
References
Find below translated experiences from our customers of our collaboration.
Due to nature of some of our assignments, not all references are public. Do not hesitate to contact us to find out how we can help your organization reach its goals!
Contact Us


Exemplar has worked both as a developer and integrator of our central production documentation system as well as supporting Unix systems' problem solving, planning and implementation. The cooperation with Exemplar has been going on for over 10 years.

Exemplar has provided the Ministry of Finance with an application audit related to information security and an assignment requiring IT infrastructure expertise.

During my career, I have seen well over 100 different IT projects and this was definitely one of the most successful.

Exemplar has provided maintenance support for critical core application of Finnish Blood Service for a long time. Based on these good experiences, Exemplar's help has expanded to other projects of the Finnish Blood Service. Mari has supported us for over 10 years with our core environment maintenance, development, change implementations and as a safeguard of information security and continuity. With Mari's investment and effort, we have successfully survived occasional production interruptions and a demanding application migration project.

Mari and Timo have worked on a project to transform Myllykoski Global IT environment into harmonized, globally efficient IT infrastructure. The project has involved consolidating and migrating users to new high availability Exchange environment, SW distribution and imaging planning and implementation, network simplification and re-design, re-structuring AD environment and harmonizing and simplifying global GPO (Group Policy Object) environment.

Exemplar has been involved in developing Tekes' strategic knowledge management by mapping the development paths with which Tekes can move to the next level in knowledge management.

Exemplar has provided us with an infrastructure and information documentation model that emphasizes information security.