Nucleus IT Limited

Software development, quality assurance, testing, delivery, training, architecture, documentation

Development of bespoke cloud hosted business applications. Full stack solution delivery using Microsoft .Net, JavaScript, HTML and JSON. Specialising in Agile and Kanban methodologies. Expertise in the use of Document Databases, RavenDB, MongoDB plus MS SQL Server. Provision of system design, architecture, development, testing, deployment, hosting, training, support and maintenance.

Features

  • System design, delivery, maintenance and DevOps. SOLID development principles
  • .Net Core 2.0, 3.0 web frameworks. MS Office, Word, Visio
  • HTML 5.2, CSS, XML, HAL, Hydra, RDF, OWL, VBA
  • Hypermedia driven RESTful APIs using JSON-LD
  • Technical analysis, Domain Driven Design principles
  • Range of databases including MS SQL Server, MySQL, RavenDB, MongoDB
  • Full integration test suite. XUnit, Nunit, MSpec
  • Continuous integration, build, deployment and testing
  • Cloud hosting using AWS, Azure, containerisation using Docker, Kubernetes
  • Functional, non-functional testing and support

Benefits

  • Full lifecycle delivery reduce costs, shrink lines of communication,
  • Leveraging latest frameworks reduces legacy costs
  • Using web open standards increase lifespan of products
  • Training provision, technical authoring/communication at all levels, user guides
  • Standard ontologies avoid creating data silos
  • Use of document databases reduce development and hosting costs
  • Extensive test coverage reduces the overall cost of ownership
  • Continuous deployment aids user engagement, and rapid prototyping
  • AWS, Azure provide s secure, highly available service
  • Containerisation allows services to scale according to demand, reducing costs

Pricing

£250 to £600 per person per day

  • Education pricing available

Service documents

G-Cloud 11

682637815228248

Nucleus IT Limited

Martin Bailey

0161 818 8085

info@nucleustechnologies.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints Solutions based around windows platform, AWS, Azure, GCP
System requirements
  • No requirement for licenses
  • No requirement for anti-virus
  • No requirement for specific cloud provider
  • No requirement for specific database
  • No requirement for specific version of .Net
  • No requirement for specific version of windows
  • No requirement for specific browser
  • No requirement for specific methodologies
  • No requirement for specific web standards
  • No requirement for specific test frameworks

User support

User support
Email or online ticketing support No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels We can offer hosting and application defect management. We work with out clients to identify the level and support they will require and the corresponding SLAs to meet those requirements can be agreed.
This can include 24/7 developers or testing support, plus incremental software updates as required.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide onsite training, plus user documentation
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Full data extracts are provided at all stages of development,
End-of-contract process No additional cost to ending contract

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices No
API No
Customisation available Yes
Description of customisation Customisations as per requirements

Scaling

Scaling
Independence of resources We can offer hosting and application scaling management. We work with out clients to identify the level of scale they require

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach As database backups, or in a customer specific format
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability We can offer hosting and application availability management. We work with out clients to identify the level and support they will require and the corresponding SLAs to meet those requirements can be agreed.
Approach to resilience We can offer hosting and application resilience management. We work with out clients to identify the level and support they will require and the corresponding SLAs to meet those requirements can be agreed.
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Restricted by IP address
Access restriction testing frequency At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach In-house
Information security policies and processes In-house

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Customers change management system is used
Vulnerability management type Supplier-defined controls
Vulnerability management approach We can offer hosting and application vulnerability management. We work with out clients to identify the level and support they will require and the corresponding SLAs to meet those requirements can be agreed.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We can offer hosting and application protective monitoring management. We work with out clients to identify the level and support they will require and the corresponding SLAs to meet those requirements can be agreed.
Incident management type Supplier-defined controls
Incident management approach We can offer hosting and application incident management. We work with out clients to identify the level and support they will require and the corresponding SLAs to meet those requirements can be agreed.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £250 to £600 per person per day
Discount for educational organisations Yes
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑