Real work. Real results.
A few examples of the problems we’ve solved. Companies aren’t named but the work is real.
Request system
Problem
A regional property developer was managing all requests across multiple live sites by email. Requests were getting missed, duplicated and disputed with suppliers. There was no audit trail and site managers were spending hours chasing confirmations.
What we built
A custom Microsoft Power App with AI-assisted search and automatic approval routing. Site managers submit structured digital requests from any device. Every request is logged with a full history: who ordered it, when, what was approved and what was delivered.
Result
The email chain is gone. Requests are tracked from submission to delivery. Supplier disputes have stopped because there is now a clear, timestamped record of everything ordered.
Phishing attack response
Problem
A professional services firm had been targeted by a phishing attack. Credentials had been compromised and the business had no clear picture of what had been accessed.
What we did
Identified the compromised accounts, secured them and audited access logs to establish what had been reached. Put monitoring in place. Ran a practical session with the team on spotting phishing attempts, because the same attack would have worked again a month later without it.
Result
No further incidents. The firm now has visibility of their security posture and their team knows what to look for.
Induction loop installation
Problem
A major infrastructure project required compliant hearing loop coverage across several public-facing areas with structural constraints that ruled out standard installation approaches.
What we did
Surveyed the spaces, designed a system that worked within the constraints, installed and tested to BS EN 60118-4. Full compliance documentation provided on completion.
Result
Compliant installation, signed off first time.
Got a similar problem?
Tell us about it. We’ll let you know if we can help.
Tell us about your project →