Prospective client-partners can call InfoDynamics for these IT-related services:
A. IT Needs Assessment
application suited for their requirements. We evaluate current operational
and functional procedures and recommend a more simplified way of doing
things while meeting basic reporting requirement.
For certain Offices, we let them articulate and define their requirement for
any database requirement - up to allowing them to define the data fields and
even allow them to set its sequence for data entry.

After the IT Needs Assessment stage we develop and
customize a system as prescribed by each Office. We
can develop as many database management for every
resource as needed. We guarantee full compliance to
the data as initially defined by the user. Then we run
the customized system for their final evaluation. We
modify as needed to ensure a seamless fit to the user's
As part of the customization process, we also customize program screens to
include the client organization's logo, officials, pictures as recommended and
organizational taglines.
We finally deploy to the client an executable program that is able to run in
any Windows Operating Systems platform - from Windows95 to XP, Vista,
or Windows7.
C. Instructional Assistance
We provide onsite, hand-on training as may be needed. We also provide a
video-based instruction manual of how to operate the system. The user
simply clicks on the topic selected and the video-manual will execute an
auto-demo of how to use the system. On the screen, the user will then see
the mouse moves from one command button to another showing how the
system works. This will serve as an actual demo on how to use the system.
We have done away with a word-based manual to a video-tutorial manual as
the latter provides a quick learning curve for our system users..
D.

For all its software, InfoDynamics has
acquired the SecureInstall PC-to-MIS
Security protocol where the installed
software runs only in the user's registered
PC unit. While the executable program
can be copied by any person, it is secured
to run only in the PC for which it was
originally installed. The SecureInstall
protocol first validates the HDD Serial No.
before activating the program.
E. Post-Installation Services
We provide online access via Internet to the user's installed PC unit. In cases
of systems modification, upgrade or instruction we simply access the client's
PC unit and deploy the needed assistance.
Using this online support it minimizes the need for a physical visit to the
client's PC just to deploy the assistance needed.