Work with customized hardware!
Whether you need a fast mobile companion or a powerful workstation for your tasks: You will receive optimal advice and your personal customized solution.
We are aimed at professional users who want to get more out of their everyday life with well-equipped hardware.
Our clients include:
Academics who want ideal knowledge management or a clear research environment,
Craft businesses with a need for robust devices for ongoing production and
Creatives from graphics, video and music production who rightly refuse to accept the limits of conventional systems.
We put your visions into practice!
You say what you would like to do and immediately receive suggestions on how your wishes and visions can be turned into reality. This ranges from specially configured high-end mobile phones to elegant laptops and fast workstations.
Not enough?
Let us configure your own high-availability server for you.
Image films – message via video
Nowadays everything is transported by video, because: What is more meaningful than a film? Whether on Youtube or other streaming platforms, emotions want to be conveyed, controversies created or even sparked, and of course: everyone wants to present themselves (or their product) in the best possible light.
Why do we make image films?
During our visits to companies that are actually concerned with optimizing the IT infrastructure, we are often asked: „Do you also create websites?”
The order for a website often leads to the question: „Do you also write the texts for it?”
Until the crucial question finally arises:
„Do you also make promotional videos?”
Now!
As a hosting provider for websites that takes care of everything from e‑mail to web servers and PHP support, and as a team that takes care of simple game development in the media, we have a network of competent cooperation partners. Theater and media scholars, photographers and filmmakers are also at home in this FTT Forensic Discovery network. Everything is possible, from product videos and commercials to editorial contributions. We work closely with partners from the advertising industry, such as:
Whether conference or congress: Keynote speakers give important clues and make the audience think. The FTT Forensic Discovery network has experts not only from IT and forensics, but also from rhetoric and dramaturgy, whose lectures and workshops are in great demand at congresses such as the Moldova Developer Conference 2019 .
The crux of the lectures – would you rather listen than speak?
Lectures serve to provide inspiration and impetus, but should be informative and, above all, not make the audience fall asleep.
Some of us hate the idea of speaking in front of a crowd.
Can’t someone else do that?
Or at least give a few tips on how to deal with such a situation so that this shark tank does not cause any consequential damage?
The short and relieving answer: yes and yes again!
Our speakers are passionate about performing in front of large crowds in order to inspire their audience with innovative and entertaining performances. We look forward to discussion groups tailored to the target group afterwards, both among laypeople and interested specialist audiences. In this combination, we offer a lasting memory that remains positively anchored in the memory of the listener for years.
We’ll help you prepare!
Our speakers deal in detail with the matter and / or give an introductory or motivational speech on current topics. Whether it is about historical, international law or international finances in English or German, about IT or about making the world a better place – our speakers succeed in captivating the audience with well-founded and entertaining lectures.
Train your lectures in workshops!
We also pass on this ability in workshops that make even more experienced speakers sweat: voice training and acting training, setting up a lecture through correct dramaturgy or the question of the target audience are part of everyday life for our speakers.
The employer is obliged to take the necessary occupational health and safety measures, taking into account the circumstances that affect the health and safety of employees at work.
There are many workplaces, but not all of them are perceived as pleasant by employees. It has been proven that an ergonomically designed workplace increases productivity, improves the working atmosphere and promotes personal well-being.
The computer factor
Computers in particular are key to a healthy workplace in the information age.
You will receive help with the creation of an overall concept for your office, which will give you short distances and plenty of room to breathe.
The consequences of a lack of ergonomics
Prolonged desk work puts a permanent strain on many of our muscles, while other important muscle groups are permanently neglected.
Chronic tension, neck and back pain, sleep disorders, but also psychological complaints can make us ill in the long term.
Nearly a quarter of all work absences are now due to musculoskeletal disorders, closely followed by respiratory and mental illnesses.
In 2019, the newspaper Die Zeit expressed this problem under the following working title:
Those who sit longer are dead sooner.
Zeit-Online from March 26, 2019
Ergonomics in the office increases productivity!
In contrast, an ergonomic work environment not only supports the physical and mental health of employees, it demonstrably and significantly increases productivity.
Simply by maintaining a healthy sitting posture, working regularly while standing, and moving from one position to the next, employees’ well-being and performance can be significantly enhanced.
A healthy and productive working atmosphere is inextricably linked to our holistic orientation.
We are happy to help you align your workplace with your personal needs and design flexible working environments for you and your employees.
Our cooperation partners
We work closely with the Dataflex company, which we believe has the ideal solution for every area.
The black line focuses on data-intensive work and ergonomic multi-monitor environments.
The white line is designed with hinged joints for monitors with touchscreens and is particularly suited for the medical sector.
The Silver Line offers flexible arrangements for single and multi-office environments.
There should be no limits to your creativity, much less your health. The difference has an immediate impact on your productivity and well-being. Your body and soul will thank you for the courageous decision in this direction.
An appealing and simple website is often enough to put yourself in the limelight. With the right links in social networks, on Google Maps and proper search engine optimization (SEO for short) you will also be found.
The most common problems and desires are:
All of this is entirely possible with and with us.
From a single text to a marketing campaign
If required, you will receive a page that is optimized for search engines and tailored to your needs.
If you wish, we can design your website up to and including a marketing campaign.
If you don’t have time to write, we will formulate your texts in the style you want. Our texts should make reading enjoyable and arouse curiosity. They are neatly edited, written by German scholars and specialist content is properly researched.
Our references
Here you can see how completely pages created and written by us – from zero to hero – can look and be formulated:
www.ferienhaus-am-kuechensee.de
www.schmausikatessen.de
www.leue-fotodesign.de
www.forensicthinktank.org
Many entrepreneurs underestimate the importance of process design on the success and workflow of their company. In the illustration of work processes, they see above all a cost factor without direct monetary success, but overlook the advantages that guarantee them more time, money, more relaxed work and good employees in the medium to long term.
We don’t need a process design!
Entrepreneurs often argue:
However, work processes are often not as clearly regulated as managing directors and department heads would like.
Unclear and ambiguous processes create problems
How often are important people overlooked in your company and information arriving too late or not at all?
Constantly asking questions or having to explain things several times is exhausting.
Familiarization takes time, verbal and personalized agreements lead to redundant inquiries with a “silent post” effect.
What begins as a small wave in production then often arrives as a tsunami on the executive floor.
Can you still count on your hand how many inquiries, delays, unfinished tasks or decisions that have not been made have kept you from your work in the last week?
Ensure a smooth workflow!
Relieve yourself and your employees by visualizing operational processes, preparing them digitally and continuously optimizing them.
This not only reduces 90% of all sources of error, but also enables a working atmosphere in which you and your employees can look ahead in a concentrated, focused and motivated manner.
Lean Business Optimization according to Business Process Model and Notation (BPMN) 2.0 brings you:
We know that most capable executives can easily learn and apply BPMN 2.0 themselves.
But would you take the time?
Everyday challenges
For most people, finding a job is an excruciating challenge. Often times, workers have unfulfilled jobs and families to look after. Many have quit internally, are completely bored or already burned out.
For employers, on the other hand, the shortage of skilled workers is an overwhelming issue. In addition, the existing job platforms hardly reflect the complexity of the activities required. Rural hidden champions are struggling with increasing urbanization.
Investors, start-ups and company founders in general face all kinds of problems. How do you find the right partners to turn your ideas into reality? Should investors look at pitch decks forever? Should employers conduct one interview after another? Should job seekers still search?
Wouldn’t it be better if we found a machine for every human being that has a high probability of bringing the ideal situation together, without stress, excessive demands and decision-making fatigue?
The human being at the center of a networking algorithm
Artificial intelligence, matching algorithms and big data offer technical solutions to these problems. But the decisive factor is people. Our startup team wants to represent the whole person. The whole person should be seen with their needs, desires and – often unrecognized – potentials. Only in this respect, resource-oriented and on a human level, can a respectful social network develop. The connecting element is the algorithm, because the user rooms remain private, confidential and encrypted. In their room, users can let off steam in a playful way to discover their area of expertise.
International network
We have access to over 1200+ programmers and experts. And with every congress we win more of it.
Because the programmers love our global approach, which brings everything into harmony – economy, ecology and social issues.
A project for EVERYONE!
In this respect, our startup with MenschLink is not aimed at the top ten thousand or creates another first-world niche product for an oversaturated western society, but also makes a contribution to the so-called common people, especially to all those for whom quality of life is still a foreign word .
MenschLink serves the wealthy by helping the poor – for the benefit of both worlds. 800 million people suffer from severe hunger. 3.5 billion people live on less than $ 5.50 a day. What would a world look like in which we grow together with our potential and no longer have to leave anyone behind?
We especially invite investors who are not interested in luxury startups, but want to create sustainable benefits in the world – without losing sight of profitability.
FTT Forensic Discovery has the Forensic Think Tank (FTT) network of experts. Our reports include IT forensic reports, IT reports and appraisals or appraisals.
What are expert opinions in IT and how useful are they?
IT reports are used to analyze and evaluate existing or alleged defects and damage to IT systems. The profitability of offers, orders and deliveries of IT systems can be checked using valuation reports. An appropriate value is determined depending on the scenario: the current value on the reporting date of hardware or specially developed individual software.
IT forensic reports contain an evaluation of digital traces that can be found on numerous devices equipped with chips and storage media. The FTT reports show the logical connection between the traces and thus do part of the criminalistic work.
Who do we support with our reports?
As an association of experts for systems and applications in information processing, we provide advice and clarification to companies and IT specialists with questions, problems and legal disputes in the field of IT.
Courts are increasingly preoccupied with a plethora of disputes on complex issues that go well beyond the field of jurisprudence.
We support you with our experts to clarify all facts that are related to the use of computer technology.
Quality assurance through the four-eyes principle
Each of our experts works impartially, independently, objectively and without instructions.
Our reports can be used in court and are subject to high quality standards. In order to guarantee this quality, every report prepared by an expert is checked internally by at least one other body for traceability, relevance and the associated scope („as long as necessary, as short as possible”) as well as compliance with academic standards.
External access – a question of security
In the age of Industry 4.0 and the Internet of Things (IoT), secure VPN gateways in connection with VPN access points are the prerequisite for protecting machines from unauthorized access.
The control and maintenance of any machine is increasingly being carried out remotely, which saves companies considerable travel costs. For some of our customers it was common for specialists to be flown in from Germany to the USA, which is not only an expensive undertaking, but in times of Covid has also become more and more of a logistical problem.
But can companies rely on the machine manufacturer’s remote access modules actually complying with current safety standards?
Which company wants or is allowed – whether its data protection regulations – to tolerate third parties in its network?
Hardly any contractual regulations for IT security
When manufacturing systems are maintained by external third parties and there is no secure and up-to-date solution, hacker attacks can easily cause millions in damage. Unfortunately, alarming security vulnerabilities appear every day.
The simple reason: IT security is either not part of the core business of machine manufacturers or – the more common case – the machines are contractually explicitly not permitted for direct access from outside.
Best protection against hackers
Our routers are manufacturer-independent and can be configured individually. We rely on transparent open source code, hard encryption, secure passwords, unique authentication up to multi-factor and hardware authentication as well as clear access control.
In order to additionally protect your data behind the VPN router, we can also cascade the access system so that attempted attacks are no longer worthwhile.
If data, data records, electronic documents and electronic records that are required to be recorded and retained were created or received in the company, they must also be retained in this form and may not be deleted before the retention period has expired.
Excerpt from the GoBD of the Federal Ministry of Finance, Federal Tax Gazette Part I, p. 29
Retention obligation also for e‑mail traffic!
Do you comply with the principles for the proper management and storage of books, records and documents in electronic form and for data access (GoBD) in e‑mail traffic?
The clear and short answer: No.
As far as we know, there is no system that stores all data as it was received digitally. But this is exactly what the GoBD prescribes. How can e‑mails that are easily manipulated, of all things, be stored in a tamper-proof manner? And does this require complicated, time-consuming training in new systems?
The clear and short answer again: No.
E‑mail communication: audit-proof & legally binding.
E‑mails are still the most important means of communication in companies. Have you ever imagined the case that you have to prove that you have not (!) Received an email? Do you have to make sure that all of your employees enjoy full legal security?
Forensic Mail offers transparent and uniquely legally secure communication for everyone. With Forensic Mail you design your e‑mail traffic and the archiving of e‑mails in a revision-proof, court-proof and transparent manner. But that’s not all.
Backup system: simple, fast, invisible.
Classic audit-proof solutions make a complete backup of all data. This means that if individual e‑mails are accidentally deleted, the entire backup block always has to be restored at great expense – a cumbersome and time-consuming operation.
Our system is also capable of such backups. But through this it creates a feather-light copy of every single email that you can restore with one click. You retain full control over your folder structure.
You can keep your previous e‑mail client and do not have to change anything in your workflow. Our system works invisibly in the background.
Forensic mail server archive system:
✔ Legally compliant (§§239, 257 HGB, §§ 146, 147 AO, GoBD)
✔ Court festival
✔ Maintenance-free
✔ Tamper-proof
✔ Redundant
✔ Usual access to Thunderbird, Outlook etc. (IMAP, POP3, SMTP)
✔ Real-time e‑mail backup
✔ Post-quantum cryptographic (SHA 512 with secp521r1)
For example, e‑mails with the function of a commercial or business letter or a booking receipt must be kept in electronic form. […] A conversion into another format is permitted if the machine readability is not restricted and no content changes are made. The taxpayer must also take into account that the corresponding restrictions in these cases can be at his expense.
The Federal Ministry of Finance, GoBD, pp. 29, 31 and 32
If you sleep restlessly because of the burden of proof and the burden of proof, contact us immediately.
For a good night’s sleep, with certainty.
Most companies operate their own servers to meet their needs for variety of services and data protection. However, the security of these servers has its price and is often neglected for reasons of cost. Medium-sized companies in particular often lack the means to invest in the reliability and availability of their own servers. And what happens if a server goes down?
We experienced this in Strasbourg: Individual software has been destroyed, valuable e‑mails have been deleted. According to Funkschau , the fire was „a tremendous game” for 1.5 million customers. Because the secure operation of servers is all about one thing: the bare existence. Most customers only realized this when it was too late. Because servers are material and do not float somewhere in the clouds.
Any server can suffer a sudden and terrifying server infarction.
With our unique system, we have succeeded in achieving high availability and reliability at around a quarter of the previous costs. We manufacture our server clusters especially for medium-sized companies, which often can hardly afford conventional servers. The advantage of a cluster: If an entire server fails due to a defect, the entire system continues to run stably. In addition, the clusters are connected across data centers, so that at most one meteorite impact would destroy data and make a „Disaster Recovery Plan” necessary.
We combine four micro mainboards in a housing specially made for us. You determine the equipment. Four instead of the usual two identical servers in a cluster secure your business with 99.99% guaranteed availability for critical applications. Your data is mirrored and backed up automatically and monitored in the background. You get full control through direct hardware access at BIOS level and fully equipped servers of your choice – tailored to your needs.
We would be happy to set up your professional hardware according to your wishes and put together your individual workstation .
Those who value a high level of security use cluster solutions. Our highly available and fail-safe server clusters are specially developed for medium-sized companies and can be configured individually.
Dedicated Bare Metal Micro Ceph Clusters:
✔ Desired server
✔ Highly redundant
✔ Inexpensive
✔ Main memory with error correction possible (ECC-RAM)
✔ Full access control (easily remote controlled via IPMI)
✔ 6–16 cores (AMD Ryzen 5000)
✔ 100% green electricity
✔ 100% GDPR-compliant with German location
✔ Rack housing and cold aisle air conditioning
✔ Directly at the DE-CIX
✔ Connection up to 40 Gb / s (10 Gb / s per server)
✔ Can be scaled as required to meet your needs
We make sure that our customers sleep well. Thanks to fun in the operational business, transparent structures, ergonomic and secure IT. If you are looking for a respectful connection between people and technology, ask us.
We awaken potential
How happy are your employees?
How well do you tap their potential?
Can IT help with this?
Yes. And that 24/7.
If you are looking for a complex and unusual but innovative solution, we are guaranteed to help.
Be a real person – become a creator and awaken dormant potential. Before others do – and one chance is missed.
Our portfolio
We offer software, hardware and advice from a single source through the companies that are directly associated with us.
In terms of human and social forensics, we work with the strengths of our customers.
who we are
With over 1,500 programmers, the leading specialists in IT forensics, artificial intelligence, big data, Industry 4.0 and High Performance Computing (HPC), we also meet special needs that inevitably arise in the context of digital transformation.
We offer solutions that are both intelligent and close to people, and therefore practical. If you are desperate, cannot crack a problem, or are looking for really seriously thought-out solutions: get in touch!
Our holistic portfolio includes:
Contact us here and secure a free initial consultation!
FTT Forensic Discovery GmbH
Dammwäldchen 3
95444 Bayreuth
Geschäftsführer: Christian Bubenheim
Registergericht: Amtsgericht Bayreuth
Handelsregister: HRB 6659
Telefon: +49 921 730 88 70
Telefax: +49 921 730 88 68
E‑Mail: info@forensic-discovery.de
Website: www.forensic-discovery.de
Steuer-Nr.: 208÷126÷80847
USt-IdNr.: DE316922947
HypoVereinbank Bayreuth
IBAN DE95773200720027470980
BIC HYVEDEMM412
Penta (solarisBank AG)
IBAN DE49 1101 0100 2357 4581 72
BIC SOBKDEBBXXX