Our process - How we work
We believe in efficiency and maximizing our resources to provide the best value to our clients. The primary way we do that is by re-using the same five projects we’ve been developing for the past decade.
Discover
We work closely with our clients to understand their needs and goals, embedding ourselves in their every day operations to understand what makes their business tick.
Our team of private investigators shadow the company director’s for several weeks while our account managers focus on going through their trash. Our senior security experts then perform social engineering hacks to gain access to their business accounts — handing that information over to our forensic accounting team.
Once the full audit is complete, we report back with a comprehensive plan and, more importantly, a budget.
Included in this phase
- In-depth questionnaires
- Feasibility studies
- Blood samples
- Employee surveys
- Proofs-of-concept
- Forensic audit
Build
Based off of the discovery phase, we develop a comprehensive roadmap for each product and start working towards delivery. The roadmap is an intricately tangled mess of technical nonsense designed to drag the project out as long as possible.
Each client is assigned a key account manager to keep lines of communication open and obscure the actual progress of the project. They act as a buffer between the client’s incessant nagging and the development team who are hard at work scouring open source projects for code to re-purpose.
Our account managers are trained to only reply to client emails after 9pm, several days after the initial email. This reinforces the general aura that we are very busy and dissuades clients from asking for changes.
Deliver
About halfway through the Build phase, we push each project out by 6 weeks due to a change in requirements. This allows us to increase the budget a final time before launch.
Despite largely using pre-built components, most of the progress on each project takes place in the final 24 hours. The development time allocated to each client is actually spent making augmented reality demos that go viral on Twitter.
We ensure that the main pages of the site are fully functional at launch — the auxiliary pages will, of course, be lorem ipusm shells which get updated as part of our exorbitant maintenance retainer.
Included in this phase
- Testing Our projects always have 100% test coverage, which would be impressive if our tests weren’t as porous as a sieve.
- Infrastructure To ensure reliability we only use the best Digital Ocean droplets that $4 a month can buy.
- Support Because we hold the API keys for every critical service your business uses, you can expect a lifetime of support, and invoices, from us.
Our values -
Balancing reliability and innovation
We strive to stay at the forefront of emerging trends and technologies, while completely ignoring them and forking that old Rails project we feel comfortable using. We stand by our core values to justify that decision.
- Meticulous. The first part of any partnership is getting our designer to put your logo in our template. The second step is getting them to do the colors.
- Efficient. We pride ourselves on never missing a deadline which is easy because most of the work was done years ago.
- Adaptable. Every business has unique needs and our greatest challenge is shoe-horning those needs into something we already built.
- Honest. We are transparent about all of our processes, banking on the simple fact our clients never actually read anything.
- Loyal. We foster long-term relationships with our clients that go beyond just delivering a product, allowing us to invoice them for decades.
- Innovative. The technological landscape is always evolving and so are we. We are constantly on the lookout for new open source projects to clone.