology.
Build tangible/demo-able prototype early.
Be test-driven during the implementation.
We are flexible enough to handle small projects either with our software development methodology or customer’s proprietary process.
Our standard approach is the iterative waterfall with Agile in the each iteration.
Break down projects into phases and set milestones.
Use Agile Methodology for each phase.
Balance requirement changes and schedule.
We will provide written requirement, design and test documents.
We welcome changes.
Designate an engagement manager for customer communication.
Assign a PM to manage daily operation.
Provide detailed weekly status repot.
An independent technical expert is assigned to attend major design review meetings, listen to your feedback and escalate any issues to higher level.
Our US-based office is here to maximize communication effectiveness.
Our methodology consists of a four-phase process to bridge the gap between concept/requirement and practical outcome. We build your confidence in outsourcing with us by focusing on delivery quality and user experience.
We implement strict protection policies company-wide, and will adopt special security policies upon request.
We also work with customers to design special ways to prevent IP risk at the very beginning.
Confidentiality agreements are signed with employees.
Special policies can be adopted upon request such as removing floppy drives and CD copiers from desktop computers; seal USB ports and computer boxes in designated work areas; special internet access controls.
Prohibit mobile storage media from being taken in or out of designated work areas.
We strictly enforce IP policies and have zero tolerance for violation.
Strict Access Control.
Upon request, we will permanently delete or remove all documents (RFP, design documents, requirement documents, interface control docs, test-plans etc), emails, software/hardware tools, source code, executable code, and even discussion memorandum upon project delivery.